Using MIS Final Study – Flashcards

232 test answers

Unlock all answers in this set

Unlock answers 232
question
1) Which of the following statements is true of information systems?
answer
B) Every information system has at least one application.
question
2) Which of the following statements is true about the relationship between business processes and information systems?
answer
A) A business process need not relate to any information system, but an information system relates to at least one business process.
question
3) A ________ is a person who is well versed in an organization's strategy and focuses on ensuring that business processes and information systems meet the organization's competitive strategies.
answer
A) business analyst
question
4) ________ are IS professionals who understand both business and information technology.
answer
B) Systems analysts
question
5) A ________ is a network of activities, repositories, roles, resources, and flows that interact to accomplish a business function.
answer
C) business process
Unlock the answer
question
6) In a business process, ________ are defined as collections of related tasks that receive inputs and produce outputs.
answer
A) activities
Unlock the answer
question
7) In a business process, an inventory or a database is an example of a ________.
answer
B) repository
Unlock the answer
question
8) In a business process, a role refers to ________.
answer
D) a collection of activities
Unlock the answer
question
9) In a business process, resources are ________.
answer
A) people or computer applications that are assigned to roles
Unlock the answer
question
10) In business process management (BPM), an as-is model ________.
answer
A) documents the existing business process
Unlock the answer
question
11) In business process management (BPM), once the as-is model is created, the very next step that a team must take is to ________.
answer
C) look for improvement opportunities
Unlock the answer
question
12) Which of the following are the steps in the business process management (BPM) cycle?
answer
D) model processes; create components; implement processes; assess results
Unlock the answer
question
13) Control Objectives for Information and related Technology (COBIT) is often used in the ________ stage of the business process management (BPM) cycle.
answer
C) assessment
Unlock the answer
question
14) ________ set the stage for the requirements for any information systems and applications that need to be created or adapted.
answer
D) Business process models
Unlock the answer
question
15) Which of the following can be represented using the Business Process Modeling Notation?
answer
B) as-is models
Unlock the answer
question
16) ________ is a standard set of terms and graphical notations for documenting business processes.
answer
A) Business Process Modeling Notation
Unlock the answer
question
17) Which of the following statements is true of the swim-lane layout used for modeling the business processes?
answer
B) It draws attention to the interactions among components of the diagram.
Unlock the answer
question
18) In a Business Process Modeling Notation (BPMN) diagram, a ________ symbol represents an activity.
answer
B) rectangle
Unlock the answer
question
19) In a Business Process Modeling Notation (BPMN) diagram, ________ represent decisions and usually contain a question that is answered with yes or no.
answer
A) diamonds
Unlock the answer
question
20) In a Business Process Modeling Notation (BPMN) diagram, dotted arrows depict the flow of ________ in the process.
answer
B) messages and data
Unlock the answer
question
21) In a Business Process Modeling Notation (BPMN) diagram, ________ depict the flow or sequence of activities in a process.
answer
C) solid arrows
Unlock the answer
question
22) In Business Process Modeling Notation (BPMN) diagrams, a square with a plus sign means that ________.
answer
D) an activity is considered to be a subprocess of a process
Unlock the answer
question
23) The traditional process for developing information systems is ________.
answer
B) the systems development life cycle
Unlock the answer
question
24) The first phase of the systems development life cycle (SDLC) is ________.
answer
A) defining the system
Unlock the answer
question
25) The final phase of the systems development life cycle (SDLC) is ________.
answer
C) maintaining the system
Unlock the answer
question
26) The project plan which results from defining the system is the input to ________, which is the second phase of the SDLC.
answer
C) requirements analysis
Unlock the answer
question
27) The first step in the system definition phase of the systems development life cycle (SDLC) is to ________.
answer
C) determine the goals and scope
Unlock the answer
question
28) Once the project's goals and scope have been defined, the next immediate step in the system definition phase of the SDLC is to ________.
answer
B) assess feasibility
Unlock the answer
question
29) Which of the following are the four dimensions of feasibility?
answer
C) cost, schedule, technical, and organizational feasibility
Unlock the answer
question
30) Organizational feasibility assesses ________.
