Information Systems CLEP Test
Which of the following represents an ongoing opportunity to use the Internet to increase the profits of producers? (A) Disintermediation (B) Global marketing (C) Sales tax avoidance (D) Protection of intellectual property (E) JIT ordering
(A) Disintermediation
The special formatting language used to create Web pages is called (A) HTML (B) XML (C) Perl (D) Java (E) Script
(A) HTML
Which of the following best characterizes data in a data warehouse? (A) Historical (B) Normalized (C) Relational (D) Volatile (E) Up-to-date
(A) Historical
Which of the following types of systems development methods would be appropriate when a company does not have an expert IS department? I. Outsourcing II. Traditional SDLC III. RAD (A) I only (B) II only (C) III only (D) I and III only (E) I, II, and III incorrect
(A) I only
Data redundancy can be increased by storing data in multiple locations. What other effects can this have on a database? Select all that apply (A) Increased costs (B) Data confliction (C) Reduced response time (D) Improved security (E) More efficient server usage
(A) Increased costs (B) Data confliction
Which of the following is NOT a correct characterization of batch processing? (A) It allows immediate updating of master files. (B) It provides physical batch totals to be used in control procedures. (C) It provides efficient updating of master files. (D) It is most applicable for processing routine periodic activities. (E) It allows efficient scheduling of processing
(A) It allows immediate updating of master files.
Which of the following is an advantage of outsourcing? (A) It enables a company to focus on core competencies. (B) It decreases dependence on other organizations. (C) It decreases the risk of disclosing confidential information. (D) It improves managerial control. (E) It enhances in-house technical expertise.
(A) It enables a company to focus on core competencies.
Which of the following is NOT true of social networking sites? (A) It is unethical for a company recruiting prospective employees to track their presence on and posts to social networking sites. (B) Any unethical activity on a social networking site could have negative consequences outside the site. (C) Some sites enable members to share material with many other members simultaneously. (D) Some sites enable members to maintain contact with other members. (E) Some sites facilitate access to commercial sites.
(A) It is unethical for a company recruiting prospective employees to track their presence on and posts to social networking sites.
What principle describes the rate of increase in computer processing speed over time? (A) Moore's law (B) Data delivery algorithm (C) Processing acceleration principle (D) Data efficiency principle (E) Processing gain function incorrect
(A) Moore's law
Which data model uses two-dimensional tables to represent data structures? (A) Relational (B) Hierarchical (C) Network (D) Multidimensional (E) Object-oriented
(A) Relational
Which of the following violates intellectual property rights? (A) Software piracy (B) Data mining of social networks (C) Launching a denial of service attack (D) Hacktivism (E) Spamming
(A) Software piracy
Which of the following statements is true regarding client/server architecture? (A) The server computer accepts commands from a number of computers that are its clients. (B) The server computer manages a number of computers that it services. (C) The server computer is connected to a number of computers that provide it with services. (D) The client computer is connected to a number of computers that provide it with clients. (E) The client computer manages a number of computers being served by it.
(A) The server computer accepts commands from a number of computers that are its clients.
What is the principal function of an operating system? (A) To provide an interface between the hardware and the application software (B) To defragment storage devices to optimize file access (C) To process transaction information (D) To create and maintain organizational databases (E) To scan for viruses
(A) To provide an interface between the hardware and the application software
Which of the following is the most likely negative consequence of participating in a social networking website? (A) Unintended disclosure of private information (B) Increase in spam (C) Infection by a virus (D) Download of a cookie containing personal preferences (E) Download of spyware
(A) Unintended disclosure of private information
Which of the following is a software agent used by some Internet search engines to generate search results? (A) Web bot (B) TCP filter (C) Auto responder (D) Worm (E) Macro
(A) Web bot
Standards that are developed through a collaborative process and made available for public use are referred to as (A) open standards (B) cooperative standards (C) public standards (D) technical standards (E) universal standards
(A) open standards
What is the primary source of revenue for website businesses providing user services such as social networking, search engines, or blogging? (A) User fees (B) Advertising (C) Subscription fees (D) Donor contributions (E) None, these are nonprofit groups
(B) Advertising
Which type of software is most commonly used by the users of a computer to solve specific problems? (A) Operating system (B) Application (C) Machine code (D) Compiler (E) Embedded
(B) Application
Which of the following is NOT a means of secondary storage? (A) External hard drive (B) Cache memory (C) USB flash drive (D) Cloud storage (E) Secure digital card
(B) Cache memory
In a company with a large and effective IT workforce, which of the following is the most likely title of the person who recommends enterprise-wide upgrades of computer hardware? (A) Chief Information Officer (B) Chief Technology Officer (C) Chief Financial Officer (D) Systems Analyst (E) Information Resources Manager
(B) Chief Technology Officer
Asking a group of users to evaluate the functionality of a prelaunch graphical user interface occurs during which phase of the systems development process? (A) Analysis (B) Design (C) Implementation (D) Maintenance (E) Planning
(B) Design
Which of the following statements about EDI is FALSE? (A) EDI documents contain the same information that would be found in paper documents. (B) EDI provides the infrastructure for both voice and data communication. (C) EDI standards are industry specific. (D) EDI enables the digital transmission of invoices. (E) EDI can be used to automate inventory replenishment.
