MIS Midterm Exam
4) Which of the following is the key business metric behind the technologies implemented by Kroger, as discussed in the chapter-opening case? A) Higher customer satisfaction levels B) Survival C) Improved employee morale D) Improved decision making E) Reduced cost of supplies
A
14) Disciplines that contribute to the technical approach to information systems include: A) computer science, engineering, and networking. B) operations research, management science, and computer science. C) engineering, utilization management, and computer science. D) management science, computer science, and engineering. E) economics, sociology, and psychology.
B
34) A SAN is a ________ network. A) server area B) storage area C) scalable architecture D) service-oriented architecture E) software arrangement
B
17) The interaction between information technology and organizations is influenced: A) solely by the decision making of middle and senior managers. B) by the development of new information technologies. C) by many factors, including structure, politics, culture, and environment. D) by two main macroeconomic forces: capital and labor. E) by the rate of growth of the organization.
C
18) A(n) ________ represent data as two-dimensional tables. A) non-relational DBMS B) mobile DBMS C) relational DBMS D) hierarchical DBMS E) object-oriented DBMS
C
3) Competitors were seeking which of the following business objectives when they rushed to provide ATMs after Citibank introduced the first ATMs in New York? A) Improved efficiency B) Customer and supplier intimacy C) Survival D) Competitive advantage E) Improved decision making
C
31) Which of the following is the most prominent data manipulation language today? A) Access B) DB2 C) SQL D) Crystal Reports E) NoSQL
C
36) Which of the following is not an example of a wearable computing device? A) Smartwatch B) Smart glasses C) Smartphones D) Activity trackers E) Smart ID badges
C
8) What are the four layers of the TCP/IP reference model? A) Physical, application, transport, and network interface B) Physical, Application, Internet, and Network Interface C) Application, Transport, Internet, and Network Interface D) Application, Hardware, Internet, and Network Interface E) Software, Hardware, Network Interface, Internet
C
24) Which signal types are represented by a continuous waveform? A) Laser B) Optical C) Digital D) RFID E) Analog
E
33) A(n) ________ signal is a discrete, binary waveform that transmits data coded into two discrete states such as 1-bits and 0-bits. A) modulated B) broadband C) T1 D) analog E) digital
E
64) In data mining, which of the following involves using a series of existing values to determine what other future values will be? A) Associations B) Sequences C) Classifications D) Clustering E) Forecasting
E
7) Which of the following occurs when the same attribute in related data files has different values? A) Data redundancy B) Data duplication C) Data dependence D) Data discrepancy E) Data inconsistency
E
9) Which of the following is not an example of the potential dark side of big data? A) Police visits to individuals whom a computer system identified as likely to commit a crime in the future. B) Use of a device installed in a car to analyze driving habits. C) Use of a predictive modeling system that predicts life expectancy by using data about individual consumers' buying habits as well as personal and family medical histories. D) Use of computerized systems to filter and hire job applicants. E) Analyzing data from sensors installed in local parks to monitor soil moisture.
E
20) All of the following statements are true about information technology's impact on business firms except: A) it helps firms expand in size. B) it helps firms lower the cost of market participation. C) it helps reduce internal management costs. D) it helps reduce transaction costs. E) it helps reduce agency costs.
A
17) Which of the following is a DBMS for desktop computers? A) DB2 B) Oracle Database C) Microsoft SQL Server D) Microsoft Access E) Microsoft Exchange
D
11) Computer networks are fundamentally different from telephone networks. A) TRUE B) FALSE
A
15) Sociologists study information systems with an eye to understanding: A) how systems affect individuals, groups, and organizations. B) how human decision makers perceive and use formal information. C) how new information systems change the control and cost structures within the firm. D) the production of digital goods. E) mathematically based models and physical technology.
A
2) Which of the following is not an IT infrastructure service component? A) Operating system software B) Computing platforms to provide a coherent digital environment C) Physical facilities management to manage the facilities housing physical components D) IT management services to plan and develop the infrastructure and provide project management E) IT education services that provide training to employees
A
22) A field identified in a table as holding the unique identifier of the table's records is called the: A) primary key. B) key field. C) primary field. D) unique ID. E) primary entity.
