MIS Quiz Questions
What is big data? A. A collection of large, complex data sets, including structured and unstructured data, which cannot be analyzed using traditional database methods and tools B. Processes and manages algorithms across many machines in a computing environment C. Focuses on forecasting future trends and producing insights using sophisticated quantitative methods, including statistics, descriptive and predictive data mining, simulation, and optimization D. Extracts knowledge from data by performing statistical analysis, data mining, and advanced analytics on big data to identify trends, market changes, and other relevant information
A. A collection of large, complex data sets, including structured and unstructured data, which cannot be analyzed using traditional database methods and tools
What occurs when resources reach full capacity and cannot handle any additional demand limiting throughout and impeding operations? A. Bottlenecks B. Redundancy C. Automation D. Streamlining
A. Bottlenecks
What expresses the specific number of instances in an entity? A. Cardinality B. Composite entity C. Business rule D. Null-valued attribute
A. Cardinality
What is a technique for documenting the entities and relationships in a database environment? A. Entity-relationship diagram B. Data model C. Database D. Relational database model
A. Entity-relationship diagram
Shelby Black runs a very successful hair salon in downtown Los Angeles. One of Shelby's tasks is to input positive and negative customer reviews into her computer system. What type of information is Shelby gathering? A. Feedback B. Processing C. Output Management D. Sales Processing
A. Feedback
Within the sites that support disaster recovery, ______ is a separate and fully equipped facility where the company can move immediately after a disaster and resume business. A. Hot site B. Cold site C. Warm site D. Disaster site
A. Hot site
Which of the following is considered data? A. Quantity sold B. Best customer by month C. Best-selling item by month D. Worst selling item by month
A. Quantity sold
Callie owns and operates one of the most successful local coffee shops in Denver called the Edgewater Café. Each time a customer purchases their 100th cup of coffee at the Edgewater Café, they receive a free pound of coffee of their choice. That is Callie attempting to create with her unique "Free Pound of Coffee" marketing program? A. Reducing buyer power with a loyalty program B. Increasing buyer power with a loyalty program C. Decreasing supplier power with a differentiated product D. Creating a substitute product
A. Reducing buyer power with a loyalty program
What is extraction, transformation, and loading? A. It is a process of entering data, tracking data, and loading it into a database B. It is a process that extracts information from internal and external databases, transforms it using a common set of enterprise definitions, and loads it into a data warehouse C. It is a process that is performed at the end of the data warehouse model prior to putting the information in a cube D. It is a process that is performed at the beginning of the data mining model
B It is is a process that extracts information from internal and external databases, transforms it using a common set of enterprise definitions, and loads it into a data warehouse
Which policy can protect a company's brand identity and outlines the corporate principles governing employees online communications? A. An internet workplace policy B. A social media policy C. A technology information policy D. A YouTube policy
B. A social media policy
Angela works for an identity protection company that maintains large amounts of sensitive customer information such as usernames, passwords, personal information and social security numbers. Angela and a coworker decide to use the sensitive information to open credit cards in a few of her customer's names. This is a classic example of which of the following security breaches? A. A social engineer B. An insider C. A spammer D. A dumpster diver
B. An insider
Trina works for Johnson Electric as a corporate lawyer, and part of her duties are to ensure the ethical and legal use of information within the company. Which of the following represents Trina's primary role at Johnson Electric as described by the text? A. Chief Knowledge Officer (CKO) B. Chief Privacy Officer (CPO) C. Chief Technology Officer (CTO) D. Chief Information Officer (CIO)
B. Chief Privacy Officer (CPO)
What is predictive analytics? A. A world where interconnected, Internet-enabled devices or "things" can collect and share data without B. Extracts information from data and uses it to predict future trends and identify behavioral patterns C. Refers to devices that connect directly to other devices D. Opportunities to change the way people purchase books
B. Extracts information from data and uses it to predict future trends and identify behavioral patterns
What is intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents? A. Ethics B. Intellectual property C. Privacy D. Confidentiality
B. Intellectual property
What has the potential to contain more than one value for an attribute? A. Single-valued attribute B. Multivalued attribute C. Null-valued attribute D. All of these are correct
B. Multivalued attribute
What generates revenue each time a user clicks on a link that takes the user directly to an online agent waiting for a call? A. Pay-per-click B. Pay-per-call C. Pay-per-conversion D. All of these are correct
B. Pay-per-call
What in the cloud means that each customer or tenant must purchase and maintain an individual system? A. Multi-tenancy B. Single-tenency C. Cloud fabric D. Cloud fabric controller
B. Single-tenancy
As a trainer for Exempla Healthcare, Tina is faced with many challenges to properly training her new hires. There are over 40 different locations where Exempla employees work across the Chicago metro area. Tina decides to implement some valuable ebusiness tools to help reduce traveling costs, increase speed, and provide flexibility for completing training sessions with all the new hires. Tina primarily uses PowerPoints and videos during her training modules. What is the most effective ebusiness tool for Tina to implement in order to accomplish all of her training goals? A. IMing B. Webinar C. Blog D. Email
B. Webinar
Which of the following forms of data mining assigns records to one of a predefined set of classes? A. clustering B. classification C. estimation D. affinity grouping
B. classification
