Info Systems Final

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which phase of decision making finds or recognizes a problem? - Implementation - Choice - Intelligence - Design

Intelligence

Operational management typically makes which type of decisions? - Semistructured - Structured - Procedural - Documented

Structured

To what competitive force did the printed encyclopedia industry succumb? - Positioning and rivalry among competitors - Substitute products or services - Customer's bargaining power - Low cost of entry

Substitute products or services

Which of the following types of computer is used for weather forecasting? - Server - Supercomputer - Mainframe - Minicomputer

Supercomputer

A point of sale system, such as the one selected by Macy's to to capture retail sales, falls into which category of information system? - Transaction processing systems - Knowledge worker support system - Management information systems - Decision support systems

Transaction processing systems

In an Excel workbook sheet, the cell B10 contains the number 320 (giving number of students enrolled in a course) and the cell D15 contains the formula = If (B10 <= 100, "Do nothing", If (B10>= 400, "Hire a new faculty", "Use a lab assistant")) The result of the formula in cell D15 is : - Use a lab assistant - Hire a new faculty - Do nothing - None of the above -- This formula is in error

Use a lab assistant

In MS Excel as we copy and paste formulas, we use _____________ reference if the copied formulas are to refer to the same cell - relative - fixed - absolute - mixed

absolute

The feature of social institutions that means mechanisms are in place to determine responsibility for an action is called: - accountability. - the judicial system. - due process. - the courts of appeal.

accountability

Linux is: - designed for specific machines and specific microprocessors. - an example of open-source software. - primarily concerned with the tasks of end users. - especially useful for processing numeric data.

an example of open-source software

A sales and marketing information system aids middle management in: - tracking sales. - preparing sales forecasts. - analyzing sales performance. - planning new products and services.

analyzing sales performance

Software used to apply the computer to a specific task for an end user is called: - data management software. - network software. - system software. - application software.

application software

The total amount of digital information that can be transmitted through any telecommunications medium is measured in: - Hertz. - MIPS. - gigaflops. - bps.

bps

The ________ divide refers to large disparities in access to computers and the Internet among different social groups and different locations? - digital - information - computer - technology

digital

Reducing the business process layers in a distribution channel is called: - disintermediation. - market segmentation. - business process re-engineering - network effects.

disintermediation

In MS Excel, the PMT function is a(n) ________ function - financial - date - statistical - IF

financial

Software that manages the resources of the computer is called: - application software. - network software. - operating - data management software.

operating

Which of the following range accurately represent the consumer spending on the Internet in 2008. (As a reference point the over all consumer spending is around $4 trillion.) - $100 Million - $1Billion - $1Billion -$100Billion - $100 Billion - $500 Billion - $500 Billion - 1Trillion

$100 Billion - $500 Billion

Which type of network is used to connect digital devices within a half-mile or 500-meter radius? - Microwave - WAN - LAN - MAN

LAN

In an MS Excel workbook sheet, cell H6 contains the formula =C4*E9. If we use copy and paste to copy this formula t o cell J10, the formula in cell J10 will be - =E8*G13 - =C8*E13 - =E4*G9 - =C4*E9

=E8*G13

In an MS Excel, the correct function to calculate the present value of a future annuity (regular payments of equal value) is - =PV ( ) - =IPMT ( ) - =NPV ( ) - =PMT( )

=PV ( )

In MS Excel, a line break within a cell (so that the text after line break appears on a separate line) is inserted by pressing the keys - Ctrl+Enter - Alt+Enter - Enter - Shift + Enter - Tab

Alt+Enter

In Microsoft Access, a query specifies - User password - Attributes of a table - An information request - Definition of a table

An information request

In MS Excel, you have already created a line chart, but now decide that you want to change this chart to a pie chart. To do this, you click ____ from the Type group in the Chart Tools Design tab. - Alter Existing Chart - Modify Chart - Change Chart Type - New Chart

