FINAL Flashcards

(179 cards)

1
Q

The final task in designing a management information system (MIS) is:

A

providing information in a useful format for decision-making purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A _____ is used for sales forecasting.

A

marketing information system (MKIS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

To be competitive in a workplace, a knowledge worker should:

A

know how and why data is collected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Microsoft Access is a(n) _____, which is used to create and manage a series of integrated files.

A

database management system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Human resource is the second most important resource after information in any organization. T/F

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Information systems are broader in scope than information technologies.
T/F

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Skill in using word processing software is an example of information literacy.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Intranets are often used to provide basic HR functions, such as employees checking how much vacation time they have left.
T/F

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following statements is true of data?

A

Future data is predicted for budgets or cash flow reports.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following strategies identified by Michael Porter helps organizations make their products and services distinct from their competitors?

A

Differentiation strategy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

_____ is skill in using productivity software, such as word processors, spreadsheets, database management systems, and presentation software.

A

Computer literacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following is one of the forces of the Five Forces Model identified by Michael Porter?

A

Threat of new entrants

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

In accordance with Porter’s Five Forces Model, _____ power is high when customers have fewer options.

A

Supplier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

To be useful, information systems should:

A

produce information in different formats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

_____ consists of raw facts and is a major component of information systems.

A

Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

_____ refers to understanding the role of information in generating and using business intelligence.

A

Information literacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

_____ is 1/1,000,000,000,000 of a second.

A

Picosecond

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

ASCII defines up to _____ characters.

A

128

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The control programs managing computer hardware and software perform the _____ function to control and prioritize tasks performed by the CPU.

A

job management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Extended ASCII data code allows representation of _____ characters.

A

256

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A _____ is the size of a character.

A

byte

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Computers and communication systems use _____ to represent and transfer information between computers and network systems.

A

data codes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Trackballs are ideal for notebook computers because they occupy less space than a mouse.
T/F

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A network-attached storage (NAS) system offers only storage; a storage area network (SAN) offers both storage and file services.
T/F