Which of the below is NOT considered an advantage of a content management system? A. Content management systems store website content B. Content management systems increase order entry speed C. content management systems manage website creation D. content management systems allow editing and publication of information
B. content management systems increase order entry speed
Which of the following is considered information? A. Quantity sold B. Date sold C. Best-selling item by month D. Product sold
C. Best-selling item by month
Which type of ebusiness model best describes Apple? A. Pick-and-Mortar B. Brick-and-Mortar C. Click-and-Mortar D. Virtual
C. Click-and-Mortar
What occurs when a company uses its own computing infrastructure for normal usage and accesses the cloud when it needs to scale for high/peak load requirements ensuring a sudden spike in usage does not result in poor performance or system crashes? A. Community cloud B. Private cloud C. cloud bursting D. hybrid cloud
C. Cloud bursting
What process decodes information? A. Digital Certificate B. Encryption C. Decryption D. Cryptography
C. Decryption
What kind of attribute would be age? A. Null-valued attribute B. Single value attribute C. derived attribute D. stored attribute
C. Derived attribute
Which of the following are examples of analytical information? A. Airline ticket, sales receipts, and packing slips B. Hotel reservation, sales receipts, and packing slips C. Future growth analysis, sales projections, and product statistics D. packing slips, grocery receipt, and competitor information
C. Future growth analysis, sales projections, and product statistics
What occurs when two entities can be related to each other in many instances? A.One-to-one relationship B. One-to-many relationship C. Many-to-many relationship D. Composite entity
C. Many-to-many relationship
Which of the below would NOT be found in a digital dashboard for a manufacturing team? A. a graph of stock market prices B. a running line graph of planned versus actual production for the past 24 hours C. an excel spreadsheet with static cost analysis data D. a hot list of key performance indicators, refreshed every 15 minutes
C. an excel spreadsheet with static cost analysis data
With grid computing, a problem is broken into pieces and distributed to many machines, allowing ______ processing than could occur with a single system. A. more accurate B. slower C. faster D. cleaner
C. faster
All of the following are common tools used in industry to analyze and develop competitive advantages, except ______. A. The Five Forces model B. the three generic strategies C. the competitive analysis model D. value chain analysis
C. the competitive analysis model
Which of the following statements is accurate? A. A correct business rule for one organization may not be correct for another organization B. Business rules should be integral to operations C. A typical business may have hundreds of business rules D. All of these are correct
D. All of these are correct
Cheryl is the operations manager for Nature's Bread Company, which specializes in providing natural products for health conscious individuals. Cheryl is responsible for compiling, analyzing, and evaluating daily sales numbers to determine the company's profitability and forecast production for the next day. Which of the following is an example of knowledge that Cheryl would be using to successfully perform her job? A. Craig Newmark is customer number 15467 B. Flour Power is supplier number 8745643 C. Best-selling product by day D. Best-selling product changes when Tony the best baker is working
D. Best-selling product changes when Tony the best baker is working
What is the most secure type of authentication? A. Something the user knows such as a user ID and password B. Something the user has such as a smart card or token C. Something that is part of the user such as a fingerprint or voice signature D. Combination of all of these are correct
D. Combination of all of those are correct
Which of the following is an example of dynamic processes? A. Running payroll B. Calculating taxes C. Creating financial statements D. Employee layoffs
D. Employee layoffs
Which of the choices below represents the definition of information management? A. The act of conforming, acquiescing, or yielding information B. a method or system of government for information management or control C. information secrecy is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity D. Examines the organizational resource of information and regulates its definitions, uses, values, and distribution, ensuring that it has types of data/information required to function and grow effectively
D. Examines the organizational resource of information and regulates its definitions, uses, values, and distribution, ensuring that it has types of data/information required to function and grow effectively
Which of the following are included as potential external weaknesses in a SWOT analysis that are harmful to an organization? A. Core competencies, market leaders, cost advantages, excellent management B. Lack of strategic direction, obsolete technologies, lack of managerial talent, outdated product line C. Expanded product line, increase in demand, new markets, new regulations D. New entrants, substitute products, shrinking markets, costly regulatory requirements
D. New entrants, substitute products, shrinking markets, costly regulatory requirements
What kind of attribute is assigned to an attribute when no other value applies or when a value is unknown? A. Single-valued attribute B. Multi-valued attribute C. Derived Attribute D. Null-valued attribute
D. Null-valued attribute
Which social media site works by allowing content to find the users, instead of the users having to search for the content? A. MySpace B. Facebook C. Google D. StumbleUpon
D. StumbleUpon
What is a way of monitoring the entire system by viewing multiple inputs being processed or transformed to produce outputs while continuously gathering feedback on each part? A. Value Chain analysis B. The Five Forces Model C. Feedback D. Systems thinking
D. Systems thinking
Which of the following implies that information is current with respect to the business requirement? A. Uniqueness B. Accuracy C. Consistency D. Timeliness
D. Timeliness
What is software that will search several retailers' websites and provide a comparison of each retailer's offerings, including prices and availability A. augmented reality B. mutation C. fuzzy logic D. shopping bot
D. shopping bot
What is a system weakness that can be exploited by a threat? A. capacity B. web accessibility C. web accessibility initiative D. vulnerability
D. vulnerability
Fallback occurs when the primary machine recovers and resumes operations, taking over from the secondary server.
