CS100 Final

Ace your homework & exams now with Quizwiz!

A management information system (MIS) is exactly the same as a transaction processing system (TPS); the two terms can be used interchangeably.

False

Which of the following transactions definitely require online transaction processing and cannot work on batch processing approach?

Stock investments

_____includes the planning, executing, and controlling of all activities involved in raw material sourcing and procurement, converting raw materials to finished products, and the warehousing and delivering finished product to customers.

Supply chain management (SCM)

The ______ is a security technique associated with the use of credit cards at the time of purchase that checks additional digits printed on the back of the credit cards.

Card Verification Number

If an organization is using several separate systems, they can be replaced with a single integrated set of applications for the entire enterprise.

true

In a typical computer configuration, secondary storage has a much larger capacity than the volatile random access memory.

true

Lack of trust in online sellers is one of the most frequently cited reasons that some consumers are not willing to purchase online.

true

On a modern home computer, one can set up accounts for many users and be able to control what resources a user may access.

true

One of the primary roles of a senior IS manager is to communicate with other areas of the organization to determine changing business needs.​

true

Organizations frequently need to customize a vendor's enterprise resource planning (ERP) software to integrate other business systems.

true

Using a computer to forecast future sales and order more inventory before a shortage can occur is an example of information system feedback.

false

When a business finds that many of its business applications have to be updated or rewritten, it will be better if they replace them with an ERP system.

false

Suppose you are assigned to manage a virtual team. Which of the following will you NOT do?

hold team meetings regularly - whether the team members like it or not

The action of including only some columns for output while retrieving data is known as ____.

projecting

​Which of the following is NOT one of the four main components in Leavitt's Diamond?

systems

_____ consists of server and client software, the Hypertext Transfer Protocol (HTTP), standards, and markup languages that combine to deliver information and services over the Internet.

the Web

The number of mobile Websites worldwide is expected to grow rapidly because of ______________.

the development of new and useful applications

4G will deliver 3 to 20 times the speed of 3G networks for mobile devices.

true

A client is any computer on a network that sends messages requesting services from the servers on the network.

true

A database administrator (DBA) must have a clear understanding of the fundamental business of an organization, be proficient in the use of selected database management systems, and stay abreast of emerging technologies and new design approaches.

true

A database is essential to the operation of a computer-based information system.

true

A database management system (DBMS) serves as an interface between an application program and a database.

true

A database must reflect the business processes of an organization.

true

A database, a database management system, and the application programs that use the data, make up a database environment.

true

A relational model splits the information up into many two dimensional data structures.

true

An electronic exchange is an electronic forum where manufacturers, suppliers, and competitors buy and sell goods, trade market information, and run back-office operations.

true

An integrated database for the entire organization makes it easier to share data among different business units.

true

An operating system is a set of programs that controls the computer hardware and acts as an interface with applications.

true

Cascading Style Sheets (CSS) use special Hypertext Markup Language (HTML) tags to globally define font characteristics for a variety of page elements as well as how those elements are laid out on a Web page.

true

Each central processing unit (CPU) produces a series of electronic pulses at a predetermined rate, called the clock speed, which affects machine cycle time.

true

Electronic business (e-business) goes beyond e-commerce and e-procurement by using information systems and the Internet to perform business-related tasks and functions.

true

Entering textual data in place of numeric data will result in rejection of the transaction.

true

For each data item, a data dictionary usually contains information such as the name of the data item, the range of values that can be used, and the amount of storage needed for the item.​

true

If a hotel wishes to determine where to spend resources on renovations - on interior decor or on curb appeal or on recreational facilities - they would use business intelligence to make the decision.

true

​Parker has an Android smartphone. Which type of processor is used in his mobile device?

ARM

Which of the following, (1) money deposited in a bank account, (2) student recording her answer to a question in an online test, (3) customer adding an item to the online shopping cart, are considered transactions in an information system?

All

Which of the following is a markup language for defining the visual design of a Web page or group of pages?

Cascading Style Sheets (CSS)

Which of the following forms of e-commerce has created an opportunity for many people to make a living out of selling items on auction Websites?

Consumer-to-consumer (C2C) e-commerce

_____ is a subset of e-commerce that involves electronic transactions between consumers using a third party to facilitate the process.

Consumer-to-consumer (C2C) e-commerce

_____ involves reentering data that was not typed or scanned correctly.

Data correction

_____ is an approach that starts by investigating the general data and information needs of an organization at the strategic level and then examines more specific data and information needs for the functional areas and departments within the organization.

