MSIS 2103

Ace your homework & exams now with Quizwiz!

Distributed File System (DFS)

- aka NoSQL database - server-based system - previously could not be queried with a SQL system (no longer the case) - Google, Amazon, and Facebook have created their own DFS systems

Database Management System (DBMS)

- creates databases - defines field formatting - defines database business rules - modifies the database structure - usually only accessed by an admin

Enterprise Resource Planning (ERP)

- used by businesses that manufacture products - i.e. SAP and Oracle - most ERP systems include a CRM application - may have an SCM application

Supply Chain Management (SCM)

- used by logistics and distribution companies - companies like FedEx, Walmart, and Amazon have created their own SCM

Enterprise systems

- used by most businesses - single database and all applications access that database - eliminates duplication - allows each part of the business to see the same data

Customer Relationship Management (CRM)

- used by services and sales companies - i.e. Salesforce and Microsoft Dynamics - may have an SCM application

According to the video "A Packet's Tale" what is the total time for the request and the webpage to be displayed?

1 second

A kilobyte is 1024 bytes. A megabyte is 1024 kilobytes. A gigabyte is 1024 megabytes. What is a petabyte?

1024 Terabytes

c.) entity relationship diagram

A _____________ shows the relationship between the tables in a relational database. a.) data dictionary b.) metadata table c.) entity relationship diagram d.) SQL diagram e.) key diagram

The third tenet of the CIA is _______.

Availability

A service company that uses an enterprise information system will likely us a(n) ______.

CRM

A service company that uses an enterprise information system will likely use a(n)________.

CRM

Through the use of apps (application software) your smart phone can access devices that are connected to a network. What technology does the smart phone use to connect to the network?

Cellular radio

If you have columns that are truncating your content (not showing all the content), but you cannot increase the width of the worksheet and be able to print on one page, a solution for making the text visible without losing data would be to:

Click Wrap text

If you want to paste a formula result, but not the underlying formula, to another cell, you would copy the cell with the formula, then place the insertion point in the cell you want to copy to. What next?

Click the arrow on the Paste button on the Standard toolbar, then click Values.

When you needed to know the grade distribution in the Student Grade Excel application, you used which function?

Count if

When working on WiFi, what does the router or access point use to identify you?

Dynamic IP Address

When you sign onto a LAN through WiFi, you have a ______ IP address and the LAN router has a _______ IP address.

Dynamic, Static

A manufacturing company that uses an enterprise system will likely use a(n) _____.

ERP

One method of keeping information secure when sent over the Internet or stored on a computer is ________.

Encryption

A _________ shows the relationships between the tables in a relational database

Entity Relationship Diagram

c.) foreign

Every table has a primary key. When the primary key of one table is in another table it is called a ___________ key. a.) unique b.) lost c.) foreign d.) it is not allowed to use a primary key in another table

Casandra, R, Firefox, and Linux are examples of open source software. While the source code is available to view, anyone that wants to modify it must pay a fee to the organization that controls the software, such as Apache.org.

FAlse

The IP Address defines your device whereas the Mac address defines your location on the networ

FAlse

You are saving $200 per month for a down payment on a house. Your bank pays 2% APR interest. What function would you use to calculate the total amount in your savings account in two years?

FV

A Router is a device that directs and sends data over the Internet. It has a dynamic IP address.

False

A URL has two parts. The first part is the protocol identifier, and the second is the domain name. A URL does not need to have an IP address associated with it.

False

All computer devices communicate over a network using computer languages such as Python or C#.

False

All webpages are written in hyper text markup language or HTML. Each browser has it's own transmission protocol to read the HTML. Safari because it was created by Apple uses a different transmission protocol than Google's Chrome.

False

An Information Assurance Analyst identifies current risks associated with software and hardware systems. They work with other security experts and employees to hack into the company to gain access to the company's digital assets for personal gain.

False

Data is information put into context.

False

Formatting data changes the appearance of data, and it changes the data itself.

