44
Chapter 1 Multiple Choice Which of the following statements is not correct? A. To succeed in today’s environment, it is often necessary to change business models and strategies. B. IT enables organizations to survive in the face of business pressures. C. IT requires small investments over a long period of time. D. Organizations can leverage their platforms to develop Web-based applications, products, and services. ANS: C REF: Material following chapter opening case The modern business environment has all of the following characteristics except: A. global B. interconnected C. competitive D. relatively static E. real-time ANS: D REF: Material following chapter opening case _____ deal with the planning for – and the development, management, and use of – technology to help people perform their tasks related to information processing. A. IT architecture B. IT infrastructure C. information technology D. management information systems E. IT services ANS: D REF: 1.1 Information Systems: Concepts and Definitions _____ is (are) data that have been organized to have meaning and value to a recipient. A. data B. information C. knowledge D. experience E. wisdom ANS: B REF: 1.1 Information Systems: Concepts and Definitions If Amazon uses a list of all your purchases (books bought, price paid, dates) to recommend other books to you, then Amazon is applying its _____. A. data B. information C. knowledge D. experience E. wisdom ANS: C REF: 1.1 Information Systems: Concepts and Definitions An organization’s information technology architecture: A. provides a guide for current operations B. provides a blueprint for future directions 1

Final Study Guide MIS315 2010v3S

Embed Size (px)

Citation preview

Page 1: Final Study Guide MIS315 2010v3S

Chapter 1Multiple Choice

Which of the following statements is not correct? A. To succeed in today’s environment, it is often necessary to change business models and strategies.B. IT enables organizations to survive in the face of business pressures.C. IT requires small investments over a long period of time.D. Organizations can leverage their platforms to develop Web-based applications, products, and services.

ANS: CREF: Material following chapter opening case

The modern business environment has all of the following characteristics except:A. globalB. interconnectedC. competitiveD. relatively staticE. real-time

ANS: DREF: Material following chapter opening case

_____ deal with the planning for – and the development, management, and use of – technology to help people perform their tasks related to information processing.A. IT architectureB. IT infrastructureC. information technologyD. management information systemsE. IT services

ANS: DREF: 1.1 Information Systems: Concepts and Definitions

_____ is (are) data that have been organized to have meaning and value to a recipient.A. dataB. informationC. knowledgeD. experienceE. wisdom

ANS: B

REF: 1.1 Information Systems: Concepts and Definitions

If Amazon uses a list of all your purchases (books bought, price paid, dates) to recommend other books to you, then Amazon is applying its _____.A. dataB. informationC. knowledgeD. experienceE. wisdom

ANS: CREF: 1.1 Information Systems: Concepts and Definitions

An organization’s information technology architecture: A. provides a guide for current operationsB. provides a blueprint for future directionsC. integrates the information requirements of the organization and all usersD. is analogous to the architecture of a houseE. all of the above

ANS: EREF: 1.1 Information Systems: Concepts and Definitions

_____ are the computer hardware, software, and communications technologies that are used by IT personnel to produce IT services. A. IT componentsB. IT servicesC. information technologyD. information systemE. computer-based information system

ANS: AREF: 1.1 Information Systems: Concepts and Definitions

An organization’s _____ consists of the physical facilities, IT components, IT services, and IT management that will support the entire organization. A. information technology architectureB. information technology infrastructureC. information technologyD. information systemE. computer-based information system

1

Page 2: Final Study Guide MIS315 2010v3S

ANS: BREF: 1.1 Information Systems: Concepts and Definitions

_____ is the integration of economic, social, cultural, and ecological facets of life, enabled by information technologies.

A. regionalizationB. nationalizationC. globalizationD. business environment

ANS: CREF: 1.2 The Global, Web-Based Platform

Globalization 1.0 focused on _____, Globalization 2.0 focused on _____, and Globalization 3.0 focuses on _____.A. companies, groups, countriesB. countries, groups, companiesC. countries, companies, groupsD. groups, companies, countriesE. groups, countries, companies

ANS: CREF: 1.2 The Global, Web-Based Platform

_____ enables computer applications to interoperate without human interaction.A. supply-chainingB. informingC. uploadingD. work-flow softwareE. outsourcing

ANS: DREF: 1.2 The Global, Web-Based Platform

_____ involves taking a specific function that your company was doing itself, having another company perform that same function for you, and then integrating their work back into your operation.A. informingB. insourcingC. offshoringD. outsourcingE. uploading

