FMIS EXAM 1 & 2 QUESTIONS
Albert creates a relational database to store employee performance statistics. He stores each employee's data in independent rows and creates a column named "Employee Number" to assign a unique number to each employee. This column is referred to as a ________. Select one: a. primary key b. secondary attribute c. foreign key d. functionally dependent record
a
An operating system like Windows or Linux is an example of the ________ component of an information system. Select one: a. software b. hardware c. data d. procedure
a
Anti-virus is an example of a ________. Select one: a. utility program b. operating system c. programming language d. groupware
a
Computers that reside in different geographic locations are connected using a (an) ________. Select one: a. WAN b. LAN c. URL d. XML
a
Conversion to an e-commerce or m-commerce system enables organizations to _________. Select one: a. improve the level of customer service b. implement an enterprise resource planning (ERP) system c. increase the cost of doing business d. reinforce consumer-to-consumer (C2C) e-commerce
a
Federal Express (FedEx) was one of the first large companies to empower customers to serve themselves at their convenience through the use of _____. Select one: a. a corporate extranet b. personal assistants c. automated customer service d. a mobile app
a
In _______________ a formula can be applied to determine the expected time to complete a task is t= (a + 4m +b)/6. Select one: a. PERT b. Gantt chart c. WBS d. Functional Decomposition
a
In _______________, business transactions are accumulated over a period of time and prepared for processing as a single unit. Select one: a. Batch processing b. Online transaction processing c. MIS d. Expert systems
a
It is one of E-commerce forms where online businesses attempt to reach individual consumers. Select one: a. B2C b. G2C c. C2C d. B2B
a
It is one of the e-government models where business organizations start bidding based on the request for proposals announced by a government department. Select one: a. G2B b. G2G c. G2C d. G2E
a
Pinterest, a visual bookmarking Website, logs more than 14 terabytes of new data each day, which means its storage needs are constantly changing. As a result, Pinterest has turned to Amazon for _______. Select one: a. storage as a service b. grid computing c. Parallel computing d. infrastructure as a service
a
The speed of a CPU is expressed in cycles called ________. Select one: a. hertz b. knot c. Mach d. rev
a
The term "open source" means that the source code of the program is ________. Select one: a. available to the public b. compatible with both 32-bit and 64-bit processors c. available for licensing if desired d. available only to carefully vetted contractors
a
When a physician enters an order for a patient, the system gives an alert because two of the prescribed medications have side effects on the patient. This case represents the use of: Select one: a. Decision Support System b. Transaction Processing system c. Enterprise Resource Planning d. Management Information System
a
When starting up a business, Porter's five forces model is used to assess ________. Select one: a. industry competition b. market share c. internal weaknesses d. life cycles of products
a
When the project manager uses the application of knowledge, skills, and techniques to project activities to meet project requirements, this is called: Select one: a. Project management b. Knowledge Area c. Project stakeholders d. Project variables
a
When you are looking for a 'hotspot', you are searching for _____. Select one: a. a wireless access point b. bluetooth signals c. free charging stations d. strong satellite signals
a
Which of the following include activities related to plan contracting, request for proposals, select seller, and contract closure? Select one: a. Project procurement management b. Project planning c. Project closure d. Project stakeholder management
a
Which of the following include activities such as developing a project charter related to all knowledge areas in project management? Select one: a. Project integration management b. Project scope management c. Project planning d. Project execution
a
Which of the following is NOT correct regarding to C2C? Select one: a. Typically, there is a customized product offering b. The buying process is relatively simple c. Limited negotiation on payment d. The motivation of sale is driven by an individual need.
a
Which of the following is NOT true regarding to online transaction processing systems? Select one: a. transactions are accumulated over a period of time b. each transaction is processed immediately c. the data in an online system reflects the current status d. OLTP enables organizations to provide faster, more efficient service
a
Which of the following is the distinguishing feature of LANs? Select one: a. single location b. number of computers c. bandwidth d. hardware requirement
a
Which of the following statements is true of information technology (IT)? Select one: a. Information technology (IT) refers to the abilities ,tools, methods, inventions that are used for the purpose of producing information. b. Information technology (IT) is an umbrella term that covers information systems and the products, methods, inventions, and standards used to produce information. c. Information technology (IT) and information systems are synonymous with each other and can be used interchangeably. d. Information technology (IT) is an assembly of hardware, software, data, procedures, and people that produces information.
