Information Systems

Ace your homework & exams now with Quizwiz!

Which of the following best describes a worm? A program that displays advertisements in pop-up windows A program that in installed on a computer without the user's knowledge A virus that masquerades as another active program A program that traces user activity A program that replicates itself repeatedly, using up system resources

A program that replicates itself repeatedly, using up system resources

In order to use cloud computing effectively, it is necessary for a large company to have which of the following? Computers with a large amount of memory A large amount of centralized storage Computers with multiple CPUs A robust internet connection Computers with specialized operating systems

A robust internet connection

What is a browser cookie? A small piece of information that a browser stores on your machine. The bookmarks button on a browser. Temporary storage of web documents A browser's history.

A small piece of information that a browser stores on your machine. Explanation: Cookies are small bits of information kept on a user's machine during browsing to store various types of information about the user's browsing session. The standard uses of cookies are storage of login state information, storage of user's preferences on websites and personalized content.

Which of the following accesses and updates a database to keep track of the sales of tickets to an upcoming event? System software Networking software A transaction processing system An operating system A knowledge management

A transaction processing system

A spreadsheet contains the values 4 and 6 in cells C4 and D4, respectively. What value will be displayed in cell F4 if it contains the formula (C4^2+D4/4)? 2.5 5.5 16 17.5 128

17.5

Which of the following is the most likely negative consequence of participating in a social networking website? Increase in spam Infection by a virus Download of a cookie containing personal preferences Unintended disclosure of private information Download of spyware

A Unintended disclosure of private information

The type of network that would most likely be used to link a corporation's headquarters with its four branch offices located throughout a state is referred to as A metropolitan area network A local area network An office area network A wide area network A broad area network

A wide area network

Which of the following would be an example of the use of a real-time processing system? A company employee scans different foods to collect data that the store will use when making orders and determining how many items to keep on stock. When a consumer creates an order, the system develops an invoice and prompts the consumer to create a login for easy access to the invoice and order history. A consumer purchases the last pair of a specific brand and type of shoes, and the store's database recognizes that the shoes are no longer available for others to purchase. A business analyzes sales over a span of a month to determine its best course of action moving forward. A system recognizes the number of hours an employee worked and how much money the employee will receive in his paycheck.

A consumer purchases the last pair of a specific brand and type of shoes, and the store's database recognizes that the shoes are no longer available for others to purchase.

Which of the following best characterizes data in a data warehouse Historical Normalized Relational Volatile Up-to-date

Historical

A geographic information system must have which of the following characteristics? I. Records have identified geographic locations II. The system uses global positioning satellites III. The system provides results in a graphic format I only I and II only I and III only II and III only I, II, and III

I and II only

Which of the following should be taken into consideration when using enterprise resource planning (ERP)? I. The improvement of work processes and data access II. The continued maintenance of legacy systems III. The upgrading of technology infrastructure II and III only I, II, and III I and III only I only II only

I and III only

Which of the following types of systems development methods would be appropriate when a company does not have an expert IS department? I. Outsourcing II. Traditional SDLC III. RAD I only II only III only I and III only I, II, and III

I only

A programmer develops a game using a unique algorithm and code that is unlike anything used before and wants to make sure that users cannot manipulate the algorithm and code. The programmer should consider which of the following. I. Obtaining a copyright. II. Obtaining a patent. III. Identifying the product as a closed source. IV. Identifying the product as an open source. I, II, and IV only III only I, II, and III only I and IV only II and III only

I, II, and III only

34 Which of the following is (are) true about customer relationship management systems? I. They focus on the connection between suppliers, manufacturers, and customers. II. They enable employees in all departments to have a consistent view of customers. III. They focus on customer retention. I only I and II only I and III only II and III only I, II, and III

II and III only

Goals of a supply chain management system include which of the following? I. to facilitate up selling of the product II. to deliver the product to the customer more rapidly III. to reduce the cost of procurement I only I and II only I and III only II and III only I, II, and III

II and III only

Which of the following is (are) true about a GPS unit? I. Provokes two-way communication between a device and a satellite II. Tends to be expensive. III. Receives signals from satellites. II and III only I and III only I and II only III only I, II, and III

III only

What is the term that refers to the downloading of live video, audio, or animation in such a manner that the user can begin to access the content before the download is complete? Spooling Streaming Flaming Spamming Queuing

Streaming

A disaster recovery plan to safeguard a company's computer system can be used for all of the following occurrences EXCEPT A massive long-term power outage Computer sabotage A flood, fire, or other natural disaster A major viral infection of computer systems System upgrades and hardware maintenance

System upgrades and hardware maintenance

Which of the following is a set of protocols used to link different types of computers over the Internet? HTML HTTP ERP TCP/IP W3C

TCP/IP

Which of the following is true about EDI? Select all The EDI documents generally contain the same information found in paper documents. The EDI documents are more likely than paper documents to contain errors. The speed in which the EDI documents are exchanged is much faster than that of paper documents.