False
An acceptable use policy (AUP) requires a user to agree to follow it in order to be provided access to corporate email, information systems, and the Internet
True
_________ includes the tasks, activities, and responsibilities required to execute each step in a business process?
Workflow
_______ observes the exact pattern of a consumer's navigation through a site.
clickstream data
Companies do not need a privacy policy for email because an employee's work email is private and cannot be viewed by the company.
false
EBusiness is the buying and selling of goods and services over the internet.
false
If a business could produce the same product with less expensive inputs it would probably see a decrease in profits.
false
Maintainability means the system functions correctly and provides accurate information
false
Porter has identified three generic business strategies including focused, broad cost leadership, and switching strategy
false
Predictive analytics is a world where interconnected, Internet-enabled devices or "things" can collect and share data without human intervention.
false
Strategic decisions are highly structured decisions
false
Structured query language compiles all of the metadata about the data elements in the data model.
false
The primary purpose of a data warehouse is to perform transactional processes
false
A data-driven website can help limit the amount of information displayed to customers based on unique search requirements.
true
A disruptive technology is a new way of doing things that initially does not meet the needs of existing customers
true
A foreign key is a primary key of one tables that appears as an attribute in another table and acts to provide a logical relationship between the two tables.
true
A hashtag is a keyword or phrase used to identify a topic and is preceded by a hash or pound sigh (#). For example, the hashtag #sandiegofire helped coordinate emergency responses to a fire.
true
A primary key is a field that uniquely identifies a given record in a table.
true
A sustainable MIS infrastructure identifies ways that a company can grow in terms of computing resources while simultaneously becoming less dependent on hardware and energy consumption
true
An enterprise architect is a person grounded in technology, fluent in business, and able to provide the important bridge between MIS and business
true
Asking how any employees are out sick is a type of operational question
true
Benchmarks are baseline values the system seeks to attain
true
Bring your own device is a policy that allows employees to use their personal mobile devices and computers to access enterprise data and applications
true
Business intelligence is information collected from multiple sources such as suppliers, customers, competitors, partners, and industries that analyzes patterns, trends, and relationships for strategic decision making
true
Competitive advantages provide the same product or service either at a lower price or with additional value that can fetch premium prices
true
Date of birth would be a stored attribute..
true
FedEx created a first-mover advantage by developing its customer self-service software, which allows people to request parcel pickups, print mailing slips, and track parcels online
true
Granularity refers to the level of detail in the model or the decision-making processes
true
MIS is a tool that is most valuable when it leverages the talents of people who know how to use and manage it effectively.
true
Order date, amount sold, and customer number are all forms of data.
true
Porter's five forces Model analyzes the competitive forces within the environment in which a company operates to assess the potential for profitability within an industry.
true
Social networking is the practice of expanding your business and/or social contacts by constructing a personal network
true
Supplier power is one of the Porter's five forces and it measures the suppliers' ability to influence the prices they charge for supplies (including materials, labor, and services)
true
The Trojan-horse virus hides inside other software, usually as an attachment or a downloadable file.
true
Transactional information is used when performing operational tasks and repetitive decisions such as analyzing daily sales reports and productions schedules to determine how much inventory to carry.
true
fuzzy logic is a mathematical method of handling imprecise or subjective information
true