A
33) Software that manages the resources of the computer is called: A) operating system software. B) application software. C) data management software. D) network software. E) web services software.
A
33) The process of streamlining data to minimize redundancy and awkward many-to-many relationships is called: A) normalization. B) data scrubbing. C) data cleansing. D) data defining. E) optimization.
A
34) Coaxial cable is similar to that used for cable television and consists of thickly insulated copper wire. A) TRUE B) FALSE
A
35) Fiber-optic cable is more expensive and harder to install than wire media. A) TRUE B) FALSE
A
4) A ________ is an example of pre-digital data storage that is comparable to a database. A) library card catalog B) cash register receipt C) doctor's office invoice D) list of sales totals on a spreadsheet E) schedule of due dates on a project outline
A
49) Instant messaging is a type of ________ service. A) chat B) cellular C) e-mail D) wireless E) network
A
49) The term big data refers to all of the following except: A) datasets with fewer than a billion records. B) datasets with unstructured data. C) machine-generated data (i.e. from sensors). D) data created by social media (i.e. tweets, Facebook Likes). E) data from Web traffic.
A
55) All of the following are technologies used to analyze and manage big data except: A) cloud computing. B) noSQL. C) in-memory computing. D) analytic platforms. E) Hadoop.
A
6) Data ________ occurs when the same data is duplicated in multiple files of a database. A) redundancy B) repetition C) independence D) partitions E) discrepancy
A
66) Wikis allow visitors to change or add to the original posted material. A) TRUE B) FALSE
A
7) To make sure they stock clothes that their customers will purchase, a department store implements a new application that analyzes spending levels at their stores and cross-references this data to popular clothing styles. Which of the following business objectives is this information intended to support? A) Customer intimacy B) Survival C) Operational excellence D) Improved decision making E) New products and services
A
71) The "Internet of Things" refers to a vision of a pervasive Web, in which common objects are connected to and controlled over the Internet. A) TRUE B) FALSE
A
74) The emerging Internet of People is based on sensors attached to clothing and personal effects that monitor physical states and locations of individuals. A) TRUE B) FALSE
A
75) Middleware is an application that transfers information from an organization's internal database to a web server for delivery to a user as part of a web page. A) TRUE B) FALSE
A
81) All of the following are physical components of an RFID system except: A) bar codes. B) antennas. C) radio transmitters. D) tags. E) a stationary or handheld device.
A
83) The concept of a future web in which it is commonplace for everyday objects to be connected, controlled or monitored over the Internet is called: A) the Internet of Things. B) the Semantic Web. C) Internet2. D) a 3-D Web. E) Web 2.0.
A
88) Redesigning and automating business processes can be seen as a double-edged sword because: A) increases in efficiency may be accompanied by job losses. B) increases in efficiency may be accompanied by poor data quality. C) support for middle-management decision making may be offset by poor data quality. D) reliance on technology results in the loss of hands-on knowledge. E) it can concentrate power in the hands of senior executives.
A
89) An organization's rules for sharing, disseminating, acquiring, standardizing, classifying, and inventorying information is called a(n): A) information policy. B) data definition file. C) data quality audit. D) data governance policy. E) data policy.
A
89) SSL is a protocol used to establish a secure connection between two computers. A) TRUE B) FALSE
A
9) On which of the following protocols is the Internet based? A) TCP/IP B) FTP C) IMAP D) HTTP E) DNS
A
96) The term data governance refers to the policies and processes for managing the integrity and security of data in a firm. A) TRUE B) FALSE
A
10) Which of the following is a service provided by the Internet that uses universally accepted standards for storing, retrieving, formatting, and displaying information in a page format? A) HTML B) The World Wide Web C) E-mail D) An extranet E) FTP
B
16) Psychologists study information systems with an eye to understanding: A) how systems affect individuals, groups, and organizations. B) how human decision makers perceive and use formal information. C) how new information systems change the control and cost structures within the firm. D) the production of digital goods. E) mathematically based models and physical technology.
