ISBC ch1 – Flashcards
Unlock all answers in this set
Unlock answersquestion
The number of transistors per square inch on an integrated chip doubles every 18 months." This observation is known as ________ Law.
A) Murphy's
B) Moore's
C) Amdahl's
D) Metcalfe's
answer
Moore's
question
Which of the following statements states Moore's Law?
A) A computer becomes obsolete within 18 months.
B) The number of transistors per square inch on an integrated chip doubles every 18 months.
C) The total number of transistors produced in the world doubles every 18 months.
D) The speed of a computer doubles every 18 months.
answer
The number of transistors per square inch on an integrated chip doubles every 18 months
question
As a result of Moore's Law, ________.
A) the risk of technology becoming obsolete has decreased
B) the price to performance ratio of computers has fallen dramatically
C) nonroutine skills can be outsourced
D) the cost of data processing has increased considerably
answer
The price to performance ratio of computers has fallen dramatically
question
Because of Moore's Law, the cost of data processing, communications, and storage ________.
A) is essentially zero
B) has increased exponentially
C) is witnessing an upward trend
D) has leveled off
answer
Is essentially zero
question
Because the cost of data processing, storage, and communications is essentially zero, any routine skill can and will be ________.
A) considered a nonroutine cognitive skill
B) a strong marketable skill
C) outsourced to the lowest bidder
D) sufficient to attain job security
answer
Outsourced to the lowest bidder
question
Which of the following is an impact of rapid technological change on job security?
A) Routine skills are more in demand.
B) Nonroutine cognitive skills gain more market value.
C) Nonroutine jobs are outsourced, thus reducing the need of an in-house workforce.
D) Routine skills are no longer required to complete a task.
answer
Nonroutine cognitive skills gain more market value
question
Which of the following is true of nonroutine cognitive skills?
A) They have become less marketable.
B) They increase an individual's job security.
C) Technological changes have no impact on such skills.
D) Organizations usually outsource such skills to the lowest bidder.
answer
They increase an individual's job security
question
________ is the ability to make and manipulate models.
A) Abstract reasoning
B) Systems thinking
C) Social learning
D) Experimentation
answer
Abstract reasoning
question
________ is the ability to model the components of a unit, to connect the inputs and outputs among those components into a sensible whole that reflects the structure and dynamics of the phenomenon observed.
A) Systems thinking
B) Abstract reasoning
C) Cognitive reasoning
D) Experimentation
answer
Systems thinking
question
________ is the activity of two or more people working together to achieve a common goal, result, or work product.
A) Venturing
B) Enterprising
C) Collaboration
D) Assimilation
answer
Collaboration
question
In a job interview, Lillian is asked to be part of a three-member group and design a mock business process based on the strengths and skills of the group's members. In this case, which of the following skills is the interviewer trying to test?
A) collaboration
B) abstract reasoning
C) systems thinking
D) ability to experiment
answer
Collaboration
question
Patricia is the marketing manager at a manufacturing firm. She plans new marketing strategies with the help of her subordinates, by providing and receiving critical feedback. Here, Patricia is displaying effective ________.
A) collaboration
B) experimentation
C) systems thinking
D) abstraction
answer
Collaboration
question
Which of the following is necessary for effective collaboration?
A) being nice to other individuals
B) focusing on individual goals
C) working individually on different projects
D) giving and receiving critical feedback
answer
Giving and receving critical feedback
question
________ is making a reasoned analysis of an opportunity, envisioning potential solutions, evaluating those possibilities, and developing the most promising ones, consistent with the resources you have.
A) Experimentation
B) Abstraction
C) Systems thinking
D) Collaboration
answer
Experimentation
question
Marketing managers planning to use new social networking technologies to strengthen their market presence are portraying their ________.
A) ability to experiment
B) systems thinking skills
C) abstract reasoning skills
D) collaboration skills
answer
Ability to experiment
question
In a job interview, Roy is asked to use a product that he has never used before and is not familiar with. Which of the following skills is the interviewer trying to test?
A) systems thinking
B) abstract reasoning
C) collaboration
D) ability to experiment
answer
Ability to experiment
question
A group of components that interact to achieve some purpose is referred to as a(n) ________.
A) system
B) element
C) process
D) entity
answer
System
question
Which of the following is an example of the hardware component of an information system?
A) Web browser
B) operating system
C) microprocessor
D) data file
answer
Microprocessor
question
The five-component framework of an information system consists of computer hardware, software, data, people, and ________.
A) bugs
B) procedures
C) device drivers
D) tools
answer
Procedures
question
In a grocery store, the clerk scans the UPC code on an item, which is transmitted to the computer. The scanner device is an example of the ________ component of an IS.
A) hardware
B) software
C) data
D) procedure
answer
Hardware
question
Which of the following is true about the management and use of information systems?
A) An employee must be a programmer to manage information systems.
B) Information systems must be adapted to changing requirements.
C) Information systems need not be maintained after development.
D) Organizations with dynamic business environments do not use information systems.
answer
Information systems must be adapted to changing requirements
question
Why is it important for business professionals to take an active role in developing and managing information systems?
A) They know how to create a database and configure computers.
B) They are the people who know how to build networks.
C) They know whether a system is sufficient to meet needs and requirements.
