ISYS 1

Ace your homework & exams now with Quizwiz!

An American Standard Code for Information Interchange (ASCII) file defines up to _____ characters.

128

Registering, selling, or using a domain name to profit from someone else's trademark is called:

Cybersquatting

One of the following is not among the important concepts related to the Web and network privacy: a. Nonrepudiation b. Data integrity c. Accountability d. Acceptable use policies

Data integrity

What can help offset the digital divide?

Increasing the number of computers in public places

One of the following is not a type of mobile analytics: a. Installation analytics b. In-app analytics c. Advertising and marketing analytics d. Performance analytics

Installation analytics

In using information technologies for a competitive advantage, which statement is true of a bottom-line strategy?

It focuses on improving efficiency by reducing overall costs.

The four Ms of resources in information systems:

Manpower Machinery Materials Money

Information technologies are used to gain a competitive advantage by doing all of the following except: a. Helping in reducing the cost of operations b. Delivering timely and accurate information c. Replacing all key decision makers in an organization d. Providing business intelligence

Replacing all key decision-makers in an organization

All of the following are among the new IT-related jobs except: a. Data scientist b. Search engine optimization specialist c. Social media/online-community manager d. Systems analyst

Systems analyst

All of the following are among the potential drawbacks of telecommuting except: a. The ability to work in more pleasant surroundings b. Potential legal issues about workers' injuries c. No regulated work routine d. Less interaction with coworkers

The ability to work in more pleasant surroundings

Choose the wrong answer: a. The fourth generation of computer languages is natural language processing. b. The third generation of computer languages is high-level language. c. The second generation of computer languages is assembly language. d. The first generation of computer languages is machine language.

The fourth generation of computer languages is natural language processing.

Choose the wrong answer: a. The first generation of computers is identified by vacuum tubes. b. The fourth generation of computers is identified by VLSI, personal computers, and optical discs. c. The second generation of computers is identified by transistors. d. The third generation of computers is identified by miniaturization.

The third generation of computers is identified by miniaturization.

Which statement is accurate for transaction-processing systems? a. They focus on integrating data, processes, and human elements. b. They focus on maximizing human involvement. c. They focus on integrating hardware and software technologies. d. They focus on data collection and processing.

They focus on data collection and processing.

One of the following is NOT among the 5 Vs of big data: a. Veracity b. Value c. Variety d. Variance

Variance

All of the following are among the advantages of object-oriented programming except: a. Modularity b. Reuse of codes for other purposes c. Effective problem solving d. All of these choices

all of these choices

All of the following are among the future outlook of information systems except: a. Hardware and software costs will continue to decline. b. The computer literacy of typical information system users will improve. c. Hackers will become more sophisticated. d. All of these choices

all of these choices

Tableau and Power BI are used for all of the following purposes except: a. Exploring and finding patterns in data b. Creating multiple charts to get meaningful insight into data c. Allowing analyzing data with different formats d. All of these choices

all of these choices

Which component of a database management system (DBMS) is used to design elements of an application using a database, such as data entry screens, interactive menus, and interfaces with other programming languages?

application generation

Which is recognized as an input device?

barcode reader

Every character, number, or symbol on the keyboard is represented as a(n) _____ in computer memory.

binary number

Which is a software component of a management information system (MIS)?

commercial programs

The data _____ component of a database management system (DBMS) is used to create and maintain the data dictionary.

definition

Job deskilling occurs when:

experienced labor is eliminated by high technology

Computer literacy is understanding the role of information in generating and using business intelligence. True or False?

false

In a data warehouse environment, ETL refers to extraction, transformation, and language. True or False?

false

Public information posted by an organization or public agency cannot be censored for public policy reasons. True or False?

false

The arithmetic logic unit (ALU) performs only arithmetic operations. True or False?

false

In a(n) _____, nodes with the same parents are called twins or siblings.

hierarchical model

In the context of intellectual property, _____ is categorized as industrial property.

logos

In the context of how information is viewed in a database, the _____ involves how data is stored on and retrieved from storage media.

physical view

A potential benefit of telecommuting is that it _____.

reduces employee turnover

Storage definition

saving data in computer memory

A data lake gathers and stores data in its original format in a central location. The collected data can be structured as well as unstructured. True or False?

true

Application software can be commercial software or software developed in-house; it is used to perform a variety of tasks on a personal computer. True or False?

true

Digital citizenship means using information technology safely, ethically, and responsibly. True or False?

true

Machine language is the first generation of computer languages and consists of a series of 0s and 1s representing data or instructions. True or False?

true

Michael Porter's Five Forces Model analyzes an organization, its position in the marketplace, and how information systems could be used to make it more competitive. True or False?

true

One of the main applications of database and database systems is database marketing. True or False?

true

Repetitive typing with thumbs or continual navigation through various pages and apps is causing a health issue for many smartphone users called "smartphone thumb," also called tendinitis. True or False?

true

Strategic information systems (SISs) focus on big-picture, long-term goals and objectives and assist an organization or a decision-maker to achieve them. True or False?

true


Related study sets

Speaking and Listening: Effective Group Discussions

View Set

Alabama Drivers Manual Terms, Alabama Driver Manual Test

View Set

APES Review Earth Systems and Resources

View Set

Care Management Medsurg Evolve questions

View Set

Sensation and Perception Final Exam

View Set