click below
click below
Normal Size Small Size show me how
MIS 101 Final 1
Question | Answer |
---|---|
Which of the following is an example of a low-tech information system? | a file of email addresses stored in an email program |
Which of the following types of skills is most likely to be outsourced to the lowest bidder? | accounting skills |
Which of the following statements is consistent with the central idea of business process design? | Organizations should create new business processes instead of improving existing systems. |
A data model is a ________. | logical representation of database data |
Which of the following is a critical characteristic of good information? | accuracy |
Owen, the database administrator for a shipping company, is responsible for checking the data model, which is to be used in the database management system, for accuracy and completeness. This is an example of Owen's ________ tasks. | development |
Virtualization is the process by which ________. | one physical computer hosts many different virtual computers within it |
I-scream-4 Ice Cream recently faced competition against their flagship brand of "Orange peel ice cream." A competitor made significant in-roads into the market by offering three variety. Which competitive strategy is I-scream-4 Ice Cream implementing? | product differentiation |
________ is the ability to model the components of a system, to connect the inputs and outputs among those components into a sensible whole that reflects the structure and dynamics of the phenomenon observed. | Systems thinking |
In the five-component model of information systems, which of the following components is considered an actor? | hardware |
Silway Travels organizes tours to a number of cities in Illinois. The manager of the company examines a spreadsheet which is an annual record of airfares to different cities from Chicago. The spreadsheet, in this case, represents ________. | Data |
Which of the following is the least critical aspect of good information? | additional data |
Heidi, an accountant, completed three mandatory training sessions in the last quarter. She needs to update her training record in the company's database. Which of the following elements will help Heidi modify her data? | forms |
John Carter, the CEO of Carter Steels, is concerned about the rise in employee attrition organization. He asks Walter, to provide him with the last quarter's report showing the rate of attrition. This report is of no use to Carter as it is ________. | irrelevant |
Launch Cars, a car manufacturing company, has patented its breakthrough technology that reduces pollutant emission by half. Launch Cars is attempting to ________. | raise barriers to market entry |
Which of the following principles of competitive advantage is related to process implementations? | raise the barriers to market entry |
Toby has lost valuable data on his computer a number of times due to system crashes caused by viruses. He decides to invest in a powerful antivirus program. When Toby buys the program, he will actually be buying the software ________. | license |
________ is installed into special, read-only memory of devices like printers and print servers or devices used for various types of communication. | Firmware |
In an E-R diagram, a line between two entities represents a(n) ________. | relationship |
Linux applications are developed using ________ programming language. | Java |
The ________ component of the five-component framework of an information system includes individuals who maintain the data and support the networks of computers. | people |
Which of the following components of an information system is the easiest to change and results in the least amount of organizational disruption? | hardware |
________ is defined as making a reasoned analysis of an opportunity, envisioning potential solutions, evaluating those possibilities, and developing the most promising ones, consistent with the resources one has. | Experimentation |
In 1972, computer scientist ________ recognized that digital devices would change the world as they evolved and became widely used. | Gordon Bell |
Which of the following statements best describes the role of operations in a value chain? | transforming inputs into the final products |
Which of the following defines a repository? | a collection of something, such as data or raw materials |
Melissa is a senior accountant at a consulting firm. She proposes that the department automates these tasks. Melissa's accounting department is in need of a(n) ________. | application software |
A data integrity problem will occur only if ________. | data are duplicated in a database |
The difference between the total value added and the total costs incurred is called the ________ of the value chain. | total margin |
Mark follows certain steps to access the supplementary readings for a course when using his organization's library management system. These steps that he follows are examples of the ________ component of an information system. | procedure |
Which of the following statements correctly describes the relationship between drones and videos in Falcon Security's database? | A drone takes many videos; a video is taken by one and only one drone. |
Browser applications are thin-client applications that ________. | need not be preinstalled on the users' computers |
