Information Systems Final Exam
How many characters are in a tweet?
140 Characters
How many bits are in 1 Byte?
8
Who maintains a database?
A database Administrator
Which of the following statements is NOT true about a mainframe computer?
A single computer with a single user is typical of a mainframe computer.
What is the best way to safe guard a network?
A username and password
_____ is the term used to describe enormous and complex data collections that traditional data management software, hardware, and analysis processes are incapable of dealing with them.
Big data
Hierarchy of Data
Bit-Byte-Field-Record-File-Database
A Web Log Equals...
Blog
With _____, the database is stored on a service provider's server and accessed by the client over a network, typically the Internet.
Database as a Service
_____ is text that describes a program's functions to help a user operate the computer system.
Documentation
What is making cuts in a company's human resources called?
Downsizing
_____ is an approach that starts by investigating the general data and information needs of an organization at the strategic level and then examines more specific data and information needs for the functional areas and departments within the organization.
Enterprise data modeling
Which of the following types of software provides income and expense tracking and reporting to monitor and plan budgets?
Financial management
An wireless access point is called a
Hot spot
IPSO model (scanner, keyboard)
Input
Which of the following statements is true of a database?
It helps companies analyze information to open new market opportunities.
A close network in a small range
LAN (Local)
_____ is an open-source operating system whose source code is freely available to everyone.
Linux
What are some examples of wireless communication?
Microwave, infared, radio (ULF)
Converts digital to analog
Modem
Giving a company task to an outside source.
Outsourcing
What is the most important component?
People
What does an ERP do?
Plans resources
Auto Downloading
Podcasting
Which part of IPSO changes input into an output?
Processing
Some databases use ______, which is a visual approach to developing queries and requests.
Query By Example
_____ is a special-purpose programming language for accessing and manipulating data stored in a relational database.
SQL (Structured Query Language)
_____ is a personal application software that includes a wide range of built-in functions for statistical, financial, logical, database, graphics, and date and time calculations.
Spreadsheet
Fastest processor ever
Super Computer
value chain whose primary activities include inbound logistics, operations,outbound logestics, marketing and sales and service
Supply Chain Management
Who is in charge of User Training
Support
_____ is an operating system used with special-purpose computers.
Symbian
What is the box called that holds everything inside for a computer?
System Unit
Which of the following statements is true of embedded operating systems?
They are dedicated to the control of another device.
What handles internet and web?
Web Administrator
The smallest piece of data used by a computer is a(n) _____.
bit
Processing speed is measured by?
clockspeed
A(n)_____ is a combination of a hardware configuration and systems software.
computer system platform
The position of a _____ is a nontechnical position responsible for defining and implementing consistent principles for setting data standards and data definitions that apply across all the databases in an organization.
data administrator
As long as the tables in a relational database share one common _____, the tables can be linked to provide useful information and reports.
data attribute
A ______ is a collection of instructions and commands used to define and describe data and relationships in a specific database.
data definition language
A _____ is a subset of a data warehouse that is used by small- and medium-sized businesses and departments within large companies to support decision making.
data mart
_____ is an information-analysis tool that involves the automated discovery of patterns and relationships in a data warehouse.
data mining
Each attribute in a relational database model can be constrained to a range of allowable values called a _____.
domain
Data warehouses allow managers to _____ to get increasing levels of detail about business conditions.
drill down
A database is a collection of integrated and related _____.
files
A _____ is a simple database program whose records have no relationship to one another.
flat file
The Equipment that does IPSO is
hardware (physical)
One of the advantages of off-the-shelf software is that:
initial cost is lower
One of the disadvantages of proprietary software is that:
it can take a long time and significant resources to develop the required software features.
The _____ is the heart of the operating system and controls its most critical processes.
kernel
After a computer system is started, portions of the operating system are transferred to _____ as they are needed.
memory
Apple has how many apps?
more than 1 million
An operating system with _____ capabilities allows a user to run more than one program to concurrently.
multitasking
Today's mobile phones and some PCs use a touch user interface called a _____ to allow people to control the personal computer.
natural user interface
Connects computers
network
A(n) _____ is a field or set of fields in a record that uniquely identifies the record.
primary key
Google AppEngine is an example of a(n) _____.
public cloud service provider
A collection of fields all related to a single object, activity, or individual is a(n) _____.
record
A _____ is a description that involves "telling" the database management system (DBMS) the logical and physical structure of the data and the relationships among the data for each user.
schema
Basic data manipulations include _____ that involves eliminating rows in a relational database according to certain criteria.
selecting
The use of middleware to connect disparate systems has evolved into an approach for developing software and systems called _____.
service-oriented architecture
The _____ techniques of the operating system increases the amount of processing that can be accomplished in a given amount of time.
task management
One advantage of proprietary software versus off-the-shelf software is that _____.
the software provides a company a competitive advantage by solving problems in a unique manner
What was the first type of computer?
transaction processing system
What do you call someone who uses a computer?
user
An information system that operates in the _____ sphere of influence supports two or more people who work together to achieve a common goal.
workgroup
_____ is IBM's first 64-bit enterprise operating system that is capable of handling very heavy workloads.
z/OS