IT Final

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

12. Which graph would best illustrate the trends showing the history of student grades for this class? a. Pie Chart b. Histogram c. Line Chart d. Scatter Chart

c. line chart

6. What is an example of a LEVEL ONE process model? a. Purchasing capital b. Requests c. Customer processes d. Maintenance

c. customer processes

18. Which of the following is an activity of BI? a. Analyzing b. Production c. Reports d. Regression

a. Analyzing

14. Project Initiation involves: a. Assessing size, scope/complexity, and establish procedures b. Define discrete activities and the work required to complete each activity c. Plans created that are put into action d. Closing down the project and wrapping it up

a. Assessing size, scope/complexity, and establish procedures

2. Which of the following contains the best estimate of a project's scope, benefit, cost, risks, and resource requirements? a. Baseline project plan b. Project initiation plan c. Project deliverable plan d. Project development plan

a. Baseline project plan

11. A task is something that _____? a. Can be done by one person or a well-defined group b. Has multiple deliverables c. Managers care about d. Is intangible

a. Can be done by one person or a well-defined group

12. LAN is a network that... a. Connects computers together in a close proximity b. Connects systems in a wide region c. Connects networks to networks d. Allows users to access the wide web

a. Connects computers together in a close proximity

7. Bar Charts contain what type of Data? a. Continuous Data b. Discrete Data c. Interpreted Data d. Categorical Data

a. Continuous Data

12. _______ is defined as an action, process, device, or system that can prevent, or mitigate the effects of, threats to a computer, server or network. a. Countermeasure b. Risk c. Threat d. Vulnerability

a. Countermeasure

13. Understanding _________ is based around preferences, buying behaviors, and price sensitivity. a. Customers b. Employees c. Operations d. Business

a. Customers

12. What is the first part of the Transaction Processing Model? a. Data Input b. Data Processing c. Output Generation d. Data Storage

a. Data Input

9. How do organizations solve the problems of information silos? a. Data integration into a single database and revise applications to use that database b. Data isolation decisions that work to enhance organizational efficiencies c. Integrated departmental cost sourcing d. Limit data sourcing of information

a. Data integration into a single database and revise

12. The main information silo problem is that: a. Data is isolated in separate information systems b. Customers do not know how to use data c. There is too much data in one place d. Managers cannot access the data

a. Data is isolated in separate information systems

14. An information system designed to provide additional analytical support of organizational data a. Decision Support System b. Capture System c. Transaction Processing System d. Computer application

a. Decision Support System

10. The goal of project planning is to? a. Define clear, discrete activities and the work needed to complete each activity b. Decide if a project is economically feasible for the company c. Describe how the project will benefit the company d. Select which projects the company will complete in the upcoming year

a. Define clear, discrete activities and the work needed to complete each activity

27. _____ is a specialized DSS that supports senior level executives within the organization. a. EIS b. ERP c. AI d. OAS

a. EIS

9. Information security performs what important functions for an organization? a. Enables the safe operation of applications implemented on the organization's IT systems. b. Organization safeguard applications c. Organizations must create integrated, efficient, and capable applications d. Rely upon risk frameworks

a. Enables the safe operation of applications implemented on the organization's IT systems.

17. The solutions to information silos are? a. Enterprise Application Integration (EAI) & Enterprise Resource Planning (ERP) b. Enterprise Application Integration (EAI) & Enterprise Retirement Procedure (ERP) c. Human Resources (HR) & Finance (FI) d. External Application Information (EAI) & Enterprise Response Planning (ERP)

a. Enterprise Application Integration (EAI) & Enterprise Resource Planning (ERP)

5. Which of the following are parts of a database? a. Entities b. Classes c. Operations d. States

a. Entities

17. A specialized Decision Support System that supports senior level executives within the organization is a. Executive Information System b. Artificial Intelligence c. Electronic Commerce System d. Office Automation System

a. Executive Information System

2. The amount data increases over time in a _____________ manner. a. Exponential b. Linear c. Logarithmic d. Polynomial

a. Exponential

3. Which of the following is a risk of cybercrimes? a. Financial losses b. Criminals c. Nature d. Human error

a. Financial losses

2. A value in one row of one table that appears as a primary key in another table is called a. Foreign Key b. Secondary Key c. Primary Key d. Unique Key

a. Foreign Key

3. Database applications can consist of a collection of which of the following? a. Forms b. Figures c. Records d. Procedures

a. Forms

3. This is the mathematical method for handling imprecise or subjective information. a. Fuzzy logic b. Cloudy computation c. Sandy math d. Indecisive reasoning

