mis final study guide

Ace your homework & exams now with Quizwiz!

The HR Manager for your organization has set a department goal to improve the efficiency and effectiveness of the New Hire process. She has assigned you to work with the team that will study and transform the hiring process. Your team chooses to apply the Business Process Management approach as suggested by the authors of Using MIS. As your team works through the steps, you refer to and produce a number of documents which help you organize and implement your changes. Think back to the outline of the Business Process Management process and organize the list of documents below in the appropriate order that your team would encounter, use, or work on developing. The current HR Hiring Process User Manual (v1.0) (Your Organization) HR Hiring Practice: A Complete User's Guide (v2.0) HR Hiring Workflow Diagram (Your Organization) Time-To-Hire Activity Report

1 The current HR Hiring Process User Manual (v1.0) 2 HR Hiring Workflow Diagram 3 (Your Organization) HR Hiring Practice: A Complete User's Guide (v2.0) 4 (Your Organization) Time-To-Hire Activity Report

Connecting the world together is a major undertaking. There are many obstacles that you have to overcome in order to assure that every human being in every place can access resources. Which Internet technology is directly impacted by the fact that the earth is round? A. Fiber Optic B. 4G C. WANs D. Switches

4G

Which of the following is NOT like the others? A. <textarea id="textarea1" name="notes"> B. <input type="text" id="text1" name="firstname" placeholder="First Name" /> C. <fieldset id="fieldset1" name="fs1" value="test" > D. <input type="checkbox" id="check1" name="musicpreference" value="country" />

<fieldset id="fieldset1" name="fs1" value="test" >

You are building a single page, HTML document. You have elected to use an Internal stylesheet. Place the following lines of code in the ORDER that they would appear on the page from top to bottom. put in correct order- 1. h3 + hr { width:95%;margin-top:-20px } p { text-indent: 1em } 2. <h3>Moore's Law</h3> 3. <html> 4. <hr /> 5. <p>Moore's law is the observation that the number of transistors in a dense integrated circuit doubles approximately every two years. The observation is named after Gordon E. Moore, the co-founder of Intel and Fairchild Semiconductor, whose 1965 paper described a doubling every year in the number of components per integrated circuit, and projected this rate of growth would continue for at least another decade.</p>

<html> h3 + hr { width:95%;margin-top:-20px } p { text-indent: 1em } <h3>Moore's Law</h3> <hr /> <p>Moore's law is the observation that the number of transistors in a dense integrated circuit doubles approximately every two years. The observation is named after Gordon E. Moore, the co-founder of Intel and Fairchild Semiconductor, whose 1965 paper described a doubling every year in the number of components per integrated circuit, and projected this rate of growth would continue for at least another decade.</p>

Which of the following is affected by having multiple related controls that share the same name? A. <select name="musicpreference"> B. <textarea name="musicpreference" > C. <input type="radio" name="musicpreference" value="country"> D. <input type="checkbox" name="musicpreference" value="country">

<input type="radio" name="musicpreference" value="country">

HTML Table What is missing? A. Data B. Nothing is missing. C. Pages in the book D. <td></td>

<td></td>

You are reviewing a stylesheet and observe the following selector: ul.pullout li span { font-weight: bold } To which of the following lines of HTML does this apply? A. <ul><li><span>Option 1</span></li> B. <ul class="pullout"><li><span>Option 1</span></li> C. <ul id="pullout"><li><span>Option 1</span></li> D. <ul class="pullout"><li>Option 1</li>

<ul class="pullout"><li><span>Option 1</span></li>

You want to create a bulleted list of your favorite activities. What is the correct HTML to do this? 1. <li>Music Concerts</li> <li>Beach Walks</li> <li>Night out with Friends</li> 2. <ul> <li>Music Concerts</li> <li>Beach Walks</li> <li>Night out with Friends</li> </ul> 3. <p>* Music Concerts</p> <p>* Beach Walks</p> <p>* Night out with Friends</p> 4. <ol> <li>Music Concerts</li> <li>Beach Walks</li> <li>Night out with Friends</li> </ol>

<ul> <li>Music Concerts</li> <li>Beach Walks</li> <li>Night out with Friends</li> </ul>

Which of the following usually happens in a malicious denial-of-service attack? A. An intruder uses another site's IP address to masquerade as that other site. B. A hacker monitors and intercepts wireless traffic at will. C. A hacker floods a Web server with millions of bogus service requests. D. A phisher pretends to be a legitimate company and requests confidential data.

A hacker floods a Web server with millions of bogus service requests.

