front 1 _____ provides historical, current, and predictive views of business operations and environments and gives organizations a competitive advantage in the marketplace.
| back 1 A |
front 2 The _____ component of an information system consists of raw facts and by itself is difficult to use for making decisions.
| back 2 D |
front 3 In designing a management information system (MIS), after defining the system's objectives, the next step is to _____.
| back 3 C |
front 4 _____ is skill in using productivity software, such as word processors, spreadsheets, database management systems, and presentation software.
| back 4 A |
front 5 A(n)__________, the heart of an information system, is a collection of all relevant facts organized in a series of integrated files.
| back 5 E |
front 6 _____ is understanding the role of information in generating and using business intelligence.
| back 6 C |
front 7 In the context of the major components of an information system, which of the following is a difference between information and data?
| back 7 C |
front 8 Database management systems _____.
| back 8 C |
front 9 Which of the following statements is true of an intranet?
| back 9 D |
front 10 Which of the following decisions is supported by a logistics information system (LIS)?
| back 10 D |
front 11 Which of the following systems supports sales forecasting?
| back 11 D |
front 12 A__________is designed to reduce the cost of transporting materials while maintaining safe and reliable delivery.
| back 12 E |
front 13 A personnel information system (PIS) helps in _____.
| back 13 B |
front 14 _____ refers to building and integrating analytics capabilities into all everyday business activities.
| back 14 A |
front 15 _____ refers to computing devices everywhere with different sizes and power and accessed through multiple formats such as voice, touch, and gesture.
| back 15 C |
front 16 The__________is the heart of a computer.
| back 16 E |
front 17 Beginning in the 1940s, first-generation computers used _____.
| back 17 B |
front 18 The breakthrough technology of the 1960s was to "print" electronic components onto silicon wafers, also known as _____.
| back 18 B |
front 19 Computer designers are now working on technology using gallium arsenide instead of silicon because silicon:
| back 19 B |
front 20 Which of the following is an example of an input device?
| back 20 A |
front 21 What is necessary for a computer to accept a new type of data (like pictures, audio, or video) as input?
| back 21 C |
front 22 What is the implication of the "GIGO" principle?
| back 22 C |
front 23 __________bits equal one byte.
| back 23 A |
front 24 A gigabyte (GB) is about 1 billion bytes. What's the next larger unit of data size (equal to about 1 trillion bytes)?
| back 24 D |
front 25 A(n) _____ is a step-by-step direction for performing a specific task, which is written in a language the computer can understand.
| back 25 D |
front 26 UNIX is a type of _____.
| back 26 D |
front 27 Java and C++ are examples of _____.
| back 27 B |
front 28 What is the name of the recently developed IBM supercomputer that has pushed the boundaries of a computer's ability to understand context in human language?
| back 28 D |
front 29 Given the relative strengths and weaknesses of computers and humans, which of these tasks would be best given to a computer?
| back 29 B |
front 30 Given the relative strengths and weaknesses of computers and humans, which of these tasks would be best given to a person?
| back 30 B |
front 31 _____ outlines procedures for keeping an organization operational in the event of a natural disaster or a network attack or intrusion.
| back 31 B |
front 32 In the context of computer and network security, _____ means that computers and networks are operating and authorized users can access the information they need.
| back 32 B |
front 33 In the context of computer and network security, _____ means that a system must not allow the disclosing of information by anyone who is not authorized to access it.
| back 33 D |
front 34 __________is the unauthorized use of system data for personal gain, such as transferring money from another's account or charging purchases to someone else's account.
| back 34 D |
front 35 In the context of intentional computer and network threats, a _____ floods a network or server with service requests to prevent legitimate users' access to the system.
| back 35 D |
front 36 In the context of security, _____ is an attack that takes advantage of the human element of security systems.
| back 36 D |
front 37 In data encryption, thehttpsin a browser address bar indicates a safe HTTP connection over _____.
| back 37 A |
front 38 _____ is a type of data encryption that enables users of the Internet to securely and privately exchange data through the use of a pair of keys that is obtained from a trusted authority and shared through that authority.
| back 38 A |
front 39 __________is a form of spyware that collects information about a user (without the user's consent) to determine which commercials to display in the user's Web browser.