a. Fuzzy logic

11. Data visualization conveys information through...? a. Graphical representations b. Numbers c. Lectures d. Textbooks

a. Graphical representations

6. The three main components of IT infrastructure consist of________ , _________ and __________ . a. Hardware, software, networks b. Hardware, software, servers c. Software, servers, operating systems d. Operating systems, anti-virus, networks

a. Hardware, software, networks

8. Which of the following is recommended for discrete data? a. Histograms b. Bar Charts c. Line Charts d. Scatter Plot

a. Histograms

17. What is the most used social media metric used by companies? a. Hits/visits/page view b. Profit per customer c. Repeat Visits d. Abandoned shopping carts

a. Hits/visits/page view

9. What is a collection of components producing information from data? a. Information Systems b. Data analytics c. Hard drive d. Smart phone

a. Information Systems

1. What is infrastructure in IT? a. It is the hardware, software, networks that provides the framework needed to support the applications, data, and communications of the enterprise b. The hardware that provides computing power and data storage for several files c. The means of providing a centralized location for shared computing resources d. The basic physical and organizational structures and facilities (e.g., buildings, roads, and power supplies) needed for the operation of a society or enterprise

a. It is the hardware, software, networks that provides the framework needed to support the applications, data, and communications of the enterprise

19. Each of the following are examples of data automation except: a. Laptops b. Card readers c. Scanners d. Bar code readers

a. Laptops

7. What networks connect computers in close proximity to shared resources and data/information? a. Local Area Networks (LAN) b. Wide Area Networks (WAN) c. Personal Area Networks (PAN) d. WiFi

a. Local Area Networks (LAN)

17. Which of the following can be a problem with multi-user databases? a. Lost Update Problem b. Unclear Data Problem c. Access Problem d. Browser Identifier Problem

a. Lost Update Problem

6. _____ is data that is used to describe data. a. Metadata b. Database c. Biodata d. DBMS

a. Metadata

2. An asset is _______. a. People, property, and information b. Anything that can exploit a vulnerability c. Weaknesses or gaps in a security program d. An action that can prevent threats

a. People, property, and information

9. ______ is a data mining analysis, which measures the effect of a set of variables on another variable. a. Regression Analysis b. Market Basket Analysis (MBA) c. Supervised Data Analysis d. Unsupervised Data Analysis

a. Regression Analysis

16. Which application is used to show data in a structured form? a. Report b. Queries c. Application program d. Form

a. Report

8. Asset + Threat + Vulnerability = a. Risk b. Attacks c. Countermeasure d. Compromise

a. Risk

16. Which is a part of IT Governance? a. Risk Management b. Supervising the progression of a project c. Ensuring that the network is properly working d. End user support for technology

a. Risk Management

9. A __________ is a type of hardware that provides computing power and data storage for several different devices. a. Server b. Network c. WAN d. LAN

a. Server

4. ________ is any web application that supports the creation and sharing of user-generated content (UGC). a. Social media b. Business intelligence c. CRM d. Internet of things

a. Social media

14. What is the objective for utilizing visual representation of information? a. Support decision making b. To help customers gain a better understanding of product integrity c. To facilitate the sharing of thoughts and observations d. Eliminate suggestion

a. Support decision making

2. Which type of communication requires all team members to be available to collaborate at the same time? a. Synchronous b. Texting c. Asynchronous d. Email

a. Synchronous

6. What is an Information System? a. System that interacts to produce information b. Security program c. Device used for finding information d. Intelligent computer designed to complete task

a. System that interacts to produce information

11. Parts of a database include: a. Tables, rows, columns b. Tables, rows, lines c. Rows, lines, columns d. Queue, row, columns

a. Tables, rows, columns

7. What is security? a. The protection afforded to an automated information system in order to attain the applicable objectives. b. An effective information security program is essential to the protection of the integrity and value of the organization's data c. The potential for loss, damage or destruction of an asset as a result of a threat exploiting a vulnerability. d. An action, process, device, or system that can prevent, or mitigate the effects of, threats to a computer, server or network.

a. The protection afforded to an automated information system in order to attain the applicable objectives.