ANS: DREF: 1.2 The Global, Web-Based Platform

_____ means that you can create content and send or post it to the Web.A. informingB. insourcingC. deliveringD. participatingE. uploading

ANS: EREF: 1.2 The Global, Web-Based Platform

If your university hires a company to manage its entire human resources function, then your university is practicing _____. A. insourcingB. outsourcingC. offshoringD. temporary hiringE. consulting

ANS: BREF: 1.2 The Global, Web-Based Platform

The workforce in developed countries has which of the following characteristics? A. more diversifiedB. more womenC. more single parentsD. more persons with disabilitiesE. all of the above

ANS: EREF: 1.3 Business Pressures, Organizational Responses, and IT Support

Today’s customers have which of the following characteristics? A. less knowledge about productsB. less sophisticationC. difficulty in finding information about productsD. higher expectationsE. difficulty in comparing prices

ANS: DREF: 1.3 Business Pressures, Organizational Responses, and IT Support

2

Page 3: Final Study Guide MIS315 2010v3S

When identical items are produced in large quantities, this is called:A. strategic systemsB. customer focusC. continuous improvementD. mass productionE. mass customization

ANS: DREF: 1.3 Business Pressures, Organizational Responses, and IT Support

Which of the following is not a fact about IT careers? A. The four-fastest growing U.S. jobs that require college degrees from 2002 through 2012 are IT-related.B. Highly-skilled IT jobs will typically not be offshored.C. There are no computing jobs.D. MIS majors usually receive high starting salaries.

ANS: CREF: 1.4 Why Are Information Systems Important to You?

Chapter 2Multiple Choice

Which of the following statements about information systems is not correct?A. Information systems are concentrated in the IS Department.B. Information systems tend to follow the structure of the organization.C. Information systems are based on the needs of employees.D. Any information system can be strategic.E. Managing information systems is difficult.

Ans: ARef: Discussion immediately following Chapter opening case

A collection of related files, tables, and so on that stores data and the associations among them is _____. A. hardwareB. software C. databaseD. network

E. procedures

Ans: CRef: 2.1 Types of Information Systems

Which of the following is not a major capability of information systems? A. perform high-speed, high-volume numerical computationsB. provide fast, accurate communications among organizationsC. store very small amounts of information in a very large spaceD. increase the effectiveness and efficiency of people working in groupsE. automate semiautomatic business processes

Ans: CRef: 2.1 Types of Information Systems

Two information systems that support the entire organization are:A. Enterprise resource planning systems, dashboardsB. Transaction processing systems, office automation systemsC. Enterprise resource planning systems, transaction processing systemsD. Expert systems, office automation systemsE. Expert systems, transaction processing systems

Ans: CRef: 2.1 Types of Information Systems

When your purchases are swiped over the bar-code reader at the point-of-sale terminals at Wal-Mart, a _____ records the data. A. transaction processing systemB. functional area information systemC. dashboardD. enterprise resource planning systemE. office automation system

Ans: ARef: 2.1 Types of Information Systems

Supply chain systems are which type of information system? A. departmental information systemsB. enterprisewide information systemsC. interorganizational information systems

3

Page 4: Final Study Guide MIS315 2010v3S

D. end-user computing systemsE. individual information systems

Ans: CRef: Types of Information System

_____ attempt to duplicate the work of human experts by applying reasoning capabilities.A. expert systemsB. dashboardsC. functional area information systemsD. decision support systemsE. business intelligence systems

Ans: ARef: 2.1 Types of Information Systems

_____ provide rapid access to timely information and direct access to structured information in the form of reports.A. expert systemsB. dashboardsC. functional area information systemsD. decision support systemsE. business intelligence systems

Ans: BRef: 2.1 Types of Information Systems

Information-based industries are most susceptible to which one of Porter’s five forces? A. threat of entry of new competitorsB. bargaining power of suppliersC. bargaining power of customersD. threat of substitute productsE. rivalry among existing firms in an industry

Ans: DRef: 2.2 Competitive Advantage and Strategic Information Systems

For most companies, the Web _____ the threat that new competitors will enter the market by _____ traditional barriers to entry.A. decreases, increasingB. increases, decreasingC. increases, increasingD. decreases, decreasing