(B) EDI provides the infrastructure for both voice and data communication.
Which of the following is true about open-source software? Select all that apply: (A) It always provides product support. (B) Its source code is freely available. (C) It is copyrighted. (D) It is shareware.
(B) Its source code is freely available. (C) It is copyrighted.
Which of the following can support cloud-based application development and deployment? (A) Communications as a service (B) Platform as a service (C) Infrastructure as a service (D) Software as a service (E) Network as a service
(B) Platform as a service
Which of the following describes a website that provides access to multiple services such as news, weather, sports, and stock indexes? (A) Host (B) Portal (C) Domain (D) Hot site (E) Home page
(B) Portal
The rules and relationships within the Information System are included in which element of the system? (A) People (B) Process (C) Technology (D) Structure (E) Data incorrect
(B) Process
The memory type which supports the operation of a computer processing chip and allows data to be freely entered and erased at any point is called: (A) Hard Disk storage (B) Random Access Memory (RAM) (C) Read Only Memory (ROM) (D) Scratch pad memory (E) Robust Internal Memory (RIM)
(B) Random Access Memory (RAM)
What is the term that refers to the downloading of live video, audio, or animation in such a manner that the user can begin to access the content before the download is complete? (A) Spooling (B) Streaming (C) Flaming (D) Spamming (E) Queuing
(B) Streaming
Which of the following best describes how GPS units function? (A) The receiver sends out regular query pulses and waits to receive responses from a GPS satellite. (B) The receiver is passive and listens for the regular signals from GPS satellites, which are then processed to find the distance from the satellites. (C) The receiver sends out radio signals that are reflected back by satellites and detected by the unit. (D) The receiver acts as a homing beacon that is tracked by the GPS satellites, which periodically send out position updates for each tracked receiver. (E) The receiver can detect an invisible electronic grid projected onto Earth's surface and compares the location on this grid to a stored map of Earth.
(B) The receiver is passive and listens for the regular signals from GPS satellites, which are then processed to find the distance from the satellites.
Which of the following is an application that can use RFID technology? Select all that apply. (A) Data transfer between smartphones (B) Toll collection on a limited-access roadway (C) Inventory management (D) Credit card use (E) Internet access (F) Animal Tracking
(B) Toll collection on a limited-access roadway (C) Inventory management (D) Credit card use (F) Animal Tracking
Which of the following uses the Internet, as opposed to using the public switched network, to enable voice communication? (A) TCP/IP (B) VoIP (C) EFT (D) EDI (E) PBX
(B) VoIP
When can a piece of software be patented? (A) When the code is written in a unique coding language (B) When the algorithm that is coded is unique and offers unique benefits (C) When the code has been written by a certified programmer (D) When the software has also been copyrighted and/or trademarked (E) Never. Software may not be patented
(B) When the algorithm that is coded is unique and offers unique benefits
In a relational database, each column represents (A) a record (B) an attribute (C) a key (D) an entity (E) a file
(B) an attribute
When applied to the development of computer systems, the term "ergonomics" means (A) designing computer systems to maximize the cost-benefit ratio (B) incorporating human comfort, efficiency, and safety into the design of the human-machine interface (C) following the systems development life cycle (D) fostering development team interaction through the use of computer-aided software engineering tools (E) optimizing the throughput rate by adjusting the operating system interrupts
(B) incorporating human comfort, efficiency, and safety into the design of the human-machine interface
Developers quickly create a version of a system and give it to the users for feedback. The developers then use the users' feedback to revise the system. This process repeats until the users approve the system. This method of developing a system is called (A) waterfall (B) prototyping (C) object-oriented (D) end-user development (E) joint application design
(B) prototyping
A spreadsheet has values 1, 2, 3, and 4, respectively, in cells A1, B1, A2, and B2. Cell C1 contains the formula "= A1 + $B$1." If the formula in cell C1 is copied to cell C2, what value is displayed in cell C2? (A) 3 (B) 4 (C) 5 (D) 6 (E) 7
(C) 5
Which two mathematical functions allow computers to manipulate all data? (A) Whole numbers and integers (B) Multiplication and division (C) Addition and subtraction (D) Algebra and Arithmetic (E) Digital and analog calculations
(C) Addition and subtraction correct