3. Application delivery and support ensure all the following EXCEPT: a. Users receive correct data b. Technology is properly updated c. Users receive correct technology d. The technology is properly updated

a. Users receive correct data

10. What type of server allows for the use of multiple servers without the need to have a number of "real" servers? (UT's V-lab is an example of this server type.) a. Virtual b. Application c. Direct d. Data

a. Virtual

10. Brochure Ware is considered: a. Web 1.0 b. Web 2.0 c. Web 3.0 d. Web 4.0

a. Web 1.0

8. __________ connects and provides access to LAN through a wireless connection point. a. WiFi b. USB c. Bluetooth d. PAN

a. Wifi

16. What structure breakdown divides the project into manageable and logically ordered tasks and subtasks? a. Work Breakdown Structure b. Time Breakdown Structure c. System Breakdown Structure d. Computer Breakdown Structure

a. Work Breakdown Structure

9. What type of business process results in a product or service that is received by an organization's external customer? a. Customer-Facing Process Industry-Specific Customer Facing Process Business-Facing Process d. Business Process Model

a. customer-facing process

16. Which variable type cannot be divided? a. Discrete b. Eccentric c. Perishable d. Numerical

a. discrete

4. Which of the following is the most expensive part of ERP? a. Labor b. Upgrades c. Hardware d. Software

a. labor

13. Which graph would provide the best illustration of trends based on growth per year? a. Line Chart b. Pie chart c. Bubble Chart d. Scatter Chart

a. line chart

7. A _________ outlines at a high level all work required to complete the project. a. project scope statement b. system description c. project initiation d. customer contract

a. project scope statement

12. Which of the following is the purpose of why organizations needs the business process a. Reduce risk b. Government mandate c. Reduce personnel d. Not scalable

a. reduce risk

14. What are the characteristics associated with processes in organizations? a. Stability of flow b. Global scope c. All formally defined d. Not well defined

a. stability of flow

7. What is an example of a business facing process? a. Strategic planning b. New product c. Order processing d. Customer billing

a. strategic planning

6. A Baseline Project Plan includes: a. system description b. project global statement c. consumer issues d. All user interview data

a. system description

5. This is an example of a discrete variable. a. Zip code b. Salaries c. Revenue d. Length

a. zip code

5. Studies have found that ___% to ___ % of all IT projects fail at one stage or another. a. 20% to 40% b. 40% to 60% c. 60% to 80% d. 10% to 20%

b. 40% to 60%

3. What is a data center? a. A building that people go to and store data b. A facility that houses a plethora of servers c. A room inside the workspace with that stores data for that building d. A data storing machine in the middle of nowhere

b. A facility that houses a plethora of servers

5. What is a Business Process? a. An item necessary to accomplish an activity b. A set of activities that accomplish a specific function c. A way to build your business d. A way to enforce rules and regulations in a company

b. A set of activities that accomplish a specific function

9. What is a Primary Key? a. A value in one row of one table that appears as a value in another row of another table b. A value that identifies a unique row in a table c. A value in a table that appears as a unique key in another table to which it relates d. A value that is not unique

b. A value that identifies a unique row in a table

2. What kind of information system is a neural network? a. Transaction Processing system b. Artificial intelligence system c. Executive Information System d. Decision Support System

b. Artificial intelligence system

9. Which of the following are not sources of business data? a. TPS Systems b. Circuit Quality Systems c. Social Media Data d. Customer surveys

b. Circuit Quality Systems

10. Who would most commonly use an Office Automation System? a. CEOs b. Clerical Staff c. Customers d. Suppliers

b. Clerical Staff

12. Iteration control occurs when: a. Collaboration tools are hacked b. Collaboration tools limit and direct user activity c. Collaboration tools monitor synchronized locations d. VIZIO connects with markets

b. Collaboration tools limit and direct user activity

11. Two key activities of collaboration are: a. Communication and Bounce Back b. Communication and Iteration c. Iteration and Bounce Back d. Bounce Back and Mediational Sources

b. Communication and Iteration

7. What are the five components that make up an information system? a. Computer hardware, software, data, technology, security b. Computer hardware, software, data, procedures, people c. Security, data, business, monitors, software d. Data, security, software, computer hardware, procedures

b. Computer hardware, software, data, procedures, people

11. Which of the following is not one of the four functions of information security in an organization? a. Protects the organization's ability to function b. Creates security technology for the organization c. Safeguards the technology assets in use by the organization d. Protects the data the organization collects and uses

b. Creates security technology for the organization

2. Which type of business process results in a product or service that is received by an organization's external customer? a. Business facing process b. Customer facing process c. Business process modeling d. Executive process

b. Customer facing process

8. What are the steps in a Transaction Processing Model? a. Data Input- Output Generation- Data Processing b. Data Input- Data Processing-Output Generation c. Output Generation- Data Input- Data Processing d. Data Storage-Output Generation-Data Input

