MIS Midterm – Flashcards
Unlock all answers in this set
Unlock answersquestion
Which of the following statements is true about the quality of information?
answer
Information should be just barely sufficient for its purpose.
question
Which of the following components of an information system is the easiest to change and results in the least amount of organizational disruption?
answer
hardware
question
According to the five-component model of information systems, the ________ component provides instructions for the people who use information systems.
answer
procedure
question
Which of the following is a major implication of Moore's Law?
answer
Costs of communications and storage have become very low.
question
________ refers to making a reasoned analysis of an opportunity, envisioning potential solutions, evaluating those possibilities, and developing the most promising ones, consistent with the resources one has.
answer
Experimentation
question
Which of the following statements is true of information technology (IT)?
answer
Information technology (IT) refers to the products, methods, inventions, and standards that are used for the purpose of producing information.
question
Which of the following is considered information rather than mere data?
answer
the return on investment of an advertising campaign
question
Mark follows certain steps to access the supplementary readings for a course when using his organization's library management system. These steps that he follows are examples of the ________ component of an information system.
answer
procedure
question
The ________ component of the five-component framework of an information system includes individuals who maintain the data and support the networks of computers.
answer
people
question
Which of the following is a critical characteristic of good information?
answer
accuracy
question
Which of the following is a primary activity in the value chain?
answer
receiving and distributing inputs to the product
question
Locking in customers by making it difficult or expensive for customers to move to another product is called establishing high ________.
answer
switching costs
question
Which of the following is a support activity in the value chain of a firm?
answer
setting up contractual arrangements for procurement
question
Porter's five forces model is used to assess ________.
answer
industry structure
question
Which of the following statements is true of business process designs?
answer
Most process designs require people to work in new ways.
question
The automobile industry is characterized by many manufacturers and intense competition among them. According to Porter's five forces model, this statement illustrates ________.
answer
high levels of rivalry
question
Which of the following principles of competitive advantage is related to process implementations?
answer
locking in suppliers
question
Which of the following principles of competitive advantage is associated with product implementations?
answer
differentiating service offerings
question
According to Porter's five forces model, which of the following would be most affected by the threat of substitutes?
answer
Southwest Airlines
question
Which of the following statements is consistent with the central idea of business process design?
answer
Organizations should create new business processes rather than improve existing systems.
question
Organizational feasibility assesses ________.
answer
whether the new system fits within the organization's customs or legal requirements
question
A ________ shows the tasks, dates, and dependencies for the tasks of a project.
answer
Gantt chart
question
Which of the following are the four dimensions of feasibility?
answer
cost, schedule, technical, and organizational feasibility
question
The traditional process for developing information systems is ________.
answer
the systems development life cycle
question
Which of the following statements is true of the swim-lane layout used for modeling the business processes?
answer
It draws attention to the interactions among components of the diagram.
question
In a Business Process Modeling Notation (BPMN) diagram, ________ depict the flow or sequence of activities in a process.
answer
solid arrows
question
A ________ involves balancing three critical factors: requirements, cost, and time.
answer
trade-off
question
In business process management (BPM), an as-is model ________.
answer
documents the existing business process
question
The situation where addition of resources creates inefficiencies is known as ________.
answer
diseconomies of scale
question
Which of the following statements is true about the relationship between business processes and information systems?
answer
A business process need not relate to any information system, but an information system relates to at least one business process.
question
Which of the following is an international standard language for processing a database?
answer
SQL
question
In an E-R diagram, a line between two entities represents a(n) ________.
answer
relationship
question
In an E-R diagram, a(n) ________ on a line means that at least one entity of that type is required.
answer
vertical bar
question
A ________ describes the data and relationships that will be stored in a database.
answer
data model
question
Which of the following refers to the problem that exists in database applications when two users modify the same data item, but only one of those changes is recorded?
answer
lost-update problem
question
Entities in a data model have ________ that describe the characteristics of the entity.
answer
attributes
question
________ is the process of converting a poorly-structured table into two or more well-structured tables.
answer
Normalization
question
A(n) ________ is a request for data from a database.
answer
query
question
The columns in a database are called ________.
answer
fields
question
Each entity in a database has a unique attribute called a(n) ________.
answer
identifier
question
Virtualization is the process by which ________.
answer
one computer hosts the appearance of many computers
question
Linux is an example of a(n) ________.
answer
open source operating system software
question
Which of the following memory devices is volatile in nature?
answer
cache
question
A client-server application that requires nothing more than a browser is called a(n) ________.
answer
thin-client application
question
The ________ is sometimes called "the brain" of the computer.
answer
central processing unit
question
A thin-client application is designed to run within a program such as ________.
answer
Microsoft Internet Explorer
question
________ is installed in special, read-only memory in devices like printers, print servers, or various types of communication devices.
answer
Firmware
question
Thin-client applications are typically limited by the capabilities of the ________.
answer
browser
question
Which of the following statements is true of firmware?
answer
Users do not need to load firmware into the device's memory.
question
Which of the following terms refers to a collection of servers?
answer
server farm
question
Which of the following is a characteristic of in-house hosting?
answer
in-depth visibility of disaster preparedness
question
A private internet that is used exclusively within an organization is called a(n) ________.
answer
intranet
question
A(n) ________ is a number that identifies a particular device.
answer
IP address
question
A(n) ________ uses the Internet to create the appearance of private, secure connections.
answer
VPN
question
Which of the following TCP/IP application-layer protocols is used for email transmissions?
answer
smtp
question
The protocols used on the Internet are arranged according to a structure known as the ________ protocol architecture.
answer
TCP/IP
question
Which of the following characteristics is a disadvantage of in-house hosting?
answer
cost uncertainties
question
A ________ is a set of rules that programs on two communicating devices follow.
answer
protocol
question
Which of the following is a function of an ISP?
answer
It serves as a gateway to the Internet.
question
Which of the following protocols guarantees secure data transmission?
answer
https