CIS 310 Midterm

Ace your homework & exams now with Quizwiz!

Describe what the term normalization means. A. reduces duplication of data between tables B. eliminates poor primary keys C. eliminates use of multiple tables by using one comprehensive table D. all of the above

A

In general, the Internet has __________________ bargaining power of customers. A. increased B. decreased C. not changed D. eliminated

A

On the curve of technology adoption, who are the users that are first to adopt a new technology? A. Innovators B. Early adopters C. Early majority D. Late majority

A

The Internet began in: A. 1960s B. 1970s C. 1980s D. 1990s

A

This person aligns the plans and operations of the information systems with the strategic goals of the organization. A. CIO B. Functional Manager C. ERP Manager D. Project Manager

A

What are the advantages of solid-state drives over hard disks? Correct! A. They use flash memory which is must faster than a traditional disk drive. B. SSDs are slower but more reliable. C. SSDs are more expensive. D. All of the above.

A

What are the two main types of software? A. Operating Systems and Application Software. B. Application software and enterprise-wide Software. C. Apps and Data Analysis. D. Personal productivity and enterprise-wide software.

A

What does Electronic Data Interchange (EDI) do? Correct! A. Integrates the supply chain technologically, so that business partners share documents and information regarding production. B. Integrates manufacturing with research and development. C. Provides for configuration management of engineering documents. D. All of the above.

A

What does a document management system (DMS) control: A. Versions, Approval and Communications. B. Processes, Approval and Communications. C. Versions, Flow of Control and Responsibility. D. Versions, Approval and Responsibility.

A

What does it mean to say we are in a post-PC world? A. The increased use of tablets and smartphones is putting us in a new era of computing. B. Apple iPad. C. Mainframes were the beginning of computing. D. Macs are outselling PCs.

A

What does the term authentication mean? A. Making sure someone using the computer is who they say they are by use of passwords and other techniques. B. Making sure data is accurate. C. Making sure that data is kept confidential, so only the owner of the data can see it. D. All of the above.

A

What is Big Data? A. Data sets that is so large, they cannot be analyzed by conventional database tools. B. Data accuracy. C. Business Intelligence to gain strategic advantage. D. Personal data that is captured by government agencies like the NSA.

A

What is a VPN and why is it useful? A. Virtual Private Network for employees outside the firm to securely access the network. B. Virtual Primary Network where most of the firewalls are set. It is the most secure part of the network. C. Virtual Primary Network where customers can link to a company for its services. D. Virtual Public Network where the public has internet access, like at an airport or coffee house.

A

What is a domain name? A. A human-friendly name that corresponds to an IP address. B. An IP address. C. An Internet protocol. D. How packets are switched on the Web.

A

What is a hotsite? A. An alternative replica of a company's critical data center. If the primary site goes down, the alternate site is immediately brought online with no downtime experienced. B. A cloud computing center. C. A duplicate data center with equipment. The backups can be restored here if a natural disaster destroys the original data center. D. A remote vault that contains all the backups for a company.

A

What is an example of open source software? A. Linux B. Windows C. iOS D. None of the above

A

What is metadata? A. Data about data B. A special data type C. Too much data D. A primary key

A

What is multi-factor authentication? A. It requires a user to log in (authenticate) with more than one type of identification.* B. It requires a user to carry an identification key to log into a system. C. It requires a human being to identify someone before they can use a computing system. D. It requires thumb print or other biometric identification.

A

What is the definition of a process? A. Series of steps undertaken to achieve a desired outcome or goal. B. Continuous improvement C. Programming logic D. All of the above

A

What is the impact of Moore's Law on the various hardware components described in this chapter? A. The number of transistors on a chip will double every two years. B. Computers quickly lose their strategic advantage and therefore they become a commodity. C. Hardware is obsolete every two years. D. There are 8 bits in a byte.

A

What is the productivity paradox? A. Even though we've added information technology to business, it has not improved productivity. Yet, we cannot think of operating a business without technology. B. Even though processes are automated, people cannot work as fast as machines. C. Even though technology was introduced to businesses, errors in implementation keep businesses from being successful. D. You cannot achieve more productivity without investing in technology.