b. Data Input- Data Processing-Output Generation

2. What is an information silo? a. Consolidation of data for real-time sharing of data b. Data isolated in separate information systems c. Workgroup information systems that support a particular business function A cultural collaboration of shared information of business processes that prevents data isolation

b. Data isolated in separate information systems

15. What are the five elements of the ERP systems? a. Materials, Resources, Procedures, Computers, and Employees b. Data, Hardware, Software, Procedure, and People c. Data, Software, Hardware, Processes, and People. d. Procedure, Processes, People, Management, and Data

b. Data, Hardware, Software, Procedure, and People

15. What is responsible for creating tables and defining their relationships? a. Database b. Database Management System (DBMS) c. Database application d. Data entry personnel

b. Database Management System (DBMS)

13. Which of the following is a possible solution for information silos? a. ERI b. ERP c. EAT d. EAP

b. ERP

3. Which one of the following best describes Web 2.0? a. Only one-way communication b. Encourages reader feedback c. Only a few content providers d. Static

b. Encourages reader feedback

14. EAI Stands for: a. Electronic Accessed Information b. Enterprise Application Integration c. Electronic Application Information d. Enterprise Application Information

b. Enterprise Application Integration

5. Used by the highest level employees to review internal and external data to make big business decisions. a. Presidential Decision Maker b. Executive Information System c. Decision Support System d. Exclusive Business Intuitive Systems (EBIS)

b. Executive Information System

1. What is the SAP Module abbreviation for Financial Accounting? a. FA b. FI c. FN FG

b. FI

22. Which of the following is the correct sequence for creating information systems? a. Testing, Implementing the Design, Gathering Data, Designing the System, and Deploying the System b. Gathering Data, Designing the System, Implementing the Design, Testing, and Deploying the System c. Implementing the Design, Gathering Data, Updating Infrastructure, Designing the System, and Testing d. Gathering Data, Implementing the Design, Updating Infrastructure, Testing, and Deploying the System

b. Gathering Data, Designing the System, Implementing the Design, Testing, and Deploying the System

5. What is a system? a. One component working independently b. Group of components interacting to achieve some purpose c. One person entering data into a program d. Group of people each working on a separate task

b. Group of components interacting to achieve some purpose

10. Most ERP systems require ongoing maintenance. Make sure to ask your vendor about the ongoing maintenance costs with _____________. a. Hardware Maintenance and Network Fees b. Hardware Maintenance, support, network fees, etc. c. Labor and Hardware Maintenance d. This statement is false, there are no ongoing costs for maintenance with ERP systems

b. Hardware Maintenance, support, network fees, etc.

14. Characteristics of _________ are accurate, timely, relevant, just sufficient, worth its cost, and secured. a. Low Quality Information b. High Quality Data c. High Quality Information d. Low Quality Data

b. High Quality Data

3. When using a Gantt chart for scheduling diagrams, how are the task durations represented? a. Vertical bars b. Horizontal bars c. Vertical and horizontal lines d. Boxes and links

b. Horizontal bars

1. The problems posed by information silos lead to ____. a. Decreased costs for an organization b. Increased costs for an organization c. An easier way to exchange data d. Faster, more accurate business procedures

b. Increased costs for an organization

6. ________ occur(s) when data is isolated in separated information systems. a. Processing b. Information silos c. Scheduling d. System integration

b. Information silos

9. Which of the following is not a goal of data visualization? a. Answer Questions b. Inspect and Cleanse Data c. Find Patterns Support Decision Making

b. Inspect and Cleanse Data

13. What does "IoT" stand for? a. Inside of Technology b. Internet of Things c. Iteration-opportunity Type d. Information Technology

b. Internet of Things

17. Which is not considered to be a functional area of IS? a. Governance b. Marketing/ Promotion c. Project Management d. Infrastructure

b. Marketing/ Promotion

6. Big Data refers to data sets that are at least a ______ or larger in size? a. Megabyte b. Petabyte c. Gigabyte d. Terabyte

b. Petabyte

6. Cyber security: a. Does not involve Internet b. Protects data c. Protects facilities d. Ensures employee safety

b. Protects data

5. Which of the following is the most used ERP system? a. Oracle b. SAP c. InFor d. Microsoft

b. SAP

23. Which of the following best describes an Organizational type of classification? a. Supports activities/duties of a particular functional area of the organization b. Supports entire organization's activities with an integrated package c. Connects two or more organizations and supports inter-organizational operations d. Only supports the area that provides the organization with the highest profit

b. Supports entire organization's activities with an integrated package

14. What does the acronym "Wi-Fi" stand for? a. Wireless Fibrillation b. Wireless Fidelity c. Wireless Field d. Wireless Filtration

b. Wireless Fidelity

9. Post-project reviews will a. be harmful because you may not get the feedback you anticipated b. ensure that future projects can avoid any issues that may have occurred during the execution of the just completed project c. guarantee a signed customer contract d. acknowledge all the users that contributed

b. ensure that future projects can avoid any issues that may have occurred during the execution of the just completed project

