MIS (Saylor/ Peterson)

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

The first personal microcomputer came out in 1975 and was featured on the cover of Popular Mechanics. What was the name of this microcomputer? A. Apple I B. Altair 8800 C. Mark-8 D. Nascom 2

Altair 8800

eBay and Amazon were two of the first online e-commerce sites. Both online retailers were established in what year? A. 1993 B. 1994 C. 1996 D. 1997

1994

Intel and Advanced Micro Devices are examples of which computer component essential for its operation? A. CPU B. Hub C. RAM D. Router

CPU

Which of the following is an example of system software? A. DOS B. Malware C. Firmware D. Mobile apps

DOS

This type of protection lasts for the life of an original author plus 70 years. a. Copyright b. Intellectual property c. Patent d. Trademark

Copyright

RAM is installed in a computer through the use of a: a. DIMM. b. DNS. c. hard disk. d. motherboard.

DIMM.

Which of the following business processes is built to help organizations identify the best course of action? A. Decision Support Systems B. Quality management C. Knowledge management D. Electronic Data Interchange

Decision Support Systems

___________ involves selecting an end of life date for an old system. a. Direct cutover b. Parallel operation c. Pilot implementation d. Phased implementation

Direct cutover

Which of the following is explicitly prohibited as part of the Association for Computing Machinery's code of ethics? A. Browsing a competitor's website B. Using a company computer to find another job C. Using a company computer after business hours D. Entering or using someone else's computer without permission

Entering or using someone else's computer without permission

The amount and substantiality of the portion used in relation to the protected work as a whole is a definition of: A. Copyright B. Fair use C. Trademark D. Patent

Fair use

In which era of globalization did fiber-optic Internet connections and software creat a "flat world platform"? A. Globalization 1.0 B. Globalization 2.0 C. Globalization 2.5 D. Globalization 3.0

Globalization 3.0

Which of the following is a productivity software application? A. Antivirus B. DOS C. Groupware D. Registry

Groupware

Innovation to which of the following components first allowed computers to become smaller and more portable? A. Hard drive B. Mouse C. Monitor D. Power supply

Hard drive

Which of the following network devices connects other devices to the network and sends packets, rather than managing them? A. Bridge B. Hub C. Router D. Switch

Hub

The ability to take your work anywhere via smartphone or tablet is an example of what advantage of cloud computing? A. Flexible capacity B. Improved mobility C. Virtual environment D. Improved collaboration

Improved mobility

Allowing suppliers to manage their own inventory is a characteristic of which primary function of the value chain? A. Inbound logistics B. Operations C. Outbound logistics D. Service

Inbound logistics

___________ assures information has not been altered in any unauthorized or unexpected way. A. Availability B. Confidentiality C. Integrated D. Integrity

Integrity

Which of the following presents the largest infrastructure challenges organizations face in globalization? a. Internet speed b. Sources of power c. Incompatible hardware d. Telecommunications and time zones

Internet speed

What group is the last to adopt a new technology because they have an aversion to change? A. Early majority B. Innovators C. Laggards D. Late majority

Laggards

Which of the following is an advantage of mobile apps over traditional desktop apps? a. Mobile apps require more disk space than traditional apps. b. Many organizations are developing company specific apps c. It costs less to create a mobile app than a traditional desktop app. d. Mobile apps enable users to access information wherever they have a data network or Internet connection.

Mobile apps enable users to access information wherever they have a data network or Internet connection.

Which of the following is an advantage of cloud computing for business? A. Rigid cost structure B. Off-premises servers C. Opportunity to monetize D. Non-negotiable agreements

Off-premises servers

Which of the following is one advantage collaboration software provides to businesses? A. Organizations can focus on specific products. B. Office applications can be shared between individuals C. Automatic product delivery for business teams is simplified. D. Suppliers create and send invoices to an internal computer system.

Office applications can be shared between individuals

What is the main reason businesses may be skeptical about using open source software? A. Open source software is not completely free. B. Open source applications are more vulnerable to attack. C. Programmers charge a fee to compile the code they built. D. Applications are not compatible with closed source software.

Open source applications are more vulnerable to attack.

What workflow software allows people to work together in a global e-commerce solution? a. Form models b. User reassignments c. Document integrators d. Payment-processing systems

Payment-processing systems

Which of the following is an ethical decision involving technology that may have legal ramifications? A. Anonymously submitting complaints B. Finding one's friends or family online C. Posting complaints about someone by name D. "Liking" public pages or events anonymously

Posting complaints about someone by name

Prostheses, durable building materials, and home goods are among recent innovations in which of the following trends in the future of technology? a. Collaborative b. Printable c. Surgical d. Wearable

Printable

Which stage of the data mining lifestyle is focused on understanding the issue and domain environment at hand? A. Problem definition B. Creating the database C. Exploring the database D. Preparation for creating a data mining model

Problem definition

The main job duty of which of the following individuals is to oversee the initiation, design, and implementation of IT related projects? A. Functional manager B. Project manager C. Software engineer D. Systems analyst

Project manager

Which of the following is an essential function of operating systems? A. Providing application resources B. Managing application resources C. Upgrading user interface components D. Providing a platform for software developers to write applications

Providing a platform for software developers to write applications

Which of the following components contributes to the speed of a computer? A. RAM B. Hard Disk C. Solid state drives D. Input and output cables

RAM

What is one of the greatest disadvantages to storing sensitive data on the cloud? A. Unlimited disk space B. Reliability on third party cloud systems C. Services are leased on an as-needed basis D. Available from any device with an internet connection

Reliability on third party cloud systems

Which of the following phases is part of the RAD methodology? A. Agile revisioning B. Requirements planning C. Assembly development D. Waterfall

Requirements planning

Which of the following supply-chain management systems is best applied when the goal is to maintain operations with vendor partnerships and meet 100% order fulfilment requirements? A. Anaplan B. Retail Link C. OpenLogistix D. Accenture Strategy

Retail Link

Which of the following advantages does closed source software have over open source software? A. Patches and additional features are available free. B. Application code can be reviewed before you install it. C. The company that developed the software offers technical support. D. More closed source applications exist for mobile apps than open source applications.