Enterprise data modeling

_____ is an approach used to capture user-provided information, such as information from warranties, surveys, user registrations, and contest-entry forms completed online.

Explicit personalization technique

Which of the following systems can help identify your geolocation​?

GPS

_____ is a visa program that allows skilled employees from foreign lands into the United States.

H-1B

_____ is an example of a popular general purpose software suite for personal computer users.

Microsoft Office

_____ is a hard disk drive storage device that is set up with its own network address and provides file-based storage services to other devices on the network.

Network-attached storage (NAS)

Which of the following types of processing is essential for businesses that require access to current data such as airlines, ticket agencies, and stock investment firms?

Online transaction processing

_____ is a process for driving traffic to a Web site by using techniques that improve the site's ranking in search results.

Search engine optimization

According to the classification of enterprise resource planning (ERP) vendors, _____ vendors target medium-sized firms with annual revenues in the $50 million to $1 billion range operating out of one or more locations.

Tier II

Which of the following statements is true of network-management software?

With network-management software, a manager on a networked personal computer can scan for viruses.

_____ is the use of software to assist in the creation, analysis, and modification of the design of a component or product.

_____ is the use of software to assist in the creation, analysis, and modification of the design of a component or product.

An enterprise data model is created only for documentation, but is otherwise inconsequential.

false

The fiber-optic cables that span the globe over land and under sea make up the Internet _____.

backbone

With _____, business transactions are accumulated over a period of time for processing in a single unit.

batch processing systems

The smallest piece of data used by a computer is a(n) _____.

bit

In a _____, all network devices are connected to a common backbone that serves as a shared communications medium.

bus network

Which of the following is NOT one of the three basic components of a successful e-commerce model?

capital

The idea of _____ is a form of innovation that constantly seeks ways to improve business processes and add value to products and services.

continuous improvement

​To ensure reliability and integrity, SQL databases conform to four specific properties. Which of the following is NOT one of those four properties?

currency

A _____ is a climate-and-access-controlled building or a set of buildings that houses the computer hardware that delivers an organization's data and information services.

data center

The process of converting human-readable data into machine-readable form is called _____.

data entry

The elimination of organizations that operate between the producer and the consumer is called _____.

disintermediation

A customer relationship management (CRM) system helps a company in managing ______.

distribution and accounting

Each attribute in a relational database model can be constrained to a range of allowable values called a _____.

domain

A global positioning system (GPS) device uses a(n) _____ to help people find their way around town or more remote areas.

embedded system

_____ are people who work directly with information systems to get results.

end users

You might be an information systems worker if you _________.

enjoy learning new techniques and enjoy working with people

A(n) _____ can replace many applications with one unified set of programs, making the system easier to use and more effective.

enterprise resource planning system

"Adapting" is the second stage in Lewin's Change Model, which involves learning new work methods, behaviors, and systems.​

false

A collection of data fields that are all related to one object, activity, or individual is called a file.

false

A customer relationship management (CRM) system helps a company to plan, execute, and control all the activities involved in raw material sourcing and procurement, conversion of raw materials to finished products, and the warehousing and delivery of finished product to customers.

false

A telecommunications protocol is any material substance that carries an electronic signal to support communications between a sending and receiving device.

false

An intranet is a network based on Web technologies that allows selected outsiders, such as business partners and customers, to access authorized resources of a company's extranet.

false

An organization's structure is independent of its goals and approach to management.

false

Bioprinting, which uses 3D printers to build human parts and organs from actual human cells, is widely considered to be unethical.

false

Businesses and organizations that manage a local area network (LAN) connect to the Internet via a Web browser.

false

Cache memory is available in two forms: level 1, which is found on the CPU chip, and level 2, which can be accessed over a high-speed dedicated interface.

false

Chip-and-PIN cards employ a computer chip that communicates with a card reader using infrared frequencies so that the cards do not need to be swiped at a terminal.

false

Completing an instruction involves two phases (instruction and execution), which are each broken down into three steps in each phase.

false

Data modeling usually involves setting a specific business goal and then analyzing the data and information needed to reach that goal.​

false

Data scientists do not need much business domain knowledge.​

false

If 10 users can run programs at the same time on the same computer, it is known as multi-tasking.