Engaging the customer through social media is a routine topic around many business boardrooms. As companies try to develop a community base, they want to involve them in as many aspects of the business as is reasonable. The more engaged a consumer is in the mission of the company the more likely they will be an evangelist for the company in their social networks. What aspect of division of a business organization is LEAST likely to see benefit by engaging the customer through social media information systems? A. Accounting Department B. Business Logistics C. Manufacturing D. Customer Service

Accounting Department

You are a Business Analyst for Acme Drapery Systems. Your schedule for the day looks like this: 8:00 am Review the Software Unit Tests from last night 9:00 am Team Meeting: Daily Stand-up Report In 9:30 am Meet with Tim to write the new email validation code What style of Systems Development does Acme Drapery Systems practice? A. Business Process Management B. Agile Development C. Systems Development Lifecycle D. Standard Operating Procedure

Agile Development

How does company management begin to suspect that they have a problem with Information Silos in their organization? A. Employee tardiness is up and efficiency is down. B. Department managers game the systems to appear more successful in monthly reports. C. Irate customers posting on Social Media. D. All of the Above

All of the Above

Moore's Law teaches us that the effective cost of data is nothing. Which of the following BEST illustrates that concept? A. Amazon Web Services B. Microsoft SQL Server C. Microsoft Windows 10 D. Nike.com

Amazon Web Services

The CEO of your organization saw a demonstration of a new messaging application that combines email, texts and database entries as sources for an Integrated Messaging Platform. He purchases the product and directs the CIO to install and deploy it. After an initial burst of use, the application fizzles and simply consumes server space. What is the BEST explanation for the failure of the application? A. Third party software is a form of outsourcing. Since the product was not developed by inhouse developers it cannot be adjusted to the daily operations of the company. B. Employees are fickle stakeholders in any system. If you don't find something that has end user appeal, it won't be adopted by the users. C.The salesman did a number on the CEO. While the product was flashy, it was not the best-in-class and has numerous problems which leads to less interest in using the product. D.An application is a component of an Information System and an Information System supports the improvement or maintenance of a Business Process. Installing an application simply for its features does not add value unless there is an appropriate need and adjustment in Information Systems and Business Processes.

An application is a component of an Information System and an Information System supports the improvement or maintenance of a Business Process. Installing an application simply for its features does not add value unless there is an appropriate need and adjustment in Information Systems and Business Processes.

Which the following is an example of OLAP data for Sonic Drive-In? A. Order #100234 @ 1:15pm B. Average Number of Items per Order in March C. Employee James, Sean Check-in @ 3:45pm D. Order #203845 Ready for delivery

Average Number of Items per Order in March

What is the basic definition of a "freemium"? A. Your account is free but the sponsor/provider links to your other activities such as online searches to place targeted advertising in front of you. B. Membership is free but you must watch partial or whole web advertisements every time you access content. C.Your account is free and you can control all of the functions and features of the application/website for now. When the sponsor has attracted a large enough audience, they will convert to a pay for subscription model and generate revenue to grow the product. D. Basic membership is free but subscription upgrades are offered which provided a better user experience.

Basic membership is free but subscription upgrades are offered which provided a better user experience.

Andrea, the floor supervisor at a call center, calls Bryan, a call attendant, to her office. She reports observing a few critical omissions in his calls, a finding supported by recent employee ratings. Andrea discusses with Bryan a few ways to improve his productivity. Bryan feels that Andrea is overreacting. Which of the following is a valid observation of this scenario? A. Bryan needs to learn to receive feedback. B. Andrea failed to express an unpopular viewpoint. C. Bryan is self-managing and requires low supervision. D. The office lacks a communication system.

Bryan needs to learn to receive feedback.

Like any other process, an Agile project has several distinct steps to be performed. Select the items from below that belong to an Agile Development project (SCRUM). A. Implement Processes B. Choose Requirements To Deliver C. Maintain System D. Define The System E. Stand-Up F. Deliver & Reflect G.Prioritize Requirements List

Choose Requirements To Deliver Stand-Up Deliver & Reflect Prioritize Requirements List

The holy grail in marketing is the "viral" video or meme. Marketers and academics who study marketing want to know what that magic quality is that lets one message or video scream across the Internet while others just as important languish. Which of the following terms related to "data" makes the most likely reason that a message can go viral in a short amount of time? A. Public B. Connection C. Content D. Sponsor

Connection

Microsoft markets a software product call Sharepoint. On their Sharepoint Overview web page, they make the following statements "Making decisions faster and staying in contact are critical for making any organization more effective. Your ability to access information on the go is now a workplace necessity. SharePoint Server 2016 makes file storage and document collaboration more people-centric, with touch-based experiences across devices and improved mobile access to content, people, and applications." Based on this information, what type of Business Intelligence System is Microsoft Sharepoint? A. Decision Support System B. Knowledge Management System C. Expert System D. Content Management System

Content Management System

Which of the following is a major implication of Moore's Law? A. Data processing activities have become complex and time-consuming. B. The size of integrated chips has increased. C. Costs of communications and storage have become very low. D. Costs of computing and processing have increased.