answer
D) whether the new system fits within the organization's customs or legal requirements
Unlock the answer
question
31) If a defined project is determined to be feasible in the SDLC, the next immediate step is to ________.
answer
B) form the project team
Unlock the answer
question
32) During the requirements definition stage of developing an information system, the project team will consist mostly of ________.
answer
C) business and systems analysts
Unlock the answer
question
33) In the system definition phase of the SDLC, the first major task for an assembled project team is to ________.
answer
C) plan the project
Unlock the answer
question
34) Which of the following phases of the SDLC include identifying what is to be produced, how frequently, and how fast it is to be produced?
answer
A) requirements analysis
Unlock the answer
question
35) The ________ phase of the SDLC involves determining hardware and program specifications, designing the database and procedures, and creating job definitions.
answer
C) component design
Unlock the answer
question
36) Tasks in the ________ phase of the SDLC include building and testing system components and converting users to the new system.
answer
D) system implementation
Unlock the answer
question
37) A(n) ________ is a formal description of a system's response to use and misuse scenarios.
answer
C) test plan
Unlock the answer
question
38) During the system implementation phase of the SDLC, once a system has passed testing, the organization installs the new system. Which of the following terms is used to refer to this activity?
answer
B) system conversion
Unlock the answer
question
39) In the system implementation phase of the SDLC, with ________ installation, the organization implements the entire new system/business processes on a limited portion of the business.
answer
C) pilot
Unlock the answer
question
40) In the system implementation phase of the SDLC, with ________ installation, the new system runs alongside the old one until it has been tested and is fully operational.
answer
C) parallel
Unlock the answer
question
41) In the context of system implementation phase of the SDLC, a ________ installation is the riskiest because the old system is shut down and the new system is introduced.
answer
D) plunge
Unlock the answer
question
42) In the system implementation phase of the SDLC, with the ________ installation, the organization installs the next piece of the system only after the previous piece works.
answer
A) phased
Unlock the answer
question
43) Fixing a system so that it works correctly, or adapting it to changes in requirements, occurs during the ________ phase of the SDLC.
answer
B) maintenance
Unlock the answer
question
44) In systems development, documents, designs, prototypes, data models, database designs, and working data entry screens are examples of ________.
answer
D) deliverables
Unlock the answer
question
45) Project teams create a ________, which is a hierarchy of the tasks required to complete a project.
answer
B) work breakdown structure
Unlock the answer
question
46) A ________ shows the tasks, dates, and dependencies for the tasks of a project.
answer
B) Gantt chart
Unlock the answer
question
47) A ________ is a sequence of activities that determine the earliest date by which a project can be completed.
answer
C) critical path
Unlock the answer
question
48) A ________ involves balancing three critical factors: requirements, cost, and time.
answer
B) trade-off
Unlock the answer
question
49) According to Brooks' Law, adding more people to a late project will ________.
answer
C) create diseconomies of scale
Unlock the answer
question
50) The situation where addition of resources creates inefficiencies is known as ________.
answer
A) diseconomies of scale
Unlock the answer
question
51) The final work breakdown structure (WBS) plan shows planned tasks, dependencies, durations, and resource assignments. It is denoted as ________ WBS.
answer
B) baseline
Unlock the answer
question
52) The term ________ refers to a set of management policies, practices, and tools that developers use to maintain control over the SDLC project's resources.
answer
D) configuration control
Unlock the answer
question
53) The SDLC process follows a linear sequence from requirements to design to implementation. Therefore, the SDLC process is also known as the ________.
answer
A) waterfall method
Unlock the answer
question
54) Rapid application development, the unified process, extreme programming, and scrum have led to ________.
answer
C) agile development
Unlock the answer
question
55) Which of the following is true of paired programming?
answer
D) two team members share the same computer to write a computer program together
Unlock the answer
question
56) According to the scrum process, once the tasks are known for a given set of requirements, the next step is to assign each task a difficulty score, called ________.
answer
B) points
Unlock the answer
question
57) The total number of points of work a team can accomplish in each scrum period is called ________.
answer
C) velocity
Unlock the answer
question
1) Developing, operating, and maintaining an organization's computing infrastructure is a major function of the ________ department.
answer
B) information systems
Unlock the answer
question
2) Which of the following statements is true of an IS department?
answer
C) The operations group monitors user experience and responds to user problems.
