BUSA 245 final exam review Quiz 1,2,3,4,5,6,7,8,9,10,11
IT and MIS are functions within an organization that if used properly can increase the efficiency and effectiveness of an organization. When we talk about increased efficiency, it can be defined as? Select one: a. Doing the right thing b. Doing things right c. Buying the latest hardware d. Examine the Value Chain
Doing things right
Which of the following acronyms is NOT correctly defined
EPI- Electronic Data Integration
Which of the following is NOT a component of an ERP system?
GIS
Which of the following is NOT among the 5 Vs of big data: a. Variance b. Variety c. Veracity d. Value
a. Variance
A primary key made up of more than one field name is called a(n)? a. Foreign key b. Compound key c. Unique key d. Multiple key
b. Compound key
(01) You are working with a DBMS that has two tables Auto and Rental. The tables and contents are: Auto table contains vin# (primary key), make (text), color (text), mileage (number)Rental table contains customer# (number and part of primary key), date (date and part of primary key), vin# code (text and part of primary key) Which of the following queries correctly prints the make and color of all red cars? a. Select make, color From auto Where color=red b. Select make, color From auto Where color="red" c. Select make, color From rentalWhere color="red" d. None of those listed are correct
b. Select make, color From auto Where color="red"
Word and Facebook are examples of which of the following types of software? a. user b. application c. system d. control
b. application
How many bits are in one megabyte? a. One million b. Eight million c. One billion d. Eight billion
b. eight million
A smartphone is a computer system really not much different than a desktop computer, only a lot smaller. Which of the following would you NOT find inside a smartphone? a. RAM b. CPU c. Hard disk drive D. Screen
c. Hard disk drive
Which of the following is a nonbiometric security measure? Select one: a. Signature analysis b. Rootkit c. Callback modems d. Retinal scanning
c. callback modems
Software that secretly gathers information about users while they browse the web is referred to as? Select one: a. Trojan horses b. Worms c. Spyware d. Backdoors
c. spyware
Which type of encryption uses a public key to encrypt the message? Select one: a. SSD b. symmetric c. ANN d. asymmetric
d. asymmetric
Gathering _____ is part of the maintenance phase of the software development life cycle (SLDC). Select one: a. new funding b. competitive data c. performance data d. requests for proposals (RFPs)
performance data
A number of organizations, especially financial ones, are requiring an additional way for you to prove that you are the actual owner of the account to which you are attempting to gain access. This type of access control is referred to as? Select one: a. biometric security b. two factor authentication c. double verification d. none of these are correct
two factor authentication
A(n) _____ identifies a Web page and is the address of a document or site on the Internet. Select one: a. top-level domain b. Internet Protocol c. Weblog d. uniform resource locator
uniform resource locator
What is the security tool that provides a secure tunnel or "pipe" through the Internet? Select one: a. Virtual private network b. Firewall c. Public key infrastructure d. Virtual pipe net
virtual private network
In the following URL, which element is the top level domain name? http://www.amazon.com/alpha/people.html Select one: a. http: b. amazon c. .com d. alpha
.com
Which of the following is not a valid IP address? Select one: a. 192.168.1.1 b. 1.200.299.0 c. 101.2.12.144 d. 170.2.25.66
1.200.299.0
Which statement is true of an intranet? Select one: a. It aids the duplication and distribution of documents. b. It inhibits the sharing of software, such as an office suite or a database management system. c. It helps organizations move from a calendar-based document-publishing strategy to one that is based on events. d. It increases the costs and time of document production.
It helps organizations move from a calendar-based document-publishing strategy to one that is based on events.
Which statement is true of the Internet? Select one: a. It is less secure than an intranet. b. It is usually faster than an intranet. c. Its accessibility requires prior approval. d. Its geographical scope is limited.