Costs of communications and storage have become very low.

Kroenke and Boyle outline 6 steps to develop a successful Social Media plan for a business. Which of the following is NOT one of those steps? A. Create A Budget B. Identify Success Metrics C. Define Your Value D. Make Personal Connections

Create A Budget

Your book defines social capital like this: "Social capital is the investment in social relationships with the expectation of returns in the marketplace." Which of the following is the BEST way for you, as a student, to build your social capital while at GU? A. Get on your work supervisor's "invite" list B. Create a "mentorship" relationship with your academic advisor C. Grow your Facebook Friends list D. Participate In Student clubs on campus

Create a "mentorship" relationship with your academic advisor

Businesses that want to have the advantages of outsouring their IT but not become hostage to the negative aspects of outsourcing can take what action? A. Create an Amazon Web Services account. B. Buy their own servers but pay someone to set them up. C. Start an IT subsidiary that handles all of the technology for just one company. D. Buy out a local IT consulting business to put the employees on the payroll.

Create an Amazon Web Services account.

To be considered part of a computer oriented information system, a device must have all of the following items except what? A. Storage B. Display C. RAM D. CPU

Display

The Systems Development Life Cycle (SDLC) is often referred to as the "waterfall method." Which explanation below best explains why SDLC has that reputation? A. Each stage of the SDLC is performed in sequential order and once that stage has been completed you do not reopen or modify it. B.When you follow the SDLC you can trace a particular feature all the way through each of the stages and see how the concept was imagined, rationalized, defined, implemented and finally tested in the final release. C. The SDLC is the most consistent way of guiding a project through a series of rocky problems to move the business from where it is to where it wants to be. D. Each stage is more detailed an comlicated than the one before so like a water fall the each stage represents more work than the one before.

Each stage of the SDLC is performed in sequential order and once that stage has been completed you do not reopen or modify it.

Of the following terms and concepts, which is NOT part of the Five Component Framework? A. Efficiency B. Automation C. Data D. Hardware

Efficiency

Stylesheets are critical to the presentation of content on a web page. To be efficient with your styles, you want to place styles where they can apply to the largest number of pages and tags that are appropriate. Which of the following has the greatest stylesheet effect on a website? A. Internal B. Personal C. External D. Inline

External

The core of any system -- it's memory -- is the Stock. What effect do the various flows associated with a given stock have on the stock itself? 1. Flows control the level held in the stock. 2. Flows cause no change in a stock. 3. Flows add to a stock. 4. Flows remove from a stock.

Flows control the level held in the stock.

I sit between two networks. One is well known to me and is managed by the administrators who own me. The other is borrowed from an Internet Service Provider but through that network I have access to the entire world. The users on my private side all must use my services in order to access all their favorite Internet sites. What am I? A. Access Point B. Gateway/Firewall C. Switch D. Router

Gateway/Firewall

Which of the following statements is true of good information? A. Good information is only received from sources that provide data for free. B. Information should be relevant to the subject, not necessarily to the context. C. Good information should go well beyond the scope of the purpose for which it is generated. D. Good information should be based on correct and complete data.

Good information should be based on correct and complete data.

Speed and security remain an important issue for businesses who want to utilize the Internet. Which of the following terms addresses the question of security when conducting business over the Internet? A. Fiber Optic B. Virtual Private Cloud C. HTTPS D. SAAS

HTTPS

There are three elements that make a computer what it is. Though the size and dimensions may change, without these three things all the rest is for nothing. What are those elements? A. Operating System, Browser, Server B. Hard Drive, CPU, RAM C. CPU, Operating System, Software D. CPU, RAM, Operating System

Hard Drive, CPU, RAM

Both Microsoft and Nintendo offer software for sale. Each is a specialist at what they do. What concept below best explains the broader appeal of Microsoft over Nintendo? A. Spyware B. Adware C. Packet Sniffer D. Virus

Horizontal Market

Information Systems can be vulnerable to THREATS. Which of the following is a threat identfied by Kroenke? A. Software Bugs B. Hard Drive Failure C. Employee Turnover D. Human Error