Unlock the answer
question
3) If an organization runs an information system that provides little support to accounting, it's chief information officer will most likely report to the ________.
answer
B) chief executive officer
Unlock the answer
question
4) Which of the following is a responsibility of a CIO?
answer
A) reporting to the chief executive officer
Unlock the answer
question
5) Which of the following is a function of the technology office in an organization's IS department?
answer
C) investigating new information systems
Unlock the answer
question
6) In an IS department, the ________ group manages computing infrastructure, including individual computers, in-house server farms, networks, and communications media.
answer
A) operations
Unlock the answer
question
7) Which of the following statements is true of the operations group in an organization's IS department?
answer
B) It monitors the user experience and responds to their problems.
Unlock the answer
question
8) Which of the following statements is true about the "maintenance" of information systems?
answer
C) It involves adapting existing systems to support new features.
Unlock the answer
question
9) In the IS department, the ________ group manages the process of creating new information systems as well as maintaining existing information systems.
answer
C) development
Unlock the answer
question
10) If an organization does not develop programs in-house, then the development group of the IS department will be staffed primarily by ________ who work with users, operations, and vendors to acquire and install licensed software and to set up the system components around that software.
answer
C) business and systems analysts
Unlock the answer
question
11) The purpose of the ________ group is to protect data and information assets by establishing data standards and data management practices and policies.
answer
A) data administration
Unlock the answer
question
12) A ________ works with users to determine system requirements, designs and develops job descriptions and procedures, and helps determine test plans.
answer
A) system analyst
Unlock the answer
question
13) A ________ prepares program documentation, help-text, procedures, job descriptions, and training materials.
answer
D) technical writer
Unlock the answer
question
14) The responsibilities of a computer technician include ________.
answer
A) installing software and repairing networks
Unlock the answer
question
15) The responsibilities of a ________ include advising the chief information officer, executive group, and project managers on emerging technologies.
answer
D) chief technology officer
Unlock the answer
question
16) Which of the following statements is true about data administration?
answer
B) It establishes standards to protect information assets.
Unlock the answer
question
17) Which of the following is a limitation of aligning information systems with organizational strategy?
answer
A) Adapting the IS to new versions of business processes is complex and time-consuming.
Unlock the answer
question
18) The ________ is the representative for IS and IT issues within the executive staff who provides the IS perspective during discussions of problem solutions, proposals, and new initiatives.
answer
C) chief information officer
Unlock the answer
question
19) A(n) ________ is a group of senior managers from the major business functions that works with the CIO to set IS priorities and decide among major IS projects and alternatives.
answer
A) steering committee
Unlock the answer
question
20) Which of the following is a function of the steering committee for an IS department?
answer
D) setting IS priorities
Unlock the answer
question
21) Which of the following statements is true about the steering committee of an IS department?
answer
D) The steering committee's meetings are conducted by the IS department.
Unlock the answer
question
22) Which of the following statements is true about IS planning functions?
answer
D) The CEO and other executive staff decide the membership of the steering committee.
Unlock the answer
question
23) ________ is the process of hiring another organization to perform a service.
answer
B) Outsourcing
Unlock the answer
question
24) One of the reasons outsourcing is undertaken is to ________.
answer
C) cap an organization's financial exposure
Unlock the answer
question
25) Which of the following statements is true about outsourcing?
answer
B) It saves both direct and indirect management time.
Unlock the answer
question
26) An outsource vendor changes its strategic direction. Under which of the following outsourcing risks can this be associated?
answer
D) loss of control
Unlock the answer
question
27) Which of the following statements is a characteristic of outsourcing?
answer
C) To achieve quality, it is easier to hire another vendor than it is to rehire internal staff.