Ans: B

Ref: 2.2 Competitive Advantage and Strategic Information Systems

The threat of competitors’ entering a market is very high in industries that perform a(n) _____ role, and in industries where the primary product or service is _____.A. intermediation, physicalB. broker, physicalC. sales, financialD. financial, digitalE. intermediation, digital

Ans: ERef: 2.2 Competitive Advantage and Strategic Information Systems

Buyer power is _____ when buyers have many choices from whom to buy and _____ when buyers have few choices.A. high, the sameB. high, lowC. low, lowD. low, highE. low, the same

Ans: BRef: 2.2 Competitive Advantage and Strategic Information Systems

Porter’s competitive forces model helps organizations identify _____, where his value chain model helps organizations identify specific _____.A. competitive opportunities, activitiesB. general strategies, activitiesC. activities, competitive opportunitiesD. activities, general strategiesE. primary activities, support activities

Ans: BRef: 2.2 Competitive Advantage and Strategic Information Systems

_____ activities create value for which customers are willing to pay, where _____ activities do not add value directly to the firm’s products or services.A. Support, primaryB. Human resource management, inbound logisticsC. Procurement, operationsD. Primary, support

4

Page 5: Final Study Guide MIS315 2010v3S

E. Accounting, outbound logistics

Ans: DRef: 2.2 Competitive Advantage and Strategic Information Systems

Offering different products, services, or product features is which strategy for competitive advantage? A. cost leadershipB. differentiationC. innovationD. operational effectivenessE. customer-orientation

Ans: BRef: 2.2 Competitive Advantage and Strategic Information Systems

Introducing new products and putting new features in existing products is which strategy for competitive advantage? A. cost leadershipB. differentiationC. innovationD. operational effectivenessE. customer-orientation

Ans: CRef: 2.2 Competitive Advantage and Strategic Information Systems

Improving the manner in which internal business processes are executed is which strategy for competitive advantage? A. cost leadershipB. differentiationC. innovationD. operational effectivenessE. customer orientation

Ans: DRef: 2.2 Competitive Advantage and Strategic Information Systems

When Amazon welcomes you by name back to its Web site on your second visit, this is an example of which strategy for competitive advantage?A. cost leadershipB. differentiationC. innovation

D. operational effectivenessE. customer orientation

Ans: ERef: 2.2 Competitive Advantage and Strategic Information Systems

The impact of IT on managers’ jobs is all of the following except: A. gives managers time to get into the fieldB. managers can spend more time planningC. managers must spend more time managing fewer employeesD. managers can gather information more quicklyE. none of the above

Ans: CRef: 2.2 Competitive Advantage and Strategic Information Systems

Porter’s _____ help(s) companies identify general strategies, where his _____ help(s) to identify specific activities where companies can use the strategies for greatest impact.A. Value chain model, competitive forces modelB. Primary activities, support activitiesC. Competitive forces model, primary activitiesD. Competitive forces model, value chain modelE. Value chain model, support activities

Ans: DRef: 2.2 Competitive Advantage and Strategic Information Systems

Which of the following statements concerning information resources is not correct?A. Information resources include all the hardware, information systems and applications, data, and networks in an organization.B. Without their information resources, organizations cannot function.C. Information resources typically do not change quickly.D. Information resources are expensive to acquire, operate, and maintain.

Ans: CRef: 2.4 Managing Information Resources

5

Page 6: Final Study Guide MIS315 2010v3S

_____ is the direct use of information systems by employees in their work. A. Transaction processing systemsB. Executive information systemsC. Decision support systemsD. Management information systemsE. End-user computing

Ans: ERef: 2.4 Managing Information Resources

Dividing the responsibility for developing and maintaining information resources between the Information System Department and end users depends on all of the following except :A. Size of the organizationB. Amount and type of information resources in the organizationC. Organization’s revenue and profitsD. Organization’s attitude towards computingE. Maturity level of the organization’s information technologies

Ans: CRef: 2.4 Managing Information Resources

The role of the director of the Information Systems Department is changing from more _____ to more _____.A. hands-on, managingB. technical, managerialC. operational, technicalD. hands-on, decision-makingE. managerial, technical

Ans: BRef: 2.4 Managing Information Resources

Chapter 3

Which of the following was not one of TJX’s problems?A. The company’s security was originally breached.B. The company disclosed the security breach to its customers too quickly.C. The attackers had the company’s encryption key.D. The company did not know about the breach immediately when it occurred.E. The company did not know which data were stolen and when.