In ________ process, a server hosts many versions of desktop operating systems. | desktop virtualization |
Carlos is a business student doing an internship at Bruno and Venus, a firm specializing in the export of sophisticated equipment to other countries. This indicates that he lacks ________ skills. | abstract reasoning |
Ryan, a database administrator, is in the process of designing his company's database. Which of the following would Ryan have had to create before he began designing? | data model |
FunText is a company that owns an app used for text messaging. It recently offered a six month membership extension, to its existing customers, without any additional charges. Which competitive strategy is FunText trying to implement in this scenario? | locking in customers |
A(n) ________ is a request for data from a database. | query |
Robert is a strategic planner for a consulting firm. He receives countless reports for daily analysis, but he avoids being inundated with information. Which principle of data characterization is Robert following? | Information should be just barely sufficient for its purpose. |
As the purchasing manager of a company that designs costumes, Natalie orders yards of fabric in preparation for Halloween. Natalie's duties can be classified under the ________ category of a business process. | inbound logistics |
Which of the following is considered as information rather than mere data? | the return on investment of an advertising campaign |
Identify the principle of competitive advantage that is associated with product implementations. | enhance services |
Graham & Hilda Corp. is a firm that offers enterprise software solutions to independent retailers. Which of the following actions will be most difficult to perform when implementing the new information system? | training the employees to use and manage the new system |
A customer relationship management (CRM) system contains the names and phone numbers of customers. Such details stored in a CRM system are part of the ________ component. | data |
In the context of information systems, which of the following statements is true of data characteristics? | An appropriate relationship should exist between the cost of data and its value. |
Will decides to gift his wife a house for their 10th wedding anniversary. He contacts his real estate agent about a specific house that he wants to buy. The information provided by the agent is most likely to be useless because it lacked ________. | timeliness |
Caroline asks her secretary to send information on the meetings that she needs to attend next month. Her secretary, Joanne. Which of the following statements is true about this scenario? | The information that Joanne gave was accurate and sufficient for Caroline's purpose. |
________ is a means through which an organization can gain a competitive advantage through process implementations. | Establishing alliances |
Clark's microbiology report is due the next day. Being short on time, he collects most of the information for his report from an open-source Web browser. In this case, which of the following has Clark used to complete his report? | Firefox |
Android applications are developed using ________ programming language. | Java |
Which of the following operating systems is used by Apple? | iOS |
Locking in customers by making it difficult or expensive for customers to move to another product is called establishing high ________. | switching costs |
Metadata are ________. | data that describe data |
________ is a version of Unix that was developed by an open source community. | Linux |
Which of the following is an example of nonvolatile memory? | optical disk |
Which of the following statements is true of business users who administer the development of information systems? | They should take an active role in the system's development. |
Which of the following notations in an E-R diagram means that the entity is optional and a relationship need not have an entity of that type? | small oval |
Which of the following statements is true about operating systems? | Nonmobile client operating systems are used on personal computers. |
A thin-client application is designed to run within a program such as ________. | Edge |
Which of the following statements is true about firmware? | Users do not need to load firmware into a device's memory. |
Identify an open source DBMS product. | MySQL |
Which of the following is an example of a database management system? | Access |
Browser-based applications ________. | support graphical queries |
Globus Corp. uses a software tool to manage its supply chain. This software tool is an ________ of the company's information system. | instruction on the computer side |
Which of the following is true of N:M relationships? | They can have more than one entity on each side of the relationship. |
A ________ is equivalent to 1,024 bytes. | kilobyte |
Linux is an example of a(n) ________. | open source operating system |
Cooper, the owner of a small bicycle manufacturing company, is striving to keep his organization running smoothly while remaining profitable in a highly competitive market. Which of the following principles is he most likely to implement? | reducing costs |
Which of the following is true of single-user databases? | The application, the DBMS, and the database all reside on the user's computer. |
Users in motion, wireless connectivity, and a cloud-based resource are the elements in a ________. | mobile system |