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
A disadvantage of trackball is that positioning is sometimes less precise than with a mouse. T/F
True
26
Both the arithmetic logic unit (ALU) and the control unit are part of the Basic Input/Output System. T/F
False
27
Flash memory is used in memory cards for storing and transferring data between computers and other devices. T/F
True
28
Light pen is an output device.
False
29
_____ allow off-site users to connect to network resources, such as network file storage, printers, and databases.
Remote access servers
30
_____ storage, which is used for online storage and backup, involves multiple virtual servers that are usually hosted by third parties.
Cloud
31
In the context of the power of computers, _____ means saving data in computer memory.
Storage
32
The Clipboard’s contents are typically stored on ____.
random access memory (RAM)
33
A server is a set of programs for controlling and managing computer hardware and software. T/F
False
34
Which of the following best defines an operating system?
It is a set of programs for controlling and managing computer hardware and software.
35
A personal computer can perform a variety of tasks by using application software, which can be commercial software or software developed in house. T/F
True
36
The word “memory” consists of 48 bits, which is equivalent to _____ bytes.
6
37
The _____ approach to setting up a distributed database management system (DDBMS) combines fragmentation and replication.
allocation
38
The _____ component of a database management system (DBMS) is used to add, delete, modify, and retrieve records from a database.
data manipulation
39
The _____ dimension of big data refers to the sheer quantity of transactions, measured in petabytes or exabytes.
Volume
40
The _____ component of a database management system (DBMS) is used for tasks such as backup and recovery, security, and change management.
data administration
41
Which of the following data sources provides the input a data warehouse needs to perform analyses and generate reports?
Enterprise resource planning systems
42
A _____ is usually a smaller version of a data warehouse, used by a single department or function.
data mart
43
Updating a flat file system is efficient and consumes less time. T/F
False
44
In a relational model, the rows are called attributes and the columns are called tuples. T/F
False
45
The network data model is similar to the hierarchical data model because records are organized in the same way. T/F
False
46
A database engine converts logical requests from users into their physical equivalents by interacting with other components of the database management system (DBMS). T/F
True
47
Disks are sequential access devices, whereas tapes are random access devices. T/F
False
48
The database component of an information system can generate sufficient business intelligence by accessing just the internal data of an organization. T/F
False
49
Which of the following is a source of external data?
Tax records
50
Redundant data is eliminated by a process called normalization. T/F
True
51
A _____ is a collection of data from a variety of sources used to support decision-making applications and generate business intelligence.
data warehouse
52
A database administrator is responsible for developing recovery procedures in case data is lost or corrupted.
True
53
Which of the following is a source of internal data?
Sales records
54
In well-designed data-driven Web sites, changes are made to the HTML code every time a Web site's data content changes. T/F
False
55
Data in a database is used for analytical purposes, whereas data in a data warehouse is used for capturing and managing transactions. T/F
False
56
A database is a critical component of information systems because any type of analysis that is done is based on data available in the database.
False
57
_____ has created decency concerns, because these e-mails often contain explicit language or nudity.
Spamming
58
Which of the following is a commonly used technology for data collection?
Cookies
59
In the context of Web and network privacy, _____ is a method for binding all the parties to a contract.
nonrepudiation
60
Alfred, a software programmer at Gamma Inc., develops a program that spreads Trojan viruses to the organization's network. When Liam, his manager, discovers that Alfred had intentionally spread the virus, he immediately fires Alfred. In this scenario, Liam's behavior is considered _____.
legal and ethical
61
_____ information can be censored if the content is deemed offensive to a political, religious, or cultural group.
Public
62
According to the principle of Internet neutrality, Internet service providers (ISPs) and government agencies should:
not charge different rates on data.
63
Copyright laws do not cover online materials. | T/F
False
64
Green computing is one of the methods for combating global warming. T/F
True
65
Private information on the Web-what is posted by a person-is not subject to censorship because of the person's constitutional freedom of expression. T/F
True
66
In general, patents last the author's lifetime plus 70 years. T/F
False
67
An advantage of virtual organizations is that:
products are customized more to respond to customers' needs.
68
Information technology and the Internet have, in essence, resulted in two societal groups: the information rich and the information poor. This is called the _____.
digital divide
69
The _____ is an exception to copyright laws that means that a person can use copyrighted material for certain purposes, such as quoting passages of a book in literary reviews.
Fair Use Doctrine
70
Jared makes two copies of an antivirus software package he just bought and gives one of the copies to Joshua. In this scenario, Jared's actions are considered _____.
illegal and unethical
71
Organizations should keep collected information only as long as:
it is needed for the stated purpose.
72
_____ provide information about a user's location and computer equipment, and this information can be used for unauthorized purposes, such as corporate espionage.
Cookies
73
In which of the following ways can green computing be achieved?
Using video conferencing, electronic meeting systems, and groupware
74
_____ security measures primarily control access to computers and networks, and they include devices for securing computers and peripherals from theft.
Physical
75
Which of the following is a biometric security measure?
Signature analysis
76
A(n) _____ encryption usually works better for public networks, such as the Internet.
asymmetric
77
_____ is a commonly used encryption protocol that manages transmission security on the Internet.
Secure Sockets Layer
78
A _____ is a programming routine built into a system by its designer or programmer.
backdoor
79