The company that developed the software offers technical support.

During the build-out of the Internet in the late 1990s, Internet protocols such as TCP/IP, HTML, and ___________ became freely available standards used by everyone. a. ARP b. DHCP c. HTTPS d. SMTP

SMTP

During the build-out of the internet in the late 1990s, internet protocols such as TCP/IP, HTML and ___________ became freely available standards used by everyone. A. ARP B. DHCP C. HTTPS D. SMTP

SMTP

How do legal restrictions pose a challenge to global firms? A. Some countries have a ban on certain items. B. Human rights law plays a central part in international law. C. Some countries have restrictions on the use of cellular phones for workers D. Companies in other countries work hard to build relationships to business partnerships, while American companies work through lawyers to create these relationships.

Some countries have a ban on certain items.

Which of the following is one of the three factors of authentication: A. Something you say B. Something you did C. Something you have D. Something you wrote

Something you have

EDI can be thought of as the exchange of business documents: A. from computer to computer. B. from computer to employee. C. from customer to computer. D. from employee to computer.

from computer to computer.

Which of the following career paths incorporates both the technical and management tracks of information systems? A. Area manager B. Senior manager C. Supervisor D. Systems analyst

Systems analyst

This global economic trend identified in 1996 is an economy with the capacity to work in real time. A. The global firm B. The world is flat C. Globalization 1.0 D. The network society

The network society

What kind of programming language is more like a spoken language and is not hardware-specific? A. First-generation B. Fourth-generation C. Second-generation D. Third-generation

Third-generation

The more products or services that meet particular needs, the less profitability there is in an industry. Which of Porter's Five Forces addresses this idea? A. Bargaining power of suppliers B. Bargaining power of customers C. Rivalry among existing competitors D. Threat of substitute products or services

Threat of substitute products or services

Which of the following is a point for deliberation for organizations when creating a plan for digital transformation? a. Top down b. External consulting c. Engage market trends d. Software development for the infrastructure

Top down

Who creates prototype designs during the design phase of a website? A. Customer B. Programmer C. Project Manager D. Web Designer

Web Designer

Which of the following uses radio technology to convert Internet signals into radio waves through a broadband modem? a. Bluetooth b. Hotspot c. Mobile d. Wi-Fi

Wi-Fi

Which of the following uses radio technology to convert signals into radio waves through a broadband modem? A. Bluetooth B. Hotspot C. Mobile D. Wi-Fi

Wi-Fi

Microsoft's first commercial success with a graphical user interface was: A. Windows 1.0. B. Windows 3.0. C. Windows 3.1. D. Windows NT.

Windows 3.0.

Application software is designed to do a specific task. Which of the following is an example of application software? a. Windows XP b. System Registry c. World of Warcraft d. HD Sector Boot Software

World of Warcraft

Application software is designed to do a specific task. Which of the following is an example of application software? A. Windows XP B. System Registry C. World of Warcraft D. HD Sector Boot Software

World of Warcraft

Which of the following is an example of personally identifiable information? A. Your name B. Your pet's name C. Your second cousin's name D. Your spouse's maiden name

Your name

Open source software was developed to: a. create a social network with other programmers. b. develop a new business model of software licensing. c. build problem-solving programs to share with everyone. d. sell programs they built as an individual business venture.

build problem-solving programs to share with everyone.

Song lyrics, computer programs. and ___________ are all types of intellectual property. A. common phrases B. expressions C. product designs D. services

product designs

Different cultures, competition, and ___________ caused the One Laptop Per Child effort to fail. a. corruption b. lack of Internet access c. power issues d. school agreements

corruption

The process of encoding data upon its storage or transmission is called: A. encryption. B. access control. C. authentication. D. public key infrastructure.

encryption.

The physical component of information systems includes hardware like disk drives, flash drives, keyboards, and: A. power strips. B. computer desks. C. human operators. D. external hard drives.

external hard drives.

Intellectual property is defined as any ___________, invention, or process that derives from the work of the mind or intellect. a. copy b. idea c. license d. project

idea

Data in a(n) ___________ database is defined in classes and subclasses. A. distributed B. object-oriented C. relational D. tabular

object-oriented

Time, cost, and ___________ are the three factors in software development. A. quality B. quantity C. relevance D. usability

quality

A ___________ creates new programming languages and operating systems to run on existing hardware. A. hardware engineer B. network engineer C. software engineer D. systems engineer

software engineer

Knowledge management is the process of formalizing the capturing, indexing, and ___________ of a company's knowledge. A. distributing B. editing C. securing D. storing

storing

In the 1980s and 1990s, a new kind of department, the IT department, was developed by combing the information systems function and the ___________ function. A. administrative B. human resources C. management D. telecommunications

telecommunications

Access control limits what information a user is allowed to read, ___________, add, and delete. A. export B. write C. observe D. save

write


Ensembles d'études connexes

Gilded Age and Unionization (1865-1900)

View Set

Unit 7 (Use of financial statements)

View Set

Iggy 11 Chapter 54: Care of Patients with Esophageal Problems

View Set

PM Ch.12, Project Management Final Exam +

View Set

EXAM 2 Patho Pharm practice questions

View Set