False

T/F: A relational database can have a many-to-many relationship between entities

False

T/F: Because a properly designed relational database only has single data entry, it is common to put calculated variables in the database

False

T/F: Google and Facebook store a very large amount of information. They use a relational database to store and manage this information.

False

T/F: If a formula contains several nested functions, excel starts with the innermost function and then moves outward

False

T/F: In Excel, when you define a named range it can only be used in formulas on the same spreadsheet as the named range.

False

T/F: Malware is software to protect your computer from anti-malware attacks by viruses, spying tools, ransomware, and Trojan horse

False

T/F: The DBMS is used to create application business rules.

False

T/F: The availability heuristic is based on how easy an instance can be brought to mind. It is based on redundant input variables that are highly correlated.

False

The AutoSum function can be accessed through a button on both the Home tab and the Formulas tab. The AutoSum function in Excel only works on a data in a column.

False

You have a LAN at home so all of your IoT devices can be reached through the Internet. All of the devices are connected by WiFi and have a static IP addresses

False

Which of the following transmission protocols is not a wireless network protocol?

Fiberoptics

Every table has a primary key. When the primary key of one table is in another table it is called an _______ key.

Foreign

You are working on an excel spreadsheet and have discovered that your method of solving a problem has created a circular reference. Excel has a solution to this problem. You need to use _________.

Goal Seek

Visualizations

Graphs, charts, maps, and any other visual views of the data

In excel to select several cells or ranges that are not touching each other you would ________ while selecting.

Hold down the CTRL key

d.) it may have a link for you to click to access a message

How can you recognize a phishing email? a.) it will often have perfect spelling and grammar b.) it will not ask for your ID and password c.) it will not ask for you to pay a fee d.) it may have a link for you to click to access a message e.) it will not have a threat of account closing

When you use the internet you run the risk of ______.

Identity theft, financial theft, extortion, and blackmail.

b.) insensitive to prior outcomes

If an interviewer ignores your past history of success, he is guilty of which bias? a.) insensitive to prior probabilities b.) insensitive to prior outcomes c.) insensitive to sample size considering prior possibilities d.) insensitive to posterior probabilities e.) insensitive to predictability

Someone is quiet and appears aloof. You predict that they would not have a successful career as a comedian. What bias would potentially invalidate your prediction?

Illusion of Validity

You always take exams wearing the same shirt, because when you wear that shirt you make a good grade on the exam. This is an example of what bias?

Illusion-correlation bias.

Which is the part of the Excel screen where you can find all the commands or buttons, depending on the tab you selected before?

Ribbon

When you take out renter's insurance, you are practicing ______.

Risk transference

A retailer such as Walmart that uses an enterprise information system will likely us a(n)______.

SCM

To sort data in an Excel worksheet you can use the ______.

Sort A to Z and Sort Z to a buttons

False

T/F A relational database can have a many-to-many relationship between entities.

True

T/F A relational database cannot have a many-to-many relationship between entities.

False

T/F Because a properly designed relational database only has single data entry, it is common to put calculated variables in the database.

True

T/F Because a properly designed relational database only has single data entry, variables that can be calculated are not in the database.

True

T/F Distributed File Systems or NoSQL databases are usually triple redundant.

True

T/F Heuristics can lead to predictable biases and inconsistencies.

False

T/F Heuristics can lead to unpredictable biases and consistencies.

True

T/F Information on the Internet has an unlimited life and is rarely deleted.

False

T/F Information on the internet has a limited life and is deleted after a period of time.

False

T/F Malware is the software to protect your computer from anti-malware attacks by viruses, spying tools, ransomware, and Trojan horses.

False

T/F Risk is the probability of a bad thing happening divided by the impact of its occurrence.

True

T/F Risk is the probability of a bad thing happening multiplied by the impact of its occurrence.

False

T/F The "law of small numbers" says that any sample will have a distribution that is representative of the population, regardless of sample size. The "law of small numbers" is valid for selecting sample size.

True

T/F The DBMS is used to create database business rules.

False

T/F Distributed File Systems or NoSQL databases are available for purchase and are closed source systems.

True

T/F The representative heuristic is one of the reasons that first impressions on meeting someone are so important.

