ITM Chapter 1 Review

Ace your homework & exams now with Quizwiz!

A password is said to be weak if it contains ________. A) a complete dictionary word B) both upper- and lowercase letters C) the numbers 9 and 3 D) three special characters

A) a complete dictionary word

_______ is the ability to model the components of a unit, to connect the inputs and outputs among those components into a sensible whole that reflects the structure and dynamics of the phenomenon observed. A) Systems thinking B) Collaboration C) Adaptive learning D) Critical reasoning

A) Systems thinking

Which of the following is true about the impact of Moore's Law on business professionals? A) They need to be able to assess, evaluate, and apply emerging information to technology to business B) They need to concentrate more on developing routine skills than non routine skills. C) They need to be able to develop better communication and information technologies. D) They no longer need to focus on skills such as abstract reasoning and collaboration.

A) They need to be able to assess, evaluate, and apply emerging information to technology to business

Marketing managers planning to use new social networking technologies to strengthen their market presence are portraying their____. A) ability to experiment. B) routine skills C) collaboration skills D) ability to outsource work

A) ability to experiment.

In a job interview, Lillian is asked to be a part of a three-member group and design a mock business process based on the strengths and skills of the group's members. In this case, which of the following skills is the interview trying to test? A) collaboration B) cognitive acceleration C) systems thinking D) facilitation

A) collaboration

Patricia, the marketing manager of a manufacturing firm, plans new marketing strategies with the help of her subordinates by providing and receiving critical feedback. Here, Patricia is displaying effective ____. A) collaboration B) cognitive acceleration C) virtualization D) abstractions

A) collaboration

In a grocery store, a clerk uses a barcode scanner to read the barcode on an item. Which of the following components of an information system includes this scanning device? A) hardware B) software C) data D) procedure

A) hardware

Which of the following components distinguishes information systems from information technology? A) people B) database structure C) software D) hardware

A) people

Which of the following is a critical responsibility of business professionals in using information systems? A) protecting the security of a system and its data B) reprogramming a system to meet changing needs C) creating and modifying a system's databases D) building and configuring additional networks

A) protecting the security of a system and its data

A group of components that interact to achieve some purpose is referred to as a(n)____. A) system B) element C) unit D) entity

A) system

Which of the following is an impact of rapid technological change on job security: A) Routine skills have more demand B) Nonroutine cognitive skills have gained more market value C) Nonroutine jobs are outsourced, thus reducing the need of an in-house workforce D) Routine skills are no longer required to complete a task.

B) Nonroutine cognitive skills have gained more market value

Which of the following statements is true of nonroutine cognitive skills? A) They have become less marketable B) The increase an individual's job security. C) They do not experience any impact of technological changes. D) They are are usually outsourced by organizations to the lowest bidder.

B) The increase an individual's job security.

Which of the following is a result of Moore's Law? A) The risk of technology becoming obsolete has decreased. B) The price to performance ratio of computers has fallen dramatically. C) The outsourcing of non routine skills has increased drastically. D) The cost of data processing has increased considerably.

B) The price to performance ratio of computers has fallen dramatically.

The five-component framework of an information system system consists of computer hardware, software, data, people, and_____. A) documents B) procedures C) objectives D) results

B) procedures

Which of the following statements is true about the management and use of information systems? A) An employee must be programmer to manage information systems. B) Information systems must be adapted to new requirements C) Information systems need not be maintained after development. D) Organizations with dynamic business environments do not use information systems.

C) Information systems need not be maintained after development.

Which of the following is an example of a hardware component of an information system? A) Web browser B) operating system C) storage disk D) data file

C) storage disk

Which of the following reasons is valid for a company to create a new information system? A) to project a modern image B) to avoid falling behind the technology curve C) to help employees achieve the strategies of the business D) to show its social networking presence

C) to help employees achieve the strategies of the business

Which of the following passwords is the strongest? A) sword123 B) RileyyeliR C) paranoid4EVER D) [email protected]

D) [email protected]

In a job interview, Roy is asked to use a product that he has never used before and is unfamiliar with its functioning. Which of the following skills is the interviewer trying to test? A) systems thinking B) abstract reasoning C) Collaboration skills D) ability to experiement

D) ability to experiement

Which of the following is necessary for effective collaboration? A) modeling the components of a system B) focusing on individual goals C) proper division of tasks D) giving and receiving critical feedback

D) giving and receiving critical feedback

Businesses do not use information systems to achieve their strategies.