Unlock the answer
question
28) ________ is a form of outsourcing.
answer
C) Acquiring licensed software
Unlock the answer
question
29) Which of the following is a form of outsourcing hardware infrastructure exclusively?
answer
B) IaaS cloud hosting
Unlock the answer
question
30) Which of the following is an outsourcing alternative in which hardware and both operating system and application software are leased?
answer
C) Software as a Service (SaaS)
Unlock the answer
question
31) Which of the following is an example of outsourcing an entire business function?
answer
C) outsourcing the function of arranging employee travel
Unlock the answer
question
32) In 2005, Marrion International chose a human resources consulting agency to handle its human resource needs for the next 7 years. This is an example of ________ outsourcing.
answer
C) business function
Unlock the answer
question
33) When a company outsources a system, control over prioritizing fixes for software failures and problems belongs to the ________.
answer
B) quality vendor
Unlock the answer
question
34) Which of the following is a risk of outsourcing IS/IT functions?
answer
C) It involves the potential loss of intellectual capital.
Unlock the answer
question
35) Every IS user has a right to a secure computing environment. This means that ________.
answer
A) the organization should protect his/her computer and its files
Unlock the answer
question
36) Which of the following is a right of users of information systems?
answer
C) receiving effective training
Unlock the answer
question
37) Which of the following is generally a responsibility of users of information systems?
answer
D) following security and backup procedures
Unlock the answer
question
38) Which of the following statements is true about users of information systems?
answer
C) They should learn standard techniques and procedures for the applications they use.
Unlock the answer
question
39) Users should not bother IS personnel for trivial issues, instead they should fulfill their responsibilities by ________.
answer
A) learning basic computer skills
Unlock the answer
question
40) Which of the following statements is true about the changes and developments foreseen by the year 2024?
answer
B) Most organizations will move their internal hardware infrastructure into the cloud.
Unlock the answer
question
1) A ________ is a person or an organization that seeks to obtain or alter data or other IS assets illegally, without the owner's permission and often without the owner's knowledge.
answer
C) threat
Unlock the answer
question
2) Which of the following is considered a threat caused by human error?
answer
A) an employee inadvertently installs an old database on top of the current one
Unlock the answer
question
3) Which of the following is considered a computer crime?
answer
D) hacking of information systems
Unlock the answer
question
4) ________ occurs when someone deceives by pretending to be someone else.
answer
D) Pretexting
Unlock the answer
question
5) When referring to security threats, pretexting, sniffing, spoofing, and phishing are all examples of ________.
answer
A) unauthorized data disclosure
Unlock the answer
question
6) A ________ pretends to be a legitimate company and sends an email requesting confidential data, such as account numbers, Social Security numbers, account passwords, and so forth.
answer
B) phisher
Unlock the answer
question
7) Email spoofing is a synonym for ________.
answer
B) phishing
Unlock the answer
question
8) ________ is a technique for intercepting computer communications, either through a physical connection to a network or without a physical connection in the case of wireless networks.
answer
C) Sniffing
Unlock the answer
question
9) ________ take computers with wireless connections through an area and search for unprotected wireless networks and then monitor and intercept wireless traffic at will.
answer
C) Drive-by sniffers
Unlock the answer
question
10) Which of the following is an example of a sniffing technique?
answer
D) adware
Unlock the answer
question
11) ________ occurs when a person breaks into a network to steal data such as customer lists, product inventory data, employee data, and other proprietary and confidential data.
answer
C) Hacking
Unlock the answer
question
12) Which of the following is most likely to be a result of hacking?
answer
C) an unauthorized transaction from a user's credit card
Unlock the answer
question
13) ________ occurs through human error when employees do not follow proper procedures or when procedures have not been well designed.
answer
B) Incorrect data modification
Unlock the answer
question
14) ________ is the type of security loss that involves computer criminals invading a computer system and replacing legitimate programs with their own unauthorized ones that shut down legitimate applications and substitute their own processing to spy, steal, and manipulate data.
answer
D) Usurpation
Unlock the answer
question
15) Which of the following usually happens in a malicious denial-of-service attack?
answer
B) a hacker floods a Web server with millions of bogus service requests
Unlock the answer
question
16) ________ present the largest risk for an organization's infrastructure loss.
answer
B) Natural disasters
Unlock the answer
question
17) Which of the following statements is true about losses due to computer security threats?
answer
B) Some organizations don't report all their computer crime losses, and some won't report such losses at all.