It is less secure than an intranet
Revenue and business models are often used interchangeably but they are very different. Which of the following best describes a business model? Select one: a. It is how the business acquires high value customer b. It is how a business is funded c. It is part of a revenue model d. It is the framework for the entire organization
It is the framework for the entire organization
In Excel all the dates are based on a number, for instance the number 43600 when formatted as a date is 5/15/2019. The number is how many days since ___? Select one: a. January 1, 1900 b. January 1, 2000 c. January 1, 1800 d. January 1, 1950
January 1, 1900
A _____ is a device that connects a user to the Internet. Generally these devices connect DIRECTLY to a telephone line (such as AT&T with twisted pair) or a cable provider (such as Spectrum with coax cable). Select one: a. router b. server c. cookie d. modem
Modem
____ feasibility measures if the proposed system can work within the organization. Select one: a. Scheduling b. Technical c. Operational d. Financial
Operational
Which of the following is a primary activity in the Value Chain? Select one: a. Threat of new entrants b. Human Resources c. Firm Infrastructure d. Outbound Logistics
Outbound Logistics
Implementing an information system can be a complex endeavor. Project managers have tools to keep the project within budget and on schedule. Which of the following has lines and circles showing activities and when they begin and end? Select one: a. PERT b. RFP c. Agile methodology d. Gantt
PERT
During the implementation phase of the systems development life cycle (SDLC), in the _____ conversion, the old system and the new systems run together until testing is completed. Select one: a. phased b. plunge c. parallel d. pilot
Parallel
What is the correct order of the SDLC model? Select one: a. Requirements Gathering, Planning, Design, Implementation and Maintenance b. Planning, Requirements Gathering, Design, Implementation and Maintenance c. None of those listed are correct d. Requirements Gathering, Design, Programming, Implementation and Maintenance
Planning, Requirements Gathering, Design, Implementation and Maintenance
(01) You are working with a DBMS that has two tables Auto and Customer. The tables and contents are: Auto table contains vin# (primary key), make (text), color (text), mileage (number)Customer table contains customer# (number), name (text), address (text) and telephone# (number) You want to print a report that lists the the mileage and make of all Honda with under 50,000 miles. Which of the following is the correct Where statement? Select one: a. Where model=honda and mileage<50000 b. Where model="honda" and mileage<50000 c. Where model=honda and mileage<"50000" d. Where model="honda" and mileage<"50000"
Where model="honda" and mileage<50000
You need to add up all the values in cells C5, C6, C7, C8, C9, C10 and C11. Which of the following is the correct formula in Excel? a. =sum(C5:C11) b. none of those listed c. =sum(C5,C11) d. =sum(C5+C6+C7+C9+C10+C11)
a. =sum(C5:C11)
The Northwind database we are using has eight tables, one is the Product table. The primary key is Productid, but it also has two foreign keys. Which of the following is one of them? Select one: a. Categoryid b. customerid c. Shipperid d. unitprice
a. Categoryid
SQL is an example of which generation of computer languages? It is designed for end users. a. Fourth-generation language b. Assembly language c. Machine language d. First-generation language
a. Fourth-generation language
Which of the following is one of the forces of the Five Forces Model identified by Michael Porter (read them carefully)? a. Intraindustry competition b. Interindustry competition c. Barriers to entry d. Threat of buyers
a. Intraindustry competition
There are two ways that data can be presented or viewed in a data base. One is based on how it is stored and retrieved, the other is how it appears to the user. Which one is the way that it appears to the user? a. Logical view b. Physical view c. Sequential view d. Random view
a. Logical view
_____ improves database efficiency by eliminating redundant data and ensuring that only related data is stored in a table. a. Normalization b. Triangulation c. Encapsulation d. Fragmentation
a. Normalization
A sequence of instructions that directs a computer to perform an action or series of actions is called a? a. Program b. SSD c. Cobol d. Language
a. Program
Choose the wrong answer: a. The third generation of computers are identified by miniaturization. b. The fourth generation of computers are identified by VLSI, personal computers, and optical discs. c. The second generation of computers are identified by transistors. d. The first generation of computers are identified by vacuum tube.
a. The third generation of computers are identified by miniaturization.