Ans: BResponse: Chapter opening case

Various organizations that promote fair and responsible use of information systems often develop _____: A. a code of ethicsB. a strategic planC. a mission statementD. responsibility chartersE. a goals outline

Ans: AResponse: 3.1 Ethical Issues

What is _____ is not necessarily _____.A. Illegal, unethicalB. Ethical, illegalC. Unethical, illegalD. Unethical, legalE. Ethical, legal Ans: CResponse: 3.1 Ethical Issues

_____ issues involve collecting, storing and disseminating information about individuals.A. privacyB. accuracyC. transferabilityD. propertyE. accessibility

Ans: AResponse: 3.1 Ethical Issues

_____ issues involve the authenticity and fidelity of information that is collected and processed.A. privacyB. accuracyC. transferabilityD. propertyE. accessibility

Ans: BResponse: 3.1 Ethical Issues

_____ issues involve who may obtain information and how much they should pay for this information.

6

Page 7: Final Study Guide MIS315 2010v3S

A. privacyB. accuracyC. transferabilityD. propertyE. accessibility

Ans: EResponse: 3.1 Ethical Issues

Which of the following statements is correct? A. An individual’s right to privacy is absolute.B. It is difficult to determine and enforce privacy regulations.C. An individual’s right to privacy supersedes the needs of society.D. Advances in information technologies have not affected individual privacy.E. The Internet has increased individuals’ privacy.

Ans: BResponse: 3.1 Ethical Issues

Which of the following statements is not correct? A. Employees have limited protection against surveillance by employers.B. The large majority of organizations monitor employee Internet usage.C. The large majority of organizations use URL filtering.D. As with normal first-class mail, employers cannot read employee e-mail.E. Employees should be aware that surveillance is legal.

Ans: DResponse: 3.1 Ethical Issues

Which of the following statements is correct? A. International privacy and security laws are very consistent.B. Consistent international privacy and security laws help companies with their regulatory requirements from country to country.C. Consistent international privacy and security laws enable information to flow freely among countries.D. International privacy and security laws have led to a complex global legal framework.E. Consistent international privacy and security laws are followed by all countries.

Ans: D

Response: 3.1 Ethical Issues

When Lexis-Nexis suffered a security breach, the most important lesson that the company learned was which of the following? A. Encrypt your data.B. Use biometric identification.C. It is enough to protect your own internal network.D. You must take responsibility for the security of your business partners and customers.E. You must have insurance to cover the costs of a security breach.

Ans: DResponse: 3.1 Ethical Issues

Which of the following factors are not increasing the threats to information security?A. smaller computing devicesB. downstream liabilityC. the InternetD. limited storage capacity on portable devicesE. due diligence

Ans: DResponse: 3.2 Threats to Information Security

The computing skills necessary to be a hacker are decreasing for which of the following reasons? A. More information systems and computer science departements are teaching courses on hacking so that their graduates can recognize attacks on information assets.B. Computer attack programs, called scripts, are available for download from the Internet.C. International organized crime is training hackers.D. Cybercrime is much more lucrative than regular white-collar crime.E. Almost anyone can buy or access a computer today.

Ans : BResponse : Threats to Information Security

Your company’s computers have been taken over by an attacker and used to attack another organization’s information systems. Your problem is which of the following? A. poor security policies and proceduresB. lack of due diligence

7

Page 8: Final Study Guide MIS315 2010v3S

C. downstream liabilityD. poor service-level agreementsE. users have a lack of information security awareness

Ans: CResponse: 3.2 Threats to Information Security

Rank the following in terms of dollar value of the crime, from highest to lowest.A. robbery – white collar crime – cybercrimeB. white collar crime – extortion – robberyC. cybercrime – white collar crime – robberyD. cybercrime – robbery – white collar crimeE. white collar crime – burglary – robbery

Ans: CResponse: 3.2 Threats to Information Security

A(n) _____ is any danger to which an information resource may be exposed.A. vulnerabilityB. riskC. controlD. threatE. compromise

Ans: DResponse: 3.2 Threats to Information Security

A(n) information system’s _____ is the possibility that the system will suffer harm by a threat.A. vulnerabilityB. riskC. controlD. dangerE. compromise