B
59) Data mining allows users to: A) quickly compare transaction data gathered over many years. B) find hidden relationships in data. C) obtain online answers to ad-hoc questions in a rapid amount of time. D) summarize massive amounts of data into much smaller, traditional reports. E) access the vast amounts of data in a data warehouse.
B
7) Which of the following is the best description of a protocol in a telecommunications network architecture? A) A device that handles the switching of voice and data in a local area network B) A standard set of rules and procedures for control of communications in a network C) A communications service for microcomputer users D) The main computer in a telecommunications network E) A pathway through which packets are routed
B
9) The fact that a traditional file system cannot respond to unanticipated information requirements in a timely fashion is an example of which of the following issues with traditional file systems? A) Program-data dependence B) Lack of flexibility C) Poor security D) Lack of data sharing E) Data redundancy
B
90) In a large organization, which of the following functions would be responsible for physical database design and maintenance? A) Data administration B) Database administration C) Information policy administration D) Data auditing E) Database management
B
91) Smartphones typically feature state-of-the-art encryption and security features, making them highly secure tools for businesses. A) TRUE B) FALSE
B
1) Which of the following is not one of the six strategic business objectives of information systems? A) New products and services B) Improved decision making C) Competitive advantage D) Improved employee morale E) Survival
D
1) Which type of infrastructure service provides data, voice and video connectivity to employees, customers, and suppliers? A) Networking B) Telephone C) VOIP D) Telecommunications E) Data management
D
11) Which of the following is a private corporate network extended to authorized users outside the organization? A) An intranet B) The World Wide Web C) The Internet D) An extranet E) FTP
D
18) Which of the following is not a major feature of organizations that impacts the use of information systems? A) Business processes B) Environments C) Goals D) Agency costs E) Leadership styles
D
2) The Mandarin Oriental's use of computer systems to keep track of guests' preferences is an example of which of the following? A) Improved flexibility B) Improved decision making C) Improved efficiency D) Customer intimacy E) Operational excellence
D
5) Which of the following is an example of a business using information systems to create a new product? A) Walmart's RetailLink system B) The Mandarin Oriental's use of computers to keep track of guest preferences C) Verizon's use of a web-based digital dashboard to provide real-time company information for managers D) Apple's creation of the iPod E) Kroger's use of sensors to monitor cold food storage temperatures
D
6) How much did American businesses spend on information systems hardware, software, and telecommunications equipment in 2015? A) About $100 million B) About $1 billion C) About $100 billion D) About $1 trillion E) About $10 trillion
D
84) Which of the following statements about RFID is not true? A) RFIDs transmit only over a short range. B) RFIDs use an antenna to transmit data. C) Microchips embedded in RFIDs are used to store data. D) RFIDs require line-of-sight contact to be read. E) RFID tags and antennas come in a variety of shapes and sizes.
D
91) Which common database challenge is illustrated by a person receiving multiple copies of an L.L. Bean catalog, each addressed to a slightly different variation of his or her full name? A) Data normalization B) Data accuracy C) Data redundancy D) Data inconsistency E) Data duplication
D
12) Which of the following deals with behavioral issues as well as technical issues surrounding the development, use, and impact of information systems used by managers and employees in the firm? A) Information systems literacy B) Information systems architecture C) Business processes D) Information technology infrastructure E) Management information systems
E
13) Which field of study focuses on both a behavioral and technical understanding of information systems? A) Sociology B) Operations research C) Economics D) Behavioral computing E) Management information systems
E
19) Which of the following statements about business processes is not true? A) Business processes influence the relationship between an organization and information technology. B) Business processes are a collection of standard operating procedures. C) A business firm is a collection of business processes. D) Business processes are usually ensconced in an organization's culture. E) Business processes are typically unaffected by changes in information systems.
E
8) All of the following are new technology-related trends in MIS except: A) cloud computing. B) big data. C) IoT. D) the mobile digital platform. E) co-creation of business value.
E
9) The three activities in an information system that produce the information organizations use to control operations are: A) information, research, and analysis. B) input, output, and feedback. C) data, information, and analysis. D) data analysis, processing, and feedback. E) input, processing, and output.
E
65) Most Internet businesses do very little to protect the privacy of their customers.
TRUE