MIS (Saylor/ Peterson)
The first personal microcomputer came out in 1975 and was featured on the cover of Popular Mechanics. What was the name of this microcomputer? A. Apple I B. Altair 8800 C. Mark-8 D. Nascom 2
Altair 8800
eBay and Amazon were two of the first online e-commerce sites. Both online retailers were established in what year? A. 1993 B. 1994 C. 1996 D. 1997
1994
Intel and Advanced Micro Devices are examples of which computer component essential for its operation? A. CPU B. Hub C. RAM D. Router
CPU
Which of the following is an example of system software? A. DOS B. Malware C. Firmware D. Mobile apps
DOS
This type of protection lasts for the life of an original author plus 70 years. a. Copyright b. Intellectual property c. Patent d. Trademark
Copyright
RAM is installed in a computer through the use of a: a. DIMM. b. DNS. c. hard disk. d. motherboard.
DIMM.
Which of the following business processes is built to help organizations identify the best course of action? A. Decision Support Systems B. Quality management C. Knowledge management D. Electronic Data Interchange
Decision Support Systems
___________ involves selecting an end of life date for an old system. a. Direct cutover b. Parallel operation c. Pilot implementation d. Phased implementation
Direct cutover
Which of the following is explicitly prohibited as part of the Association for Computing Machinery's code of ethics? A. Browsing a competitor's website B. Using a company computer to find another job C. Using a company computer after business hours D. Entering or using someone else's computer without permission
Entering or using someone else's computer without permission
The amount and substantiality of the portion used in relation to the protected work as a whole is a definition of: A. Copyright B. Fair use C. Trademark D. Patent
Fair use
In which era of globalization did fiber-optic Internet connections and software creat a "flat world platform"? A. Globalization 1.0 B. Globalization 2.0 C. Globalization 2.5 D. Globalization 3.0
Globalization 3.0
Which of the following is a productivity software application? A. Antivirus B. DOS C. Groupware D. Registry
Groupware
Innovation to which of the following components first allowed computers to become smaller and more portable? A. Hard drive B. Mouse C. Monitor D. Power supply
Hard drive
Which of the following network devices connects other devices to the network and sends packets, rather than managing them? A. Bridge B. Hub C. Router D. Switch
Hub
The ability to take your work anywhere via smartphone or tablet is an example of what advantage of cloud computing? A. Flexible capacity B. Improved mobility C. Virtual environment D. Improved collaboration
Improved mobility
Allowing suppliers to manage their own inventory is a characteristic of which primary function of the value chain? A. Inbound logistics B. Operations C. Outbound logistics D. Service
Inbound logistics
___________ assures information has not been altered in any unauthorized or unexpected way. A. Availability B. Confidentiality C. Integrated D. Integrity
Integrity
Which of the following presents the largest infrastructure challenges organizations face in globalization? a. Internet speed b. Sources of power c. Incompatible hardware d. Telecommunications and time zones
Internet speed
What group is the last to adopt a new technology because they have an aversion to change? A. Early majority B. Innovators C. Laggards D. Late majority
Laggards
Which of the following is an advantage of mobile apps over traditional desktop apps? a. Mobile apps require more disk space than traditional apps. b. Many organizations are developing company specific apps c. It costs less to create a mobile app than a traditional desktop app. d. Mobile apps enable users to access information wherever they have a data network or Internet connection.
Mobile apps enable users to access information wherever they have a data network or Internet connection.
Which of the following is an advantage of cloud computing for business? A. Rigid cost structure B. Off-premises servers C. Opportunity to monetize D. Non-negotiable agreements
Off-premises servers
Which of the following is one advantage collaboration software provides to businesses? A. Organizations can focus on specific products. B. Office applications can be shared between individuals C. Automatic product delivery for business teams is simplified. D. Suppliers create and send invoices to an internal computer system.
Office applications can be shared between individuals
What is the main reason businesses may be skeptical about using open source software? A. Open source software is not completely free. B. Open source applications are more vulnerable to attack. C. Programmers charge a fee to compile the code they built. D. Applications are not compatible with closed source software.
Open source applications are more vulnerable to attack.
What workflow software allows people to work together in a global e-commerce solution? a. Form models b. User reassignments c. Document integrators d. Payment-processing systems
Payment-processing systems
Which of the following is an ethical decision involving technology that may have legal ramifications? A. Anonymously submitting complaints B. Finding one's friends or family online C. Posting complaints about someone by name D. "Liking" public pages or events anonymously
Posting complaints about someone by name
Prostheses, durable building materials, and home goods are among recent innovations in which of the following trends in the future of technology? a. Collaborative b. Printable c. Surgical d. Wearable
Printable
Which stage of the data mining lifestyle is focused on understanding the issue and domain environment at hand? A. Problem definition B. Creating the database C. Exploring the database D. Preparation for creating a data mining model
Problem definition
The main job duty of which of the following individuals is to oversee the initiation, design, and implementation of IT related projects? A. Functional manager B. Project manager C. Software engineer D. Systems analyst
Project manager
Which of the following is an essential function of operating systems? A. Providing application resources B. Managing application resources C. Upgrading user interface components D. Providing a platform for software developers to write applications
Providing a platform for software developers to write applications
Which of the following components contributes to the speed of a computer? A. RAM B. Hard Disk C. Solid state drives D. Input and output cables
RAM
What is one of the greatest disadvantages to storing sensitive data on the cloud? A. Unlimited disk space B. Reliability on third party cloud systems C. Services are leased on an as-needed basis D. Available from any device with an internet connection
Reliability on third party cloud systems
Which of the following phases is part of the RAD methodology? A. Agile revisioning B. Requirements planning C. Assembly development D. Waterfall
Requirements planning
Which of the following supply-chain management systems is best applied when the goal is to maintain operations with vendor partnerships and meet 100% order fulfilment requirements? A. Anaplan B. Retail Link C. OpenLogistix D. Accenture Strategy
Retail Link
Which of the following advantages does closed source software have over open source software? A. Patches and additional features are available free. B. Application code can be reviewed before you install it. C. The company that developed the software offers technical support. D. More closed source applications exist for mobile apps than open source applications.