_____ can interfere with users' control of their computers, through such methods as installing additional software and redirecting Web browsers.
Spyware
80
After examining an incoming packet, a firewall cannot reject that packet. T/F
False
81
Keystroke loggers can be used for malicious purposes, such as collecting the credit card numbers that users enter while shopping online. T/F
True
82
Corner bolts are an expensive way to secure a computer to a desktop or a counter. T/F
False
83
Social engineering is an attack that takes advantage of the backdoors in security systems. T/F
False
84
The main advantage of asymmetric encryption is that it is faster and requires only a small amount of processing power. T/F
False
85
Trojan programs replicate themselves as viruses and worms do. T/F
False
86
A(n) _____ is often used, so remote users have a secure connection to an organization's network.
virtual private network
87
A distributed denial-of-service (DDoS) attack involves hundreds of computers working together to bombard a Web site with thousands of requests for information in a short period. T/F
True
88
Social engineering is an example of an unintentional security threat. T/F
False
89
_____ outlines procedures for keeping an organization operational in the event of a natural disaster or a network attack or intrusion.
Business continuity planning
90
_____ is the process of capturing and recording network traffic.
Sniffing
91
A _____ plan lists the tasks that must be performed to restore damaged data and equipment.
disaster recovery
92
The main function of Cyber Incident Response Capability (CIRT) is to:
provide information on security incidents.
93
_____ ensures data security and integrity over public networks, such as the Internet.
Transport Layer Security
94
Traditional mainframe networks use a _____ topology.
hierarchical
95
_____ cables have the highest bandwidth of any communication medium.
Fiber-optic
96
Which of the following is an important application of data communication systems for managers to consult decision makers located throughout the world?
E-collaboration
97
A routing table lists _____.
nodes on a network
98
A _____ is a network operating on a radio frequency (RF), consisting of radio cells, each served by a fixed transmitter.
mobile network
99
In _____ processing, each department has its own computer for performing processing tasks.
decentralized
100
All Internet connections require a modem. | T/F
False
101
Data transfer rates of local area networks (LANs) are typically below 100 Mbps. T/F
False
102
Data transmission channels are generally divided into two types: broadband and narrowband. T/F
True
103
A bus topology connects nodes along a network segment, with the ends connected in a manner similar to a ring topology. T/F
False
104
When a bridge connects two local area networks (LANs) using the same protocol, the communication medium must be the same on both LANs. T/F
False
105
Local area networks (LANs) are used to _____.
integrate services, such as e-mail and file sharing
106
A(n) _____ is a device that connects a user to the Internet.
Modem
107
A network _____ represents a network’s physical layout.
Topology
108
Ethernet is a standard communication protocol embedded in software and hardware devices used for building a local area network (LAN). T/F
True
109
_____ cables are glass tubes surrounded by concentric layers of glass, called cladding, to form a light path through wire cables.
Fiber-optic
110
In data communication, _____ refers to integrating voice, video, and data so that multimedia information can be used for decision making.
convergence
111
An Ethernet cable is used to connect computers, hubs, switches, and routers to a network. T/F
True
112
The amount of data that can be transferred from one point to another in one second is called _____.
bandwidth
113
Any computer that stores hypermedia documents and makes them available to other computers on the Internet is called a _____.
Server
114
A(n) _____ is a journal or newsletter that is updated frequently and intended for the general public.
Blog
115
Housed at server farms, search engines use _____ to index data coming in from crawlers.
Keywords
116
Which of the following protocols is used to send e-mails?
SMTP
117
The goal of _____ is to tailor online searching and requests to users’ specific search patterns, preferences, and needs.
Web 3.0
118
A T3 line uses two pairs of copper wires to carry up to 24 simultaneous conversations and has a transmission rate of 1.544 Mbps. T/F
False
119
The Internet is owned or run by the Advanced Research Projects Agency Network (ARPANET). T/F
False
120
Telepresence surgery allows surgeons to operate all over the world without physically traveling anywhere. T/F
True
121
Client-based e-mail enables a user to access his or her e-mail account from any computer. T/F
False
122
The Internet and an intranet use similar languages for developing applications. T/F
True
123
A client can be a home computer or a node in an organization’s local area network (LAN). T/F
True
124
The Web organizes information by using _____, meaning documents that include embedded references to audio, text, images, video, or other documents.
hypermedia
125
Which of the following is true of the Internet?
It is less secure than an intranet.
126
In the URL, http://www.csub.edu/~ hbidgoli/books.html, _____ represents the name of the directory in which files are stored.
/~hbidgoli
127
Which of the following statements is true of Extensible Markup Language (XML)?
An XML tag represents the kind of content being posted and transmitted.
128
Which of the following statements is true of geographic top level domain (TLDs)?
Geographic TLDs are used to promote business and tourism.
129
The Internet is playing an important role in helping organizations reduce expenses, because:
Web applications can be used with minimum costs.
130
A(n) _____ is the address of a document or site on the Internet.
uniform resource locator (URL)
131
Crawlers can go through the other pages that are part of a Web site, as long as there are links to those pages. T/F
True
132
Media buying is an example of a(n) _____ market.
Horizontal
133
An _____ is a secure, convenient, and portable tool for online shopping that stores personal and financial information, such as credit card numbers, passwords, and PINs.
E-wallet
134
E-training for government officials is an example of a _____ application.
government-to-employee (G2E)
135
Which of the following is a supporting activity in a value chain?
Technological development
136
Crisis response is an example of a _____ e-government application.
government-to-government (G2G)
137
E-commerce sites that use the _____ model collect data on consumers and businesses and then sell this data to other companies for marketing purposes.
informediary
138
Government and nonbusiness organizations refrain from using e-commerce applications. T/F