Which of the following best describes data warehousing? (A) Backing up an organization's data to an offsite location (B) Moving data that have not been accessed for some time to an alternate storage system (C) Compiling and storing organization-wide data to assist in decision making (D) Validating all customer data (E) Storing all of an organization's data in two dimensional tables
(C) Compiling and storing organization-wide data to assist in decision making
Which of the following does NOT provide data security or access security? (A) Data encryption incorrect (B) Password protection (C) Data encoding (D) Biometric scan (E) Digital certificate
(C) Data encoding
What term identifies the measure of accuracy, completeness, and currency of data? (A) Data dependency (B) Data integration (C) Data integrity correct (D) Data redundancy (E) Data visualization
(C) Data integrity correct
A manager of a small business wants to use a computer to store information about clients, vendors, inventory (item, number, price), and orders. The manager needs to be able to sort and group data for various reports. Which of the following types of software packages would be best for this task? (A) Word processor (B) Spreadsheet (C) Database management system (D) Presentation software (E) System software
(C) Database management system
Which of the following problem-solving techniques allows users to start with high-level information and then select more specific, lower-level details? (A) Ad hoc analysis (B) Exception reporting (C) Drill-down analysis (D) RFM analysis (E) Cluster analysis
(C) Drill-down analysis
Voice and speech recognition technologies can be found in which of the following applications? I. Automated transcription II. Security and access control III. Batch processing (A) I only (B) II only (C) I and II only (D) I and III only (E) I, II, and III
(C) I and II only
A geographic information system must have which of the following characteristics? I. Records have identified geographic locations. II. The system uses global positioning satellites. III. The system provides results in a graphic format. (A) I only (B) I and II only (C) I and III only (D) II and III only (E) I, II, and III
(C) I and III only
Conversion of data files is part of which of the following phases of the system development process? (A) Analysis incorrect (B) Design (C) Implementation (D) Development (E) Maintenance
(C) Implementation
The Bluetooth standard uses what transmission method for data transfer? (A) Infrared (B) Ethernet cable (C) Radio waves (D) Satellite (E) Wi-Fi
(C) Radio waves
What is the primary difference between an intranet Web page and an Internet Web page? (A) Transport protocol (B) Transmission rate (C) Restriction of access (D) Physical proximity to server (E) Use of secure socket layers
(C) Restriction of access
Which of the following is a major benefit of object-oriented programming? (A) The development of logical steps to achieve the object of the program (B) The use of subroutines that optimize the program's objective (C) The creation of objects that can be used or modified for use in future applications (D) The freedom for programmers to create objects unique to each program (E) The defining of objects as static entities that do not relate to each other
(C) The creation of objects that can be used or modified for use in future applications
Under which of the following conditions can a public wireless network be used to transmit confidential data most securely? (A) The local computer has been scanned for viruses. (B) The local computer has the latest operating system and updates. (C) The local computer connects to the network using VPN. (D) All files on the local computer have been backed up. (E) The network password meets all security criteria.
(C) The local computer connects to the network using VPN.
Which of the following is not included in an information system: (A) The people who use the system (B) The data/information in the system (C) The manufacturer of the computers used in the system correct (D) The computer hardware of the system (E) The computer software of the system
(C) The manufacturer of the computers used in the system correct
Telecommunications satellites are often orbit 23,000 miles above the Earth's equator. This orbit is called geosynchronous and it is important because: (A) The satellite can receive the maximum amount of solar energy to power its operations (B) The satellite can reach very difficult mountain sites easily (C) The satellite appears to remain in a constant place in the sky at all times (D) The satellite will not interfere with military satellite operations (E) The satellite can remain in this orbit with very little fuel
(C) The satellite appears to remain in a constant place in the sky at all times
Which of the following is NOT true about virtual private networks? (A) They use encryption. (B) They use a public network such as the Internet. (C) They transmit data at a greater speed than a local area network. (D) They are less costly than a regular private network. (E) They provide a way to connect to a remote computer.
(C) They transmit data at a greater speed than a local area network.