In a manufacturing business, which of the following transforms finished goods into cash? | sales process |
Which of the following is an example of a mobile device? | smartphone |
PL Inc. implements an information system to improve its supply chain. The system helps the organization to reduce wastes and optimally utilize its resources. The information system has helped PL Inc. to gain a competitive advantage by ________. | reducing its costs |
Entities in a data model have ________ that describe the characteristics of the entity. | attributes |
Jason's Burgers, a famous diner, recently started taking orders online to reduce the customer wait time. Jason's Burgers attempted to ________. | lock in customers |
Which of the following principles of competitive advantage is associated with product implementations? | differentiating service offerings |
Meredith constantly analyzes her work in terms of her individual contribution that she makes to the overall output of the organization. This shows her ________ skills. | systems thinking |
For Falcon Security, the primary purpose of creating a database of video information is to ________. | enable querying based on video characteristics |
A group of similar rows or records is known as ________. | a file |
An automobile company decides to improve the quality of its products and bring more variety into its entire product line. The company has decided to adopt ________. | industry-wide differentiation |
Thin-client applications are typically limited by the capabilities of the ________. | browser |
The process of normalization constructs tables such that every table has a ________. | single theme |
According to Porter's five forces model, a group of grain farmers in a surplus year will have reduced ________. | bargaining power |
Bits are grouped into 8-bit chunks called ________. | bytes |
A ________ is a small, lightweight, power-conserving, computing device that is capable of wireless access. | mobile device |
Reed Technologies has hired certified programmers to create an application for its Web site. The application would run inside a browser and support graphics and animation. Which of the following will the programmers use to develop this application? | HTML5 |
A manager will essentially require ________ skills to test ideas clearly on a small scale, before taking bigger risks or committing significant resources to a larger project. | experimentation |
In an E-R diagram, a(n) ________ on a line means that at least one entity of that type is required. | vertical bar |
Java, C#, and VB.NET are examples of ________. | object-oriented languages |
Focused differentiation occurs when ________. | better service is provided within an industry segment |
Which of the following is a major implication of Moore's Law? | Costs of communications and storage have become very low. |
Which of the following statements is true about the changes and developments foreseen by the year 2026? | Traditional classrooms will be replaced by classrooms in a box. |
Brad, a project manager, wants to build a database to integrate information about employees and tasks that they handle. These aspects that Brad wants to track are called ________. | entities |
________ in an E-R diagram refer to the least number of entities required in a relationship. | Minimum cardinalities |
Which of the following devices is an example of a storage hardware device? | optical disk |
Marcus is a video editor who works for the film industry. His job involves editing large pictures, sounds, and video files. Given the nature of his job, Marcus will require a computer with a minimum speed of 3.5 Gigahertz and a(n) ________ processor. | dual |
Which of the following factors determines the structure, features, and functions of an information system used in a company? | the competitive strategy |
Which of the following is categorized as a nonroutine cognitive skill? | systems thinking |
Which of the following pairs of components constitutes the human side of information systems? | people and procedures |
Bits are used for computer data because they ________. | are easy to represent physically |
According to the five-component model of information systems, the ________ component provides instructions for the people who use information systems. | procedure |
Which of the following is an example of computer hardware? | a monitor |
Organizations can lock in suppliers either by making it difficult to switch to another organization or by ________. | making it easy to work with the organization |
Porter defined value as the ________. | amount of money that a customer is willing to pay for an offering |
Which of the following ratios has fallen as a result of Moore's Law? | price/performance |
The cost of the business process is the sum of the cost of the inputs and the ________. | cost of the activities |
Which of the following is an example of storage hardware in computers? | magnetic disk |
Identify the first step in transforming a data model into a relational database design. | creating a table for each entity |
Brenda, the sales manager of a firm, wants to generate a particular report containing sales analyses of the second and third quarter of the year. She should use a ________ to obtain the information that she wants from the database. | query |
The rows in a database are called ________. | records |