Change Chart Type

What service converts IP addresses into more recognizable alphanumeric names? - DNS - HTTP - HTML - IP

DNS

________ controls ensure that valuable business data files on either disk or tape are not subject to unauthorized access, change, or destruction while they are in use or in storage. - Software - Administrative - Data security - Implementation

Data security

These systems are especially suited to situations in which the procedure for arriving at a solution may not be fully predefined in advance. - Knowledge management systems - Transaction processing systems - Management information systems - Decision-support systems

Decision-support systems

These systems are especially suited to situations in which the procedure for arriving at a solution may not be fully predefined in advance. - Transaction processing systems - Management information systems - Decision-support systems - Knowledge management systems

Decision-support systems

In MS Excel when you select a chart, the ____ Chart Tools contextual tabs appear on the Ribbon - Format, Print, and Layout - Design, Layout, and Format - Insert, Layout, and Design - Insert, Design, and Format

Design, Layout, and Format

By business and IT alignment we mean - IT supports development and execution of strategic business plans - past enterprise data has been properly archived - CIO job has been outsourced - IT is set up as a different functional area in the organization

IT supports development and execution of strategic business plans

Which of the following is not one of the competitive forces of Porter's model? - Suppliers - Other competitors - Customers. - External environment

External environment

________ use scanning software to look for known problems such as bad passwords, the removal of important files, security attacks in progress, and system administration errors. - Application proxy filtering technologies - Packet filtering technologies - Stateful inspections - Intrusion detection systems

Intrusion detection systems

These systems are designed to summarize and report on the company's basic operations. - Decision-support systems - Transaction processing systems - Executive information systems - Management information systems

Management information systems

Executive Support Systems are specifically designed to serve the ________ level of the organization: - End-user - Senior management - Operational - Middle management

Senior management

These systems are typically a major source of data for other systems: - Decision-support systems - Transaction processing systems - Executive support systems - Management information systems

Transaction processing systems

To use an analog telephone system for sending digital data, you must use: - a modem. - twisted wire. - DSL. - a router.

a modem

NORA (Non Obvious Relationship Awareness) is: - a federal privacy law protecting networked data. - a sentencing guideline adopted in 1987 mandating stiff sentences on business executives. - a new data analysis technology that finds hidden connections between data in disparate sources. - profiling technology used by the EU.

a new data analysis technology that finds hidden connections between data in disparate sources

In a telecommunications network architecture, a protocol is: - a standard set of rules and procedures for control of communications in a network. - a communications service for microcomputer users. - the main computer in a telecommunications network. - a device that handles the switching of voice and data in a local area network.

a standard set of rules and procedures for control of communications in a network

Biometric authentication: - can use a person's voice as a unique, measurable trait. - is used widely in Europe for security applications. - uses physical lock and key to prevent unauthorized access - only uses physical measurements for identification.

can use a person's voice as a unique, measurable trait

An example of technology convergence is: - virus protection software that runs and updates itself automatically. - cell phones taking on the functions of handheld computers. - software programmed to run on any hardware platform. - programming languages that allow non-programmers to create custom applications.

cell phones taking on the functions of handheld computers

In "SUM(number1 [, number2, number3, ...])", number 1, number 2, and number 3 may be numbers or ____ - operators - letters - cell references - symbols

cell references

If you want to create a query that retrieves data from multiple tables, the tables must have a(n) ____. - hyperlink - primary key - integration - common field

common field

eBay is an example of: - business-to-consumer electronic commerce. - consumer-to-consumer electronic commerce. - an online exchange. - a click-and-mortar business.

consumer-to-consumer electronic commerce

A DSS database is a collection of: - current or historical data from several applications or groups. - the corporation's current transaction data. - external data typically mined from the Internet and other third-party sources. - None of the above - DSS do not use any data

current or historical data from several applications or groups

Which of the following determines what type of values can be entered for a field. - data element - primary key - data integrity - data type

data type

A firewall allows the organization to: - check the accuracy of all transactions between its network and the Internet. - check the content of all incoming and outgoing e-mail messages. - enforce a security policy on traffic between its network and the Internet. - create an enterprise system on the Internet.