HTML, Cobol, C and Java are examples of which of the following? a. computer languages b. computer programs c. none of the items listed d. operating systems
a. computer languages
One of the following is NOT a type of mobile analytics: a. installation analytics b. Performance analytics c. in app analytics d. Advertising and Marketing analytics
a. installation analytics
In HTML there is an <i> ....... </i> instruction. When the web browser displays the text between the <i> and </i> how will the text appear on the display? a. italics b. inverted c.indented d. indexed for search engines
a. italics
In a(n)__________, records can be accessed in any order, regardless of their physical locations in storage media. Select one: a. random access file structure b. logical access file structure c. sequential access file structure d. physical access file structure
a. random access file structure
Which of the following is not one of the functions provided by the operating system of a computer? a. word processing b. communications c. resource allocation d. data management
a. word processing
Signing onto a computer system is a three step process even though it feels like a single one. Which is the second step? Select one: a. Identification b. Authentication c. Integrity d. Authorization
authentication
In class, we discussed the speed of computers. Usually the faster the clock runs the faster the computer operates. Which of the following is an example of a clock speed? a. 4 Gigabyte b. 2.5 Gigahertz c. 7200 rpm d. 10 Megabits
b. 2.5 Gigahertz
If you copy the formula =A2+A3 from cell B10 to B11, the formula in B11 will be which of the following? a. None of those listed b. =A3+A4 c. =B2+B3 d. =A2+A3
b. =A3+A4
Which of the following best defines an operating system? Read the answers carefully, two look very similar, but quite different. a. It is the main circuit board containing connectors for attaching additional boards. b. It is a set of programs for controlling and managing computer hardware and software. c. It is a computer and all the software for managing network resources and offering services to a network. d. It is a collection of disk drives used for fault tolerance, typically in large network systems.
b. It is a set of programs for controlling and managing computer hardware and software.
Which of the following are two popular data visualization platforms? a. OLTP and OLAP b. Power BI and Tableau c. Excel and PowerPoint d.Apache and Cassandra
b. Power BI and Tableau
Which type of analytics develops models from the past to predict the future or ascertain the impact of one variable on another? Select one: a. Slice and dice b. Predictive c. Descriptive d. Forecast
b. Predictive
In the relationship diagram below from the marketing department of a small bank, what is the key field for the CS Reps table? a. None of those listed b. Rep Number c. Account Number d. Customer Acct Numb
b. Rep Number
There are three methods for accessing files listed in the textbook (hint, the third one is ISAM). Don't confuse with the three models or structures of a DBMS. The two are? Select one: a. Hierarchical and network b. Sequential and random c. Physical and logical d. Oracle and Access
b. Sequential and random
Business analytics is defined as? Select one: a. Collecting data from a variety of sources to build a data cube. b. Using data and statistical methods to gain insights into data and provide decision makers with information they can act on. c. The process if extracting, transforming and loading data. d. CRUD (create, read, update and delete) big data.
b. Using data and statistical methods to gain insights into data and provide decision makers with information they can act on.
A _____ stores definitions, such as field names, data types for fields, default values, and validation rules for data in each field. Select one: a. data mine b. data dictionary c. data mart d. data warehouse
b. data dictionary
In the following file name, what are the names of the folders that contain the actual file? C:\user\busa345\lab5.xlsx Select one: a. C:\user b. user and busa345 c. user, busa345 and lab5 d. C:\
b. user and busa345
Which of the following are NOT true about a screen with 1920x1080 resolution? a. Each of the 1920 times 1080 = 2,073,600 pixels on the screen are individually addressable b. It is referred to as a 4K device c. There are 1920 pixels horizontally d. The color and intensity of each pixel can be individually controlled
b.It is referred to as a 4K device
Which of the following is NOT an example of an output device? a. A cathode ray tube b. An inkjet printer c. A camera d. Speakers
c. A camera
Which of the following statements is true of data marts and data warehouses? a. Access to data is often slower in data marts than in data warehouses. b. Consolidating information from different departments is easier in data marts than in data warehouses. c. Despite being smaller, data marts can usually perform the same type of analysis as data warehouses. d. Data marts have more extended scope than data warehouses.
c. Despite being smaller, data marts can usually perform the same type of analysis as data warehouses.