The EDI documents generally contain the same information found in paper documents. The speed in which the EDI documents are exchanged is much faster than that of paper documents.

Which of the following statements about spyware is FALSE? Spyware is a program that is stored on a computer's hard drive. The activation of spyware is prompted by a user's consent. Spyware can cause computer crashes. Spyware monitors a person's website visits. Memory loss and limited bandwidth can be the result of spyware.

The activation of spyware is prompted by a user's consent.

Which of the following is NOT true of a productivity suite? Software works independently. Distribution of programs within suites occur together. Costs tend to be lower. Applications have similar interfaces. Formatting can be maintained when copying from one program to another.

Software works independently.

When applied to the development of computer systems, the term "ergonomics" means Designing computer systems to maximize the cost-benefit ratio Following the systems development life cycle Fostering development team interaction through the use of computer-aided software engineering tools Incorporating human comfort, efficiency, and safety into the design of the human-machine interface Optimizing the throughput rate by adjusting the operating system interrupts

Incorporating human comfort, efficiency, and safety into the design of the human-machine interface

Which of the following is NOT a correct characteristic of batch processing? It provides physical batch totals to be used in control procedures It allows efficient scheduling of processing It is most applicable for processing routine periodic activities It allows immediate updating of master files It provides efficient updating of master files

It allows immediate updating of master files

Which of the following is an advantage of outsourcing? It enables a company to focus on core competencies It decreases dependence on other organizations It decreases the risk of disclosing confidential information It improves managerial control It enhances in-house technical expertise

It enables a company to focus on core competencies

Which of the following is a major benefit of object-oriented programming? The development of logical steps to achieve the object of the program The use of subroutines that optimize the program's objective The creation of objects that can be used or modified for use in future applications The freedom for programmers to create objects unique to each program The defining of objects as static entities that do not relate to each other

The creation of objects that can be used or modified for use in future applications

Under which of the following conditions can a public wireless network be used to transmit confidential data most securely? The local computer has been scanned for viruses The local computer has the latest operating system and updates The local computer connects to the network using VPN All files on the local computer have been backed up The network password meets all security criteria

The local computer connects to the network using VPN

Which of the following statements about mainframe computers is true? Select all They are capable of large-scale batch jobs They are capable of massive online-transaction processing They are more powerful and more expensive than supercomputers They provide superior multi user performance compared with that of multiple workstations

They are capable of large-scale batch jobs They are capable of massive online-transaction processing They provide superior multi user performance compared with that of multiple workstations

52 Which of the following is true about user passwords? They should be changed only by the administrator They must be no more than eight characters in length They are requested by CAPTCHAs They are most secure when they consist of letters, numbers, and special characters They are required to be unique

They are most secure when they consist of letters, numbers, and special characters

What is the principal function of an operating system? To progress transaction information To create and maintain organizational databases To scan for viruses To provide an interface between the hardware and the application software To defragment storage devices to optimize file access

To create and maintain organizational databases

A business often identifies that its software has been trademarked by using a unique symbol or attaching the letters ™ to its name. What is the purpose of the trademark? To eliminate unauthorized copying and distribution To identify the software as available for use, free of charge To identify and differentiate the product's brand To assure the user that the software is properly licensed and ready to use To assure the user that the software contains unique features not found in other products

To identify and differentiate the product's brand

Which of the following is an application that can use RFID technology? Select all a. Data transfer between smartphones b. Toll collection on a limited-access roadway c. Inventory management d. Credit card use e. Internet access f. Animal tracking

Toll collection on a limited-access roadway Inventory management Credit card use Animal tracking

Which of the following refers to the testing of individual modules with a software system? Acceptance testing System conversion System testing Test planning Unit testing

Unit testing

Which of the following user-based activities would NOT be part of a website design project? Users being asked what information should appear on the website Users being asked what programming language they are most comfortable with Users being asked about their security concerns Users being asked what statistical feedback they would like to receive Users being instructed to look at similar websites

Users being asked what programming language they are most comfortable with

When developing a website, which of the following activities should occur closest to the end of the process? Creating the navigation structure Purchasing a domain name Verifying all the hyperlinks Designing the style sheets Finalizing the graphics

Verifying all the hyperlinks

41 An online storefront developer should test the different versions of which of the following in order to ensure usability for all users? Database management systems Hypertext markup languages Compilers Web browsers Search engines