Human Error

Bob runs a ATV Rental Business. While rentals have been steady, he keeps having to scramble at the end of the month to make sure that all the bills get covered. He doesn't understand how he can rent out his inventory every day and still come up short at the end of the month. He'd like to understand exactly where the problem is. Which of the following will likely help Bob the most? A. Daily Rentals by ATV B. Income and Expense Report C. National ATV Rental trend report D. End of Month Bank Statement

Income and Expense Report

You sit down at your parent's computer that you got for them at Christmas. You turn on the computer and you are hit with a dialog box telling you that the free subscription to Norton Antivirus has expired. You ask your mother about it and she acknowledges that the message started showing up about six weeks prior. Your parents have been simply clicking the "Ignore" button and going on about their activities with the computer. What is the nature of their personal security risk? A. Ineffective Safeguard B. Incorrect Safeguard C. No Safeguard D. Blocked By Safeguard

Ineffective Safeguard

ERP, EAI, and CRM are classes of Enterprise Software Solutions that overcome a specific business problem that develops as businesses mature. What is the term we apply to that problem? A. Information Silo B. Poor Margins C. Intellectual Property management D. Employee Resistance to Change

Information Silo

The Chief Information Officer (CIO) is responsible for all of the Information Systems decisions that are made by an organization. She must be technically savvy and mission oriented to be successful. Within the MIS branch of the business is another executive title: CTO. Which of the following would be a responsibility of the CTO? A. Create the SQL Server backup strategy and offsite storage plan B. Develop, deploy and analyze a Stakeholder survey of the effectiveness of the MIS department. C. Installing MongoDB in the testing environment and working with a team to test various business scenarios. D. Create a budget plan for replacement hard drives for the Storage Area Network (SAN).

Installing MongoDB in the testing environment and working with a team to test various business scenarios.

The Affordable Care Act (ACA) establishes the opportunity for inidividual states and the Federal government to establish medical insurance exchanges. On these exchanges, individuals and nuclear families can purchase medical insurance at discounted group rates usually reserved for businesses who have many employees. Which term below best matches the work of an online Health Care Exchange? A. The Cloud B. Inter-enterprise Process C. Competitive Strategy D. Enterprise Process

Inter-enterprise Process

IS planning functions include the directive to "align information systems with organizational strategy." Which of the following is NOT an example of the need for this IS function in a business? A. April 2013: Kodak spins off its Personalized Imaging and Document Imaging Business units into independent organizations. B. January 2009: Kodak annouces plans to cut 4500 jobs across the business C. 2003 Kodak introduces the Kodak EasyShare LS633 Digital Camera D. January 2012 Kodak receive a warning from the NYSE that their average stock price for 30 consecutive days was below the $1 minimum listing threshold.

January 2012 Kodak receive a warning from the NYSE that their average stock price for 30 consecutive days was below the $1 minimum listing threshold.

The following is from the About Us page on spotcrime.com. They produce visual maps that locate crime events by geo location ( Spokane, WA ). "SpotCrime is a crime data aggregator. We map the crime incidents, plot them on Google Maps, and deliver alerts via email, Facebook, Twitter, SMS, RSS and a multitude of other platforms. The data comes from police departments, news reports and user-generated content. Our goal is to provide the most accurate, timely geocoded crime information to the public. We map crime and deliver alerts." What type of Business Intelligence/Data Mining application does this website represent? A. Unsupervised Data Mining B. Knowledge Management C. Expert System D. Market-basket Analysis

Knowledge Management

During an project where Itron developed and deployed an ERP system, a local Analyst had a request from Itron stakeholders for a field to be displayed on one of the ERP screens. She discussed with the program manager in India the need for the field and they discussed a timeline for when it would be added. At the appropriate time, the field did appear on the screen as requested. During a follow up with the stakeholders they told her the field was there but there was no data being displayed. Following up with the programmers, the analyst learned that while they had understood that they wanted the field displayed, they had failed to understand that the stakeholders wanted to see the data stored in the database for that field so they failed to connect it to the data source. This is an example of what Risk in Outsourcing IS projects? A. Insufficient safeguards B. Loss of Control C. No Easy Exit D. Benefits outweighed by long-term costs

Loss of Control

Your company outsourced the development of the ERP system to an international vendor. You need a field to be changed on a report to meet regulatory compliace. You send a change request to the company Business Analyst in charge of developing the new ERP system. He replies that according to the vendor the changes you have requested will not be able to be made until 2 weeks after your reporting deadline. What outsourcing risk does this problem represent? A. No easy exit. B. The Vendor's lack of skilled employees. C. Loss of Control D. Benefits outweighed by long-term costs