Ans: AResponse: 3.2 Threats to Information Security

Employees in which functional areas of the organization pose particularly grave threats to information security?A. human resources, financeB. human resources, management information systemsC. finance, marketingD. operations management, management information systems

E. finance, management information systems

Ans: BResponse: 3.2 Threats to Information Security

_____ involves building an inappropriate trust relationship with employees for the purpose of gaining sensitive information or unauthorized access privileges.A. reverse social engineeringB. hackingC. spoofingD. social engineeringE. spamming

Ans: DResponse: 3.2 Threats to Information Security

Dumpster diving is: A. always illegal because it is considered trespassingB. never illegal because it is not considered trespassingC. typically committed for the purpose of identity theftD. always illegal because individuals own the material in the dumpsterE. always legal because the dumpster is not owned by private citizens

Ans: CResponse: 3.2 Threats to Information Security

A(n) _____ is intellectual work that is known only to a company and is not based on public information. A. copyrightB. patentC. trade secretD. knowledge baseE. private property

Ans: CResponse: 3.2 Threats to Information Security

A(n) _____ is a document that grants the holder exclusive rights on an invention for 20 years. A. copyrightB. patentC. trade secretD. knowledge baseE. private property notice

8

Page 9: Final Study Guide MIS315 2010v3S

Ans: BResponse: 3.2 Threats to Information Security

_____ are segments of computer code that attach to existing computer programs and perform malicious acts.A. virusesB. wormsC. Trojan horsesD. back doorsE. alien software

Ans: AResponse: 3.2 Threats to Information Security

_____ are software programs that hide in other computer programs and reveal their designed behavior only when they are activated.A. virusesB. wormsC. Trojan horsesD. back doorsE. alien software

Ans: CResponse: 3.2 Threats to Information Security

_____ are segments of computer code embedded within an organization’s existing computer programs, that activate and perform a destructive action at a certain time or date.A. virusesB. wormsC. Trojan horsesD. back doorsE. logic bomb

Ans: EResponse: 3.2 Threats to Information Security

_____ uses deception to fraudulently acquire sensitive personal information by masquerading as an official e-mail.A. zero-day attackB. denial-of-serviceC. distributed denial-of-serviceD. phishingE. brute force dictionary attack

Ans: DResponse: 3.2 Threats to Information Security

In a(n) _____ attack, a coordinated stream of requests is launched against a target system from many compromised computers at the same time.A. phishingB. denial-of-serviceC. wormD. back doorE. distributed denial-of-service

Ans: EResponse: 3.2 Threats to Information Security

_____ is designed to use your computer as a launch pad for sending unsolicited e-mail to other computers.A. spywareB. spamwareC. adwareD. virusE. worm

Ans: BResponse: 3.2 Threats to Information Security

_____ is the process in which an organization assesses the value of each asset being protected, estimates the probability that each asset might be compromised, and compares the probable costs of each being compromised with the costs of protecting it.A. risk managementB. risk analysisC. risk mitigationD. risk acceptanceE. risk transference

Ans: BResponse: 3.3 Protecting Information Resources

In _____, the organization takes concrete actions against risks.A. risk managementB. risk analysisC. risk mitigationD. risk acceptanceE. risk transference

9

Page 10: Final Study Guide MIS315 2010v3S

Ans: CResponse: 3.3 Protecting Information Resources

In _____, the organization purchases insurance as a means to compensate for any loss.A. risk managementB. risk analysisC. risk mitigationD. risk acceptanceE. risk transference

Ans: EResponse: 3.3 Protecting Information Resources

Which of the following statements is not correct concerning the difficulties in protecting information resources? A. Computing resources are typically decentralized.B. Computer crimes often remain undetected for a long period of time.C. Rapid technological changes ensure that controls are effective for years.D. Employees typically do not follow security procedures when the procedures are inconvenient.E. Computer networks can be located outside the organization.