a
Which of these forces correctly represent Porter's five forces that shape a firm's competitiveness within the industry? Select one: a. bargaining power of customers, bargaining power of suppliers, threat of substitutes, threat of new entrants, firm rivalry b. value chain, differentiation, cost leadership, firm rivalry, innovation c. bargaining power of customers, bargaining power of suppliers, cost leadership, firm rivalry, innovation d. differentiation, cost leadership, firm rivalry, innovation, cost leadership
a
___________ captures and processes detailed data necessary to update the organization's records about fundamental business operations. Select one: a. TPS b. DSS c. MIS d. ES
a
_____________ is a trusted third-party organization or company that issues digital certificates that verifies the identity of a sender or Web site. Select one: a. Certificate authority b. Authorization System c. Payment System d. TLS
a
_________________ a document used to describe risks associated with a project, proposed strategies to mitigate risks and status of risks. Select one: a. Risk management plan b. Communication management plan c. Integration management plan d. Stakeholders analysis matrix
a
_________________ is dividing the pool of potential customers into subgroups based on demographic characteristics. Select one: a. Market segmentation b. Market customization c. Market virtualization d. Market personalization
a
__________________ involves evaluating the progress of the project on an ongoing basis to ensure that it meets the identified quality standards. Select one: a. Quality Assurance b. Quality Control c. Quality planning d. Quality estimating
a
A (An) ________ is a number that identifies a particular device on the network. Select one: a. domain b. IP address c. hyperlink d. href
b
A _____ is an HTML code, not visible on a displayed Web page, that contains keywords representing the Website's content, which search engines use to build indexes pointing to the Website. Select one: a. attribute b. meta tag c. hyperlink text d. identifier
b
A private internet that is used exclusively within an organization is called a ________. Select one: a. Ethernet b. intranet c. cloud d. server
b
A type of memory whose contents are not lost if the power is turned off or interrupted is said to be _____. Select one: a. unarbitrary b. nonvolatile c. inaccessible d. nonadjacent
b
Amazon Relational Database Service (Amazon RDS) is an example of: Select one: a. IaaS b. DaaS c. SaaS d. PaaS
b
Anyone who affects or affected by the project's outcome. This is called: Select one: a. People b. Stakeholder c. Stockholder d. Sponsor
b
CPU clock speed is the _______________ at a predetermined rate. Select one: a. number of instructions processed b. number of electronic pulses created c. number of files created d. number of memory pages loaded
b
Columns that are secondary keys to different tables than the ones in which they reside are called ________. Select one: a. attributes b. foreign keys c. primary keys d. internal records
b
Haley's employer has asked her to review tens of thousands of social media posts about their company's products and compile this data into a database. In terms of the characteristics of big data, Haley is dealing with ________. Select one: a. value b. variety c. velocity d. veracity
b
It is used to analyze information needs, format, medium, and timing preferences for people who influence the project: Select one: a. Risk management plan b. Stakeholders analysis matrix c. Project charter d. Functional decomposition
b
Source code is computer code ________. Select one: a. that is represented as bits and bytes b. that is written by humans c. that is not understandable by humans d. that cannot be modified
b
The value of information is directly linked to how it helps decision makers achieve their organization's _____. Select one: a. cost/profit target b. goals c. cost reduction initiatives d. customer satisfaction levels
b
To run a program or process data, the CPU first transfers the program or data from disk to the ________. Select one: a. optical drive b. main memory c. input device d. ROM
b
Which of the following is NOT one of the three basic components of a successful e-commerce model? Select one: a. content b. capital c. community d. commerce
b
Which of the following is a critical characteristic of good information? Select one: a. abundance of details b. completeness c. low cost d. ease of creation
b
____________ is an uncertain event or condition that, if occurs, has a positive or a negative effect on a project objective. Select one: a. Weakness b. Risk c. Opportunity d. Risk management
b
________________ is not only buying and selling of goods and services but also providing information over computer networks. Select one: a. E-commerce b. E-business c. E-government d. M-commerce
b
_________________ Involves the generation, collection, dissemination, and storage of project information in a timely and effective manner. Select one: a. Project scope management b. Project communication management c. Project time management d. Project human resource management
b
__________________ is a frequently used technique to define the scope of an information system by identifying the business processes it will affect. Select one: a. WBS b. Functional Decomposition c. Risk management plan d. ROI
b