Unlock the answer
question
18) A(n) ________ is a computer program that senses when another computer is attempting to scan the disk or otherwise access a computer.
answer
A) intrusion detection system
Unlock the answer
question
19) Nonword passwords are vulnerable to a ________ attack, in which the password cracker tries every possible combination of characters.
answer
C) brute force
Unlock the answer
question
20) ________ are small files that the browser stores on the user's computer when he/she visits Web sites and enables him/her to access Web sites without having to sign in every time.
answer
A) Cookies
Unlock the answer
question
21) Removing and disabling ________, which may contain sensitive security data, presents an excellent example of the trade-off between improved security and cost.
answer
C) cookies
Unlock the answer
question
22) Which of the following is a critical security function that the senior management should address in an organization?
answer
C) establishing the security policy
Unlock the answer
question
23) In information security, which of the following is true of managing risk?
answer
B) Organizations should implement safeguards that balance the trade-off between risk and cost.
Unlock the answer
question
24) Which of the following was passed to give individuals the right to access their own health data created by doctors and other healthcare providers?
answer
C) the HIPAA of 1996
Unlock the answer
question
25) Which of the following is classified as a technical safeguard?
answer
B) firewalls
Unlock the answer
question
26) A(n) ________ has a microchip in it to hold data.
answer
B) smart card
Unlock the answer
question
27) Users of smart cards are required to enter a ________ to be authenticated.
answer
C) personal identification number
Unlock the answer
question
28) Which of the following is used for biometric authentication?
answer
B) facial features
Unlock the answer
question
29) Which of the following statements is true of biometric identification?
answer
D) It often faces resistance from users for its invasive nature.
Unlock the answer
question
30) A ________ is a number used to encrypt data.
answer
A) key
Unlock the answer
question
31) In asymmetric encryption, each site has a ________ for encoding messages.
answer
C) public key
Unlock the answer
question
32) With ________, the sender and receiver transmit a message using different keys.
answer
A) asymmetric encryption
Unlock the answer
question
33) Secure Socket Layer is also known as ________.
answer
B) transport layer security
Unlock the answer
question
34) Which of the following statements is true of the Secure Socket Layer (SSL)?
answer
B) It is used to send sensitive data such as credit card numbers.
Unlock the answer
question
35) Mark is transferring funds online through the Web site of a reputed bank. Which of the following will be displayed in the address bar of his browser that will let him know that the bank is using the SSL protocol?
answer
C) https
Unlock the answer
question
36) A ________ examines each part of a message and determines whether to let that part pass.
answer
A) packet-filtering firewall
Unlock the answer
question
37) Packet-filtering firewalls ________.
answer
A) can filter both inbound and outbound traffic
Unlock the answer
question
38) ________ is the term used to denote viruses, worms, and Trojan horses.
answer
A) Malware
Unlock the answer
question
39) A virus is a computer program that replicates itself. The program code that causes unwanted activity is called the ________.
answer
A) payload
Unlock the answer
question
40) ________ are viruses that masquerade as useful programs or files.
answer
C) Trojan horses
Unlock the answer
question
41) A ________ is a type of virus that propagates using the Internet or other computer networks.
answer
A) worm
Unlock the answer
question
42) ________ is similar to spyware but it watches user activity and produces pop-ups.
answer
B) Adware
Unlock the answer
question
43) Which of the following is likely to be accepted by a poorly designed application, leading to improper disclosure of data?
answer
D) SQL injection
Unlock the answer
question
44) ________ refers to an organization-wide function that is in charge of developing data policies and enforcing data standards.
answer
A) Data administration
Unlock the answer
question
45) ________ is a function pertaining to a particular database that develops procedures and practices to control and protect the database.
answer
B) Database administration
Unlock the answer
question
46) Which of the following statements is true of data administration?
answer
D) It is involved in establishing data safeguards.