Web browsers

Managers in an organization often use spreadsheets to assist with decision making. The process of using a spreadsheet is called a. What-if analysis b. Data mining c. Flowcharting d. Querying e. Data manipulation

What-if analysis

Which of the following wireless technology would a user consider using if striving for a low data transfer rate to save battery life? WiMax Ultra-wideband Bluetooth Zigbee Infrared light

Zigbee

The ABC Charity Association, a nonprofit foundation, has a home page on the World Wide Web. Which of the following is the most likely URL for its home page? http://www.abc-charity.gov http://www.abc-charity.edu http://www.abc-charity.com http://www.abc-charity.org http://www.abc-charity.abc

http://www.abc-charity.org

A company that opts to use an information system to train employees to manufacture a piece of material necessary for its product instead of continuing to use another company to make the material is insourcing the production process exchanging economic output functions campaigning against globalization altering its infrastructure hierarchy outsourcing the production process

insourcing the production process

Which of the following is NOT true of social networking sites? Some sites facilitate access to commercial sites Any unethical activity on a social networking site could have negative consequences outside the site Some sites enable members to share material with many other members simultaneously It is unethical for a company recruiting prospective employees to track their presence on and posts to social networking sites Some sites enable members to maintain contact with other members

It is unethical for a company recruiting prospective employees to track their presence on and posts to social networking sites

Which of the following statements about rapid application development is true? It allows programmers to preemptively determine user interfaces without the users' input It reduces dependency on object-oriented programming It begins before requirements are defined It is used during prototyping It is designed to be a platform dependent

It is used during prototyping

Which of the following is NOT true about the Linux OS? It is a free operating system. It is used solely for commercial computers and devices. It has the capability of running on various types of devices. It is an open-source operating system. Its development stemmed from AT&T's UNIX system.

It is used solely for commercial computers and devices.

Which of the following is NOT a characteristic of a decision support system as it is usually defined? It can be used as an aid in solving ad hoc problems It is useful for what-if analysis It is intended to help managers make decisions It makes the one best or optimal decision It uses appropriate statistical and mathematical models

It makes the one best or optimal decision

Which of the following is true about open-source software? Select all It is copyrighted It is shareware It always provides product support Its source code is freely available

Its source code is freely available It is copyrighted

Requiring system users to use a computer network within a single area requires the use of a SAN WAN LAN PAN MAN

LAN

Which of the following elements occurs when the programmer prompts a system to go through a set of instructions repeatedly until some established condition is met? inputting outputting calculating looping conditionalizing

looping

Which of the following is the most likely rationale for creating a disaster recovery plan? Core enterprise-wide functions cannot operate without information technology Human capital represents a massive investment A large number of transactions are processed daily A large number of employees work off-site Telecommuting is not an option for many employees

Core enterprise-wide functions cannot operate without information technology

Having multiple operating systems installed on the same personal computer enables the user to do each of the following EXCEPT a. Run a proprietary operating system and an open source operating system on the same computer b. Run different versions of the same operating system on the same computer c. Access a larger variety of software d. Create multiple IP addresses for the computer e. Create a viral server

Create multiple IP addresses for the computer

Metadata is best described as which of the following? End-user data Data gathered by spyware Data returned by an Internet search engine Data about data Data stored in a Web file format

Data about data

A network administrator is LEAST likely to recommend which of the following technologies to share large quantities of information in a knowledge management system? E-mail Wiki Intranet Discussion board Shared network drive

E-mail

Which of the following is an asynchronous technology that a virtual team can use for communication? a. Conference call b. Videoconferencing c. VoIP d. E-mail e. Webinar

E-mail

Which of the following is an information technology process that is used to produce documents that are duplicate digital copies of a paper document? Word processing Digital editing Document imaging Desktop publishing Cloud storage

Document imaging

Which of the following problem-solving techniques allows users to start with high-level information and then select more specific, lower-level details? Ad hoc analysis Exception reporting Drill-down analysis RFM analysis Cluster analysis

Drill-down analysis

When implementing an electronic data interchange (EDI), businesses should consider using specialized communication software if external systems used to collaborate have interfaces that align with the business's system communication involves transactions involving money two parties do much business with each other the business is a smaller organization with limited continued interaction with consumers or clients information needs to be secure and encrypted during transmission

two parties do much business with each other

File types labeled as .csv are best imported when they are opened by any type of software application opened within an internet browser formatted carefully with specific parameters extracted from a compressed file used with spreadsheet and database software

used with spreadsheet and database software

After a computer programmer identifies a problem, designs a solution, and draws a flow chart when writing a computer program, what should the programmer do next? test the solution write the code debug the flowchart release the flowchart write a pseudocode

write a pseudocode

21 Which of the following is a method of system implementation that requires both the previous system and the new system to perform identical tasks at the same time? Parceled Phased Pilot Private Parallel