Ans: CResponse: 3.3 Protecting Information Resources

_____ controls restrict unauthorized individuals from using information resources and are concerned with user identification.A. access controlsB. physical controlsC. data security controlsD. administrative controlsE. input controls

Ans: AResponse: 3.3 Protecting Information Resources

Which of the following is not a characteristic of strong passwords?A. should be difficult to guessB. should contain special charactersC. should not be a recognizable wordD. should not be a recognizable string of numbersE. should be shorter rather than longer so the password can be remembered

Ans: EResponse: 3.3 Protecting Information Resources

Chapter 4Multiple Choice

It is very difficult to manage data for which of the following reasons? A. amount of data stays about the same over timeB. data are scattered throughout organizationsC. decreasing amount of external data needs to be consideredD. data security is easy to maintainE. data are stored in the same format throughout organizations

Ans: BRef: 4.1 Managing Data

Place the following members of the data hierarchy in the correct order: A. bit – byte – field – record – database – file/tableB. bit – field – byte – record – file/table – databaseC. byte – bit – record – field – databaseD. bit – byte – field – record – file/table – databaseE. bit – record – field – byte – file/table -- database

Ans: DRef: 4.2 The Database Approach

Verifying that no alphabetic characters are in a Social Security Number field is an example of _____ :A. data isolationB. data integrityC. data consistencyD. data redundancyE. application/data dependence

Ans: BRef: 4.2 The Database Approach

_____ occurs when the same data are stored in many places.A. Data isolationB. Data integrityC. Data consistencyD. Data redundancyE. Application/data dependence

10

Page 11: Final Study Guide MIS315 2010v3S

Ans: DRef: 4.2 The Database Approach

_____ occurs when various copies of the data agree.A. Data isolationB. Data integrityC. Data consistencyD. Data redundancyE. Application/data dependence

Ans: CRef: 4.2 The Database Approach

A(n) _____ represents a character, such as a letter, number, or symbol. A. byteB. fieldC. recordD. fileE. database

Ans: ARef: 4.2 The Database Approach

In a database, the primary key field is used to _____: A. specify an entityB. create linked listsC. identify duplicated dataD. uniquely identify a recordE. uniquely identify an attribute

Ans: DRef: 4.2 The Database Approach

As an individual student in your university’s student database, you are a(n) _____ of the STUDENT class.A. instanceB. individualC. representativeD. entityE. relationship

Ans: ARef: 4.2 The Database Approach

At Umass, students can take more than one class, and each class can have more than one student. This is an example of what kind of relationship?A. one-to-one

B. one-to-manyC. many-to-oneD. many-to-manyE. some-to-many

Ans: DRef: 4.2 The Database Approach

In the relational database model, related tables can be joined when they contain common _____.A. FilesB. RowsC. RecordsD. Columns/Fields

Ans: DRef: 4.3 Database Management Systems

Data dictionaries perform all of the following functions except:A. Provide information on each recordB. Provide information on why fields/attributes are needed in the databaseC. Define the format necessary to enter data into the databaseD. Provide information on name of fields/attributesE. Provide information on how often fields/attributes should be updated

Ans: ARef: 4.3 Database Management Systems

In a relational database, every row represents a _____:A. fileB. recordC. attributeD. primary keyE. secondary key

Ans: BRef: 4.3 Database Management Systems

A standardized language used to manipulate data is _____: A. MS-AccessB. OracleC. query-by-example languageD. structured query language (SQL)E. data manipulation language (DML)

11

Page 12: Final Study Guide MIS315 2010v3S

Ans: DRef: 4.3 Database Management Systems

Data dictionaries provide which of the following advantages to the organization? A. reduce data inconsistencyB. provide for faster program developmentC. make it easier to modify data and informationD. all of the above

Ans: DRef: 4.3 Database Management Systems

_____ is a method for analyzing and reducing a relational database to its most streamlined form.A. Structured queryB. NormalizationC. Query by exampleD. JoiningE. Relational analysis

Ans: BRef: 4.3 Database Management Systems

When data are normalized, fields/attributes in the table depend only on the _____.A. Common record B. Common attributeC. Primary keyD. Common row

Ans: CRef: 4.3 Database Management Systems

The data in a data warehouse:A. Are updated constantly in real timeB. Are updated in batch mode, approximately once per dayC. Are not updatedD. Are purged constantly as new data enterE. Are available for MIS analysts, but not users

Ans: CRef: 4.4 Data Warehousing

The process of moving data from various sources into the data warehouse is called:A. Upload

B. Extract, transform, loadC. Online transaction processingD. Master data managementE. Online analytical processing

Ans: BRef: Data Warehousing

_____ is a formal approach to managing data consistently across an entire organization.A. Database managementB. Enterprise information managementC. Data warehousingD. Data governanceE. Data mart

Ans : DRef : Data GovernanceDifficulty : Easy

_____ provides companies with a single version of the truth for their data.A. Data warehouseB. Data martC. DatabaseD. Master data managementE. Enterprise information management

