True & False Questions

Ace your homework & exams now with Quizwiz!

16 Some smartphones allow you to take notes and to "write" emails or text messages by speaking into the phone. These are examples of speech-recognition technology. A) True B) False

A) True

19The operating system converts a basic user request into the set of detailed instructions that the computer hardware requires, thus acting as an intermediary between the application and the hardware. A) True B) False

A) True

A relational model splits the information up into many two dimensional data structures. Question 14 options: A) True B) False

A) True

Carlos is working with an existing database, but he wants to eliminate some of the columns in the table to create a new, more streamlined database. He will use projection to create his new database. Question 27 options: A) True B) False

A) True

For a small system, site preparation can be as simple as rearranging the furniture in an office to make room for a computer. Question 18 options: A) True B) False

A) True

One of the primary advantages of a relational database is that it allows tables to be linked to reduce data redundancy and allow data to be organized more logically. Question 17 options: A) True B) False

A) True

Some of the key factors in database design are content, access, structure, archiving, and security. Question 20 options: A) True B) False

A) True

Sometimes a database can contain "bad data," meaning incomplete, incorrect, inaccurate, or irrelevant records, which can be corrected or deleted through data cleansing. Question 28 options: A) True B) False

A) True

System testing is often done by independent testers who are not involved in developing program code. Question 11 options: A) True B) False

A) True

The information systems operations group is responsible for the day-to-day running of IS hardware to process the organization's information systems workload. Question 15 options: A) True B) False

A) True

The need for additional data storage capacity is one of the factors driving the growth in data centers. A) True B) False

A) True

The operating system's application programming interface (API) provides software developers with tools they use to build application software without needing to understand the inner workings of the operating system and hardware. A) True B) False

A) True

Two of the major challenges business users face when using big data are finding the information they need to make decisions and knowing that the data they have is valid. Question 11 options: A) True B) False

A) True

Unstructured data comes from sources such as word-processing documents and scientific research. Question 23 options: A) True B) False

A) True

Virtual tape technology can decrease data access time, lower the total cost of ownership, and reduce the amount of floor space consumed by tape operations. A) True B) False

A) True

"Adapting" is the second stage in Lewin's Change Model, which involves learning new work methods, behaviors, and systems.​ Question 17 options: A) True B) False

B) False

2 RAM stands for random access memory; a form of memory that holds its contents even if the current is turned off or disrupted. A) True B) False

B) False

A command-based user interface employs icons and menus that people use to send commands to the computer system. A) True B) False

B) False

A database administrator (DBA) is an important nontechnical position responsible for defining and implementing consistent principles for a variety of data issues, including setting data standards and data definitions that apply across all the databases in an organization. Question 21 options: A) True B) False

B) False

Agile is better suited for developing larger information systems than smaller ones. Question 25 options: A) True B) False

B) False

An enterprise data model is created only for documentation, but is otherwise inconsequential. Question 12 options: A) True B) False

B) False

Bioprinting, which uses 3D printers to build human parts and organs from actual human cells, is widely considered to be unethical. A) True B) False

B) False

DBMSs are used primarily for modeling data. Question 9 options: A) True B) False

B) False

Data modeling usually involves setting a specific business goal and then analyzing the data and information needed to reach that goal. Question 26 options: A) True B) False

B) False

In the context of the relational database model, selecting involves combining two or more tables. Question 15 options: A) True B) False

B) False

Software can be divided into two types: operating software and application software. A) True B) False

B) False

Suppose a manager wishes to analyze historical trends in sales. He would use the online transaction processing (OLTP) system. Question 24 options: A) True B) False

B) False

The concept of a value chain is not significant to organizations unless they manufacture products. Question 7 options: A) True B) False

B) False

The relational model describes data using a standard tabular format; all data elements are placed in three-dimensional tables called relations, which are the logical equivalent of files. Question 13 options: A) True B) False

B) False

The role of a systems analyst is narrowly defined and seldom involves communications with others. Question 14 options: A) True B) False