Parallel

The maintenance phase of the system development process could include all of the following activities EXCEPT Correcting errors in the software that were detected after implementation Changing the heading on a report Updating entries in the tax table to reflect changes in tax rates Adding a new function to an existing system Performing a complete rewrite for an existing system

Performing a complete rewrite for an existing system

Which of the following can support cloud-based application development and deployment? Communications as a service Platform as a service Infrastructure as a service Software as a service Network as a service

Platform as a service

Which of the following violates intellectual property rights? Software piracy Data mining of social networks Launching a denial of service attack Hacktivism Spamming

Software piracy

The Bluetooth standard uses what transmission method for data transfer? Infrared Ethernet cable Radio waves Satellite Wi-Fi

Radio waves

Which data model uses two-dimensional tables to represent data structures? Relational Hierarchical Network Multidimensional Object-oriented

Relational

Which of the following is included in the maintenance phase of the systems development process? Select all. Repairing a system Replacing a system Updating a system improving process efficiency Testing system modifications

Repairing a system Updating a system improving process efficiency Testing system modifications

Which of the following is a database whose data are scattered across several physical servers? Data mine Data warehouse Relational database Distributed database Integrated database

Distributed database

Knowledge management software is designed to do which of the following? Identify patterns and trends in data Collect and store data in a way that can be easily accessed manage day-to-day interactions with customers Manage day-to-day interactions with customers Help analyze data and facilitate decision making Facilitate organizational learning

Facilitate organizational learning

Which of the following is a potential benefit of telecommuting to an employer? Select all Eliminates employee commuting time Facilitates recruiting a larger pool of prospective employees Increases flexibility in handling of unexpected work after typical business hours Reduces stress of supervisors Improves communication between employees

Facilitates recruiting a larger pool of prospective employees Increases flexibility in handling of unexpected work after typical business hours

The process through which a user is verified and validated to access a computer network/system is referred to as a. Encryption b. Password protection c. Authentication d. Account validation e. Certification

Authentication

Which of the following is a principle of net neutrality? Select all All internet traffic will be treated equally Organizations are prohibited from charging more for faster transmission of data based on the content The language of the internet shall be English in order to maintain a common standard Governments are prohibited from filtering internet content Access to data is not restricted based on the country the user is in

All internet traffic will be treated equally Organizations are prohibited from charging more for faster transmission of data based on the content

In a relational database, each column represents A record An attribute A key An entity A file

An attribute

Which of the following is a goal of green computing? Reducing the potential for a computer to become infected with malware Reducing the number of people experiencing computer vision syndrome Reducing power consumption of computers and peripherals Optimizing the human-computer interface Building relationships between computer manufacturers and environmental groups

Building relationships between computer manufacturers and environmental groups

In a company with a large and effective IT workforce, which of the following is the most likely title of the person who recommends enterprise-wide upgrades of computer hardware? Chief information officer Chief technology officer Chief financial officer Systems analyst Information resources manager

Chief technology officer

After a consumer purchases and downloads an MP3 file, which of the following is legal? Select all Uploading the file to a public website Copying the file and giving the copy to a friend Giving the original file as a gift Copying the file for personal use Selling the original file

Copying the file for personal use Giving the original file as a gift

Which of the following is NOT a means of secondary storage? External hard drive Cache memory USB flash drive Cloud storage Secure digital card

Cache memory

Which of the following directly affects the most users? Hacking Phishing Cyber Extortion Identity theft Denial of service attacks

Denial of service attacks

What term identifies the measure of accuracy, completeness, and currency of data? Data dependency Data integration Data integrity Data redundancy Data visualization

Data integrity

What is the term that describes the storage of identical data in multiple locations? Data dependency Data integrity Data integration Data redundancy Data structure

Data redundancy

A manager of a small business wants to use a computer to store information about clients, vendors, inventory (item, number, price), and orders. The manager needs to be able to sort and group data for various reports. Which of the following types of software packages would be best for this task? Word processor Spreadsheet Database management system Presentation software System software

Database management system

Which of the following explains why digital networks can transmit different types of data? Networks can accommodate different types of computers Network connections can be made via satellites Data can be transmitted as either digital or analog signals Storage capacity is not an issue Each data type can be represented by strings of bits