Unlock the answer
question
47) Key escrow is a(n) ________.
answer
B) safety procedure that allows a trusted party to have a copy of the encryption key
Unlock the answer
question
48) ________ protect databases and other organizational data.
answer
C) Data safeguards
Unlock the answer
question
49) The computers that run the DBMS and all devices that store database data should reside in locked, controlled-access facilities. This is done to ________.
answer
D) provide physical security
Unlock the answer
question
50) Which of the following statements is true with regard to human safeguards?
answer
C) Documenting position sensitivity enables security personnel to prioritize their activities based on possible risk.
Unlock the answer
question
51) ________ involve the people and procedure components of information systems.
answer
C) Human safeguards
Unlock the answer
question
52) Which of the following statements is true about human safeguards for employees?
answer
B) User accounts should be defined to give users the least possible privilege necessary to perform their jobs.
Unlock the answer
question
53) When an employee is terminated, IS administrators should receive advance notice so that they can ________.
answer
D) remove the user account and password
Unlock the answer
question
54) ________ a Web site means to take extraordinary measures to reduce a system's vulnerability, using special versions of the operating system.
answer
B) Hardening
Unlock the answer
question
55) The process of hardening a Web site is a ________ safeguard.
answer
C) technical
Unlock the answer
question
56) ________ are the primary means of authentication and are important not just for access to a user's computer, but also for authentication to other networks and servers to which the user may have access.
answer
C) Passwords
Unlock the answer
question
57) Which of the following systems procedures is specifically the responsibility of operations personnel?
answer
C) creating back up of system databases
Unlock the answer
question
58) ________ involves accomplishing job tasks during failure.
answer
D) Recovery
Unlock the answer
question
59) Firewalls produce ________ which include lists of all dropped packets, infiltration attempts, and unauthorized access attempts from within the firewall.
answer
C) activity logs
Unlock the answer
question
60) ________ are false targets for computer criminals to attack.
answer
Honeypots
Unlock the answer
question
1. Which of the following principles of competitive advantage is associated with product implementations?
answer
B) differentiating service offerings
Unlock the answer
question
1. According to Hackman's three criteria for team success, which of the following IS requirements will be categorized under the meaningful and satisfying experience criterion?
answer
B) rewarding accomplishment
Unlock the answer
question
1. Which of the following statements is true of business process designs?
answer
A) Most process designs require people to work in new ways.
Unlock the answer
question
1. Which of the following is considered information rather than mere data?
answer
B) the return on investment of an advertising campaign
Unlock the answer
question
1. Identify the activity in the value chain that involves receiving and handling of raw materials and other inputs to the product.
answer
A) inbound logistics
Unlock the answer
question
1. ________ decisions are decisions that support day-to-day activities.
answer
A) Operational
Unlock the answer
question
1. Which of the following is a component of an information system, but not of information technology?
answer
C) people
Unlock the answer
question
1. ________ refers to making a reasoned analysis of an opportunity, envisioning potential solutions, evaluating those possibilities, and developing the most promising ones, consistent with the resources one has.
answer
D) Experimentation
Unlock the answer
question
1. ________ is the activity of two or more people working together to achieve a common goal, result, or work product.
answer
C) Collaboration
Unlock the answer
question
1. According to Porter's five forces model, a group of grain farmers in a surplus year will have reduced ________.
answer
A) bargaining power
Unlock the answer
question
1. Which of the following is a critical characteristic of good information?
answer
B) accuracy
Unlock the answer
question
1. The ________ component of the five-component framework of an information system includes individuals who maintain the data and support the networks of computers.
answer
B) people
Unlock the answer
question
1. One of the procedures of a collaboration project is documenting and reporting progress. This is performed in the ________ phase of the project.
answer
C) doing
Unlock the answer
question
1. Lynn, the manager of a transportation company, is goes through the week's delivery schedule. She calls her team and assigns territories for each executive. She contacts the fleet supervisor to arrange trucks for transportation. Which activity of the value chain is Lynn executing?
answer
D) outbound logistics
Unlock the answer
question
1. The directors of a company meet to decide if they should start a new product line or not. This is an example of a(n) ________ decision.