False

Critical feedback undermines collaboration

False

Effective collaboration is all about being nice to one's team members

False

Good passwords contain a complete dictionary word.

False

Increased outsourcing has made non routine skills less marketable.

False

Moore's Law states that the speed of a computer doubles every 18 months.

False

Successful experimentation is throwing buckets of money at every crazy idea that enters one's head

False

The number of business adopting new technologies has seen a downfall over the years.

False

The use of information systems is restricted to the field of business.

False

When a user is provided with an unfamiliar program and asked to use it, he or she is being tested on their ability to collaborate effectively.

False

Future business professionals need to be able to apply information technology to business.

True

Information systems and information technology are not the same.

True

Information systems should be created by a business only if they help achieve the strategies of that business.

True

Moving away to let another user enter his or her password is a mark of professionalism.

True

Professionals in the 21st century need to be able to experiment in order to have greater job secuirty.

True

Routine skills are outsourced to the lowest bidder because the cost of data processing, storage, and communications is essentially zero.

True

Strong non-routine cognitive skills are more in demand than routine skills.

True

The knowledge of managing information systems can lead to greater job security.

True

The methods used to start a program and save a file are referred to as procedures.

True

A marketable skills has no impact on job security.

False

Building information systems requires many different skills besides those of programmers.

True

_______ is the ability to make and manipulate models. A) Abstract reasoning B) Cognitive acceleration C) Adaptive learning D) Holacracy

A) Abstract reasoning

Which of the following passwords is the weakest? A) B33rmu9 B) Qw37^T1bb?as C) 3B47qq<3>5!7bdE D) As60$T1dd?dc

A) B33rmu9

_______ is making a reasoned analysis of an opportunity, envisioning potential solutions, evaluating those possibilities, and developing the most promising ones, consistent with the resources one has. A) Experimentation B) Abstraction C) Systems thinking D) Collaboration

A) Experimentation

Which of the following statements on password etiquette is true? A) If someone asks for the password, do not just give it out. B) Always back up the password by writing it down. C) Never access an information system from a computer that is connected to the Internet. D) Never use the password more than three times a day.

A) If someone asks for the password, do not just give it out.

The number of transistors per square inch on an integrated chip doubles every 18 months. The observation is known as ____ Law A) Murphy's B) Moore's C) Amdahl's D) Metcalfe's

B) Moore's

Which of the following statements is true of Moore's Law? A) It is based on the technological advancements in weapon manufacturing. B) It made the cost of data processing, communications, and store essentially zero. C) It states that the total number of transistors produced in the world doubles every 18 months. D) It has resulted in obsoleting the use of transistors.

B) It made the cost of data processing, communications, and store essentially zero.

Which of the following best describes collaboration? A) Is is the ability of an individual to model the components of the system, to connect the inputs and outputs among those components into a sensible whole that reflects the structure and dynamics of the phenomenon observed. B) Is it the ability to assess, evaluate, and apply emerging information technology to business. C) It is the activity of two or more people working together to achieve a common goal, result, or work product. D) It is the activity of constructing or modifying models with the help of one's non routine cognitive skills.

C) It is the activity of two or more people working together to achieve a common goal, result, or work product.

Why is it important for business professionals to take an active role in developing managing information systems? A) They know how to create a database and configure computers. B) The are the people who know how to build networks. C) They know whether a system meets their needs and requirements. D) They are the lone users of information systems.

C) They know whether a system meets their needs and requirements.

Because the cost of data processing, storage, and communications is essentially zero, any routine skill can and will be _____ A) considered a non routine cognitive skill B) a strong marketable skill C) outsourced to the lowest bidder or performed by a machine D) sufficient to attain job security

C) outsourced to the lowest bidder or performed by a machine

Abstract reasoning is one of the components of strong non-routine cognitive skills

True

An information system is a group of components that interact to produce information.

True


Related study sets

OB: Chapter 14 Nursing Management During Labor and Birth, Chapter 14, Exam 1 prep- Chap 1-3

View Set

bio final chapters 52-56, chapter quizzes, old exams

View Set

med term - chp 15 - comp terms nbfwp

View Set

Chapter 16 New Motors (EV, Natural Gas, and Hydrogen)-combined

View Set

Characteristics of Bright Romanticism, Dark Romanticism, and Transcendentalism

View Set

Foundations of Nursing, Chapter 1 Nursing Today Review Questions

View Set

Chapter 2 - Financial Reporting:Its Conceptual Framework

View Set

Chapter 13 peds sensory and neurological disorders

View Set