false

If a large organization wants software that will benefit the entire organization—what's known as enterprise application software—the organization must develop it specifically for the business in order to get the functionality required.​

false

In 1992, the Supreme Court ruled that online retailers must collect sales taxes even in states where they lack a physical presence.

false

In the past, market segmentation has been easy for B2B marketers because firmographic data was easy to obtain.

false

In the regression line Y = a+ bX + e, a is the slope of the regression line.​

false

It is acceptable to for transaction processing systems to capture inaccurate data.

false

It is safe to assume that personal information will be secure with businesses, because security breaches of information systems are not common.​

false

Like other programs, Java software can run only on specific types of computers.

false

One of the final steps in installing and using a large database involves "telling" the database management system (DBMS) the logical and physical structure of the data and the relationships among the data for each user.

false

Operating systems provide a measure of security by allowing users to access to those resources they've been cleared to use as well as other users' resources if those resources are beneficial.

false

Organizations cannot have many value chains.

false

Primary memory, which holds program instructions and data, is not associated with the central processing unit (CPU).

false

Proprietary software is mass-produced by software vendors to address needs that are common across businesses, organizations, or individuals.

false

Reengineering and continuous improvement have the same definition.

false

Smart card use is restricted to data associated with financial transactions.

false

Software as a Service (SaaS) refers to the use of computing resources, including software and data storage, on the Internet rather than local computers.

false

Suppose your friend, who is a small business owner, wants to computerize her business functions such as accounting, payroll, and inventory management. She would need to purchase separate software to meet each functional requirement.

false

Systems development projects should always be outsourced in order to allow an organization to focus on what it does best.

false

The Transmission Control Protocol (TCP) is responsible for managing IP addresses and Internet domain names.

false

The ability to capture and analyze all customer interactions, generate appropriate responses, and gather data to create and build effective and efficient marketing campaigns is known as contact management.

false

The activities that lead to getting the right product into the right consumer's hands in the right quantity at the right time at the right cost are known as value chain management.

false

The length of sales process for a typical business-to-business (B2B) e-commerce is shorter than that for a typical consumer-to-consumer (C2C) e-commerce.

false

The market for m-commerce in North America is maturing much earlier than in Western Europe and Japan.

false

The role of a systems analyst is narrowly defined and seldom involves communications with others.

false

There is no way a manufacturing firm would implement an Internet of Things because the risk of hacking is far too high.

false

While using your smart card at a store's checkout terminal, you are prompted to enter your PIN. The PIN is then sent on the network to compare with the stored PIN for authorization.

false

Yahoo has developed its own Linux-based operating system called Chrome OS.

false

​In the regression line Y = a+ bX + e, Y is the value of the independent variable.

false

A database is a collection of integrated and related _____.

files

In a manufacturing organization, the supply chain is a key value chain whose primary activities include all of the following EXCEPT:

finance and accounting

A clothing store chain tracks the sale of each product at each location. Managers use this information to calculate the organization's profits, to track inventory needs, and to determine which styles and fabrics are the most popular among its customers. This is an example of quality information that is ___________.

flexible

In terms of information systems, Wikipedia would be an example of _________.

group IS

A key feature of an enterprise system is that _________.

it employs a database of key operational and planning data that can be shared by all

The process of defining relationships among data to create useful information requires ______.

knowledge

The component of a computer that provides the CPU with a working storage area for program instructions and data is called the __________.

main memory

A(n) _____ is an HTML code, not visible on a displayed Web page, that contains keywords representing the Website's content, which search engines use to build indexes pointing to the Website.

meta tag

An operating system with _____ capabilities allows a user to run more than one program concurrently.

multitasking

Today's mobile phones and some PCs use a touch user interface called a _____ to allow people to control the personal computer.

natural user interface

Carson's supervisor has asked him to review a variety of portable computers for possible purchase for their company's employees. Which of the following should Carson NOT consider buying?

nettops

A type of memory whose contents are not lost if the power is turned off or interrupted is said to be _____.

nonvolatile

​In most large organizations, the IS department is divided into the following functions __________.

operations, development, and support

After entering data into a relational database, users can make all of the following basic data manipulations except:

organizing

All of the following are positive driving forces that influence chance according to Lewin's Theory of Force Field Analysis, EXCEPT:

past performance

_____ is/are considered to be the most important element in computer-based information systems.

people

To develop software you need all these except ​________.

personal application software

In a supply chain, _____ involve the transformation, movement, and storage of supplies and raw materials.