enforce a security policy on traffic between its network and the Internet

A suite of integrated software modules for finance and accounting, human resources, manufacturing and production, and sales and marketing that allows data to be used by multiple functions and business processes best describes: - groupware - enterprise systems - decision support system - application software.

enterprise systems

To keep internal data secure, a company employing an extranet must be sure to put a(n) ________ in place. - switch - firewall - server - router

firewall

Porter's Value chain model of the firm describes - organizational structure - a strategic planning approach - social and moral values - value of firm's physical assets - firms primary and support activities that add value in transforming inputs into outputs

firms primary and support activities that add value in transforming inputs into outputs

Porter's Value chain model of the firm describes - value of firm's physical assets - firms primary and support activities that add value in transforming inputs into outputs - a strategic planning approach - organizational structure - social and moral values

firms primary and support activities that add value in transforming inputs into outputs

The value chain model: - categorizes five related advantages for adding value to a firm's products or services. - categorizes four basic strategies a firm can use to enhance its value chain. - helps a firm identify points at which information technology can most effectively to enhance its competitive position. - sees the supply chain as the primary activity for adding value.

helps a firm identify points at which information technology can most effectively to enhance its competitive position

Marketing modules in Customer Relationship Management (CRM) systems would provide tools for: - managing sales prospect and contact information. - identifying profitable and unprofitable customers. - managing an advice telephone line. - sales quote generation.

identifying profitable and unprofitable customers

The first step in the four-step model of business problem solving is: - outlining the problem's causes. - assigning the problem to a problem solver. - agreeing that a problem exists. - identifying the problem.

identifying the problem.

The Sarbanes-Oxley Act: - imposes responsibility on companies and management to safeguard the accuracy of financial information. - specifies best practices in information systems security and control. - requires financial institutions to ensure the security of customer data. - outlines medical security and privacy rules.

imposes responsibility on companies and management to safeguard the accuracy of financial information

The primary activities of a firm include: - procurement, operations, technology, sales and marketing, and service. - inbound logistics, operations, outbound logistics, sales and marketing, and service. - procurement, inbound logistics, operations, technology, and outbound logistics. - inbound logistics, operations, outbound logistics, technology, and service.

inbound logistics, operations, outbound logistics, sales and marketing, and service

The business value of an effective supply chain management system includes all of the following except: - faster time to market. - supply matched to demand. - cost reduction. - increased inventory levels.

increased inventory levels

In network economics, the value of a commercial software vendor's software products: - increases as more people use them. - decreases as more people use them. - decreases according to the law of diminishing returns. - increases due to higher marginal gain in output.

increases as more people use them

The three activities in an information system that produce the information organizations use to control operations are: - input, output, and feedback. - input, processing, and output. - data analysis, processing, and feedback. - information retrieval, research, and analysis.

input, processing, and output.

A management hierarchy: - is composed primarily of experts trained for different functions. - results in a clear-cut division of labor. - is a pyramid structure of rising authority and responsibility. - is used primarily in large organizations to define responsibilities of customer service staff.

is a pyramid structure of rising authority and responsibility.

A VPN: - provides secure, encrypted communications using Telnet. - is an encrypted private network configured within a public network. - is more expensive than a dedicated network. - is an Internet-based service for delivering voice communications.

is an encrypted private network configured within a public network

Executive support systems are information systems that support the: - day-to-day processes of production. - knowledge and data workers in an organization. - decision-making and administrative activities of middle managers. - long-range planning activities of senior management.

long-range planning activities of senior management

The Internet raises the bargaining power of customers by: - making information available to everyone. - lowering transaction costs. - creating new opportunities for building loyal customer bases. - making more products available.

making information available to everyone

Rigorous password systems - may hinder employee productivity. - are often disregarded by employees. - are costly to implement. - are one of the most effective security tools.

may hinder employee productivity.