A business often identifies that its software has been trademarked by using a unique symbol or attaching the letters TM to its name. What is the purpose of the trademark? (A) To eliminate unauthorized copying and distribution (B) To identify the software as available for use, free of charge (C) To identify and differentiate the product's brand (D) To assure the user that the software is properly licensed and ready to use (E) To assure the user that the software contains unique features not found in other products
(C) To identify and differentiate the product's brand
When developing a website, which of the following activities should occur closest to the end of the process? (A) Creating the navigation structure (B) Purchasing a domain name (C) Verifying all the hyperlinks (D) Designing the style sheets (E) Finalizing the graphics
(C) Verifying all the hyperlinks
Which of the following network technologies allows secure transmission of data over an unsecured public network link between private networks? (A) Local area network (B) Wide area network (C) Virtual private network (D) Intranet (E) Extranet
(C) Virtual private network
A program written to access and update a master database that maintains sales of tickets to an upcoming concert is (A) system software (B) networking software (C) a transaction processing system (D) an operating system (E) a knowledge management system
(C) a transaction processing system
A disaster recovery plan to safeguard a company's computer system can be used for all of the following occurrences EXCEPT (A) a flood, fire, or other natural disaster (B) a massive long-term power outage (C) system upgrades and hardware maintenance (D) computer sabotage (E) a major viral infection of computer systems
(C) system upgrades and hardware maintenance
What domain name extension is used by commercial businesses operating websites? (A) .bus (B) .bz (C) .corp (D) .com (E) .pri
(D) .com
What is the most significant advantage of an in-house database versus one housed on the cloud? (A) Lower cost (B) faster response (C) Greater redundancy (D) Better security (E) Improved accuracy
(D) Better security
What logic system is used to describe and analyze the functions of digital systems? (A) Analog logic (B) Representative logic (C) Radix function logic (D) Boolean logic (E) Bakerfield logic
(D) Boolean logic
Which "C suite" executive is most likely to be in charge of a company's information systems? (A) CEO (B) CFO (C) CCO (D) CIO (E) COO
(D) CIO
Which of the following is a database whose data are scattered across several physical servers? (A) Data mine (B) Data warehouse (C) Relational database (D) Distributed database (E) Integrated database
(D) Distributed database
Which of the following is (are) true about EDI? I. The EDI documents generally contain the same information that paper documents do. II. The speed in which the documents are exchanged is much faster than that of paper documents. III. Transmission of EDI documents is less accurate than that of paper documents. (A) I only (B) II only (C) III only (D) I and II only (E) I, II, and III
(D) I and II only
Which of the following should be taken into consideration in ergonomic design? I. Adapting the computer hardware to be comfortable to use II. Adapting the office furniture to protect the health of the worker III. Adapting the computer software to be easy to learn (A) I only (B) II only (C) III only (D) I and II only (E) I, II, and III
(D) I and II only
Which of the following is (are) true about object oriented programming? I. Once defined, a class can be reused to build different objects. II. Instructions can be directly understood by the CPU without translation. III. An object can contain both data and instructions. (A) I only (B) II only (C) III only (D) I and III only (E) I, II, and III
(D) I and III only
Which of the following statements is (are) true concerning multiuser database management systems? I. They can increase the standardization of data. II. They can increase the need to store data in many different locations in the database. III. They can increase access to and availability of information. (A) I only (B) II only (C) I and II only (D) I and III only (E) I, II, and III
(D) I and III only
Using an ERP system has which of the following advantages? I. It is easier to install than a typical transaction processing system. II. It provides a centralized database for organizational data. III. It integrates processes over the organization. (A) I only (B) II only (C) I and II only (D) II and III only (E) I, II, and III
(D) II and III only
Which of the following is (are) true about customer relationship management systems? I. They focus on the connection between suppliers, manufacturers, and customers. II. They enable employees in all departments to have a consistent view of customers. III. They focus on customer retention. (A) I only (B) I and II only (C) I and III only (D) II and III only (E) I, II, and III
(D) II and III only
Which of the following is NOT a characteristic of a decision support system, as it is usually defined? (A) It can be used as an aid in solving ad hoc problems. (B) It is useful for what-if analysis. (C) It is intended to help managers make decisions. (D) It makes the one best or optimal decision. (E) It uses appropriate statistical and mathematical models.
(D) It makes the one best or optimal decision.
When developing new software in an enterprise, you must occasionally deal with existing software that cannot be easily changed or replaced. This is known as (A) Historic software (B) Pre-existing software (C) standardized software (D) Legacy software (E) internal software
(D) Legacy software
Which of the following is a set of protocols used to link different types of computers over the Internet? (A) HTML (B) HTTP (C) ERP (D) TCP/IP (E) W3C
(D) TCP/IP
Which of the following is true about user passwords? (A) They should be changed only by the administrator. (B) They must be no more than eight characters in length. (C) They are requested by CAPTCHAs. (D) They are most secure when they consist of letters, numbers, and special characters. (E) They are required to be unique.