B) False

The scope of green computing is limited to the efficient and environmentally responsible design and manufacture of all types of computers. A) True B) False

B) False

A data flow diagram (DFD) does not provide any information about process timing. Question 5 options: A) True B) False

A) True

A database administrator (DBA) must have a clear understanding of the fundamental business of an organization, be proficient in the use of selected database management systems, and stay abreast of emerging technologies and new design approaches. Question 22 options: A) True B) False

A) True

A database management system (DBMS) serves as an interface between an application program and a database. Question 19 options: A) True B) False

A) True

For each data item, a data dictionary usually contains information such as the name of the data item, the range of values that can be used, and the amount of storage needed for the item. Question 25 options: A) True B) False

A) True

In the context of the relational database model, projecting involves eliminating columns in a table. Question 16 options: A) True B) False

A) True

The relational database model is currently the most widely used. Question 18 options: A) True B) False

A) True

Organizations can collect many types of data from a wide variety of sources, but typically they only collect structured data that fits neatly into traditional relational database management systems. Question 29 options: A) True B) False

B) False

Joint application development (JAD) sessions with a cross section of users and stakeholders in a project are an effective way to define system requirements. Question 3 options: A) True B) False

A) True

Massively parallel processing systems are a form of multiprocessing that speeds processing by linking hundreds or thousands of processors to operate at the same time. A) True B) False

A) True

One of the primary roles of a senior IS manager is to communicate with other areas of the organization to determine changing business needs.​ Question 21 options: A) True B) False

A) True

Secondary storage can store large amounts of data, instructions, and information more permanently than allowed with main memory. A) True B) False

A) True

Software as a Service (SaaS) allows businesses to subscribe to Web-delivered business application software by paying a monthly service charge or a per use fee. A) True B) False

A) True

Suppose your business is using software that was written using FORTRAN 77. They wish to modify it to accommodate new requirements. It is a sound advice to suggest that they consider switching to a new application using newer technologies (e.g. Microsoft ASP.Net), rather than modify the current software. Question 22 options: A) True B) False

A) True

The primary function of application software is to apply the power of the computer to enable people, workgroups, and the entire enterprise to solve problems and perform specific tasks. A) True B) False

A) True

The purpose of studying a system is to identify the strengths and weaknesses of the existing system and examine current inputs, outputs, processes, security and controls, and system performance. Question 2 options: A) True B) False

A) True

The successful implementation for change only happens when people accept the need for change and believe that it will improve factors such as productivity and/or customer satisfaction. Question 16 options: A) True B) False

A) True

The use of virtual servers is growing rapidly because virtualization can save millions of dollars per year in capital and operating expenses. A) True B) False

A) True

Utility programs are used to perform system maintenance, such as repairing errors on a hard drive, improving system security, and optimizing sluggish system processes. A) True B) False

A) True

Utility programs help to perform maintenance, correct problems, merge and sort sets of data, keep track of computer jobs, and compress data files. A) True B) False

A) True

When dealing with large multinational or global organizations, vendors often sell their software programs to the organizations but then outsource the technical support to local, third-party distributors. A) True B) False

A) True

You have lots of images on your hard drive totaling 500 million bytes. A 2 Gigabyte storage device will be adequate to store those photos A) True B) False

A) True

A database must reflect the business processes of an organization. Question 10 options: A) True B) False

A) True

A single computer can be used by a single user or by multiple, simultaneous users. A) True B) False

A) True

One of the significant drawbacks to building a custom system is the high cost compared to off-the-shelf software. Question 20 options: A) True B) False

A) True

Operational feasibility takes into account the need to meet certain system performance requirements that are considered important to system users and stakeholders. Question 9 options: A) True B) False

A) True

Opportunities in information systems are available to people from different parts of the world. Question 13 options: A) True B) False

A) True

Perceived usefulness and ease of use of a system influence an individual's attitude toward the system. Question 9 options: A) True B) False