| back 39 A |
front 40 The process of capturing and recording network traffic is referred to as _____.
| back 40 D |
front 41 A(n)__________is a combination of hardware and software that acts as a filter or barrier between a private network and external computers or networks.
| back 41 C |
front 42 In the event of a network attack or intrusion, a _____ lists the tasks that must be performed by the organization to restore damaged data and equipment.
| back 42 D |
front 43 Which of the following statements is true of phishing?
| back 43 C |
front 44 In the context of intentional computer and network threats, a _____ is a programming routine built into a system by its designer or programmer to bypass system security and sneak back into the system later to access programs or files.
| back 44 D |
front 45 Assuming your company takes basic security measures, which of these situations is probably the most alarming security breach?
| back 45 C |
front 46 Which of the following is an advantage of a database over a flat file system?
| back 46 A |
front 47 A _____ is a collection of data from a variety of sources used to support decision-making applications and generate business intelligence.
| back 47 A |
front 48 In the context of how information is viewed in a database, the _____ involves how data is stored on and retrieved from storage media.
| back 48 D |
front 49 The__________of a database involves how information appears to users and how it can be organized and retrieved.
| back 49 D |
front 50 In contrast to data in a transactional database, data in a data warehouse is described as subject oriented, which means that it _____.
| back 50 A |
front 51 Data warehouses are sometimes called hypercubes because they _____.
| back 51 B |
front 52 A _____ is usually a smaller version of a data warehouse, used by a single department or function.
| back 52 C |
front 53 A request for data from the database is known as a ______.
| back 53 D |
front 54 In the context of the data administration component of a database management system (DBMS), the acronym CRUD stands for _____.
| back 54 A |
front 55 The "variety" dimension of Big Data refers to the combination of _____.
| back 55 B |
front 56 A _____ acts as an interface to a database, retrieving data for users and allowing users to enter data in the database.
| back 56 D |
front 57 _____ is information about data—its content, quality, condition, origin, and other characteristics.
| back 57 C |
front 58 In the context of database marketing, when a buyer is segmented on the basis of variable psychographics, it explains _____.
| back 58 A |
front 59 In relational algebra, the _____ specifies which rows should be retrieved by a query.
| back 59 D |
front 60 In a relational database model, a _____ is a field in a relational table that matches the primary key column of another table.
| back 60 B |
front 61 BREAK | back 61 BREAK |
front 62 The systems development life cycle (SDLC) is also known as the _____.
| back 62 D |
front 63 Which of the following is an outcome of the design phase of the systems development life cycle (SDLC)?
| back 63 D |
front 64 A__________is a written document with detailed specifications that is used to appeal bids for equipment, supplies, or services from vendors.
| back 64 E |
front 65 Which of the following is a difference between the systems development life cycle (SDLC) and extreme programming (XP)?
| back 65 C |
front 66 _____ is a philosophy and a software and system development methodology that focuses on the development, use, and reuse of small, self-contained blocks of codes to meet the software needs of an organization.
| back 66 D |
front 67 In _____ of the implementation phase of the systems development life cycle (SDLC), an old system is stopped and a new system is implemented
| back 67 B |
front 68 The end result of the__________of the systems development life cycle (SDLC) model should give users and top management a clear view of what the problem is and how the information system will solve the problem.
| back 68 A |
front 69 In the context of structured systems analysis and design (SSAD) models, a _____ is a tool that illustrates the logical steps in a process but does not show data elements and associations.
| back 69 D |
front 70 __________are small-scale versions of information systems, which are built before building the entire system, and are used to illustrate the system's benefits and allow users to offer feedback.
| back 70 A |
front 71 _____ is the measure of how well a proposed solution will work in an organization and how internal and external customers will react to it.
| back 71 D |
front 72 Computer-aided systems engineering (CASE) tools are typically used during the _____ of the systems development life cycle (SDLC).
| back 72 C |
front 73 Which of the following is a common cost-effectiveness analysis method?
| back 73 B |
front 74 Which of the following approaches for developing information systems increases the risk of leaking confidential information to competitors?
| back 74 C |
front 75 Which of the following is an advantage of the joint application design (JAD) approach?
| back 75 A |
front 76 In the context of economic feasibility, which of the following statements is true of opportunity costs?
| back 76 A |