Ans: DRef: 4.5 Data Governance

_____ is a process that helps organizations identify, select, organize, disseminate, transfer, and apply expertise that are part of the organization’s memory and typically reside inside the organization in an unstructured manner. A. discoveryB. knowledge managementC. decision supportD. online analytical processingE. data mining

Ans: BRef: 4.6 Knowledge Management

Historically, management information systems have focused on capturing, storing, managing, and reporting _____ knowledge. A. tacitB. explicitC. managerial

12

Page 13: Final Study Guide MIS315 2010v3S

D. geographicalE. cultural

Ans: BRef: 4.6 Knowledge Management

The most important benefit of knowledge management systems is:A. Improved customer serviceB. Make best practices available to employeesC. Retention of scarce knowledge if employees retireD. Improved moraleE. More efficient product development

Ans: BRef: Knowlege Management

Chapter 5Multiple Choice

Fundamental points about network computing in organizations include all of the following except:A. Computers constantly exchange dataB. Computer data exchange provides significant advantages to organizationsC. Networks can be of any size, from small to enormousD. Networks have had limited impact on organizational productivityE. Networks support new ways of doing business

Ans: DResponse: Material immediately following chapter opening case

Networks enable which of the following applications?A. DiscoveryB. CommunicationsC. CollaborationD. Web servicesE. All of the above

Ans: EResponse: Material immediately following chapter opening case

Which of the following are advantages of computer networks?A. enable organizations to be more flexible

B. enable companies to share hardware, computer applications, and dataC. enable geographically dispersed employees to work togetherD. provide a critical link between businesses and their customersE. all of the above

Ans: EResponse: Material immediately following chapter opening case

The network application, _____, enables users to access information located in databases all over the world.A. discoveryB. communicationsC. collaborationD.Web servicesE. none of the above

Ans: AResponse: 5.1 Network Applications

Search engines and metasearch engines are examples of which network application?A. DiscoveryB. CommunicationsC. CollaborationD. Web servicesE. None of the above

Ans: AResponse: 5.1 Network Applications

The amount of information on the Web _____ approximately each year. A. stays about the sameB. decreasesC. doublesD. quadruplesE. triples

Ans: CResponse: 5.1 Network Applications

_____ portals offer content for diverse communities and are intended for broad audiences.A. IndustrywideB. Personal

13

Page 14: Final Study Guide MIS315 2010v3S

C. AffinityD. CorporateE. Commercial

Ans: EResponse: 5.1 Network Applications

_____ portals support communities such as hobby groups or a political party. A. IndustrywideB. PersonalC. AffinityD. CorporateE. Commercial

Ans: CResponse: 5.1 Network Applications

_____ portals coordinate content within relatively narrow organizational and partners’ communities. A. publishingB. personalC. affinityD. corporateE. commercial

Ans: DResponse: 5.1 Network Applications

Many organizations have implemented corporate portals for which of the following reasons? A. to cut costsB. free up time for busy managersC. improve profitabilityD. offer customers self-service opportunitiesE. all of the above

Ans: EResponse: 5.1 Network Applications

Portals are an example of which network application?A. DiscoveryB. CollaborationC. CommunicationsD. Web servicesE. None of the above

Ans: AResponse: 5.1 Network Applications

With _____, every call opened up a dedicated circuit for the duration of the call.A. voice over IPB. plain old telephone serviceC. chat roomD. teleconferenceE. Internet relay chat

Ans: BResponse: 5.1 Network Applications

With _____, phone calls are treated as just another kind of data.A. Voice over IPB. Plain old telephone serviceC. Chat roomD. TeleconferenceE. Internet relay chat

Ans: AResponse: 5.1 Network Applications

Workflow, groupware, and telepresence systems are examples of which network application?A. DiscoveryB. CommunicationsC. CollaborationD. Web services E. None of the above

Ans: CResponse: 5.1 Network Applications

Key developments of the first generation of the Web were:A. Creation of Web sitesB. Heavy user interactivity with Web sitesC. Commercialization of the WebD. A and BE. A and C

Ans: EResponse: 5.2 Web 2.0

Users typically have little interaction with _____, which provide information that users receive passively.A. Affinity portalsB. Web 1.0 sites