_____________is an error, flaw, failure or fault in a computer program that causes it to produce an incorrect or unexpected result, or to behave in unintended ways. Select one: a. Spam b. Software bug c. Software updates d. Interpreter
b
A network that connects your personal devices that are located close together is called: Select one: a. LAN b. Bluetooth c. PAN d. VPN
c
According to Moore's Law, the ________. Select one: a. price of an integrated chip reduces once in 18 months b. performance of an integrated chip doubles every year c. The amount of digital data is expected to double every two years d. density of a transistor decreases every year
c
As production manager at a bottling plant for a cola manufacturer, you receive reports containing figures for raw materials from last year, but stated as the current year's. This information would qualify as bad information because it is ________. Select one: a. late b. voluminous c. inaccurate d. too narrow in scope
c
Because of ____ commerce sites, anyone can become a merchant online. Select one: a. B2B b. B2C c. C2C d. G2B
c
Google Chrome is a: Select one: a. System Software b. Web programming language c. Web browser d. Website
c
If a student is assigned to multiple advisors and an advisor is assigned to handle multiple students, it would be an example of a ________ relationship. Select one: a. one to many b. one to one c. many to many d. many to one
c
Shipping an item must start after completing the manufacturing of the item. According to time management this represents: Select one: a. Estimating the amount of resources required to complete each task b. Controlling and managing changes to the project schedule c. Sequencing the tasks, taking into account the tasks dependencies d. Cost budgeting
c
The smallest piece of data used by a computer is a _____. Select one: a. entity b. byte c. bit d. character
c
To improve performance the CPU keeps frequently used instructions in the ________. Select one: a. nonvolatile memory b. main memory c. cache d. hard disk
c
Which of the following is correct regarding to Project Management? Select one: a. PERT analysis could be used to calculate the net present value of a project. b. The PERT pessimistic time estimate is an estimate of the minimum time an activity will require. c. Quality management is a set of activities designed to ensure that a project will meet the needs for which it was undertaken d. WBS is used to identify the main risks types associated with a project.
c
Which of the following mobile operating systems is licensed by Google? Select one: a. Blackberry OS b. Symbian c. Android d. Windows RT
c
_____ is a personal application software that includes a wide range of built-in functions for statistical, financial, logical, database, graphics, and date and time calculations. Select one: a. Word processing b. Desktop Publishing (DTP) c. Spreadsheet d. Graphics
c
_____ is a special-purpose programming language for accessing and manipulating data stored in a relational database. Select one: a. Query by Example (QBE) b. Excel c. Structured Query Language (SQL) d. Java
c
_____ is an approach used to capture user-provided information, such as information from warranties, surveys, user registrations, and contest-entry forms completed online. Select one: a. Search engine optimization b. Implicit personalization technique c. Explicit personalization technique d. Phishing
c
________ is a wireless protocol designed for transmitting data over short distances, replacing cables. Select one: a. IPv6 b. PaaS c. Bluetooth d. IPv4
c
__________ a technique that enables a computer to execute programs and manipulate data files larger than main memory. Select one: a. multitasking b. Multiuser c. Swapping d. Multiprocessing
c
____________ an integrated software that is used to plan for all the required recourses of functional areas of an organization. Select one: a. SCM b. CRM c. ERP d. MIS
c
_____________________ is a communications protocol used to secure sensitive data during transactions conducted in e-commerce. Select one: a. TCP/IP b. Internet Protocols c. Transport Layer Security (TLS) d. Transaction security
c
_____________is a definition of which tasks are included and which tasks are not included in a project. Select one: a. Time b. Procurement c. Scope d. Risk
c
Tom's Art Supplies used to sell art supplies through mail order catalogs, but the company's order takers often had difficulty deciphering their customers' handwriting on the order forms. Since switching to an online e-commerce site, Tom's has been able to enjoy the advantage of ______. Select one: a. reaching new customers b. reducing costs c. increasing accuracy d. increasing quantity ordered
c
A _____ device provides data and instructions to the computer and receives results from it. Select one: a. back-side b. expansion c. internal d. input/output
d
A ________ is a set of rules that programs on two communicating devices follow. Select one: a. codec b. cloud c. packet d. protocol
d
A ________ is a small, lightweight, power-conserving, computing device that is capable of wireless access. Select one: a. PC b. mainframe computer c. server d. mobile device
d