6. What is data? a. process of and tools for storing, managing, using and gathering of data and communications in an organization b. facts and statistics collected together for reference or analysis c. the study or use of systems (especially computers and telecommunications) for storing, retrieving, and sending information d. not vital to an organization

b. facts and statistics collected together for reference or analysis

10. Structured Process are _____? a. Adaptive processes b. Formally defined processes c. Intuitive processes d. Mostly used by executives

b. formally defined processes

13. Which level of process modeling shows end-to-end processes across the above operational areas a. Level One b. Level two c. Level three d. Level four

b. level two

13. What is the most commonly used Decision Support System? a. Microsoft PowerBI b. Microsoft Excel c. Internet Explorer d. SAP BEx Analyzer

b. microsoft excel

1. Data visualization help us make ________ decisions without having to read pages of tables and data. a. Interpolated b. Quick c. Inaccurate d. Aggregated

b. quick

6. Example of a continuous variable. a. Letter Grades b. Revenue c. Employees d. ZIP code

b. revenue

4. Vulnerability is: a. The intersection of Assets and Threats b. The intersection of Threats and Attacks c. A gap in our protection efforts d. What we are trying to protect

c. A gap in our protection efforts

9. What Is Fuzzy Logic? a. Computerized advisory programs that imitate the reasoning processes of experts in solving difficult problems. b. Attempts to emulate the way the human brain works. c. A mathematical method of handling imprecise or subjective information. d. Simulates human intelligence such as the ability to reason and learn.

c. A mathematical method of handling imprecise or subjective information.

24. What is an inter-organizational system? a. An information system that supports activities and duties of specific functional area b. An information system that supports entire organization's activities with an integrated package c. An information system that connects two or more organizations and supports organization business operations d. An information system designed to provide managerial reports

c. An information system that connects two or more organizations and supports organization business operations

5. Which of the following are information types: a. Transformative information b. Conditional information c. Analytical information d. Confirmed information

c. Analytical information

6. Which computer program is designed to support a specific task, a business process or another application program? a. Operating System b. Executive Information System c. Application Program d. Computer Operations Program

c. Application Program

3. Technique to put data into context for easier consumption. a. Histograms b. Scatter Chart c. Data Visualization d. Line Chart

c. Data Visualization

8. Users create the requirements for data entered into the database. Developers then convert those requirements into ______? a. Forms b. Reports c. Data models d. Relationships

c. Data models

10. Advantages of databases are improved by all of the following except: a. Data sharing b. Data security c. Data productivity d. Data access

c. Data productivity

13. Which answer is not an improvement due to databases? a. Data sharing b. Data access c. Data quality d. Data security

c. Data quality

16. What are the challenges of implementing an ERP system? a. ERP upgrades, Customer Challenges, & Training b. Decision-Making Challenges, Training, & Customer Challenges c. Decision-Making Challenges, People Challenges, & ERP upgrades d. Outdated Technology, Customer Complaints, & Training

c. Decision-Making Challenges, People Challenges, & ERP upgrades

2. What types of hardware does infrastructure manage as a responsibility? a. Cloud Applications b. Operating Systems c. Desktops/Laptops d. Automated Procedures

c. Desktops/Laptops

4. Good decisions can _____________ impact an organization's bottom line. a. Negatively b. Inversely c. Directly d. Conversely

c. Directly

16. What is EDI? a. Enterprise Decision Information b. Executive Decision Information c. Electronic Data Interchange d. Executive Data Information

c. Electronic Data Interchange

16. Which of the following describes web 2.0? a. Brochure ware b. Web 2.0 does not exist c. Encourages reader feedback d. Only has a few providers

c. Encourages reader feedback

3. ERP stands for: a. Expert Resource Planning b. Enterprise Resource Process c. Enterprise Resource Planning d. Expert Resource Process

c. Enterprise Resource Planning

1. Which of the following is not part of the Business Process? a. Has a goal b. Uses resources c. Explains an action d. Has specific inputs

c. Explains an action

10. Which of the following is not a phase in the project management process? a. Initiation b. Closedown c. Feasibility Test d. Execution