(D) They are most secure when they consist of letters, numbers, and special characters.
An online storefront developer should test the different versions of which of the following in order to ensure usability for all users? (A) Database management systems (B) Hypertext markup languages (C) Compilers (D) Web browsers (E) Search engines
(D) Web browsers
The type of network that would most likely be used to link a corporation's headquarters with its four branch offices located throughout a state is referred to as (A) a metropolitan area network (B) a local area network (C) an office area network (D) a wide area network (E) a broad area network
(D) a wide area network
Having multiple operating systems installed on the same personal computer enables the user to do each of the following EXCEPT (A) run a proprietary operating system and an open source operating system on the same computer (B) run different versions of the same operating system on the same computer (C) access a larger variety of software (D) create multiple IP addresses for the computer (E) create a virtual server
(D) create multiple IP addresses for the computer
The American Charity Association, a nonprofit foundation, has a home page on the World Wide Web. Which of the following is the most likely URL for its home page? (A) http://www.charity.gov (B) http://www.charity.edu (C) http://www.charity.com (D) http://www.charity.org (E) ftp://www.charity.aca
(D) http://www.charity.org
Expert systems have been most successful when the range of the human expertise being replicated is (A) broad and narrow (B) broad and shallow (C) broad and deep (D) narrow and deep (E) narrow and shallow
(D) narrow and deep
Which of the following best describes a worm? (A) A program that displays advertisements in pop-up windows (B) A program that is installed on a computer without the user's knowledge (C) A virus that masquerades as another active program (D) A program that traces user activity (E) A program that replicates itself repeatedly, using up system resources
(E) A program that replicates itself repeatedly, using up system resources
Which of the following are required for your refrigerator to tell you that you need more milk? (A) An Internet connection (B) The ability to determine how much milk is inside itself? (C) Software that can communicate with your home operating system (D) A and B only (E) A, B, and C
(E) A, B, and C
Which of the following mobile communications technologies may be used by a standard smart phone to communicate with other devices? (A) Wi-Fi (B) Cellular telephone signals (C) Bluetooth (D) None of the above (E) All of the above
(E) All of the above
A computer system that uses a measurable factor to represent specific data is called a: (A) Digital computer incorrect (B) Analytical computer (C) Representative IT system (D) Factor-specific computer (E) Analog computer
(E) Analog computer
Which of the following explains why digital networks can transmit different types of data? (A) Networks can accommodate different types of computers. (B) Network connections can be made via satellites. (C) Data can be transmitted as either digital or analog signals. (D) Storage capacity is not an issue. (E) Each data type can be represented by strings of bits. correct
(E) Each data type can be represented by strings of bits. correct
Knowledge management software is designed to do which of the following? (A) Identify patterns and trends in data (B) Collect and store data in a way that can be easily accessed (C) Manage day-to-day interactions with customers (D) Help analyze data and facilitate decision making (E) Facilitate organizational learning
(E) Facilitate organizational learning
Which of the following would not be considered an input device for a computer system? (A) Image scanner (B) Webcam (C) Keyboard (D) Mouse (E) PC Speaker
(E) PC Speaker
A user has visited several websites, making purchases, initiating searches, and filling out online forms. Which of the following could the user access to revisit the websites? (A) Cookies (B) Main memory (C) Internet preferences (D) Web privacy settings (E) Web browser history
(E) Web browser history
In considering the economic feasibility of a systems development project, which of the following would a project manager be LEAST likely to consider? (A) The cost of developing the system compared with the potential benefits of using the system (B) The return on the initial investment on the system (C) When the project will break even (D) Whether the company can afford the project (E) Whether the hardware can be acquired for the project
(E) Whether the hardware can be acquired for the project
File extensions such as .txt, .bmp, and .mp3 are used to identify a file's (A) output (B) creator (C) size (D) location (E) format
(E) format
Which of the following is NOT a risk associated with outsourcing information systems functions? (A) loss of control of functionality (B) loss of control of critical in-house knowledge (C) compromising sensitive company data (D) inability to easily sever the outsourcing relationship (E) inability to obtain expertise from outside the company
(E) inability to obtain expertise from outside the company
The maintenance phase of the system development process could include all of the following activities EXCEPT (A) correcting errors in the software that were detected after implementation (B) changing the heading on a report (C) updating entries in the tax table to reflect changes in the tax rates (D) adding a new function to an existing system (E) performing a complete rewrite for an existing system
(E) performing a complete rewrite for an existing system
What word describes the relationship between hardware and software in a modern information system? (A) Cross-indexed (B) Interspersed (C) Symbiotic (D) Digital (E) Synthetic
Symbiotic