A lightweight computer with no storage power built to connect to a server from a remote location is called a ________. Select one: a. widget b. bot c. plug-and-play program d. thin client
d
Adobe Acrobat is an application that allows users to create and edit digital documents. This is an example of ________. Select one: a. hardware b. virtualization c. business intelligence d. software
d
All of the following are advantages of properietry software EXCEPT: Select one: a. You can get exactly what you need b. You can easily modify the software and add needed features c. Being involved in the development process offers more control over the results. d. The software is likely to be high quality because many customer firms have tested the software
d
Authentication technologies are used by many organizations to _____. Select one: a. verify the accuracy of their product descriptions and prices b. provide sensitive data during e-commerce c. confirm the uniform resource locator (URL) of their suppliers' Websites d. confirm the identity of a user requesting access to information or assets
d
Completing an instruction involves two phases-instruction and execution-which are each broken down into two steps for a total of four steps. Which of the following is NOT one of the four steps? Select one: a. fetch instruction b. store results c. execute instruction d. process data
d
Java, C# and VB.Net are examples of ________. Select one: a. thin-client applications b. client operating systems c. structured queries d. Programming languages
d
Payroll transactions and billing are typically done via _____. Select one: a. grid processing b. online transaction processing (OLTP) c. online analytical processing (OLAP) d. batch processing
d
Sara Beth and Taylor have developed a new software that they plan to distribute for free, allowing other software professionals to study, change, and improved it. Their software is an example of _________. Select one: a. an app b. an operating system c. a simulation system d. open source software
d
The area covered by one or more interconnected wireless access points is called: Select one: a. LAN b. Webpage c. RFID d. Hotspot
d
The protocols used on the Internet are arranged according to a structure known as the ________ protocol architecture. Select one: a. FTP b. SMTP c. HTTP d. TCP/IP
d
When an individual buys a program for his or her personal computer, he or she is actually buying a software ________. Select one: a. copyright b. trademark c. patent d. license
d
Which of the following business activities is NOT one of the strong candidates for conversion to e-commerce: Select one: a. Paper-based b. Inconvenient for customers c. Time-consuming d. Electronic transactions
d
Which of the following is NOT one of the key website performance measures? Select one: a. System Availability b. Response time c. Transaction success rate d. Shopping cart facilities
d
Which of the following is NOT true regarding to transmission media types: Select one: a. Coaxial Cable is more expensive than twisted-pair wires b. Twisted-pair wire is widely available c. Fiber-optic is the most expensive to purchase and install d. Coaxial cables are used for telephone services
d
Which of the following is a characteristic of volatile memory? Select one: a. processor heats up during the operation b. files are stored permanently c. processing of data is very slow d. contents are lost when power is off
d
Which of the following is/are considered as core competencies? Select one: a. Project management b. Financial assets c. Highly skilled staff d. All of the above
d
Which of the following statements is true of a database? Select one: a. It is accessed primarily for use by an organization's database administrator and data administrator. b. It provides an essential foundation for an organization's knowledge management and artificial intelligence systems. c. It is a collection of unstructured data. d. It helps companies analyze information to open new market opportunities.
d
_____ are the most powerful computers with the fastest processing speed and highest performance. Select one: a. Blade servers b. Workstations c. Mainframe computers d. Supercomputers
d
_____ is an example of a popular general purpose software suite for personal computer users. Select one: a. Google Chrome b. Snow Leopard c. Mozilla Firefox d. Microsoft Office
d
_____ is/are considered to be the most important element in computer-based information systems. Select one: a. Bandwidth b. Software applications c. Standard operating procedures d. People
d
_______________ is a special software program that converts the programmer's source code into the machine-language instructions. Select one: a. Programming language b. Syntax c. Protocol d. Compiler
d
TRUE OR FALSE: Advanced Research Project Agency (ARPANET) is the ancestor of the Internet.
true
TRUE OR FALSE: Ronald runs both Windows 7 and Linux on his personal computer. This process is called virtualization.
true
TRUE OR FALSE: In B2C model, there is more customized product offering than C2C and B2B.
true
TRUE OR FALSE: Planners must consider the current IT investments available in the organization before setting IS organizational strategy.
true
TRUE OR FALSE: The shorter the response time is the better in terms of performance measures for a retail website.
true