In order to perform a skill, the knowledge must be internalized. This is called ________ knowledge.

Tacit

b.) they have one database

The common element of enterprise systems is which of the following? a.) they have multiple relational databases b.) they have one database c.) they use the same programming language d.) they all have the ability to do logistics

If you are negotiating the price of a used car with the owner, you always want to make an offer before asking the owner's selling price. Why

The first price mentioned creates the starting point in the negotiation

T/F: One way to get data out of a relational database is to write a query using SQL or structured query language.

True

T/F: People are the greatest threat to the security of a business's information

True

T/F: Risk is the probability of a bad thing happening multiplied by the impact of its occurrence.

True

T/F: the representative heuristic is one of the reasons that first impressions on meeting someone are so important

True

TCP/IP defines how data is sent over the Internet.

True

There are three main types of enterprise systems. They are supply chain management (SCM), enterprise resource planning (ERP), and customer relationship management (CRM). All of these information systems support the business by automating routine tasks, providing routine reports, and providing all employees the data and information needed to do their jobs.

True

When you use a credit card, you are using several different companies' information systems.

True

insensitive to prior probabilities

Twenty percent of the students at your university are in a sorority or fraternity. You see that many of the students in your class of 200 students are wearing shirts with Greek letters on them. You conclude that half of the students are in a fraternity or sorority. Of what bias are you possibly guilty?

Which of the following is a tacit skill taught in MSIS 2103

Using Excel to solve problems

Which of the formulas below contain the correct syntax (formula arguments) for the VLOOKUP function?

VLOOKUP(lookup_value, table_array, col_index_num, range_lookup)

c.) risk transferrence

When you take out renter's insurance, you are practicing ____________. a.) risk acceptance b.) risk avoidance c.) risk transferrence d.) risk likelihood

e.) all of the above

When you use the Internet, you run the risk of ___________. a.) identity theft b.) financial theft c.) extortion d.) blackmail e.) all of the above

Your Internet Service Provider (ISP) says that your network runs at 50 gigabit per second. This is the _______

bandwidth

e.) all of the above

Metadata defines the ____________. a.) format of the data fields b.) required data fields c.) database business rules d.) number of characters in a text field e.) all of the above

c.) encryption

One method of keeping information secure when sent over the Internet or stored on a computer is ____________. a.) frequency analysis b.) using a virtual private network c.) encryption d.) cartography

You have a lot of data in a spreadsheet, thousands of rows and over 100 columns. You have been asked to summarize the data for a presentation. What do you do?

create a pivot chart

What is the first step for creating a pivot table?

create or select data that needs to be analyzed.

Logistics

delivery of personnel or supplies in an efficient manner

People make many decisions everyday. Most of these decisions are made using analytical tools like excel

false

T/F: Choices involving gains are often risk averse and choices involving losses are often risk taking. This explains the high sales of lottery tickets.

false

T/F: Heuristics can lead to unpredictable biases and consistencies.

false

T/F: Knowledge is defined as "facts, information, and skills acquired by a person through experience or education; the theoretical or practical understanding of a subject." The key element of knowledge is that it can be written and shared with others.

false

Which part of a URL identifies the protocol?

https

a.) ERP

A manufacturing company that uses an enterprise information system will likely use a(n) ____________. a.) ERP b.) SCM c.) CRM d.) OMG

b.) SCM

A large retailer with multiple locations and warehouses that uses an enterprise information system will likely use a(n) _____________. a.) ERP b.) SCM c.) CRM d.) BRP

server-based system

A server is a computer designed to process requests and deliver data to other computers (client) over a network. A web server delivers pages to web browsers. An email server hosts email and delivers it to other email servers. Identity servers support logins and security roles for authorized users.

What is not an open source application software?

Adobe Photoshop

Metadata defines the _______.

All of the above

You are being asked to join an organization. You are told that the members are very friendly and everyone has a great time at events the organization holds. You conclude that joining this organization will help you raise your GPA. Of what bias are you possibly guilty?

Insensitive to predictability

If an interviewer ignores your past history of success, he is guilty of which bias?

