MIS Quiz Questions

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

What is big data? A. A collection of large, complex data sets, including structured and unstructured data, which cannot be analyzed using traditional database methods and tools B. Processes and manages algorithms across many machines in a computing environment C. Focuses on forecasting future trends and producing insights using sophisticated quantitative methods, including statistics, descriptive and predictive data mining, simulation, and optimization D. Extracts knowledge from data by performing statistical analysis, data mining, and advanced analytics on big data to identify trends, market changes, and other relevant information

A. A collection of large, complex data sets, including structured and unstructured data, which cannot be analyzed using traditional database methods and tools

What occurs when resources reach full capacity and cannot handle any additional demand limiting throughout and impeding operations? A. Bottlenecks B. Redundancy C. Automation D. Streamlining

A. Bottlenecks

What expresses the specific number of instances in an entity? A. Cardinality B. Composite entity C. Business rule D. Null-valued attribute

A. Cardinality

What is a technique for documenting the entities and relationships in a database environment? A. Entity-relationship diagram B. Data model C. Database D. Relational database model

A. Entity-relationship diagram

Shelby Black runs a very successful hair salon in downtown Los Angeles. One of Shelby's tasks is to input positive and negative customer reviews into her computer system. What type of information is Shelby gathering? A. Feedback B. Processing C. Output Management D. Sales Processing

A. Feedback

Within the sites that support disaster recovery, ______ is a separate and fully equipped facility where the company can move immediately after a disaster and resume business. A. Hot site B. Cold site C. Warm site D. Disaster site

A. Hot site

Which of the following is considered data? A. Quantity sold B. Best customer by month C. Best-selling item by month D. Worst selling item by month

A. Quantity sold

Callie owns and operates one of the most successful local coffee shops in Denver called the Edgewater Café. Each time a customer purchases their 100th cup of coffee at the Edgewater Café, they receive a free pound of coffee of their choice. That is Callie attempting to create with her unique "Free Pound of Coffee" marketing program? A. Reducing buyer power with a loyalty program B. Increasing buyer power with a loyalty program C. Decreasing supplier power with a differentiated product D. Creating a substitute product

A. Reducing buyer power with a loyalty program

What is extraction, transformation, and loading? A. It is a process of entering data, tracking data, and loading it into a database B. It is a process that extracts information from internal and external databases, transforms it using a common set of enterprise definitions, and loads it into a data warehouse C. It is a process that is performed at the end of the data warehouse model prior to putting the information in a cube D. It is a process that is performed at the beginning of the data mining model

B It is is a process that extracts information from internal and external databases, transforms it using a common set of enterprise definitions, and loads it into a data warehouse

Which policy can protect a company's brand identity and outlines the corporate principles governing employees online communications? A. An internet workplace policy B. A social media policy C. A technology information policy D. A YouTube policy

B. A social media policy

Angela works for an identity protection company that maintains large amounts of sensitive customer information such as usernames, passwords, personal information and social security numbers. Angela and a coworker decide to use the sensitive information to open credit cards in a few of her customer's names. This is a classic example of which of the following security breaches? A. A social engineer B. An insider C. A spammer D. A dumpster diver

B. An insider

Trina works for Johnson Electric as a corporate lawyer, and part of her duties are to ensure the ethical and legal use of information within the company. Which of the following represents Trina's primary role at Johnson Electric as described by the text? A. Chief Knowledge Officer (CKO) B. Chief Privacy Officer (CPO) C. Chief Technology Officer (CTO) D. Chief Information Officer (CIO)

B. Chief Privacy Officer (CPO)

What is predictive analytics? A. A world where interconnected, Internet-enabled devices or "things" can collect and share data without B. Extracts information from data and uses it to predict future trends and identify behavioral patterns C. Refers to devices that connect directly to other devices D. Opportunities to change the way people purchase books

B. Extracts information from data and uses it to predict future trends and identify behavioral patterns

What is intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents? A. Ethics B. Intellectual property C. Privacy D. Confidentiality

B. Intellectual property

What has the potential to contain more than one value for an attribute? A. Single-valued attribute B. Multivalued attribute C. Null-valued attribute D. All of these are correct

B. Multivalued attribute

What generates revenue each time a user clicks on a link that takes the user directly to an online agent waiting for a call? A. Pay-per-click B. Pay-per-call C. Pay-per-conversion D. All of these are correct

B. Pay-per-call

What in the cloud means that each customer or tenant must purchase and maintain an individual system? A. Multi-tenancy B. Single-tenency C. Cloud fabric D. Cloud fabric controller