Which of the following is the process of taking data from internal and external data sources and creating a data warehouse? Select one: a. Create, Read, Update, Delete b. Online Analytic Processing c. Extract, Transform, Load d. Extract, Tag, Link
c. Extract, Transform, Load
In class we discussed the five generations of languages. Which one is the only one that a CPU can process directly - the native language of the computer? a. Non-procedural b. Assembler c. Machine d. Procedural
c. Machine
(01) Databases can be designed for speed of transaction processing or ease of use. Which of the following processing approaches rely on databases designed for ease of use? Select one: a. ETL b. CRUD c. OLAP d. OLTP
c. OLAP
There are two major types of software. Which of the following are examples of application software? a. Python b. C++ and Java c. PowerPoint and Adobe Acrobat d. Microsoft Windows and Linux
c. PowerPoint and Adobe Acrobat
There are two different types of memory devices, primary (also called main or internal) and secondary (also called external). Disk drives and thumb drives are examples of _____. a. Arithmetic units b. ROM c. Secondary memory d. Primary memory
c. Secondary memory
In an analyzation of the auto industry in the US using Porter's Five Forces (including the level of competition within the industry) riding a bicycle, taking public transportation and walking are examples of items that appear in which ONE of the five forces? a. Threat of New Entrants b. Bargaining Power of the Buyer c. Threat of Substitutes d. Bargaining Power of the Supplier
c. Threat of Substitutes
In a relational model, when a primary key for one table appears as a field name in another table it is called a _____ key in the second table. Select one: a. domain b. secondary c. foreign d. surrogate
c. foreign
In a relational database table the rows and columns are referred to as: a. rows are called field names and columns are called records b. rows are called primary and columns are called secondary c. rows are called records and columns are called field names d. rows are called cells and columns are called files
c. rows are called records and columns are called field names
English is the most widely spoken language in the world because it is spoken by a large number of people as a second language. What language has the largest number of native speakers? Select one: a. Hindi b. Spanish c. Chinese d. English
chinese
If we cannot avoid a IT risk, we can try to minimize the impact of some risks. Which of the following is the best way to protect against a power outage for a desktop computer? Select one: a. Backup the ROM frequently b. Install antivirus software c. Use biometric security d. Connect to a UPS device
connect to a UPS device
You have just conducted a Value Chain analysis of your pizza parlor. A lot of customer feedback indicates that it took a long time for the server to take their order. Where does this issue fall on Porter's Value Chain? Select one: a. Customer service b. Outbound logistics c. Inbound logistics d. Operations/manufacturing
customer service
Which of the following HTML codes will display text in the largest size? a. <h1> This is the largest text size <\h1> b. <h6> This is the largest text size <\h6> c. <h6> This is the largest text size </h6> d. <h1> This is the largest text size </h1>
d. <h1> This is the largest text size </h1>
Tableau and Power BI are used for all of the following purposes except: a. Exploring and finding patterns in data b. Creating multiple charts to get meaningful insight in data c. Allowing analyzing data with different formats d. All of the above
d. All of the above
In class we talked about big data and data mining. The textbook discusses three types of business analytics. Which of the following is not one of them? a. Predictive b. Descriptive c. Prescriptive d. Informative
d. Informative
In a DBMS, the field that uniquely identifies a record in a relational database table is called a ____? Select one: a. Foreign key b. Data dictionary c. Relational key d. Primary key
d. Primary key
The data manipulation component of a DBMS usually includes a query language. Which of the following is a type of DBMS query language? a. QUB b. Access c. Java d. SQL
d. SQL
In the context of intentional computer and network threats, a _____ floods a network or server with service requests to prevent legitimate users' access to the system. Select one: a. backdoor threat b. blended threat c. keystroke logging attack d. denial-of-service attack
denial of service attack
A transaction in which money or script is exchanged only electronically is called a(n). Select one: a. Micropayments b. Click-through c. Virtual wallets d. Electronic payment
electronic payment
Which of the following is a biometric security measure? Select one: a. Firewalls b. Electronic trackers c. Passwords d. Facial recognition
facial recognition
The most serious problem with wikis is the: Select one: a. inaccuracy of content. b. inability to modify content. c. restricted access to the general public. d. lack of data privacy.
inaccuracy of content.