The company that developed the software offers technical support.
During the build-out of the Internet in the late 1990s, Internet protocols such as TCP/IP, HTML, and ___________ became freely available standards used by everyone. a. ARP b. DHCP c. HTTPS d. SMTP
SMTP
During the build-out of the internet in the late 1990s, internet protocols such as TCP/IP, HTML and ___________ became freely available standards used by everyone. A. ARP B. DHCP C. HTTPS D. SMTP
SMTP
How do legal restrictions pose a challenge to global firms? A. Some countries have a ban on certain items. B. Human rights law plays a central part in international law. C. Some countries have restrictions on the use of cellular phones for workers D. Companies in other countries work hard to build relationships to business partnerships, while American companies work through lawyers to create these relationships.
Some countries have a ban on certain items.
Which of the following is one of the three factors of authentication: A. Something you say B. Something you did C. Something you have D. Something you wrote
Something you have
EDI can be thought of as the exchange of business documents: A. from computer to computer. B. from computer to employee. C. from customer to computer. D. from employee to computer.
from computer to computer.
Which of the following career paths incorporates both the technical and management tracks of information systems? A. Area manager B. Senior manager C. Supervisor D. Systems analyst
Systems analyst
This global economic trend identified in 1996 is an economy with the capacity to work in real time. A. The global firm B. The world is flat C. Globalization 1.0 D. The network society
The network society
What kind of programming language is more like a spoken language and is not hardware-specific? A. First-generation B. Fourth-generation C. Second-generation D. Third-generation
Third-generation
The more products or services that meet particular needs, the less profitability there is in an industry. Which of Porter's Five Forces addresses this idea? A. Bargaining power of suppliers B. Bargaining power of customers C. Rivalry among existing competitors D. Threat of substitute products or services
Threat of substitute products or services
Which of the following is a point for deliberation for organizations when creating a plan for digital transformation? a. Top down b. External consulting c. Engage market trends d. Software development for the infrastructure
Top down
Who creates prototype designs during the design phase of a website? A. Customer B. Programmer C. Project Manager D. Web Designer
Web Designer
Which of the following uses radio technology to convert Internet signals into radio waves through a broadband modem? a. Bluetooth b. Hotspot c. Mobile d. Wi-Fi
Wi-Fi
Which of the following uses radio technology to convert signals into radio waves through a broadband modem? A. Bluetooth B. Hotspot C. Mobile D. Wi-Fi
Wi-Fi
Microsoft's first commercial success with a graphical user interface was: A. Windows 1.0. B. Windows 3.0. C. Windows 3.1. D. Windows NT.
Windows 3.0.
Application software is designed to do a specific task. Which of the following is an example of application software? a. Windows XP b. System Registry c. World of Warcraft d. HD Sector Boot Software
World of Warcraft
Application software is designed to do a specific task. Which of the following is an example of application software? A. Windows XP B. System Registry C. World of Warcraft D. HD Sector Boot Software
World of Warcraft
Which of the following is an example of personally identifiable information? A. Your name B. Your pet's name C. Your second cousin's name D. Your spouse's maiden name
Your name
Open source software was developed to: a. create a social network with other programmers. b. develop a new business model of software licensing. c. build problem-solving programs to share with everyone. d. sell programs they built as an individual business venture.
build problem-solving programs to share with everyone.
Song lyrics, computer programs. and ___________ are all types of intellectual property. A. common phrases B. expressions C. product designs D. services
product designs
Different cultures, competition, and ___________ caused the One Laptop Per Child effort to fail. a. corruption b. lack of Internet access c. power issues d. school agreements
corruption
The process of encoding data upon its storage or transmission is called: A. encryption. B. access control. C. authentication. D. public key infrastructure.
encryption.
The physical component of information systems includes hardware like disk drives, flash drives, keyboards, and: A. power strips. B. computer desks. C. human operators. D. external hard drives.
external hard drives.
Intellectual property is defined as any ___________, invention, or process that derives from the work of the mind or intellect. a. copy b. idea c. license d. project
idea
Data in a(n) ___________ database is defined in classes and subclasses. A. distributed B. object-oriented C. relational D. tabular
object-oriented
Time, cost, and ___________ are the three factors in software development. A. quality B. quantity C. relevance D. usability
quality
A ___________ creates new programming languages and operating systems to run on existing hardware. A. hardware engineer B. network engineer C. software engineer D. systems engineer
software engineer
Knowledge management is the process of formalizing the capturing, indexing, and ___________ of a company's knowledge. A. distributing B. editing C. securing D. storing
storing
In the 1980s and 1990s, a new kind of department, the IT department, was developed by combing the information systems function and the ___________ function. A. administrative B. human resources C. management D. telecommunications
telecommunications
Access control limits what information a user is allowed to read, ___________, add, and delete. A. export B. write C. observe D. save
write