MIS Exam #1
_____ provides historical, current, and predictive views of business operations and environments and gives organizations a competitive advantage in the marketplace.
A
The _____ component of an information system consists of raw facts and by itself is difficult to use for making decisions.
D
In designing a management information system (MIS), after defining the system's objectives, the next step is to _____.
C
_____ is skill in using productivity software, such as word processors, spreadsheets, database management systems, and presentation software.
A
A(n)__________, the heart of an information system, is a collection of all relevant facts organized in a series of integrated files.
E
_____ is understanding the role of information in generating and using business intelligence.
C
In the context of the major components of an information system, which of the following is a difference between information and data?
C
Database management systems _____.
C
Which of the following statements is true of an intranet?
D
Which of the following decisions is supported by a logistics information system (LIS)?
D
Which of the following systems supports sales forecasting?
D
A__________is designed to reduce the cost of transporting materials while maintaining safe and reliable delivery.
E
A personnel information system (PIS) helps in _____.
B
_____ refers to building and integrating analytics capabilities into all everyday business activities.
A
_____ refers to computing devices everywhere with different sizes and power and accessed through multiple formats such as voice, touch, and gesture.
C
The__________is the heart of a computer.
E
Beginning in the 1940s, first-generation computers used _____.
B
The breakthrough technology of the 1960s was to "print" electronic components onto silicon wafers, also known as _____.
B
Computer designers are now working on technology using gallium arsenide instead of silicon because silicon:
B
Which of the following is an example of an input device?
A
What is necessary for a computer to accept a new type of data (like pictures, audio, or video) as input?
C
What is the implication of the "GIGO" principle?
C
__________bits equal one byte.
A
A gigabyte (GB) is about 1 billion bytes. What's the next larger unit of data size (equal to about 1 trillion bytes)?
D
A(n) _____ is a step-by-step direction for performing a specific task, which is written in a language the computer can understand.
D
UNIX is a type of _____.
D
Java and C++ are examples of _____.
B
What is the name of the recently developed IBM supercomputer that has pushed the boundaries of a computer's ability to understand context in human language?
D
Given the relative strengths and weaknesses of computers and humans, which of these tasks would be best given to a computer?
B
Given the relative strengths and weaknesses of computers and humans, which of these tasks would be best given to a person?
B
_____ outlines procedures for keeping an organization operational in the event of a natural disaster or a network attack or intrusion.
B
In the context of computer and network security, _____ means that computers and networks are operating and authorized users can access the information they need.
B
In the context of computer and network security, _____ means that a system must not allow the disclosing of information by anyone who is not authorized to access it.
D
__________is the unauthorized use of system data for personal gain, such as transferring money from another's account or charging purchases to someone else's account.
D
In the context of intentional computer and network threats, a _____ floods a network or server with service requests to prevent legitimate users' access to the system.
D
In the context of security, _____ is an attack that takes advantage of the human element of security systems.
D
In data encryption, thehttpsin a browser address bar indicates a safe HTTP connection over _____.
A
_____ is a type of data encryption that enables users of the Internet to securely and privately exchange data through the use of a pair of keys that is obtained from a trusted authority and shared through that authority.
A
__________is a form of spyware that collects information about a user (without the user's consent) to determine which commercials to display in the user's Web browser.
A
The process of capturing and recording network traffic is referred to as _____.
D
A(n)__________is a combination of hardware and software that acts as a filter or barrier between a private network and external computers or networks.
C
In the event of a network attack or intrusion, a _____ lists the tasks that must be performed by the organization to restore damaged data and equipment.
D
Which of the following statements is true of phishing?
C
In the context of intentional computer and network threats, a _____ is a programming routine built into a system by its designer or programmer to bypass system security and sneak back into the system later to access programs or files.
D
Assuming your company takes basic security measures, which of these situations is probably the most alarming security breach?
C
Which of the following is an advantage of a database over a flat file system?
A
A _____ is a collection of data from a variety of sources used to support decision-making applications and generate business intelligence.
A
In the context of how information is viewed in a database, the _____ involves how data is stored on and retrieved from storage media.
D
The__________of a database involves how information appears to users and how it can be organized and retrieved.
D
In contrast to data in a transactional database, data in a data warehouse is described as subject oriented, which means that it _____.
A
Data warehouses are sometimes called hypercubes because they _____.
B
A _____ is usually a smaller version of a data warehouse, used by a single department or function.
C
A request for data from the database is known as a ______.
D
In the context of the data administration component of a database management system (DBMS), the acronym CRUD stands for _____.
A
The "variety" dimension of Big Data refers to the combination of _____.
B
A _____ acts as an interface to a database, retrieving data for users and allowing users to enter data in the database.
D
_____ is information about data—its content, quality, condition, origin, and other characteristics.
C
In the context of database marketing, when a buyer is segmented on the basis of variable psychographics, it explains _____.
A
In relational algebra, the _____ specifies which rows should be retrieved by a query.
D
In a relational database model, a _____ is a field in a relational table that matches the primary key column of another table.
B
BREAK
BREAK
The systems development life cycle (SDLC) is also known as the _____.
D
Which of the following is an outcome of the design phase of the systems development life cycle (SDLC)?
D
A__________is a written document with detailed specifications that is used to appeal bids for equipment, supplies, or services from vendors.
E
Which of the following is a difference between the systems development life cycle (SDLC) and extreme programming (XP)?
C
_____ is a philosophy and a software and system development methodology that focuses on the development, use, and reuse of small, self-contained blocks of codes to meet the software needs of an organization.
D
In _____ of the implementation phase of the systems development life cycle (SDLC), an old system is stopped and a new system is implemented
B
The end result of the__________of the systems development life cycle (SDLC) model should give users and top management a clear view of what the problem is and how the information system will solve the problem.
A
In the context of structured systems analysis and design (SSAD) models, a _____ is a tool that illustrates the logical steps in a process but does not show data elements and associations.
D
__________are small-scale versions of information systems, which are built before building the entire system, and are used to illustrate the system's benefits and allow users to offer feedback.
A
_____ is the measure of how well a proposed solution will work in an organization and how internal and external customers will react to it.
D
Computer-aided systems engineering (CASE) tools are typically used during the _____ of the systems development life cycle (SDLC).
C
Which of the following is a common cost-effectiveness analysis method?
B
Which of the following approaches for developing information systems increases the risk of leaking confidential information to competitors?
C
Which of the following is an advantage of the joint application design (JAD) approach?
A
In the context of economic feasibility, which of the following statements is true of opportunity costs?
A