mis exam 1

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which of the following statements is true of a virtual private cloud (VPC)?

A VPC can be built on a public cloud infrastructure.

Which of the following is a difference between a virtual private network (VPN) and a virtual private cloud (VPC)?

A VPC provides the advantages of cloud storage, but a VPN by itself cannot provide these advantages

Which of the following passwords is the weakest?

B33rmu9

Which of the following passwords is the strongest?

[email protected]

Which of the following precautions should be taken to protect one's password?

Do not write it down or share it with others.

Which of the following statements is true of private clouds?

Idle servers in a private cloud cannot be repurposed for use by other organizations.

Which of the following statements is true of using an information system to improve process quality?

Information systems that are labor saving may not be efficient.

Which of the following is an advantage of a private cloud in an organization?

It allows the organization to manage its servers with elastic load balancing.

Which of the following statements is true of cloud-based hosting?

It gives little visibility over the security being used to protect data.

Which of the following is an advantage of a virtual private network (VPN)?

It helps to securely access information over the public Internet.

Which of the following is true of a value chain?

It is a network of value-creating activities.

Which of the following is a characteristic of a mobile device?

It is a small and lightweight device.

Which of the following is true of a virtual private network (VPN)?

It provides a secure connection for information transmitted over the public Internet.

Which of the following requirements should a password fulfill in order to be considered strong?

It should not contain the user name or company name.

A user has created a password that meets all the criteria for a strong password. What is a potential drawback of such a password?

It will be difficult to remember.

Which of the following is necessary for a collaboration to be successful?

Members should provide and receive critical feedback.

Which of the following should be followed for an effective collaboration?

Multiple iterations and feedback should be used to improve collaboration.

Which of the following is likely to be a consequence of cloud computing in the future?

The cost of obtaining elastic resources will decrease.

Which of the following is a reason for an internal information system that uses Web services to not be considered a cloud?

The number of servers is fixed and is not made elastic.

What should be done if someone needs to log into a user's account to solve a problem and asks for the user's password?

The user should enter the password themselves

Which of the following statements is true about information systems?

They are a group of components that produce information.

Which of the following statements is true of Web services?

They are programs designed using the concept of service-oriented architecture.

Why is it important for business professionals to take an active role in developing and managing information systems?

They know whether a system meets their needs and requirements.

Which of the following is an advantage of using a private cloud over a virtual private cloud (VPC)?

Unlike a VPC, a private cloud does not require permission from regulating bodies to host sensitive data.

Which of the following statements is true of Google Drive?

Users receive an email when a document is made available to them.

Each stage of the value chain not only adds value to the product but also ________.

accumulate costs

Which of the following refers to information that is based on correct and complete data and has been processed correctly, as expected?

accurate information

Which of the following techniques is best suited for creating memorable, strong passwords?

basing passwords on the first letter of the words in a phrase

The outermost components of the information systems framework ________.

can take action

According to the business process modeling notation, the end of a business process is symbolized by a ________.

circle having a thick border

Porter's five competitive forces can be grouped into two types: forces related to ________ and forces related to supply chain bargaining power.

competition

An organization responds to the structure of its industry by choosing a ________ strategy.

competitive

Organizations can dynamically reuse servers that use Web services internally by ________.

creating a private cloud

________ is defined as recorded facts or figures.

data

________ represent the movement of data from one activity to another.

data flows

The effectiveness of new online ad programs needs to be evaluated based on the frequency at which a customer clicks those ads. Identify the most effective and efficient method to analyze this data.

data must be saved in batches and processed later

Which of the following is a primary activity in the value chain?

delivering products to consumers

Which of the following factors has contributed to an increase in the popularity of cloud hosting?

development of virtualization technology that allows near-instantaneous creation of new virtual machines

________ is the ratio of benefits to costs.

efficiency

Which of the following is a product implementation principle of competitive advantage?

enhance existing products or services

Which of the following tasks is performed during the starting phase of project management?

establishing team rules

Which of the following collaborative activities requires providing easy-to-use and readily available multiparty communication?

feedback

Which of the following components of an information system play the role of actors?

hardware and people

Automation of a process activity consists of moving work from the ________ of the symmetrical five-component framework.

human side to the computer side

Which of the following statements on password etiquette is true?

if someone asks for the password, do not just give it out.