c. Feasibility Test

1. A study that determines whether a requested system makes economic and operational sense for an organization is a: a. Accountability study b. Work development study c. Feasibility study d. System service study

c. Feasibility study

1. A system can be defined as: a. Group of components that do not interact b. A non-interactive approach to processing information c. Group of components interacting to achieve some purpose d. Using data to achieve some purpose

c. Group of components interacting to achieve some purpose

10. PC, server, keyboard, and routers are examples of...? a. Software b. Procedures c. Hardware d. Data

c. Hardware

1. Which of the following is not an advantage of databases? a. Improvement in Data Sharing b. Improvement in Data Access c. Improvement in Process Mapping d. Improvement in Decision Making

c. Improvement in Process Mapping

18. Which classification describes at type of information systems that connects two or more organizations and supports business operations? a. Departmental b. Organizational c. Inter-Organizational d. Intra-Organizational

c. Inter-Organizational

28. Which of the following is not classified by breadth of support? a. Departmental b. Organizational c. Inter-company d. Inter-organizational

c. Inter-company

21. Which of the following is true of Transaction Processing Systems? a. Small amounts of data are processed b. Inquiry processing is recommended but not required c. Large storage capacity is needed d. Input and output data do not need to be standardized

c. Large storage capacity is needed

8. What is the one of the main risks with IS security? a. Ability to manage from more than one location b. Tracking bank information c. Loss of Reputation and Money if hacked d. Keeping up with the competition.

c. Loss of Reputation and Money if hacked

21. Which of the following is NOT one of the five components of the information system? a. Software b. People c. Management d. Procedure

c. Management

4. Which of the following is not a server type? a. Web Server b. Database Server c. Manual Server d. Print Server

c. Manual Server

10. This type of data management asset is based around critical nouns of business, fairly static and generally fall into 4 categories: people, things, places and concepts a. Unstructured b. Metadata c. Master Data d. Transactional

c. Master Data

1. Which of these is not a type of data? a. Master b. Transactional c. Megadata d. Metadata

c. Megadata

4. The process of converting a poorly structured table into two or more well-structured tables is called a. Database Design b. Multi-User Processing c. Normalization d. Database Management System

c. Normalization

12. Understanding _________ is based around drive efficiencies, expose variability and control quality, and optimization. a. Customers b. Employees c. Operations d. Business

c. Operations

15. What is included in the governance function of information systems? a. Monitoring the information systems b. Training users c. Oversee the delivery of value by IT to the business d. Managing IT personnel

c. Oversee the delivery of value by IT to the business

15. Define Data Visualization? a. Placing data into binary b. Scanning for virus infiltration c. Putting data into context for easier consumption d. The process of synthesizing information for the benefit of a customer

c. Putting data into context for easier consumption

18. Big Data differs from relational databases by all of the following except their: a. Huge Volume b. Rapid Velocity c. Rates of Return d. Great Variety

c. Rates of Return

14. The cost of a data breech does not include____. a. Legal Costs b. Business Disruption c. Researching and developing new data d. Remediation

c. Researching and developing new data

3. Which order demonstrates how IS Supports Business Processes, bottom to top? a. Support business decision making, support of business processes and operations, support competitive advantage b. Support competitive advantage, support of business processes and operations, support business decision making c. Support of business processes and operations, support business decisions making, support competitive advantage d. Support competitive advantage, support business decision making, support of business processes and operations

c. Support of business processes and operations, support business decisions making, support competitive advantage

26. Executive information system is not? a. Highly intuitive b. Visual c. Supported with lower level employees within the organization d. Filled with internal and external data sources

c. Supported with lower level employees within the organization

1. What is the general function of a (Transaction Processing Systems) TPS? a. To assist in high level business decision making processes. b. To provide middle managers information on employee performance. c. To track day to day business events. d. To predict the direction of business trends.

c. To track day to day business events.

15. What major factor that can make or break a project? a. Price b. Timeliness c. User-Friendly d. Resources availability

c. User-Friendly

1. Attacks exploit _________. a. Risks b. Assets c. Vulnerabilities d. Threats

c. Vulnerabilities

10. What is vulnerability? a. The potential for loss, damage or destruction of an asset as a result of a threat exploiting a vulnerability. b. An action, process, device, or system that can prevent, or mitigate the effects of, threats to a computer, server or network. c. Weaknesses or gaps in a security program that can be exploited by threats to gain unauthorized access to an asset. d. Anything that can exploit a vulnerability, intentionally or accidentally, and obtain, damage, destroy or make unauthorized use of an asset.

c. Weaknesses or gaps in a security program that can be exploited by threats to gain unauthorized access to an asset.