physical flows

A collection of fields all related to a single object, activity, or individual is a(n) _____.

record

Suppose you wish to find what tables are in a database, what fields they have, and how they are related you would review the _____.

schema

A _____ is a valuable tool that enables a user to find information on the Web by specifying words or phrases known as keywords, which are related to a topic of interest.

search engine

One advantage of proprietary software versus off-the-shelf software is that _____.

the software provides a company a competitive advantage by solving problems in a unique manner

Smart cards can be used for a variety of purposes, including storing a user's financial facts, health insurance data, credit card numbers, and network identification codes and passwords. They can also store monetary values for spending.

true

Some insurance companies can detect fraudulent claims using BI software​.

true

Suppose a retail business has an unwritten rule that "every sales person cooperates with others." This is an example of organizational culture.

true

Suppose you are good in math and statistics. Adding programming to your skill-set will be necessary if you want to be a data scientist.​

true

The Institute of Electrical and Electronics Engineers (IEEE) is a leading standards-setting organization whose IEEE network standards are the basis for many telecommunications devices and services.

true

The data for BI (business intelligence) comes from many sources​.

true

The diffusion of innovation theory can be useful in planning the rollout of a new information system. ​

true

The efficiency of processes for managing customer payments can vary; some processes are more efficient than others.

true

The term data is used to label raw facts such as height and weight of a patient.

true

The three basic components of a successful e-commerce model include content, commerce, and community.

true

To successfully implement a supply chain management system, an organization must be able to integrate its systems with its suppliers.

true

Twitter is a microblogging service.

true

Virtual tape technology can decrease data access time, lower the total cost of ownership, and reduce the amount of floor space consumed by tape operations.

true

When a customer buys products using the company's website, it results in transactions that are recorded for later use by management information systems.

true

When organizational learning occurs, what is revealed can be small, incremental adjustments known as continuous improvement.​

true

You have lots of images on your hard drive totaling 500 million bytes. A 2 Gigabyte storage device will be adequate to store those photos

true

Your friend has a Mac that runs OS X. If she needs to run a Windows app on it, she can set it to run Windows also.

true

​Data governance involves identifying people who are responsible for fixing and preventing issues with data.

true

​Data mining is used to explore large amounts of data, looking for hidden patterns that can be used to predict future trends and behaviors.

true

​During drill-down, you go from high-level summary data to detailed levels of data.

true

​Linear regression is useful when you wish to predict the value of a quantitative variable based on a another quantitative variable.

true

​Smaller lot sizes from vendors will help reduce the purchasing complexities for the consumer.

true

With _____, a software engineer drags and drops graphical objects such as buttons and menus onto an application form.

visual programming

The Internet of Things connects wireless identifiable objects ________.

with each other, owners, and central server

_____ are used to support engineering and technical users who perform heavy mathematical computing, computer-assisted design (CAD), video editing, and other applications requiring a high-end processor.

workstations

_____ is IBM's first 64-bit enterprise operating system that is capable of handling very heavy workloads.

z/OS

3D printing is ________.

​ used to make solid products

Liesel is an entrepreneur, and she'd like to publish a website for her small business. Liesel ____________.

​can use hosting services

If you shop on Amazon.com​, _____.

​depending on which state you are in, you may or may not pay tax

​Kendra is taking a class in Finance and she has been asked to give a speech about a case study in which she's been working. She wants to create a set of slides containing a summary of her study notes that she will project on a screen while she's speaking. Which type of personal application software should she use to create her slides?

​presentation graphics

Over the next few years, it is expected that many organizations will focus on projects that _________.

​take advantage of cloud computing, apply analytics to large amounts of business data, and create more mobile applications for their customers and employees


Related study sets

Vocabulaire Hermaion: Etapes 13-15

View Set

Fundamentals of Network Security Chapter 10, SECURITY+ GUIDE TO NETWORK SECURITY - CH1, Fundamentals of Network Security Chapter 9, Fundamentals of Network Security Chapter 8, Security - Chapter 7, Security - Chapter 6, Fundamentals of Network Securi...

View Set

Structure and Function Chapters 15, 16, & 17

View Set

KM Exam 2 Practice - Group, Crisis, Personality DO

View Set

3.4 Understanding the Entity and Its Environment

View Set

Microeconomics 1B: Chapter 8 - Firms, the Stock Market, and Corporate Governance

View Set