A

What was revolutionary about Web 2.0? A.Social media Web sites such as Twitter, Facebook and WordPress allowed people to find and communicate with each other. B. Graphical user interfaces let people use the Internet to quickly link to websites all over the world. C. Also known as the semantic web, where users can ask questions on a browser and get intelligent information. D. All of the above describe Web 2.0.

A

What were the first four locations hooked up to the Internet (ARPANET)? A.UCLA, Stanford, MIT, and the University of Utah B. UCLA, Stanford, MIT, and UC Berkeley C. UCLA, Berkeley, Cal Tech, and the University of Utah D. UCLA, Stanford, MIT, and the University of Utah

A

Which of the following is not an operating system? A. Google B. Windows C. Android D. iOS

A

Who invented the World Wide Web? A. Tim Berners-Lee B. Vinton Cerf C. National Science Foundation D. ARPANet

A

According to Michael Porter, what is the definition of competitive advantage. A. Making more profit than competitors because of technological superiority. B. Using technology to put other competitors out of business. C. Creating and sustaining superior performance. D. All of the above.

C

At the top of this quiz is a picture that can be used for this question. What do the rows and columns represent, respectively? A. Fields and records B. Fields and data C. Records and Fields D. Data and Records

C

Microsoft Windows is an example of which component of information systems? Select the most appropriate answer. A. Software B. Application C. Operating System D. User Interface

C

Software that you purchase ___________________________. A. is owned by you. B. is leased to you for a given period of time. C. is not owned by you. But, you have bought the license to use it. D. can be resold by you.

C

What are the five components that make up an information system? A. Hardware, Software, Networks, Polices and Processes B. Hardware, Software, Data, People, Networking Communication C. Hardware, Software, Data, People, Process D. Software, Data, Networking Communication, People, Process

C

What does off-the-shelf mean regarding information systems. A. Building the information system within the firm, using programmers from the organization. B. Outsourcing the programming for a new information system. C. Purchasing a system that has already been built. D. Purchasing hardware and developing software to create an information system.

C

What is a flattened organization? A. A small organization with few levels of management. B. A matrix organization with cross-functional reporting. C. An organization that has removed one or more layers of management, creating better communication and faster business processes. D. A project team where the majority of employees are outsourced labor.

C

What is cloud computing? A. A new type of operating system. B. Computing that is done over the air waves. C. Computing that is internet based. It can be applications, services and data storage. D. Mobile computing.

C

What is one of the criticisms of ERP systems? A. ERP systems require maintenance. B. ERP systems need to be implemented. C. ERP systems are inflexible. D. ERP systems lack integration.

C

What is true about Web 3.0? A. Social media Web sites such as Twitter, Facebook and WordPress allowed people to find and communicate with each other. B. Graphical user interfaces let people use the Internet to quickly link to websites all over the world. C. Also known as the semantic web, where users can ask questions on a browser and get intelligent information. D. All of the above describe Web 3.0.

C

What items below are typical Web 2.0 activities? A. Word processing, PowerPoint, Spreadsheets B. Database Programming C. Blogging, Social Networking, Interactive Comments D. Online advertising

C

Which list below shows the terms ordered from smallest to largest. A. megabyte, kilobyte, terabyte, gigabyte B. gigabyte , megabyte, kilobyte, terabyte C. kilobyte, megabyte , gigabyte, terabyte D. megabyte, kilobyte, gigabyte, terabyte

C

Which of the following is NOT a way to help with password protection? A. Use a complex password. B. Change your password regularly. C. Use the same password for multiple web sites and computer systems. D. Train people on how to create a good password.

C

Which of the following is NOT an advantage of cloud computing? A. Installation and upgrades are handled by the cloud supplier. B. You can get access to your cloud information from any computer connected to the Internet. C. Your information is stored on someone else's computer. D. Services can be leased for a limited time on an as-needed basis.

C

Which of the following is a BAD primary key? A. Social Security Number B. Email address C. Last name D. Phone number

C

Which of the following is a semi-structured decision? A. Ordering inventory when a part is out of stock. B. Hiring temporary workers during the holidays. C. Diagnosing a medical condition. D. Purchasing stock once it falls below a certain price.