Drudgen Fitness Inc. is a fitness equipment provider that markets its products through a chain of retail outlets in four states. 5-component model of information systems, which of the following processes will be the least disruptive to the organization? | buying and installing new computers in the new outlets |
Which of the following is used to process and display browser database application forms, reports, and queries? | html |
A new drug that has shown promise in curing skin cancer has been discovered by a famous chemical laboratory. This is the only known drug effective for treatment of this disease. This situation is characterized by ________. | low threat of substitutions |
Adobe's Acrobat, Photoshop, and PageMaker are examples of ________. | horizontal-market application software |
Porter's five forces model is used to assess ________. | industry structure |
Which of the following data elements is placed higher than records in the database hierarchy? | file |
The CEO of a large company asks the sales manager to report the sales figures of the previous quarter. The manager immediately sends her the list of products sold. These details do not qualify as good information because they are ________. | not relevant |
An operating system like Windows or Linux is an example of the ________ component of an information system. | software |
Dynotrix Motors is a large car-manufacturing company. The company purchases raw material from many small-sized sellers across the globe. In this case, Dynotrix Motors is characterized by ________. | high bargaining power over its suppliers |
________ skills determine the ability to conceive information from data. | Cognitive |
Which of the following refers to a small, portable storage device that can be used to back up data and transfer it from one computer to another? | USB flash drive |
In an E-R diagram, a(n) ________ on a line means that at least one entity of that type is required. | vertical bar |
Which of the following is a common description of information? | knowledge derived from data |
Carter is the Web designer for an open source project. He has created a program that facilitates the easy collation of data for a large-scale logistics firm. Which of the following is true of the source code for Carter's program? | It is available to the public. |
The ________ component in the five-component model of information systems is considered a bridge that connects the computer side and the human side. | data |
Columns that are keys to different tables than the ones in which they reside are called ________. | foreign keys |
Which of the following is an example of an open-source desktop operating system? | Ubuntu |
Source code is computer code ________. | that is written by humans |
A ________ is equivalent to 1,024 bytes. | kilobyte |
Each entity in a database has a unique attribute called a(n) ________. | identifier |
________ applications are programs that are written to use a particular operating system. | Native |
Noel creates a table listing the number of students in his biology class, their names, age, and phone numbers. His table is an example of the ________ component of an information system. | Data |
A primary key in a database is a ________. | column or group of columns that identifies a unique row in a table |
A significant difference between using Access versus Mongo DB to store Falcon Security's video information is: | with Mongo DB the video footage and the metadata are stored in the same database, while in Access the video footage and the metadata are stored in separate databases. |
Which of the following value chain activities involves collecting, storing, and physically distributing the product to buyers? | outbound logistics |
Ronald runs both Windows 7 and Linux on his desktop computer. This process is called ________. | PC virtualization |
The term ________ implies that either all transactions related to a traditional relational DBMS are processed or none of them are processed. | atomic |
Which of the following is an advantage to an organization if its bring your own device (BYOD) policy offers wireless network to mobile devices? | The organization can sniff employees' mobile traffic. |
The columns in a database are called ________. | fields |
Which of the following value chain activities involves assisting users with handling of the products after sale, thus maintaining and enhancing the products' value? | customer service |
According to Porter's five forces model, in which of the following examples would rivalry be considered as a weak force affecting the market? | search engine designers |
A database is used instead of a spreadsheet when ________. | lists involve data with multiple themes |
Erin is a manager for a reputed software firm. She typically monitors and evaluates the existing working procedures of her subordinates. She periodically alters these working procedures. Which of the following skills does Erin portray? | experimentation |
A retail company sells agricultural produce and consumer products. The company procures materials from farmers and local producers. This process is an example of ________. | inbound logistics |
When using the relational model to represent two tables, one must ________. | add a foreign key to one of the tables |
Which of the following terms refers to a collection of servers? | server farm |
Relational databases represent relationships using ________. | foreign keys |