D) They are the lone users of information systems.
answer
They know whether a system is sufficient to meet needs and requirements
question
Which of the following is a critical responsibility for business professionals in using information systems?
A) protecting the security of the system and its data
B) reprogramming the system to meet changing needs
C) creating and modifying the system's databases
D) building and configuring additional networks
answer
Protecting the security of the system and its data
question
Which of the following is a valid reason for a company to create a new information system?
A) to project a modern image
B) to avoid falling behind the technology curve
C) to help employees achieve the strategies of the business
D) to show its social networking presence on the Web
answer
To help employees achieve the strategies of the business
question
Which of the following is the most complete and accurate definition of information technology?
A) the products, methods, inventions, and standards that are used to produce information
B) an assembly of hardware, software, data, procedures, and people that produces information
C) systems that are used to process the information that is produced using technology
D) the various data models and software that are used to interpret available information
answer
The products, methods, inventions, and standards that are used to produce information
question
Which of the following is true about information systems?
A) They can be bought off the shelf.
B) They are an assembly of information technology.
C) They are the same as information technology.
D) They are not susceptible to changing needs.
answer
They are an assembly of information technology
question
Which of the following distinguishes information systems from information technology?
A) people
B) data
C) software
D) hardware
answer
People
question
Security systems ultimately depend on the behavior of its ________.
A) users
B) hardware
C) software
D) data
answer
Users
question
Which of the following requirements should a password fulfill in order to be considered strong?
A) It should have five characters at the most.
B) It should contain a complete dictionary word.
C) It should not contain many special characters.
D) It should not contain your user name or company name.
answer
It should not contain your user name or company name
question
You have created a password that meets all the criteria for a strong password. What is a potential drawback of such a password?
A) It will be difficult to remember.
B) It will be very short.
C) It can be easily guessed.
D) It will create IP address conflicts in networks.
answer
It will be difficult to remember
question
Which of the following characteristics would weaken a password?
A) containing a complete dictionary word
B) containing both upper- and lowercase letters
C) containing the numbers 9 and 3
D) containing three special characters
answer
Containing a complete dictionary word
question
Which of the following is the weakest password?
A) B33rmu9
B) Qw37^T1bb?as
C) 3B47qq<3>5!7bdE
D) As60$T1dd?dc
answer
B33rmu9
question
Which of the following is considered a strong password?
A) sword123
B) RileyyeliR
C) paranoid4EVER
D) [email protected]
answer
question
Which of the following techniques is best suited for creating memorable, strong passwords?
A) use at least one dictionary word in the password
B) use numbers instead of special characters
C) base passwords on the first letter of the words in a phrase
D) create a password that is related to your name or company name
answer
Base passwords on the first letter of the words in a phrase
question
In order to protect your password, you should never ________.
A) use it more than three times in one day
B) write it down
C) use virtual keyboards to enter it
D) create one that contains multiple special characters
answer
Write it down
question
Which of the following statements on password etiquette is true?
A) If someone asks for your password, do not just give it out.
B) Always back up your password by writing it down.
C) Never access an information system from a computer that is connected to the Internet.
D) Never use the password more than three times in one day.
answer
If someone asks for your password, do not just give it out
question
In a situation where someone needs to log into your account to solve a problem and asks for your password, ________.
A) refuse to provide the password
B) enter your password yourself
C) say it out loud
D) provide the password through an email
answer
Enter your password yourself
question
Moore's Law states that the speed of a computer doubles every 18 months.
answer
False
question
Future business professionals need to be able to apply information technology to business
answer
True
question
The number of businesses adopting new technologies has seen a downfall over the years
answer
False
question
The knowledge to manage information systems can lead to greater job security
answer
True
question
Increased outsourcing has made nonroutine skills less marketable
answer
False
question
A marketable skill has no impact on job security
answer
False
question
Routine skills are outsourced because the cost of data communication is essentially zero
answer
True
question
Strong nonroutine cognitive skills are more in demand than routine skills
answer
True
question
Abstract reasoning is the ability to make and manipulate models
answer
True
question
Critical feedback undermines collaboration
answer
False
question
Effective collaboration is all about being nice to your team members
answer
False
question
When business was stable, professionals avoided experimenting in fear of failure
answer
True
question
Experimentation only increases the fear of failure
answer
False
question
If you are provided with an unfamiliar program and are asked to use it, you are being tested on your ability to effectively collaborate
answer
False
question
An information system is a group of components that interact to produce information
answer
True
question
The methods used to start a program and save a file are referred to as procedures
answer
True
question
Building information systems requires many different skills besides those of programmers
answer
True
question
Information systems are restricted to the field of information technilogy
answer
False
question
Businesses themselves use information systems to achieve their strategies
answer
False
question
Information systems should be developed only if they help achieve business strategies
answer
True
question
Information systems and information technology are not the same
answer
True
question
Information systems can be bought whereas information technology cannot
answer
False
question
Strong passwords have a maximum of five characters
answer
False
question
Good passwords contain a complete dictionary word
answer
False
question
If your password is complex, it is ideal to write the password on a piece of paper and keep it near your workstation
answer
False
question
Moving away to let another person enter his or her password is common and acceptable
answer
True
question
If someone asks you for your password, do not share it with them
answer
True