A) True

Pressure to increase profitability and improve operational efficiencies often drives organizations to implement new approaches and technology. Question 1 options: A) True B) False

A) True

Software that allows an individual to create a to-do list, take notes, and organize tasks in a database would be classified as having a personal sphere of influence. A) True B) False

A) True

The database approach to managing data is superior to the file-based approach. Question 7 options: A) True B) False

A) True

A liquid crystal display (LCD) functions by exciting organic compounds with electric current to produce bright and sharp images. A) True B) False

B) False

An operating system is a set of programs that controls the computer hardware and acts as an interface with applications. A) True B) False

A) True

31 Software as a Service (SaaS) refers to the use of computing resources, including software and data storage, on the Internet rather than local computers. A) True B) False

B) False

Information is simply a collection of raw facts such as an employee number or the total hours worked in a week. Question 1 options: A) True B) False

B) False

If "color" is an attribute, then "green" is a data item. Question 5 options: A) True B) False

A) True

Thin client computers are a type of portable single-user computers. A) True B) False

B) False

A database, a database management system, and the application programs that use the data, make up a database environment. Question 1 options: A) True B) False

A) True

A field is typically a name, number, or combination of characters that describes an aspect of a business object. Question 2 options: A) True B) False

A) True

A slipstream upgrade is a minor upgrade—typically a code adjustment or minor bug fix. Question 23 options: A) True B) False

A) True

A software suite is a collection of programs packaged together as a bundle and typically includes a word processor, spreadsheet program, graphics program, and more. A) True B) False

A) True

According to Lewin's Change Model, an organization must deliberately change old habits, learn new work methods, and accept the new work methods as parts of the job. Question 18 options: A) True B) False

A) True

An embedded system is a computer system that is implanted in and dedicated to the control of another device. A) True B) False

A) True

An example of a common hardware function performed by the operating system is presenting information on a monitor or printer. A) True B) False

A) True

An organization's technology infrastructure includes all of the hardware, software, databases, networks, people, and procedures that are configured to collect, manipulate, store, and process data into information.​ Question 23 options: A) True B) False

A) True

As the difference among computer manufacturers in the areas of price and performance narrows, support for green computing is emerging as a new business strategy for these companies to distinguish themselves from the competition. A) True B) False

A) True

Cole has just landed a job as a sales representative in a department store. Nina is teaching him the set of steps he should follow to ring up, take payment for, and bag a purchase for a customer. Cole is learning a procedure.​ Question 24 options: A) True B) False

A) True

Most operating systems support virtual memory which allocates space on the hard disk to supplement the immediate, functional memory capacity of RAM. A) True B) False

A) True

The diffusion of innovation theory can be useful in planning the rollout of a new information system. ​ Question 11 options: A) True B) False

A) True

The disaster recovery plan focuses on technology recovery and identifies the people or the teams that are responsible to take action in the event of a disaster, what exactly these people will do when a disaster strikes, and the information system resources required to support critical business processes. Question 7 options: A) True B) False

A) True

The primary outcome of systems analysis is a prioritized list of system requirements and a recommendation of how to proceed with a project. Question 10 options: A) True B) False

A) True

User acceptance testing (UAT) is a critical activity that must be completed successfully before newly developed software can be rolled out to the market. Question 14 options: A) True B) False

A) True

Your friend has a Mac that runs OS X. If she needs to run a Windows app on it, she can set it to run Windows also. A) True B) False

A) True

39 If a large organization wants software that will benefit the entire organization—what's known as enterprise application software—the organization must develop it specifically for the business in order to get the functionality required. A) True B) False

B) False

A collection of data fields that are all related to one object, activity, or individual is called a file. Question 3 options: A) True B) False

B) False

A set of random or unrelated tasks performed to achieve a definite outcome is called a process. Question 3 options: A) True B) False

B) False

A sustaining innovation is one that initially provides a lower level of performance than the marketplace has grown to accept. Question 6 options: A) True B) False

B) False

All members of a system investigation team must be co-located to ensure a successful start to a project. Question 8 options: A) True B) False