Insensitive to prior outcomes

Twenty percent of the students at your university are in a sorority or fraternity. You see that many of the students in your class of 200 students are wearing shirts with Greek letters on them. You conclude that half of the students are in a fraternity or sorority. Of what bias are you possibly guilty?

Insensitive to prior probabilities

b.) XVG$4u5i6&n

Integrity means keeping information secure from unauthorized changes. You can do this by using a hard to guess password. Which is the best password? a.) TaBpSsOaSsB b.) XVG$4u5i6&n c.) 1234567890 d.) JeniferS e.) Password1

Where is a Pivot Table inserted?

It depends on whether you select to insert the Pivot Table in the current worksheet or a new worksheet and where your cursor is.

How can you recognize a phishing email?

It may have a link for you to click to access a message.

Which of the following describes how late work is handled in MSIS 2103?

Late work is not graded

Structured Query Language (SQL)

Lets you get information out of a database

Malware

Malware is a term we use to label things like computer viruses, spying tools, and other things that can take over your computer.

Moore's law states that _______________.

The number of transistors on a chip doubles every 18 to 24 months.

What is a common element between an ERP, a CRM, and an SCM?

They all have a single database supporting applications

In a VLOOKUP formula, what does the argument "column_index_number" mean?

This is the number of the column within the selected table_array where the lookup result is located.

Google Maps is a GIS system that utilizes a GPS system to provide information about the physical world.

True

In Excel, you can trace all of the cells referenced in a formula through the trace precedents function.

True

c.) drawing at least one red marble in seven tries, with replacement, from a bag containing 10 percent red marbles and 90 percent white marbles

Which of the following instances appears most likely? a.) drawing a red marble from a bag containing 50 percent red marbles and 50 percent white marbles b.) drawing a red marble seven times in succession, with replacement (i.e. a selected marble is put back into the bag before the next marble is selected), from a bag containing 90 percent red marbles and 10 percent white marbles c.) drawing at least one red marble in seven tries, with replacement, from a bag containing 10 percent red marbles and 90 percent white marbles

a.) drawing a red marble from a bag containing 50 percent red marbles and 50 percent white marbles

Which of the following instances appears second most likely? a.) drawing a red marble from a bag containing 50 percent red marbles and 50 percent white marbles b.) drawing a red marble seven times in succession, with replacement (i.e. a selected marble is put back into the bag before the next marble is selected), from a bag containing 90 percent red marbles and 10 percent white marbles c.) drawing at least one red marble in seven tries, with replacement, from a bag containing 10 percent red marbles and 90 percent white marbles

c.) they use the same programming language

Which of the following is not a common element of enterprise systems? a.) all applications access the same database b.) they have one database c.) they use the same programming language d.) they all have many applications

c.) application business rules

Which of the following is not defined in database Metadata? a.) format of date fields b.) required data fields c.) application business rules d.) number of characters in a text field e.) all of the above are defined in the metadata

insensitive to predictability

You are being asked to join an organization. You are told that the members are very friendly and everyone has a great time at the events the organization holds. You conclude that joining this organization will help you raise your GPA. Of what bias are you possibly guilty?

Which of the following is NOT possible with VLOOKUP?

You can lookup values located in a column to the left of the column that contains the lookup value.

Your Excel workbook has four sheets. You name a range on sheet 1. Which of the following is true

You can use that named range on all worksheets in the workbook

What is a protocol?

a standard

When you access your University's Learning Management System (LMS), the LMS is where?

on a server

When you post a review on a business you are _______.

providing content

Click-based advertising is one method that online businesses use to make money

true

Learning objective one is to develop skill in using Excel by applying it to solve problems.

true

T/F: an ERP can have a CRM module

true

Tacit knowledge requires that an individual internalize a skill

true

Your ISP says that you have 50 Mbs Internet speed. When you run a speed check you find that _________.

your download speed is lower than 50 Mbs.


Related study sets

Disability Income and Related Insurance Quiz

View Set

Ch10 Cost of Prod. & P.C. By Kevin Crump

View Set