answer
B) strategic
Unlock the answer
question
1. ________ is the ability to model the components of a system, to connect the inputs and outputs among those components into a sensible whole that reflects the structure and dynamics of the phenomenon observed.
answer
B) Systems thinking
Unlock the answer
question
1. A project manager defines the tasks that her team members have to perform and determines the schedule for carrying out each of the tasks. This project is in the ________ phase of project management.
answer
A) planning
Unlock the answer
question
1. Abstract reasoning is the ability to ________.
answer
B) make and manipulate models
Unlock the answer
question
1. Which of the following statements is true of managing tasks?
answer
B) No benefit will come from the task list unless every task has a date by which it is to be completed.
Unlock the answer
question
1. ________ decisions are those that support broad-scope, organizational issues.
answer
B) Strategic
Unlock the answer
question
1. Who among the following are most likely to use asynchronous communication?
answer
A) members of a team who work in different time zones
Unlock the answer
question
1. The difference between the total value added and the total costs incurred is called the ________ of the value chain.
answer
B) total margin
Unlock the answer
question
1. Streamtech, a manufacturer of automobiles, recently received a patent for an unmanned search boat. By doing this, Streamtech has ________.
answer
B) inbound logistics
Unlock the answer
question
1. A(n) ________ is a network of activities that generate value by transforming inputs into outputs.
answer
A) business process
Unlock the answer
question
1. Jeff is the IT manager of his organization. He needs to use his coworker's account to access some information. In keeping with password etiquette, how should he go about getting his coworker's password?
answer
A) He should request the coworker to type in the password on the system without Jeff looking at it.
Unlock the answer
question
Identify the open source DBMS product among the following.
answer
A) MySQL
Unlock the answer
question
The rows in a database are called ________.
answer
A) records
Unlock the answer
question
Which of the following features distinguishes a LAN from a WAN?
answer
A) LAN connects computers in a single location.
Unlock the answer
question
A computer ________ is a collection of computers that communicate with one another over transmission lines or wirelessly.
answer
C) network
Unlock the answer
question
The connection between a VPN client and a VPN server is called a(n) ________.
answer
C) tunnel
Unlock the answer
question
________ in an E-R diagram refer to the least number of entities required in a relationship.
answer
D) Minimum cardinalities
Unlock the answer
question
Which of the following terms refers to a collection of servers?
answer
B) server farm
Unlock the answer
question
A primary key used in a database is a ________.
answer
B) column or group of columns that identifies a unique row in a table
Unlock the answer
question
Compared to in-house hosting, cloud-based hosting ________.
answer
B) minimizes the risk of investing in technology that will soon become obsolete
Unlock the answer
question
Which of the following is an international standard language for processing a database?
answer
C) SQL
Unlock the answer
question
Which of the following characteristics is a disadvantage of cloud-based hosting?
answer
A) It involves high dependency on vendor.
Unlock the answer
question
Which of the following is a computer architecture and instruction set that is designed for portable devices such as phones and tablets?
answer
C) ARM
Unlock the answer
question
________ is used to install and update software, back up and restore mobile devices, wipe employer software and data from devices, report usage, and provide other mobile device management data.
answer
A) MDM software
Unlock the answer
question
Which of the following is a function of an ISP?
answer
B) It serves as a gateway to the Internet.
Unlock the answer
question
________ is the process of converting a poorly-structured table into two or more well-structured tables.
answer
B) Normalization
Unlock the answer
question
Which of the following is an example of an application program?
answer
A) Microsoft Word
Unlock the answer
question
Which of the following is an example of storage hardware in computers?
answer
B) magnetic disk
Unlock the answer
question
A ________ is a collection of forms, reports, queries, and programs that serves as an intermediary between users and database data.
answer
A) database application
Unlock the answer
question
A ________ is a set of rules that programs on two communicating devices follow.
answer
D) protocol
Unlock the answer
question
________ is the term used to describe data collections that are characterized by huge volume, rapid velocity, and great variety.
answer
A) BigData
Unlock the answer
question
A(n) ________ is a request for data from a database.