Loss of Control

Every business must be prepared to deal with a wide variety of mobile devices. Whether they are company provided or personally provided, managing them is of paramount importance in order to ensure the safety and integrity of the business. Which of the following represents a technology that businesses can use to ensure that mobile devices are secure, running the latest operating system and using current virus scanning capabilities? A. BYOD B. YOLO C. DBMS D. MDM

MDM

Which word or phrase would best explain the reason that customer survey forms use a limited number of values, i.e. 1-5 or 1-10, etc? A. Measuring Threshold B. Measuring Efficiency C. Measuring Randomness D. Measuring Effectiveness

Measuring Effectiveness

Open a Microsoft Access Database and you see a list on the left that has organized tabs: Tables, Queries, Forms, Reports, Macros and Modules. What feature of the Access database, of all databases, makes that list possible? A. Metadata B. Normalization C. Categories D. Relationships

Metadata

During an onboarding process with the HR Department for a new company you are going to work for, you are given an Employee badge and a network password. A front face photograph is also taken and uploaded into the security system. All of these elements will be required for you to enter the building to go to work every morning. What term BEST describes the security measures? A. Encryption B. Multi factor identification and authentication C. Malware Protection D. Firewall

Multifactor identification and authentication

You are working with a team on a database project. After studying the businesses artifacts related to your project goals, your team makes the following decision: The attributes of an Address are: AddressPK, UnitAddress, City, State, ZipCode. What work has your team been engaged in? A. System Analysis B. Entity Analysis C. Data Design D. Normalization

Normalization

Data Warehouses are the starting point for every Business Intelligence project. After the designs and creation phase, a datawarehouse must be maintained by routine activities which are coordinated by dedicated staff members. Your book outlines four functions of a data warehouse management team. Which of the following is NOT one of those functions? A. Obtain the Data B. Catalog the Data C. Normalize the Data D. Cleanse the Data

Normalize the Data

Social Capital = [A] X [B] X [C] What values replace [A], [B] and [C] in the formula? A. Number of Relationships, Influence, Entity Resources B. Number of Relationships, Relationship Strength, Entity Resources C. Number of Relationships, Relationship Strength, Net Worth D. Number of Relationships, Influence, Wealth

Number of Relationships, Relationship Strength, Entity Resources

Of the following terms, which is NOT part of the Hardware component of the Five Component Framework? A. WAN B. Operating System C. VPN D. LAN

Operating System

In information security, which of the following is true about managing risk? A. Organizations should implement safeguards that balance the trade-off between risk and cost. B. Physical security is classified as human safeguards. C. Passwords are classified as technical safeguards. D. All organizations except financial institutions should invest heavily in security safeguards.

Organizations should implement safeguards that balance the trade-off between risk and cost.

________ is the process of hiring another organization to perform a service. A. Diversifying B. Headhunting C. Merging D. Outsourcing

Outsourcing

If you commonly frequent coffee shops and you use the free WIFI on your laptop. To which type of threat are you most commonly exposed because there are others using the same WIFI service? A. Spyware B. Adware C. Packet Sniffer D. Virus

Packet Sniffer

Data tables contain multiple rows of data. Each row, a record, should track a single, unique entity in the business represented by the data. Which of the following ensures that the row is unique in the database? A. Person ID B. Primary Key C. Row Number D. System ID

Primary Key

Social Media Information Systems (SMIS) are not always positive tools. As quickly as you can build your social capital through social media, you may also lose your credibility and social relationships because of negative things that happen. Because of the public nature of Social Media, your businesses successes and failures are always on display. Which of the following is not a risk associated with developing a Social Media Information System? A. Product Flaw B. Employee SM Communications C. Intellectual Property Leaks by Employees D. Inappropriate User Generated Content

Product Flaw

Changing Business Processes through the deployment of Enterprise Information Systems can improve the overall operations. Which of the following business effects is NOT something that you would expect from deploying an ERP, EAI, or CRM product? A. Product Improvement B. Better Efficiency C. Greater Effectiveness D. Better Margins

Product Improvement

My super power is the ability to manages gigabytes of data at the speed of light. I can flip bits and hold the image of your cat. My only limitation is the length of my attention span. If you stretch too far, blip! I'm gone again. A. Storage B. Power Button C. RAM D. CPU