B. Single-tenancy

As a trainer for Exempla Healthcare, Tina is faced with many challenges to properly training her new hires. There are over 40 different locations where Exempla employees work across the Chicago metro area. Tina decides to implement some valuable ebusiness tools to help reduce traveling costs, increase speed, and provide flexibility for completing training sessions with all the new hires. Tina primarily uses PowerPoints and videos during her training modules. What is the most effective ebusiness tool for Tina to implement in order to accomplish all of her training goals? A. IMing B. Webinar C. Blog D. Email

B. Webinar

Which of the following forms of data mining assigns records to one of a predefined set of classes? A. clustering B. classification C. estimation D. affinity grouping

B. classification

Which of the below is NOT considered an advantage of a content management system? A. Content management systems store website content B. Content management systems increase order entry speed C. content management systems manage website creation D. content management systems allow editing and publication of information

B. content management systems increase order entry speed

Which of the following is considered information? A. Quantity sold B. Date sold C. Best-selling item by month D. Product sold

C. Best-selling item by month

Which type of ebusiness model best describes Apple? A. Pick-and-Mortar B. Brick-and-Mortar C. Click-and-Mortar D. Virtual

C. Click-and-Mortar

What occurs when a company uses its own computing infrastructure for normal usage and accesses the cloud when it needs to scale for high/peak load requirements ensuring a sudden spike in usage does not result in poor performance or system crashes? A. Community cloud B. Private cloud C. cloud bursting D. hybrid cloud

C. Cloud bursting

What process decodes information? A. Digital Certificate B. Encryption C. Decryption D. Cryptography

C. Decryption

What kind of attribute would be age? A. Null-valued attribute B. Single value attribute C. derived attribute D. stored attribute

C. Derived attribute

Which of the following are examples of analytical information? A. Airline ticket, sales receipts, and packing slips B. Hotel reservation, sales receipts, and packing slips C. Future growth analysis, sales projections, and product statistics D. packing slips, grocery receipt, and competitor information

C. Future growth analysis, sales projections, and product statistics

What occurs when two entities can be related to each other in many instances? A.One-to-one relationship B. One-to-many relationship C. Many-to-many relationship D. Composite entity

C. Many-to-many relationship

Which of the below would NOT be found in a digital dashboard for a manufacturing team? A. a graph of stock market prices B. a running line graph of planned versus actual production for the past 24 hours C. an excel spreadsheet with static cost analysis data D. a hot list of key performance indicators, refreshed every 15 minutes

C. an excel spreadsheet with static cost analysis data

With grid computing, a problem is broken into pieces and distributed to many machines, allowing ______ processing than could occur with a single system. A. more accurate B. slower C. faster D. cleaner

C. faster

All of the following are common tools used in industry to analyze and develop competitive advantages, except ______. A. The Five Forces model B. the three generic strategies C. the competitive analysis model D. value chain analysis

C. the competitive analysis model

Which of the following statements is accurate? A. A correct business rule for one organization may not be correct for another organization B. Business rules should be integral to operations C. A typical business may have hundreds of business rules D. All of these are correct

D. All of these are correct

Cheryl is the operations manager for Nature's Bread Company, which specializes in providing natural products for health conscious individuals. Cheryl is responsible for compiling, analyzing, and evaluating daily sales numbers to determine the company's profitability and forecast production for the next day. Which of the following is an example of knowledge that Cheryl would be using to successfully perform her job? A. Craig Newmark is customer number 15467 B. Flour Power is supplier number 8745643 C. Best-selling product by day D. Best-selling product changes when Tony the best baker is working

D. Best-selling product changes when Tony the best baker is working

What is the most secure type of authentication? A. Something the user knows such as a user ID and password B. Something the user has such as a smart card or token C. Something that is part of the user such as a fingerprint or voice signature D. Combination of all of these are correct

D. Combination of all of those are correct

Which of the following is an example of dynamic processes? A. Running payroll B. Calculating taxes C. Creating financial statements D. Employee layoffs

D. Employee layoffs

Which of the choices below represents the definition of information management? A. The act of conforming, acquiescing, or yielding information B. a method or system of government for information management or control C. information secrecy is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity D. Examines the organizational resource of information and regulates its definitions, uses, values, and distribution, ensuring that it has types of data/information required to function and grow effectively

D. Examines the organizational resource of information and regulates its definitions, uses, values, and distribution, ensuring that it has types of data/information required to function and grow effectively

Which of the following are included as potential external weaknesses in a SWOT analysis that are harmful to an organization? A. Core competencies, market leaders, cost advantages, excellent management B. Lack of strategic direction, obsolete technologies, lack of managerial talent, outdated product line C. Expanded product line, increase in demand, new markets, new regulations D. New entrants, substitute products, shrinking markets, costly regulatory requirements