answer
C) query
Unlock the answer
question
Which of the following memory devices is volatile in nature?
answer
B) cache
Unlock the answer
question
In a data model, a(n) ________ is something that a user wants to track.
answer
C) entity
Unlock the answer
question
The ________ is sometimes called "the brain" of the computer.
answer
D) central processing unit
Unlock the answer
question
A(n) ________ is a number that identifies a particular device.
answer
B) IP address
Unlock the answer
question
Which of the following principles of competitive advantage is associated with product implementations?
answer
B) differentiating service offerings
Unlock the answer
question
According to Hackman's three criteria for team success, which of the following IS requirements will be categorized under the meaningful and satisfying experience criterion?
answer
B) rewarding accomplishment
Unlock the answer
question
Which of the following statements is true of business process designs?
answer
A) Most process designs require people to work in new ways.
Unlock the answer
question
Which of the following is considered information rather than mere data?
answer
B) the return on investment of an advertising campaign
Unlock the answer
question
Identify the activity in the value chain that involves receiving and handling of raw materials and other inputs to the product.
answer
A) inbound logistics
Unlock the answer
question
________ decisions are decisions that support day-to-day activities.
answer
A) Operational
Unlock the answer
question
Which of the following is a component of an information system, but not of information technology?
answer
C) people
Unlock the answer
question
________ refers to making a reasoned analysis of an opportunity, envisioning potential solutions, evaluating those possibilities, and developing the most promising ones, consistent with the resources one has.
answer
D) Experimentation
Unlock the answer
question
________ is the activity of two or more people working together to achieve a common goal, result, or work product.
answer
C) Collaboration
Unlock the answer
question
According to Porter's five forces model, a group of grain farmers in a surplus year will have reduced ________.
answer
A) bargaining power
Unlock the answer
question
Which of the following is a critical characteristic of good information?
answer
B) accuracy
Unlock the answer
question
The ________ component of the five-component framework of an information system includes individuals who maintain the data and support the networks of computers.
answer
B) people
Unlock the answer
question
One of the procedures of a collaboration project is documenting and reporting progress. This is performed in the ________ phase of the project.
answer
C) doing
Unlock the answer
question
Lynn, the manager of a transportation company, is goes through the week's delivery schedule. She calls her team and assigns territories for each executive. She contacts the fleet supervisor to arrange trucks for transportation. Which activity of the value chain is Lynn executing?
answer
D) outbound logistics
Unlock the answer
question
The directors of a company meet to decide if they should start a new product line or not. This is an example of a(n) ________ decision.
answer
B) strategic
Unlock the answer
question
________ is the ability to model the components of a system, to connect the inputs and outputs among those components into a sensible whole that reflects the structure and dynamics of the phenomenon observed.
answer
B) Systems thinking
Unlock the answer
question
A project manager defines the tasks that her team members have to perform and determines the schedule for carrying out each of the tasks. This project is in the ________ phase of project management.
answer
A) planning
Unlock the answer
question
Abstract reasoning is the ability to ________.
answer
B) make and manipulate models
Unlock the answer
question
Which of the following statements is true of managing tasks?
answer
B) No benefit will come from the task list unless every task has a date by which it is to be completed.
Unlock the answer
question
________ decisions are those that support broad-scope, organizational issues.
answer
B) Strategic
Unlock the answer
question
Who among the following are most likely to use asynchronous communication?
answer
A) members of a team who work in different time zones
Unlock the answer
question
The difference between the total value added and the total costs incurred is called the ________ of the value chain.
answer
B) total margin
Unlock the answer
question
Streamtech, a manufacturer of automobiles, recently received a patent for an unmanned search boat. By doing this, Streamtech has ________.
answer
A) created an entry barrier
Unlock the answer
question
A(n) ________ is a network of activities that generate value by transforming inputs into outputs.
answer
A) business process
Unlock the answer
question
Jeff is the IT manager of his organization. He needs to use his coworker's account to access some information. In keeping with password etiquette, how should he go about getting his coworker's password?
answer
A) He should request the coworker to type in the password on the system without Jeff looking at it.
Unlock the answer
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New