Each data type can be represented by strings of bits

Enforcing programming standards in the software development process has which of the following impacts? Select all Establishing common expectations Making it easier to modify code Enhancing the end-user experience

Establishing common expectations Enhancing the end-user experience

File extensions such as .txt, .bmp, and .mp3 are used to identify a files's Output Creator Size Location Format

Format

The special formatting language used to create Web pages is called HTML XML Perl Java Script

HTML

Conversion of data files is part of which of the following phases of the system development process? Analysis Design Implementation Development Maintenance

Implementation

Which of the following are used to transmit data from Earth to a satellite and back? Milliwaves Microwaves Nanowaves Light waves Sound waves

Microwaves

Which of the following is an example of data conversion? Select all Automated updating of a database with new data input stored in a separate file Copying data to redundant databases to increase accessibility Moving data from one database into a new database with a different schema Moving cached data over the internet so it is closer to the requester Moving data down an indexed list due to decreased use

Moving data from one database into a new database with a different schema

Which of the following is NOT an advantage of having an entire department using the same office software suite? Lower cost per application that if purchased individually Ease of moving data between suite applications Ease of moving data between users in the same department Ease of installation and maintenance Optimal functionality of individual application packages

Optimal functionality of individual application packages

Which of the following would NOT be considered an input device for a computer system? Image scanner Webcam Keyboard Mouse PC speaker

PC speaker

53 What are the small blocks of data that are created by dividing a large block of data before transmission over a network? Bits Bytes Entities Packets Modules

Packets

The following workflow statement would do which of the following? i = 2 while i < = 50: print i I + = 2 Recognize two-syllable words and print a list of the first 50 words in the list. Print numbers equal to 2 and less than 50. Identify one word that is labeled with the number 2 and find out how many times the text is printed, up to 50 times. Print all even numbers from 2 to 50.

Print all even numbers from 2 to 50.

The capability of computerized systems to store and duplicate information poses a potential threat to an individual's Free speech Privacy Equal access to information Right to accessibility Consumer protection

Privacy

Planning, scheduling, and overseeing the development of a new information system are all components of which of the following? Systems analysis System modeling Knowledge management Cost-benefit analysis Project management

Project management

54 Developers quickly create a version of a system and give it to the users for feedback. The developers then use the users' feedback to revise the system. This process repeats until the users approve the system. This method of developing a system is called Waterfall Prototyping Object-oriented End-user development Joint application design

Prototyping

Which of the following is the term used when a website automatically downloads data or files to a computer whenever new data are available or at scheduled intervals? Web streaming Push technology Pipelining Spamming Web crawling

Push technology

What is the primary difference between an intranet Web page and an Internet Web page? Transport protocol Transmission rate Restriction of access Physical proximity to server Use of transport layer security

Restriction of access

Which of the following best describes how GPS units function? The receiver sends out radio signals that are reflected back by satellites and detected by the unit The receiver acts as a homing beacon that is tracked by the GPS satellites, which periodically send out position updates for each tracked receiver The receiver can detect an invisible electronic grid projected onto Earth's surface and compares the location on this grid to a stored map of Earth. The receiver is passive and listens for the regular signals from GPS satellites, which are then processed to find the distance from the satellites. The receiver sends out regular query pulses and waits to receive responses from a GPS satellite

The receiver is passive and listens for the regular signals from GPS satellites, which are then processed to find the distance from the satellites.

Which of the following statements is true regarding client/server architecture? The server computer accepts commands from a number of computers that are its clients The server computer manages a number of computers that it services The server computer is connected to a number of computers that provide it with services The server computer is connected to a number of computers that provide it with clients The client computer manages a number of computers being served by it

The server computer accepts commands from a number of computers that are its clients

Which of the following network technologies allows secure transmission of data over an unsecured public network link between private networks? Local area network Virtual private network Wide area network Intranet Extranet

Virtual private network

Which of the following uses the Internet, as opposed to using the public switched network, to enable voice communication? TCP/IP VoIP EFT EDI PBX

VoIP

A user visited several websites, making purchases, initiating searches, and filling out online forms. Which of the following could the user access to revisit the websites? Cookies Main memory Internet preferences Web privacy settings Web browser history

Web browser history

In considering the economic feasibility of a systems development project, which of the following would a project manager be LEAST likely to consider? The cost of developing the system compared with the potential benefits of using the system The return on the initial investment on the system When the project will break even Whether the company can afford the project Whether the hardware can be acquired for the project

Whether the hardware can be acquired for the project


Related study sets

Strategy Practice Quiz Questions

View Set

AC 292 multiple choice (Chapter 11 & 12)

View Set

Data Structures and Algorithms - Exam 1 Study Guide

View Set