MIS Chapter 1

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

37) A group of components that interact to achieve some purpose is referred to as a(n) ________. A) system B) element C) unit D) entity

A) system

56) ________ refers to the products, methods, inventions, and standards that are used to produce information. A) Information technology B) Information processing C) Simulation D) Product specification

A) Information technology

64) A user has created a password that meets all the criteria for a strong password. What is a potential drawback of such a password? A) It will be difficult to remember. B) It will be very short. C) It can be easily guessed. D) It will create IP address conflicts in networks.

A) It will be difficult to remember.

9) ________ is the ability to model the components of a unit, to connect the inputs and outputs among those components into a sensible whole that reflects the structure and dynamics of the phenomenon observed. A) Systems thinking B) Collaboration C) Adaptive learning D) Critical reasoning

A) Systems thinking

4) Which of the following is true about the impact of Moore's Law on business professionals? A) They need to be able to assess, evaluate, and apply emerging information technology to business. B) They have to concentrate more on developing routine skills than nonroutine skills. C) They need to be able to develop better communication and information technologies. D) They no longer need to focus on skills such as abstract reasoning and collaboration.

A) They need to be able to assess, evaluate, and apply emerging information technology to business.

15) Marketing managers planning to use new social networking technologies to strengthen their market presence are portraying their ________. A) ability to experiment B) routine skills C) collaboration skills D) ability to outsource work

A) ability to experiment

11) In a job interview, Lillian is asked to be part of a three-member group and design a mock business process based on the strengths and skills of the group's members. In this case, which of the following skills is the interviewer trying to test? A) collaboration B) cognitive acceleration C) systems thinking D) facilitation

A) collaboration

58) Which of the following components distinguishes information systems from information technology? A) people B) database structure C) software D) hardware

A) people

49) Which of the following is a critical responsibility of business professionals in using information systems? A) protecting the security of a system and its data B) reprogramming a system to meet changing needs C) creating and modifying a system's databases D) building and configuring additional networks

A) protecting the security of a system and its data

62) Security systems ultimately depend on the behavior of their ________. A) users B) programmers C) hardware components D) database structures

A) users

3) Which of the following is a result of Moore's law? A) The risk of technology becoming obsolete has decreased. B) The price to performance ratio of computers has fallen dramatically. C) The outsourcing of nonroutine skills has increased drastically. D) The cost of data processing has increased considerably.

B) The price to performance ratio of computers has fallen dramatically.

57) Which of the following statements is true about information systems? A) They can be bought off the shelf. B) They are a group of components that produce information. C) They drive the development of information technology. D) They are not susceptible to the changing needs of the market.

B) They are a group of components that produce information.

7) Which of the following statements is true of nonroutine cognitive skills? A) They have become less marketable. B) They increase an individual's job security. C) They do not experience any impact of technological changes. D) They are usually outsourced by organizations to the lowest bidder.

B) They increase an individual's job security.

39) The five-component framework of an information system consists of computer hardware, software, data, people, and ________. A) documents B) procedures C) objectives D) results

B) procedures

10) Which of the following best describes collaboration? A) It is the ability of an individual to model the components of the system, to connect the inputs and outputs among those components into a sensible whole that reflects the structure and dynamics of the phenomenon observed. B) It is the ability to assess, evaluate, and apply emerging information technology to business. C) It is the activity of two or more people working together to achieve a common goal, result, or work product. D) It is the activity of constructing or modifying models with the help of one's nonroutine cognitive skills.

C) It is the activity of two or more people working together to achieve a common goal, result, or work product.

50) Which of the following reasons is valid for a company to create a new information system? A) to project a modern image B) to avoid falling behind the technology curve C) to help employees achieve the strategies of the business D) to show its social networking presence

C) to help employees achieve the strategies of the business

63) Which of the following requirements should a password fulfill in order to be considered strong? A) It should have five characters at the most. B) It should contain a complete dictionary word. C) It should not contain many special characters. D) It should not contain the user name or company name.

D) It should not contain the user name or company name.

13) Which of the following is necessary for effective collaboration? A) modeling the components of a system B) focusing on individual goals C) proper division of tasks D) giving and receiving critical feedback

D) giving and receiving critical feedback

8) ________ is the ability to make and manipulate models. A) Abstract reasoning B) Cognitive acceleration C) Adaptive learning D) Holacracy

A) Abstract reasoning

14) ________ is making a reasoned analysis of an opportunity, envisioning potential solutions, evaluating those possibilities, and developing the most promising ones, consistent with the resources one has. A) Experimentation B) Abstraction C) Systems thinking D) Collaboration

A) Experimentation

47) Which of the following statements is true about the management and use of information systems? A) An employee must be a programmer to manage information systems. B) Information systems must be adapted to new requirements. C) Information systems need not be maintained after development. D) Organizations with dynamic business environments do not use information systems.

B) Information systems must be adapted to new requirements.

2) Which of the following statements is true of Moore's Law? A) It is based on the technological advancements in weapon manufacturing. B) It made the cost of data processing, communications, and storage essentially zero. C) It states that the total number of transistors produced in the world doubles every 18 months. D) It has resulted in obsoleting the use of transistors.

B) It made the cost of data processing, communications, and storage essentially zero.

1) The number of transistors per square inch on an integrated chip doubles every 18 months. This observation is known as ________ Law. A) Murphy's B) Moore's C) Amdahl's D) Metcalfe's

B) Moore's

48) Why is it important for business professionals to take an active role in developing and managing information systems? A) They know how to create a database and configure computers. B) They are the people who know how to build networks. C) They know whether a system meets their needs and requirements. D) They are the lone users of information systems.

C) They know whether a system meets their needs and requirements.

68) Which of the following techniques is best suited for creating memorable, strong passwords? A) using at least one dictionary word in the password B) repeating previously used passwords C) basing passwords on the first letter of the words in a phrase D) creating a password that is related to one's name or company's name

C) basing passwords on the first letter of the words in a phrase

5) Because the cost of data processing, storage, and communications is essentially zero, any routine skill can and will be ________. A) considered a nonroutine cognitive skill B) a strong marketable skill C) outsourced to the lowest bidder D) sufficient to attain job security

C) outsourced to the lowest bidder


Set pelajaran terkait

CA RDA Test Bank - Specialty Dentistry

View Set

Seasonal Influenza Vaccination Training (2hr)

View Set

Chapter 1: Insurance Terms and Related Concepts

View Set

Life and Health Insurance Quiz Questions

View Set

Free Enterprise Economy: Definition & Examples

View Set