RAM

Which of the following concepts is NOT a key component or feature of an Enterprise scale Database Management System like Microsoft SQL Server when compared to a desktop level database application like Microsoft Access? A. Record B. Multi-User Access C. Support for Multiple Business Applications D. Improved Data Integrity

Record

Companies do not invest in custom software projects that match their unique business processes very often. Most of them are content to purchase a Enterprise Information System and integrate it into the business processes. Some attempts, often worth 10s of thousands even hundreds of thousands of dollars fail. What challenge described in your book as a risk to adopting an Enterprise Information System is most likely the cause of these failures? A. Requirements Gaps B. Collaborative Management C. Employee Resistance D. Transition Problems

Requirements Gaps

"A system is an interconnected set of elements that is coherently organized in a way that achieves something." (Thinking in Systems, p11) Which of the following items is NOT as system? 1. The Gonzaga Men's Basketball Team 2. Rubber Door Stop 3. Piano 4. Personal Computer

Rubber Door Stop

Social Media systems are composed of several elements that work together tightly. While each has a specific role to play in the overall design, some are costs, some are neutral and some are revenue generating. Of the items listed below, which is most likely to have the most positive benefit to the organization's profit margin? A. SM Community B. SM Sponsor C. SM Application Provider D. SM Network

SM Network

Database Management Systems manipulate databases in order to provide information to the application systems. In order to build datasets, a database programmer must use a data specific language that instructs the DBMS about how to form the data that is needed by the application. What is this internationally standard data programming language called? A. Javascript B. SQL C. C# D. Metadata

SQL

Which of the following questions is best answered through unstructured decision making? A. Should we continue to outsource our bookkeeping processes? B. What is the acceptable defect ratio for this product? C. How many overtime hours should be used to fill this order? D. When should the next batch be scheduled to reduce idle time?

Should we continue to outsource our bookkeeping processes?

Of the following ways that Social Capital adds value to your life or career, which is influenced the most by WHO is in your Social Network? A. Social Credentials B. Personal Reinforcements C. Information D. Influence

Social Credentials

Which of the following is an SMIS that a business can develop to improve its business-to-business (B2B) relationships? A. Start an industry related Blog B. create a brand related hashtag to use on multiple social media platforms C. Offer free product give aways on Twitter D. Post Consumer success stories on Facebook.

Start an industry related Blog

During encryption, the client computer creates an initial random value that is used to encrypt the data to be sent. This initial value, the Key, is then encrypted using a second key that belongs to the computer that the data is being sent to. This ensures that only the recipient computer of the data can decrypt the message. What is the common name given to the original randomly generated key that encrypts the data payload? A. Public Key B. Symmetric Key C. Private Key D. Asymmetric Key

Symmetric Key

You are part of an debriefing team examing the history of a failed MIS project. The executives want to know what went wrong so that they can see that changes will not let another failed project happen again for that same reason. One of the artifacts your team gathers as part of the analysis is the Gantt chart used to manage the project. After a quick scan of the chart, you declare to the rest of the team that there is nothing on the chart that will help explain why the project went 3 months over schedule. Why can you say this? A. The Gantt chart did not align with the Project Plan document. B. You notice that there are several names of resources that are no longer with the company. C. Gantt charts are not designed for business project management. D. Systems Development Life Cycle (SDLC) is based on a waterfall method which means that a previous step must be completed before the project "falls" into the next phase of the project. The Gantt chart only shows you what the final project calendar was, it does not have a comparison to show what time each Phase was expected to take at the beginning.

Systems Development Life Cycle (SDLC) is based on a waterfall method which means that a previous step must be completed before the project "falls" into the next phase of the project. The Gantt chart only shows you what the final project calendar was, it does not have a comparison to show what time each Phase was expected to take at the beginning.

________ are information systems (IS) professionals who understand both business and information technology. A. Network administrators B. Database designers C. Systems analysts D. Development analysts

Systems analysts

Firewalls Backup and Recovery Procedure Design Compliance Data Rights and Responsibilities Application Design (match) Technical Safeguards Data Safeguards Human Safeguards

Technical Safeguards Data Safeguards Human Safeguards Human Safeguards Data Safeguards Technical Safeguards

HTML stands for Hyper-Text Markup Language (HTML). What is the purpose of a "markup" language? A. To do manually what Microsoft Word does for us automatically. B. To add bulk to otherwise sparse amounts of information. C. To convey information about the context of the data contained within a document and how it should be presented to the users. D. To give programmers more power over the way that documents are processed by remote computers.

To convey information about the context of the data contained within a document and how it should be presented to the users.