14. Which of the following is a main difference between Web 1.0 and Web 2.0? a. Web 1.0 enables everyone to be a content provider b. Web 1.0 encourages reader feedback c. Web 2.0 enables everyone to be a content provider d. Web 2.0 only allows one-way communication

c. Web 2.0 enables everyone to be a content provider

11. What does the acronym "WAN" stand for? a. Wireless Access Network b. Windows Access Network c. Wide Area Networks d. Web Area Network

c. Wide Area Networks

1. ________ is a dynamic process where a group of people work together to achieve common objectives. a. Social media b. Business intelligence c. Collaboration d. Internet of things

c. collaboration

8. Which of the following is NOT one of the three activities of Business Intelligence? a. Acquiring b. Publishing c. Computing d. Analyzing

c. computing

4.This is an example of a common Enterprise Resource Planning System. a. MS Word b. MS Access c. Oracle d. Customer Relations Management System

c. oracle

20. Which of the following is NOT an advantage of databases? a. Better data integration b. Less Data inconsistency c. Increased end-user productivity d. Better Customer Relationships

d. Better Customer Relationships

19. Who is the top level manager of Information Systems in an organization? a. Chief Operations Officer b. Chief Computer Officer c. Chief Systems Officer d. Chief Information Officer

d. Chief Information Officer

4. Which is not a goal of data visualization? a. Support Decision making b. Support graphical calculation c. See data in context d. Clean data for machine learning

d. Clean data for machine learning

14. Which of the following is NOT a component of the information system? a. Software b. People c. Procedures d. Code

d. Code

20. Which of the following is incorrect regarding Collaborative Systems? a. They offer support in communication and collaborative efforts of team groups b. Google Drive is an example of a Collaborative System c. Collaborative Systems support daily work activities for groups of people d. Collaborative Systems can only work when all group members are logged in at the same time

d. Collaborative Systems can only work when all group members are logged in at the same time

1. The following are types of assets in data management except? a. Master Data b. Transactional c. Unstructured d. Combined

d. Combined

12. The project closedown phase includes all of the following actions except? a. Close down the project b. Conduct post-project reviews c. Close the customer contract d. Communicate the project status

d. Communicate the project status

7. Database is a collection of all of these except ______? a. Forms b. Reports c. Queries d. Credits

d. Credits

15. Which of the following is NOT one of the 3 activities of business intelligence? a. Acquiring b. Analyzing c. Publishing d. Deleting

d. Deleting

8. Which of the following is the most important kind of feasibility study? a. Political b. Scheduling c. Operational d. Economic

d. Economic

15. ERP stands for a. Excel Reinforcement Program b. Enterprise Resource Program c. Executive Representative Planner d. Enterprise Resource Planning

d. Enterprise Resource Planning

29. SAP is which type of Information Systems? a. Office Automation System (OAS) b. Collaborative Systems c. Supply Chain Management Systems d. Enterprise Resource Planning System (ERP)

d. Enterprise Resource Planning System (ERP)

12. Which of the following is not part of the management of information systems? a. Processes information systems and information b. Achieve strategies c. Management and use d. Give change to a customer

d. Give change to a customer

20. What is a common entry level position to the IT organization? a. Systems Network Analyst b. Product Analyst c. Database Administrator d. Help desk

d. Help desk

11. What is a major characteristic of a Transaction Processing System? a. The sources of data are mostly external b. High processing speed isn't necessary c. Hefty storage is not crucial d. High level of accuracy is needed

d. High level of accuracy is needed

4. Which of the following is NOT a successful strategy for project management? a. Top-down leadership b. Proper selection of projects c. Realistic time table d. Intermittent development strategy

d. Intermittent development strategy

25. Which major characteristic is not a part of Transaction Process System (TPS)? a. Large amounts of data are processed b. High processing speed is needed due to the high volume c. Low computation complexity is usually evident in TPS d. Low reliability rate

d. Low reliability rate

22. The following is not an example of a transaction in a business environment is: a. Selling a product b. Shipping a box c. Hiring an employee d. Making a phone call

d. Making a phone call

7. Which is NOT an Information System? a. Transaction Processing System b. Artificial Intelligence System c. Decision Support System d. Managerial Development System