Tactical planning for information systems is typically done by - CEO of the firm - mid to senior IT managers within the organization in collaboration with user managers - by outside consultants in collaboration with technology vendors - board of directors in collaboration with data center operators

mid to senior IT managers within the organization in collaboration with user managers

FIP (Fair Information Practices) principles are based on the notion of the: - mutuality of interest between the record holder and the individual. - privacy of the individual. - responsibility of the record holder. - accountability of the record holder.

mutuality of interest between the record holder and the individual

The contracting of custom software development to outside firms is commonly referred to as: - application integration. - scaling. - outsourcing. - service-oriented architecture.

outsourcing

The method of slicing digital messages into parcels, transmitting them along different communication paths, and reassembling them at their destinations is called: - packet switching. - ATM. - multiplexing. - packet routing.

packet switching

Converting raw data into a more meaningful form is called: - capturing. - organizing. - feedback. - processing.

processing.

Moore's law that capacity doubles in about two years applies to - processor chips - database management systems - data captured in a transaction processing environment - operating systems - Decision support systems

processor chips

A supply chain driven by actual customer orders or purchases follows a: - pull-based model. - build-to-stock model. - replenishment-driven model. - push-based model.

pull-based model

In MS Access, in a table for customers in an MS Access database, the information about a single customer would reside in a single: - column. - field. - row. - table.

row

Pricing analysis is an example of a: - sales and marketing information system serving senior management. - finance and accounting information system serving middle management. - sales and marketing information system serving middle management. - finance and accounting information system serving senior management.

sales and marketing information system serving middle management.

A gigahertz is a measure of - capacity of a hard disk - size of the memory - speed of the internal clock - size of the registers in the CPU

speed of the internal clock

In MS Excel , in the following formula: =IF(A1="YES", "DONE", "RESTART"), what happens if A1= "NO"? - the formula returns the text "RESTART" - the formula returns the text "NO" - the formula returns the text "DONE" - the formula returns the text "NO, RESTART"

the formula returns the text "RESTART"

To analyze the direct and indirect costs and determine the actual cost of specific technology implementations, you would use a: - cost benefit analysis. - total cost of ownership model. - return on investment model. - breakeven point.

total cost of ownership model

In batch processing: - transactions are processed by arrays of multiple, less expensive servers. - transactions are accumulated in batches until it is time to process them. - transactions are processed by arrays of multiple, less expensive workstations. - transactions are processed immediately in batches.

transactions are accumulated in batches until it is time to process them

Together, a protocol prefix, a domain name, a directory path, and a document name, are called a: - unified resource locator. - third-level domain. - uniform resource locator. - root domain.

uniform resource locator

Deciding whether to introduce a new product line is an example of a(n): - procedural decision. - semistructured decision. - non-procedural decision. - unstructured decision.

unstructured decision

A virtual company: - provides entirely Internet-driven services, or virtual products. - uses the capabilities of other companies without being physically tied to those companies. - uses Internet technology to maintain a virtual storefront. - uses Internet technology to maintain a networked community of users.

uses the capabilities of other companies without being physically tied to those companies

A ________ is a collection of independent firms that use information technology to coordinate their value chains to produce a product or service for a market collectively. - business network - value web - consortia - value chain

value web

A network that covers a large geographic area is most commonly referred to as a(n): - wide area network. - Intranet. - peer-to-peer network. - local area network.

wide area network


Set pelajaran terkait

Macroeconomie - Piața financiară

View Set

Ch 50 caring for pt with muscle skeletal problems

View Set

Life Insurance Policy Provisions, Options, and Riders Exam FX

View Set

Chapter 22: Nutrition for Patients with Cancer or HIV-AIDS

View Set

NCLEX - Safe and Effective Care Environment

View Set

Ch. 22 - Immune System and the Body's Defense

View Set