Your customer has 10 spreadsheet files that she has been using to run her business. Recently it has become obvious that the business is suffering because information that is required can be scattered across three or more of the spreadsheets. With her help, you look at the spreadsheets to evaluate how to make them better. You note several places where spreadsheets contain the same customer information. Occasionally there are differences and your client mentions that she has lost accounts because of bad customer service that turned out to be missing or corrupted information. She authorizes you to make any recommendation that you think will help her get the best of her information. What should you propose? A.Keep the data in Excel format. However, because the data is currently in multiple files, use the multiple worksheets to combine all of her separated data into a single file so it is easier to locate information. B. Import all 10 spreadsheets into Microsoft Access. C. Make no changes, but educate the owner and her staff on how to better use the files that they have. D. Transfer all of the spreadsheets to a database management system like SQL Server. Normalize the data to fix duplicates and other data integrity problems.

Transfer all of the spreadsheets to a database management system like SQL Server. Normalize the data to fix duplicates and other data integrity problems.

Secure Sockets Layer is also known as ________ A. Transport Layer Security B. Presentation Interface Layer C. Advanced Persistent Threat Layer D. Network Interface Layer Security

Transport Layer Security

You might say that the requirements to building an HTML page are rules that must be followed. Which of the following is NOT one of the rules that was shared in class? A. Use more pictures than text on web pages. B. Close every tag that you open. C. Content intended for human beings to read goes inside the <body></body> tags. D. Always type your tags in lower case, i.e. <body></body> not <BODY></BODY>.

Use more pictures than text on web pages.

You Professor works with clients to solve business and technology problems. He spends his days, when he is not on campus, accessing his client's servers, databases, files and more from the computer in his office. He can talk to his customers on the phone and get instructions by email, but he never has to darken the doorway of his customer's businesses. What networking technology makes that possible? A. LAN B. VPN C. Operating System D. WAN

VPN

Amazon Web Services (AWS) utilizes hundreds, thousands, even potentially tens of thousands of servers to provide services to its customers. A basic server today can cost you $1200 and better, faster, bigger servers can easily reach $50K or more. Amazon bills out its smallest "server" to its customers at less than 10 cents per hour. If a server costs $50k, how can AWS afford to lease it for less than 10 cents per hour? A. Elastic Demand B. Tax Deductions C. Virtualization D. Linux Operating System

Virtualization

What is it that allows thin-client software to run on multiple Operating Systems? A. Programming Logic B. Web Browser C. Operating System D. App Store

Web Browser

(choose-) Web Formatting Control or Invalid Web Control or Web Data Control For the following: <input type="text" id="city" name="city"> <fieldset id="nameandaddress"> <legend>Name & Address</legend> </fieldset> <input type="checkbox" id="over18" value="1">Are you Over 18 years of age? <select name="size"> <option value="s">Small</option> <option value="m">Medium</option> <option value="l">Large</option> </select> <div id="usersettings"> </div> <textarea name="instructions" rows="5" cols="100"> </textarea>

Web Data Contro Web Formatting Control Invalid Web Control Web Data Control Web Formatting Control Web Data Control

You are reviewing a stylesheet and observe the following selector: p:hover { color: purple } You open the webpage and observe what behavior because of that style? A. The background color of the page is Purple. B. There is no effect. C. Paragraphs have purple text. D. When the mouse is over a paragraph its text turns purple.

When the mouse is over a paragraph its text turns purple.

Which of the following statements can we say is ALWAYS true of Thin Client software? A. You must be a better programmer to write thin client software. B. There are restrictions on which computers you can run thin client software on. C. The software does not work as well as native applications. D. You must have a web browser to operate the software.

You must have a web browser to operate the software.

According to Porter's five forces model, in which of the following situations would a supplier have the highest bargaining power? A. a restaurant that serves only army veterans B. a large retailer buying finished goods from many small suppliers C. a fashion brand's outlet catering to a niche market D. a Houston-based vendor that is the only supplier of a patented material for many smartphone manufacturers

a Houston-based vendor that is the only supplier of a patented material for many smartphone manufacturers