Processing an order faster than a prior system is an example of which of the following? Select one: a. intangible cost b. intangible benefit c. tangible benefit d. tangible cost
intangible benefit
Buying and selling of goods and services over the Internet using a smartphone is referred to as? Select one: a. e-business b. s-commerce c. e-commerce d. m-commerce
m-commerce
During the _____ phase of the systems development life cycle (SDLC), an information system is operating but enhancements, modifications and bug fixes are installed to keep the system running properly. Select one: a. design b. planning c. implementation d. maintenance
maintenance
What e-commerce business model is similar to the traditional brick and mortar store that sells goods and services, such as WalMart and Target? Select one: a. infomediary b. brokerage c. merchant d. subscription
merchant
Sending fraudulent emails that look legitimate is an example of? Select one: a. phishing b. pharming c. sniffing d. adware
phishing
During the design phase of the systems development life cycle (SDLC), the _____ design is created for a specific platform, such as choosing Dell servers running Ubuntu Linux and Java for the programming language. Select one: a. conceptual b. physical c. logical d. virtual
physical
Financial, technical, operational, schedule and legal feasibility studies are conducted in which phase of the SDLC? Select one: a. Design b. Requirements Gathering c. Planning d. Implementation
planning
In the client/server model, software runs on the local computer and communicates with the remote computer. What is the remote computer called? Select one: a. Router b. None of those listed c. Server d. Client
server
_____ take advantage of the human element of security systems. Select one: a. Denial-of-service attacks b. Trojan programs c. Blended threats d. Social engineering attacks
social engineering attacks
_____ refers to a broad class of Web sites and services that allow users to connect with friends, family, and colleagues online as well as meet people with similar interests or hobbies. Select one: a. Social networking b. Podcasting c. Weblogging d. Gigapop
social networking
DNS (Domain Name System) servers translate domain names into _____. Select one: a. MAC addresses b. hypertext c. proxy servers d. IP addresses
IP addresses
The ___________ component of an (old) enterprise resource planning (ERP) system provides information on assessing job candidates.
Human Resources
The textbook lists five generations of computer hardware. Which of the following is the one found in the classroom PCs and our smartphones (hint - 4th gen)? a. Parallel and optical b. VLSI - very large scale integration c. Transistors d. Vacuum tubes
B. VLSI - very large scale integration
RAM is different from ROM in that RAM is: a. nonvolatile b. secondary memory c. volatile d. removable
C. Volatile
Which "sourcing" describes when an organization has external volunteers to develop an information system or components? Select one: a. Out-sourcing b. In-sourcing c. Crowdsourcing d. Self-sourcing
Crowdsourcing
All of the following are among the most popular mobile marketing strategies except: Select one: a. Location-based marketing b. Customer-based marketing c. App-based marketing d. In-game mobile marketing
Customer-based marketing
Which of the following best describes reverse logistics?
Returning goods to the seller
What is the method for improving the volume or quality of traffic to a Web site from a site such as Google or Bing? Select one: a. GIS b. SEO c. TCP d. B2C
SEO
A feasibility study examines the potential for a new system from five different perspectives. Which perspective would include an analysis of the availability of hardware and software to implement the system? Select one: a. Operational b. Financial or Economic c. Technical d. Legal
Technical
__________is a service that uses the Internet rather than the telephone network to exchange spoken conversations. Select one: a. Internet relay chat b. Instant messaging c. VoIP d. Email
VoIP
The _____ denotes the type of organization or country the address of a document or site on the Internet specifies. Select one: a. top-level domain b. network interface card c. User Datagram Protocol d. Post Office Protocol
top-level domain
An organization with a(n) _____ structure might have several regional divisions that share authority and responsibility, but in general, it does not have its headquarters in a particular country. Select one: a. transnational b. international c. multinational d. global
transnational
Global information systems are challenging to implement. Which of the following is NOT one of the obstacles faced by developers when developing a global website? Select one: a. Date and money formats b. Cultural differences c. Web server performance d. Diverse regulatory practices
web server performance
You work for Bluegrass Car and Bike rentals. You need to write a SQL query that joins two tables, Rental and Bike. Which of the following is the SQL statement to join the two tables? Select one: a. Where rental = bike b. Where rental.bikeid = bike.description c. Where rental.bikeid = bike.bikeid d. Where customer.dlicense = rental.dlnumber
where rental.bikeid=bike.bikeid