D. New entrants, substitute products, shrinking markets, costly regulatory requirements

What kind of attribute is assigned to an attribute when no other value applies or when a value is unknown? A. Single-valued attribute B. Multi-valued attribute C. Derived Attribute D. Null-valued attribute

D. Null-valued attribute

Which social media site works by allowing content to find the users, instead of the users having to search for the content? A. MySpace B. Facebook C. Google D. StumbleUpon

D. StumbleUpon

What is a way of monitoring the entire system by viewing multiple inputs being processed or transformed to produce outputs while continuously gathering feedback on each part? A. Value Chain analysis B. The Five Forces Model C. Feedback D. Systems thinking

D. Systems thinking

Which of the following implies that information is current with respect to the business requirement? A. Uniqueness B. Accuracy C. Consistency D. Timeliness

D. Timeliness

What is software that will search several retailers' websites and provide a comparison of each retailer's offerings, including prices and availability A. augmented reality B. mutation C. fuzzy logic D. shopping bot

D. shopping bot

What is a system weakness that can be exploited by a threat? A. capacity B. web accessibility C. web accessibility initiative D. vulnerability

D. vulnerability

Fallback occurs when the primary machine recovers and resumes operations, taking over from the secondary server.

False

An acceptable use policy (AUP) requires a user to agree to follow it in order to be provided access to corporate email, information systems, and the Internet

True

_________ includes the tasks, activities, and responsibilities required to execute each step in a business process?

Workflow

_______ observes the exact pattern of a consumer's navigation through a site.

clickstream data

Companies do not need a privacy policy for email because an employee's work email is private and cannot be viewed by the company.

false

EBusiness is the buying and selling of goods and services over the internet.

false

If a business could produce the same product with less expensive inputs it would probably see a decrease in profits.

false

Maintainability means the system functions correctly and provides accurate information

false

Porter has identified three generic business strategies including focused, broad cost leadership, and switching strategy

false

Predictive analytics is a world where interconnected, Internet-enabled devices or "things" can collect and share data without human intervention.

false

Strategic decisions are highly structured decisions

false

Structured query language compiles all of the metadata about the data elements in the data model.

false

The primary purpose of a data warehouse is to perform transactional processes

false

A data-driven website can help limit the amount of information displayed to customers based on unique search requirements.

true

A disruptive technology is a new way of doing things that initially does not meet the needs of existing customers

true

A foreign key is a primary key of one tables that appears as an attribute in another table and acts to provide a logical relationship between the two tables.

true

A hashtag is a keyword or phrase used to identify a topic and is preceded by a hash or pound sigh (#). For example, the hashtag #sandiegofire helped coordinate emergency responses to a fire.

true

A primary key is a field that uniquely identifies a given record in a table.

true

A sustainable MIS infrastructure identifies ways that a company can grow in terms of computing resources while simultaneously becoming less dependent on hardware and energy consumption

true

An enterprise architect is a person grounded in technology, fluent in business, and able to provide the important bridge between MIS and business

true

Asking how any employees are out sick is a type of operational question

true

Benchmarks are baseline values the system seeks to attain

true

Bring your own device is a policy that allows employees to use their personal mobile devices and computers to access enterprise data and applications

true

Business intelligence is information collected from multiple sources such as suppliers, customers, competitors, partners, and industries that analyzes patterns, trends, and relationships for strategic decision making

true

Competitive advantages provide the same product or service either at a lower price or with additional value that can fetch premium prices

true

Date of birth would be a stored attribute..

true

FedEx created a first-mover advantage by developing its customer self-service software, which allows people to request parcel pickups, print mailing slips, and track parcels online

true

Granularity refers to the level of detail in the model or the decision-making processes

true

MIS is a tool that is most valuable when it leverages the talents of people who know how to use and manage it effectively.

true

Order date, amount sold, and customer number are all forms of data.

true

Porter's five forces Model analyzes the competitive forces within the environment in which a company operates to assess the potential for profitability within an industry.

true

Social networking is the practice of expanding your business and/or social contacts by constructing a personal network

true

Supplier power is one of the Porter's five forces and it measures the suppliers' ability to influence the prices they charge for supplies (including materials, labor, and services)

true

The Trojan-horse virus hides inside other software, usually as an attachment or a downloadable file.

true

Transactional information is used when performing operational tasks and repetitive decisions such as analyzing daily sales reports and productions schedules to determine how much inventory to carry.

true

fuzzy logic is a mathematical method of handling imprecise or subjective information

true


संबंधित स्टडी सेट्स

Assessment - Chapter 14 - Skin, Hair, and Nails

View Set

TURP transurethral resection of the prostate

View Set

Research Methods Study Questions Ch. 1-9

View Set

Sterile Compounding and Hazardous Drugs

View Set