Which of the following is least likely to be an outcome of organizations forming alliances with each other?

increment of purchasing costs

________ refers to the products, methods, inventions, and standards that are used to produce information.

information technology

Which of the following is an advantage of a content delivery network?

it provides protection from denial-of-service (DOS) attacks.

In version control systems, shared documents are placed into shared directories called ________.

libraries

Porter's model of business activities includes ________, which are interactions across value activities.

linkage

A manufacturing system uses sales forecasts to plan production. It uses the production plan to determine raw material needs and then uses the material needs to schedule purchases. This ultimately leads to reduced inventory costs. Which of the following is being used to reduce the inventory cost?

linkages

________ decisions are decisions about the allocation and utilization of resources.

managerial

The difference between the value that an activity generates and the cost of the activity is called the ________.

margin

With the ________ collaboration tool set, a participant should be able to collaborate with his or her team, though he or she will get little support from the software.

minimal

The number of transistors per square inch on an integrated chip doubles every 18 months. This observation is known as ________ Law.

moore's

Which of the following is an example of synchronous communication?

multiparty text chat

Web applications can be developed by less-skilled, lesser-paid employees; they are considerably cheaper to develop than ________ applications.

native

An internal information system built using Web services is said to be using the cloud if it ________.

offers elasticity in the usage of servers

Which of the following primary activities describes collecting, storing, and physically distributing products to buyers?

outbound logistics

An online service provider provides its users with hosted computers, an operating system, and a database management system (DBMS). This allows customers to add their own applications to the hosted services. Which of the following cloud-based offerings is being provided to the users?

platform as a service (PaaS)

The ________ component of the information systems framework provides instructions for people.

procedure

Which of the following is a critical responsibility of business professionals in using information systems?

protecting the security of a system and its data

________ data is data that the device requests from the server.

pull

________ data is data that the server sends to the device.

push

Activities within a business process are shown in ________.

rectangles with rounded corners

A(n) ________ is an information system (IS) that provides computer-based activity at a distance.

remote action system

________ occurs when users move their activities, especially long-running transactions, across devices.

roaming

A ________ is a subset of the activities in a business process that is performed by an actor.

role

The software and procedure components of the information systems framework are ________.

set of instructions

Phobas Inc. offers an online service that stores notes made by customers on the cloud. When a customer enters notes on a device, it gets updated in all the devices he/she owns. Which of the following cloud-based offerings does Phobas Inc. provide to its customers?

software as a service (SaaS)

According to the business process modeling notation standard, an activity with a boxed plus sign inside it indicates a ________.

subprocess

A remote system designed by Alpha Solutions uses cameras and motion-sensing equipment to issue tickets for traffic violations. This system is an example of ________.

telelaw enforcement

The bargaining power of a customer is weak if ________.

the availability of a rival product is limited

Simpson's Lawn Services decides to offer two free mowing services for all customers who booked garden landscaping in the fall. Which of the following forces is Simpson's Lawn Services addressing?

the threat posed by Roger's Landscapes, a new competitor

If the price of an alternative is lower than the price of the existing product, and customers perceive similar benefits from both the products, then the ________.

threat from the substitute is strong

Which of the following reasons is valid for a company to create a new information system?

to help employees achieve the strategies of the business

If an organization opts for software as a service (SaaS), it will have to ________.

transfer data and develop procedures

Security systems ultimately depend on the behavior of their ________.

users

The competitive strategy of an organization determines its ________.

value chains

________ are virtual meetings in which attendees view one of the attendees' computer screens for formal and organized presentations.

webinars


संबंधित स्टडी सेट्स

Chapter 2 Terms and Practice MCQ

View Set

Wset Nível 3 - Fatores que afetam a qualidade o estilo e o preço

View Set

Chapter 12 Southeast Asians and Pacific Islanders

View Set

Unit 12 Review Questions Real Estate Financing

View Set

ApHuG Unit 2-Agriculture and Rural Land Use-Vocabulary terms

View Set

Ch. 4 - The Banking Services of Financial Institutions

View Set

check your learning CH 11, 19, 20, 21, 22, 23, 24

View Set

Positioning of the Hand, Wrist, Elbow and Forearm

View Set