B) False

An attribute is a general class of people, places, or things for which data is collected, stored, and maintained. Question 4 options: A) True B) False

B) False

Each programming language has a set of rules, called the program code of the language. A) True B) False

B) False

For someone to be a good CIO, technical ability is the most important characteristic. Question 20 options: A) True B) False

B) False

If 10 users can run programs at the same time on the same computer, it is known as multi-tasking. A) True B) False

B) False

Monitoring is the process of analyzing systems to make sure they are operating as intended. Question 21 options: A) True B) False

B) False

Operating systems provide a measure of security by allowing users to access to those resources they've been cleared to use as well as other users' resources if those resources are beneficial. A) True B) False

B) False

Over time, disruptive innovation tends to become less attractive to users in a new market. Question 8 options: A) True B) False

B) False

Parallel start-up involves running a complete new system for one group of users while the rest of the users still run an old system. Question 19 options: A) True B) False

B) False

Perceived usefulness and perceived ease of use do not have any influence in determining whether someone will use an information system. Question 17 options: A) True B) False

B) False

Proprietary software is mass-produced by software vendors to address needs that are common across businesses, organizations, or individuals. A) True B) False

B) False

Reengineering and continuous improvement have the same definition. Question 5 options: A) True B) False

B) False

Security and control considerations are a negligible part of the entire system development process. Question 4 options: A) True B) False

B) False

Solid state storage devices (SSDs) store data in hard disk drives or optical media rather than memory chips. A) True B) False

B) False

Suppose your friend, who is a small business owner, wants to computerize her business functions such as accounting, payroll, and inventory management. She would need to purchase separate software to meet each functional requirement. A) True B) False

B) False

The activities that lead to getting the right product into the right consumer's hands in the right quantity at the right time at the right cost are known as value chain management. Question 12 options: A) True B) False

B) False

The diffusion of innovation theory states that adoption of any innovation happens all at once for all members of the targeted population.​​ Question 10 options: A) True B) False

B) False

The eventual success of any system solely depends on how users work with it. Question 15 options: A) True B) False

B) False

The term data is used to label raw facts such as height and weight of a patient. Question 4 options: A) True B) False

B) False

Today, many organizations can function and compete effectively without computer-based information systems.​ Question 19 options: A) True B) False

B) False

Today, most organizations use the traditional approach to data management, where multiple information systems share a pool of related data. Question 8 options: A) True B) False

B) False

Two sets of fields can have a common primary key. Question 6 options: A) True B) False

B) False

Unit testing uncovers any defects in the interface between individual components of an information system. Question 16 options: A) True B) False

B) False

Waterfall and agile are the two types of software development processes available to organizations. Question 24 options: A) True B) False

B) False

While discussing the preliminary feasibility of a project, your colleague insists that figures used in economic feasibility be very accurate down to the last cent. His claim is appropriate and not uncommon. Question 13 options: A) True B) False

B) False

​A feedback mechanism is an optional component of an information system. Question 22 options: A) True B) False

B) False

Corporate executives often object to the use of open-source software because it lacks formal technical support, even though information and solutions regarding the software are usually readily available online. A) True B) False

A) True

Depending on the brand of tablet you purchase, you may be able to enter data by typing on a keyboard, writing on the screen with a stylus, or speaking into the tablet's microphone. A) True B) False

A) True

Even if unit testing is successful, developers cannot assume they can combine individual components into a working system without any problems. Question 12 options: A) True B) False

A) True

Feasibility analysis assesses the technical, economic, legal, operational, and schedule feasibility of a project. Question 6 options: A) True B) False

A) True

In a typical computer configuration, secondary storage has a much larger capacity than the volatile random access memory. A) True B) False

A) True


Related study sets

The Road study guide sections 1-5

View Set

YTT 200 - Final Exam - Primary Series Postures (Visuals)

View Set

Food Allergies and Implication to Patient Safety

View Set

Business Computer Applications Midterm Exam Review

View Set