C

Which of the following is not an advantage of outsourcing? A. Reduce cost. B. Flexible labor pool in that it is easier to hire and fire outsourced labor. C. Easily negotiated contracts.* D. Access to specific skills that a company may not already have.

C

Why does Nicholas Carr claim 'IT Doesn't Matter.' A. Because software development is competitive and any successful product is followed by a copy almost immediately. B. Because large companies are multi-national and IT doesn't play as significant a role in other countries. C. Because information technology is so readily available and the software used so easily copied, businesses cannot hope to implement these tools to provide any sort of competitive advantage. D. Because the costs with labor, licensing, implementation and maintenance are about equal to the profits created.

C

Describe the job of a project manager. A. Lead the project, keeping it on time and within budget. B. Report to upper management and the project team. Communicate constantly. C. Work with stakeholders to solve their IT problems. A D. All of the above.

D

Enterprise Resources Planning (ERP) applications do what? A. Manage the data and business processes across a company. B. Integrate different functional areas of a company. C. Operate off of a centralized database. D. All of the above.

D

Just like a company, you can do things to ensure your recovery from a major problem (like your laptop crashing). What are some things you can do? A. Perform regular backups of your data. B. Store your backup in a safe place. If your house burns down or your computer is stolen, storing your backup somewhere else can be beneficial. C. Test your backup to make sure that it works. D. All of the above.

D

Specifically, a strategic information system is one that attempts to do what? A. Deliver a product or service at lower cost. B. Deliver a differentiated product or service. C. Enable innovation. D. All of the above.

D

What are advantages of Business Process Management systems? A. Built in reporting. B. Enforce best practices. C. Enforce consistency. D. All of the above.

D

What are some emerging roles in IT? A. Social media specialist. B. Data/Business intelligence analyst. C. Cloud computing specialist. D. All of the above.

D

What are the functions of the operating system? A. Manage the hardware resources of the computer. B. Provide the user-interface components. C. Provide a platform for developers to write software applications. D. All of the above.

D

What are three examples of information system hardware? A. computer, laptop, ipad B. printer, keyboard, mouse C. server, router, cables D. all of the above

D

What does an ERP system do? A. It offers integration of functions across organizations. B. It uses a central database. C. In reduces errors because the system is integrated. D. All of the above.

D

What does the term "killer" app mean? A. An application that drains the resources of your computer or device. B. A phone app becomes viral and everyone downloads it. C. Peer-to-peer sharing of application software. D. An application that is so essential, people will buy the device to run it.

D

What is a Local Area Network? A. A network that connects a group of consumers to ecommerce networks. B. A network that connects a firms customers to their supply chain. C. A network that connects a group or organization in a wide geographic region. D. A network that connects a group or organization in a small geographic region.

D

What is benefit of ERP? A. It helps to standardize business processes in a firm. B. It has best-practices in process management build into it. C. Having a centralized database helps eliminate the need for data entry and reduces errors. D. All of the above.

D

What is role-based access control? A. It is an Access Control List (ACL) that defines everyone's access. B. It is used to encrypt user passwords. C. It requires at least two forms of authentication. D. It is used to give users with specific characteristics (roles) different levels of access to information.

D

What is true about business processes? A. A business process, is a process that is focused on achieving a goal for a business. B. Processes are something that businesses go through every day in order to accomplish their mission. C. Automation through technology helps to make business processes more efficient and effective. D. All of the above are true.

D

What is true about cloud computing? A. Information may be stored on a remote server. B. Programs for running a company may be hosted on a remote server. C. The infrastructure for running a company's computing assets can be rented as needed. D. All of the above are true.

D

What roles do people play in information systems?. A. People run/operate information systems B. People use information systems C. People build/maintain information systems D. All of the above

D

Which describes the role of a systems analyst? A. Translate the systems requirements into an information-systems design. B. Work with people, teams and departments to determine what the business requirements are. C. Document business processes. D. All of the above.

D

Which is not an example of application software? A. Candy Crush B. Microsoft Access Database C. Google Docs D. Android

D

Which of the following are examples of application software? A. Microsoft Word B. Google Docs C. Candy Crush D. All of the above are examples of application software.