If I query a campus database with your ZagID, I will get one result and discover your First Name and Last Name. Fill in the blanks: The result I receive is ________________ composed of __________________ which include First Name and Last Name. A. data, fields B. a table, data C. a row, data D. a record, fields

a record, fields

Carlos is a business student doing an internship at Bruno and Venus, a firm specializing in the export of sophisticated equipment to other countries. He finds that he is unable to create a representative chart depicting the relation between processes such as procurement, shipping, and billing. This indicates that he lacks ________ skills. A.abstract reasoning B. systems thinking C. experimental D. collaborative

abstract reasoning

In a business process, ________ are defined as collections of related tasks that receive inputs and produce outputs. A. presentations B. resources C. databases D. activities

activities

Porter defined value as the ________. A. extent of after-sale service provided to customers B. perceived satisfaction of the customers and sellers after a transaction C. actual money exchanged in return for a product/service D. amount of money that a customer is willing to pay for an offering

amount of money that a customer is willing to pay for an offering

Systems that depend on human operators are resistent to ____________________, but the people also fear systems that depend solely on the technology because greater __________________ eliminates the need for human actors. A. success, efficiency B. change, automation C. better efficiency, technology D. automation, change

change, automation

Which of the following is considered a support activity in the value chain of a business? A. marketing B. operations C. contract negotiation D. customer service

contract negotiation

The purpose of a ________ group is to protect data and information assets by establishing data standards and data management practices and policies. A. data communication B. data mining C. data warehousing D. data administration

data administration

A group of shoe manufacturing firms purchases raw materials collectively from a single supplier to obtain better deals. This is an example of obtaining competitive advantage by ________. A. locking in customers B. enhancing the products C. differentiating the industry D. establishing alliances

establishing alliances

Project teams should document project results and information for future teams. Which of the following is the project management phase in which the teams perform this function? A. doing B. finalizing C. starting D. planning

finalizing

You have the following HTML on your page: <h1>Signing the Declaration</h1> <hr /> <div>We must, indeed, all hang together, or assuredly we shall all hang separately. --Benjamin Franklin (attr.) </div> You have been asked to place the quote in a bordered space and italicize it. Which of the following is the BEST syntax to accomplish that? A. h1 + hr + div { border:solid 1px black; font-style:italic } B. h1 + hr + div { border:solid 1px black font-style:italic } C. div { border:solid 1px black; font-style:italic } D. <div style="border:solid 1px black;font-style:italic"

h1 + hr + div { border:solid 1px black; font-style:italic }

In Systems Thinking, stocks are connected by both interconnections and feedback loops. In order for the system to operating, something must pass through these interconnections and feedback loops. Donella Meadows wrote in "Thinking In Systems: A Primer": "Many of the interconnections in systems operate through the flow of ________________. _________________ holds systems together and plays a great role in determining how they operate." Which pair of words BEST replace the blanks in Ms. Meadows' statement? A. customers : Data B. information : Information C. demand : Processes D. information : Resources

information : Information

Identify a primary purpose of collaboration. A. performing routine tasks B. making decisions C. eliminating individual tasks D. evaluating coworkers

making decisions

Which atttribute of the <form> tag controls whether the data from the form is submitted in the web browser's URL or as data in the body of the request. A. method B. enctype C. id D. action

method

According to the five-component model of information systems, the ________ component provides instructions for the people who use information systems. A. procedure B. data C. software D. hardware

procedure

You are using an external stylesheet that contains the following definition: p { color: blue; } Your page contains the following HTML tags: <body style="color:green"> <h1>Chapter 1: A Wizard Comes to Court</h1> <hr /> <p><span style="color:red">Merlin</span>knew something was afoot in Camelot....< /p> What color does the word "Merlin" appear in? A. black B. green C. undetermined from the information given D. red

red

An organization implements an information system to optimize its supply chain. The system helps the organization to reduce wastes. In this scenario, implementing the information system has helped the organization to gain a competitive advantage by ________. A. differentiating the products B. locking in suppliers C. locking in customers D. reducing costs

reducing costs

A ________ involves balancing three critical factors: requirements, cost, and time. A. trade-off B. critical path C. work breakdown structure (WBS) D. test plan

trade-off

When a control is displayed on a web form, the content that you display may not be the what you want to see in your database. For instance, Male or Female may be converted into M and F. What is the attribute of a control which allows a form to send a different result than what the user sees on the screen? A. id B. value C. data D. name

value


Related study sets

MGMT 101 - Chapter 4 Journalizing and Posting Transactions

View Set

Chapter 1 A new world to explore 1492 - 1682 The discovery of America

View Set

ch 55: Drugs Acting on the Lower Respiratory Tract

View Set

R5: Flow-Through Entity Taxation and Multi-Jurisdictional Tax Issues

View Set

Basic terminology​ Anatomy and Physiology - Unit 1

View Set

Part 1 - Chapter 3 (Inquisitive)

View Set

Systematic reviews, meta-analysis and meta-synthesis

View Set