d. Managerial Development System

17. Which variable can be divided? a. Discrete b. Eccentric c. Perishable d. Numerical

d. Numerical

4. Which of the following components cannot create a problem? a. Hardware b. Software c. Data d. Power supply

d. Power supply

12. A value that identifies a unique row in a table: a. Key b. Alien key c. Foreign key d. Primary key

d. Primary key

13. Which of these is a server type? a. Network server b. Knowledge server c. Processing server d. Print server

d. Print server

5. What is a negative aspect of WIFI? a. Easy to utilize for anybody trying to harness it. b. Users are not restricted one physical location c. Information transfer is fast an convenient d. Provides lots of vulnerabilities

d. Provides lots of vulnerabilities

8. Which of the following is not a problem posed by information silos? a. Data duplication b. Inconsistency c. Scheduling conflicts d. Retention Rates

d. Retention Rates

5. Which is not a construct in the circle of risk? a. Assets b. Attacks c. Countermeasures d. Safeguard

d. Safeguard

18. Which of the following is not something done during application development? a. Gather data from all stake holders b. Testing c. Design software, database, and hardware selection d. Sell the product

d. Sell the product

7. Which of these is not a cost of low quality information? a. Inability to accurately track customers b. Marketing to nonexistent customers c. Inability to build strong customer relationships d. Significantly improve the chances of making a good decision

d. Significantly improve the chances of making a good decision

19. The components of a DB application include all of the following except: a. Database b. DBMS (Database Management System) c. Database Application(s) d. Statistical Application(s)

d. Statistical Application(s)

13. What is not a component of the information system? a. Hardware b. Data c. Procedures d. Storage

d. Storage

3. Low quality information can cause the following results except: a. Difficulty tracking revenue due to inaccurate invoices b. Marketing to nonexistent customers c. Inability identify selling opportunities d. Successful outcomes resulting from data driven decisions

d. Successful outcomes resulting from data driven decisions

2. Which of the following is NOT a component of information System? a. Hardware b. People c. Procedures d. System

d. System

13. Cybersecurity takes measures to protect data and systems related to _____. a. Information Technology b. Mainframes c. Desktop Computers d. The Internet

d. The Internet

8. Which of the following is not an important component of business processes? a. They have external users b. They have internal users c. The processes occur across organizations d. The processes occur only within organizations

d. The processes occur only within organizations

11. Which of the following is not one of the components of an ERP System? a. Data b. Hardware c. Software d. Training

d. Training

11. This type of data management asset is based around sales, deliveries, invoices, trouble tickets, claims - any business event a. Unstructured b. Metadata c. Master Data d. Transactional

d. Transactional

17. Top-down source of projects are typically identified by which group: a. Focus Group b. Development Group c. Lower Management d. Upper Management/Steering Committee

d. Upper Management/Steering Committee

2. Which one is not a rule of thumb with regards to data visualization? a. Label correctly b. Choose the correct scale c. Use color correctly d. Use "Times New Roman" as a font

d. Use "Times New Roman" as a font

10. Which of the following is not an important rules of thumb with regards to data visualization? a. Who are you creating this for? b. What type of data are you using? c. Choose the correct scale. (So you do not mislead the audience) d. Use color when you have the opportunity.

d. Use color when you have the opportunity.

5. Big Data is a term used to describe data collections that are characterized by all of the following, except: a. Volume b. Velocity c. Variety d. Verification

d. Verification

11. What is not a Project Management? a. Supervising the progression of a project. b. Managing your team so they are working towards the completion of the project. c. Ensuring that the project phases are completed in the correct order. d. Writes the code for a system

d. Writes the code for a system

7. Information silos arise as a result of ________. a. the individual users of personal information systems b. inter-enterprise information system's involvement to find solutions to problems arising within two or more enterprises c. an organization's plan to create them d. an organization's growth and increasing use of information systems

d. an organization's growth and increasing use of information systems

7. Which of the following devices is NOT considered to be an example of an Internet of Things (IoT) device? a. Fitbit b. Medical Devices c. Amazon's Echo d. Laptop

d. laptop

4. Which of the following is not a component of a business process? a. Actors b. Resources c. Roles d. Support

d. support

11. The following symbol used to document a business process that indicates the beginning or ending of a process and links to other related processes. a. Process step Connector Square d. Terminator

d. terminator


Set pelajaran terkait

Portage Chemistry 103 Module 1 Exam Study

View Set

(Clicker Q's) The Endocrine System

View Set

Chapt. 5: Adult Health & Nutritional Assessment

View Set

Musculoskeletal Practice Q & A Exam 5 Med Surg

View Set

L12 Loop of Henle and Urine Concentration

View Set