D

Which of the following is a secondary activity on the value chain? A. Human Resources B. Firm Infrastructure C. Procurements D. Marketing and Sales

D

Which of the following is an example of qualitative data? A. Units sold. B. Net profit. C. The number of customer complaints. D. Content of customer complaints.

D

Which of the following is an operating system? A. Microsoft Excel B. Google Chrome C. iTunes D. Android

D

Which of the following is not a network security tactic? A. Firewalls B. Intrusion Detections Systems C. Physical Security D. Remote storage of backups

D

Which of the following is not part of the security triad? A. Confidentiality B. Integrity C. Availability D. Accessibility

D

Which of the following jobs can be an administrative support function for a company. A. Computer Operator B. Help Desk Administrator C. Database Administrator D.All of the above

D

Who is considered the primary inventor of the World Wide Web? A. Al Gore B. The US Government C. Vinton Cerf D. Tim Berners-Lee

D

Why is the personal computer is now considered a commodity? A. It is part of our everyday lives. B. There is very little differentiation between computers. C. Hundreds of manufacturers, worldwide produce parts for computers. D. All of the above.

D

According to our author(s) what is the simplest way to document a process? A. Interview stakeholders about the business objectives. B. Make a simple list of each step in the process. C. Analyze forms used in the process. D. Follow people around as they do their jobs

B

Antivirus software and disk defragmentation software are examples of what type of software? A. Application software B. Utility software C. Programming software D. System software

B

In 2011, access to broadband was considered a basic human right by _____________. A. The United States B. The United Nations C. The Equal Opportunity Education Act D. The World Bank

B

The CPU can also be thought of as the of the computer. A. User Interface B. Brains C. Input Device D. All of the above

B

The goal of many information systems is to transform data into ___________ in order to generate ______________ that can be used for decision making. A. digital, information B. information, knowledge C. knowledge, questions D. reports, graphs

B

What can prevent suspicious packets from entering a company network? A. Physical security B. Firewall C. Router D. Passwords

B

What does CRM stand for? A. Client Relationship Management B. Customer Relationship Management C. Client Resource Management D. All of these terms are interchangeable

B

What does the term packet mean? A. An IP address B. The fundamental unit of data transmitted over the Internet C. The protocol for connecting bridges and routers D. Primary Access Computer KbitE Test

B

What is Carr's main argument about information technology? A. Information Technology should be a free resource to the public. B. Information Technology is a commodity and should be managed to reduce costs. C. Information Technology changes too quickly to provide sustained advantages. D. Information Technology innovations are always too expensive at first.

B

What is ISO 9000 certification? A. A certification for ERP. B. A certification for best practices. C. A certification for quality business process management. D. A certification for document management systems (DMS).

B

What is a "killer" app? A. An app that achieves massive downloads when it is first put on the market. B. A "killer" application is one that becomes so essential that large numbers of people will buy a device just to run that application. C. An app that achieves so much use that it slows down or 'kills' the network. D. An application that is downloaded by many people and then fails to operate.

B

What is meant by 'matrix organization'. A. People have many skills that can be used on different projects. B. Employees have two managers a functional manager and a project manager.* C. The organization is flattened with very few managers. Employees are self-regulated. D. All of the above can describe a matrix organization.

B

Which of the following is NOT a data type? A. Number B. Name C. Text D. Date

B

Which of the following is NOT a substitute product for a car? A. A bicycle B. A hybrid vehicle* C. A train D. A bus

B

Which of the following is a primary activity on the value chain? A. Inbound logistics B. Technology development C. Operations D. Outbound logistics

B

Which term best describes this number (909) 999-2121? A.Data B. Information C.Knowledge D. Wisdom

B

What are the characteristics of a relational database? A. Data is organized into tables. B. Tables consist of a set of fields. C. A record is the data for the set of fields in a table. D. All the tables are related by one or more fields in common. E. All of the above.

E


Related study sets

U.S. History I.S.75 Practice Regent 2022

View Set

BIO 100 Unit 2 Pre-Assignment Questions

View Set

PassPoint: Fundamentals of Nursing

View Set