ISYS 1
An American Standard Code for Information Interchange (ASCII) file defines up to _____ characters.
128
Registering, selling, or using a domain name to profit from someone else's trademark is called:
Cybersquatting
One of the following is not among the important concepts related to the Web and network privacy: a. Nonrepudiation b. Data integrity c. Accountability d. Acceptable use policies
Data integrity
What can help offset the digital divide?
Increasing the number of computers in public places
One of the following is not a type of mobile analytics: a. Installation analytics b. In-app analytics c. Advertising and marketing analytics d. Performance analytics
Installation analytics
In using information technologies for a competitive advantage, which statement is true of a bottom-line strategy?
It focuses on improving efficiency by reducing overall costs.
The four Ms of resources in information systems:
Manpower Machinery Materials Money
Information technologies are used to gain a competitive advantage by doing all of the following except: a. Helping in reducing the cost of operations b. Delivering timely and accurate information c. Replacing all key decision makers in an organization d. Providing business intelligence
Replacing all key decision-makers in an organization
All of the following are among the new IT-related jobs except: a. Data scientist b. Search engine optimization specialist c. Social media/online-community manager d. Systems analyst
Systems analyst
All of the following are among the potential drawbacks of telecommuting except: a. The ability to work in more pleasant surroundings b. Potential legal issues about workers' injuries c. No regulated work routine d. Less interaction with coworkers
The ability to work in more pleasant surroundings
Choose the wrong answer: a. The fourth generation of computer languages is natural language processing. b. The third generation of computer languages is high-level language. c. The second generation of computer languages is assembly language. d. The first generation of computer languages is machine language.
The fourth generation of computer languages is natural language processing.
Choose the wrong answer: a. The first generation of computers is identified by vacuum tubes. b. The fourth generation of computers is identified by VLSI, personal computers, and optical discs. c. The second generation of computers is identified by transistors. d. The third generation of computers is identified by miniaturization.
The third generation of computers is identified by miniaturization.
Which statement is accurate for transaction-processing systems? a. They focus on integrating data, processes, and human elements. b. They focus on maximizing human involvement. c. They focus on integrating hardware and software technologies. d. They focus on data collection and processing.
They focus on data collection and processing.
One of the following is NOT among the 5 Vs of big data: a. Veracity b. Value c. Variety d. Variance
Variance
All of the following are among the advantages of object-oriented programming except: a. Modularity b. Reuse of codes for other purposes c. Effective problem solving d. All of these choices
all of these choices
All of the following are among the future outlook of information systems except: a. Hardware and software costs will continue to decline. b. The computer literacy of typical information system users will improve. c. Hackers will become more sophisticated. d. All of these choices
all of these choices
Tableau and Power BI are used for all of the following purposes except: a. Exploring and finding patterns in data b. Creating multiple charts to get meaningful insight into data c. Allowing analyzing data with different formats d. All of these choices
all of these choices
Which component of a database management system (DBMS) is used to design elements of an application using a database, such as data entry screens, interactive menus, and interfaces with other programming languages?
application generation
Which is recognized as an input device?
barcode reader
Every character, number, or symbol on the keyboard is represented as a(n) _____ in computer memory.
binary number
Which is a software component of a management information system (MIS)?
commercial programs
The data _____ component of a database management system (DBMS) is used to create and maintain the data dictionary.
definition
Job deskilling occurs when:
experienced labor is eliminated by high technology
Computer literacy is understanding the role of information in generating and using business intelligence. True or False?
false
In a data warehouse environment, ETL refers to extraction, transformation, and language. True or False?
false
Public information posted by an organization or public agency cannot be censored for public policy reasons. True or False?
false
The arithmetic logic unit (ALU) performs only arithmetic operations. True or False?
false
In a(n) _____, nodes with the same parents are called twins or siblings.
hierarchical model
In the context of intellectual property, _____ is categorized as industrial property.
logos
In the context of how information is viewed in a database, the _____ involves how data is stored on and retrieved from storage media.
physical view
A potential benefit of telecommuting is that it _____.
reduces employee turnover
Storage definition
saving data in computer memory
A data lake gathers and stores data in its original format in a central location. The collected data can be structured as well as unstructured. True or False?
true
Application software can be commercial software or software developed in-house; it is used to perform a variety of tasks on a personal computer. True or False?
true
Digital citizenship means using information technology safely, ethically, and responsibly. True or False?
true
Machine language is the first generation of computer languages and consists of a series of 0s and 1s representing data or instructions. True or False?
true
Michael Porter's Five Forces Model analyzes an organization, its position in the marketplace, and how information systems could be used to make it more competitive. True or False?
true
One of the main applications of database and database systems is database marketing. True or False?
true
Repetitive typing with thumbs or continual navigation through various pages and apps is causing a health issue for many smartphone users called "smartphone thumb," also called tendinitis. True or False?
true
Strategic information systems (SISs) focus on big-picture, long-term goals and objectives and assist an organization or a decision-maker to achieve them. True or False?
true