False
139
Each activity in a value chain adds cost and value to a product or service delivered to a customer. T/F
True
140
Micropayments are transactions on the Web involving very large amounts of money. T/F
False
141
The World Wide Web Consortium has canceled support for micropayments. T/F
True
142
The fulfillment function of the business-to-consumer (B2C) e-commerce cycle is responsible for delivering products or services to customers. T/F
True
143
Which of the following is true about mobile commerce (m-commerce) applications?
They are supported by short-range wireless communication technologies.
144
With _____ technology, information is sent to users based on their previous inquiries, interests, or specifications.
Push
145
E-commerce, its applications, and its supporting technologies are an example of using Porter’s value chain concept. T/F
True
146
Which of the following terms is computed by dividing the number of clicks an ad gets by the total impressions bought?
Click-through rate (CTR)
147
In the _____ model, a group of buyers opens an electronic marketplace and invites sellers to bid on announced products or make a request for quotation (RFQ).
buyer-side marketplace
148
Companies that provide click-and-brick e-commerce still struggle to incorporate online interaction. T/F
False
149
The _____ support of a global information system (GIS) concentrates on medium range activities that move the organization toward achieving long-term goals.
Tactical
150
By generating and delivering timely and relevant information supported by networks, _____ creates new opportunities for conducting commercial activities.
e-business
151
Foreign exchange systems that allow traders and brokers from around the world to interact are an example of information systems that support the _____ structure.
transnational
152
Some companies create separate Web sites for each country in which they do business; this is called _____ of a Web site.
localization
153
One of the issues with the _____ structure is that subsidiaries rely on headquarters for all process and control decisions as well as system design and implementation.
Global
154
The control dimension of a global information system (GIS) requires a(n) _____ architecture for data, standardized definitions used across the organization, standard formats for reports, defined behaviors for different processes, and performance-tracking systems.
centralized
155
An information system manager faces design and implementation issues when developing a global network. T/F
True
156
The integration needed to manage production, marketing, and human resources is difficult to achieve with a global structure because of the:
heavy reliance on headquarters.
157
A global information system (GIS) can be defined along two dimensions: customization and communication. T/F
False
158
The increase in direct buyer-seller communication through e-business has eradicated the presence of intermediaries. T/F
False
159
In the context of a global information system (GIS), consolidating global reporting is a crucial tool for managing overseas subsidiaries because:
it reduces the difficulties caused by the differences in accounting procedures.
160
Designing and implementing a global database is a technical challenge, mainly because of the:
different character sets used for names of people and places.
161
____ feasibility is the measure of how well a proposed solution will work in an organization and how internal and external customers will react to it.
Operational
162
During the _____ phase of the systems development life cycle (SDLC), analysts choose the solution that is the most realistic and offers the highest payoff for an organization.
Design
163
Computer-aided systems engineering (CASE) tools are typically used during the _____ phase of the of the systems development life cycle (SDLC).
Design
164
_____ costs measure what an individual would miss by not having an information system or feature.
Opportunity
165
External users of an organization’s information system are:
its customers, contractors, and suppliers.
166
During the _____ phase of the systems development life cycle (SDLC), an information system is operating, enhancements and modifications to the system have been developed and tested, and hardware and software components have been added or replaced.
Maintenance
167
Using the joint application design (JAD) approach results in the collected requirements for the application being too narrow and one-dimensional in focus. T/F
False
168
In a PERT (Program Evaluation Review Technique) or CPM (Critical Path Method) network, the critical path takes the shortest time to be completed. T/F
False
169
Workflow plans, floor plans, statistical information, project sequence diagrams, and timelines or milestone charts are all useful supporting documentation for an economic feasibility study. T/fF
True
170
Normally, a task force for the planning phase of the systems development life cycle (SDLC) only includes representatives from the IT department along with the top management. T/F
False
171
In comparison to extreme programming (XP), in agile methodology, there is more emphasis on team coding and less emphasis on limiting the project’s scope. T/F
False
172
During the implementation phase of the systems development life cycle (SDLC), in _____ conversion, the old and new systems run simultaneously for a short time to ensure the new system works correctly.
Parallel
173
In the design phase of the systems development life cycle (SDLC), the _____ design indicates hardware and software, such as specifying Linux servers and Windows clients.
Logical
174
_____ uses an iterative process that repeats the design, development, and testing steps as needed, based on feedback from users.
Rapid application development (RAD)
175
A _____ is a tool used in structured systems analysis and design (SSAD) analysis model that illustrates the logical steps in a process but does not show data elements and associations.
Flowchart
176
_____ is a philosophy and a software and system development methodology that focuses on the development, use, and reuse of small, self-contained blocks of codes to meet the software needs of an organization.
Service-oriented architecture (SOA)
177
In the _____ phase of the systems development life cycle (SDLC), a problem is defined and alternatives are generated for solving it.
requirements-gathering and analysis
178
During the implementation phase of the systems development life cycle (SDLC), in _____ conversion, the analyst introduces an information system in only a limited area of an organization, such as a division or department.
Pilot
179
A _____ is a tool used in structured systems analysis and design (SSAD) analysis model that helps break down a complex process into simpler, more manageable, and more understandable subprocesses.
data flow diagram