14

Page 15: Final Study Guide MIS315 2010v3S

C. Web 2.0 sitesD. WikisE. Web 3.0 sites

Ans: BResponse: 5.2 Web 2.0

_____ is a Web development technique that allows portions of Web pages to reload with fresh data rather than requiring the entire page to reload.A. AJAXB. TaggingC. Really simple syndicationD. WikisE. Blogging

Ans: AResponse: 5.2 Web 2.0

A process that allows users to place information in multiple, overlapping associations is called _____.A. AJAXB. TaggingC. Really simple syndicationD. WikisE. Blogging

Ans: BResponse: 5.2 Web 2.0Difficulty: Easy

A process that enables users to create a personal Web site containing his or her thoughts, feelings, and opinions is called _____.A. AJAXB. TaggingC. Really simple syndicationD. WikisE. Blogging

Ans: EResponse: 5.2 Web 2.0

A Web site on which anyone can post material and make changes to other material is a(n) _____.A. BlogB. WikiC. Affinity portalD. Really simple syndication feedE. Podcast

Ans: BResponse: 5.2 Web 2.0

Only the author may make changes to a(n) _____, where anyone can make changes to any content on a(n) _____.A. Blog, really simple syndication feedB. Blog, WikiC. Podcast, WikiD. Podcast, really simple syndication feedE. Wiki, blog

Ans: BResponse: 5.2 Web 2.0

_____ allows users to receive customized information when they want it, without having to surf thousands of Web sites.A. AJAXB. TaggingC. BloggingD. PodcastingE. Really simple syndication

Ans: EResponse: 5.2 Web 2.0

A(n) _____ is a digital audio file that is distributed over the Web for playback on portable media players or personal computers.A. Really simple syndication feedB. BlogC. PodcastD. VideocastE. Wiki

Ans: CResponse: 5.2 Web 2.0

_____ Web sites allow users to upload their content to the Web, in the form of text, voice, images, and videos.A. AggregatorsB. MashupsC. Social networkingD. Affinity portalsE. Really simple syndication

Ans: C

15

Page 16: Final Study Guide MIS315 2010v3S

Response: 5.2 Web 2.0

A particularly valuable business-oriented social networking site is:A. MySpaceB. FaceBookC. FlickrD. LinkedInE. Twitter

Ans: DResponse: 5.2 Web 2.0

_____ are Web sites that provide collections of content from all over the Web.A. AggregatorsB. Social networksC. MashupsD. Corporate portalsE. Really simple syndication

Ans: AResponse: 5.2 Web 2.0

A(n) _____ is a Web site that takes content from other Web sites and puts it together to create a new type of content.A. AggregatorsB. Social networksC. MashupsD. Corporate portalsE. Really simple syndication

Ans: CResponse: 5.2 Web 2.0

ChicagoCrime is a Web site that combines the Chicago Police Department’s crime-report information with Google Maps to provide a guide to crime in Chicago. ChicagoCrime is an example of which kind of Web 2.0 site?A. AggregatorsB. Social networksC. MashupsD. Corporate portalsE. Really simple syndication

Ans: CResponse: 5.2 Web 2.0

_____ are applications, delivered over the Internet, that use shared protocols to interoperate without human intervention.A. PortalsB. Web servicesC. Service-oriented architecturesD. WikisE. Webcrawlers

Ans: BResponse: 5.2 Web 2.0

_____ is a protocol that makes it easier to exchange data among a variety of applications and to validate and interpret such data.A. Extensible markup language (XML)B. Simple object access protocolC. Web services description language (WSDL)D. Universal description, discovery, and integration (UDDI)E. Hypertext markup language (HTML)

Ans: AResponse: 5.2 Web 2.0

_____ is a set of rules that define how messages can be exchanged among different network systems and applications.A. Extensible markup languageB. Simple object access protocolC. Web services description languageD. Universal description, discovery, and integrationE. Hypertext markup language

Ans: BResponse: 5.2 Web 2.0

_____ is used to create the document that describes the tasks performed by various Web services.A. Extensible markup languageB. Simple object access protocolC. Web services description languageD. Universal description, discovery, and integrationE. Hypertext markup language

Ans: CResponse: 5.2 Web 2.0

16

Page 17: Final Study Guide MIS315 2010v3S

The benefits of e-learning include which of the following? A. increased content retentionB. current, high-quality contentC. consistencyD. flexibilityE. all of the above

Ans: EResponse: 5.3 E-Learning and Distance Learning

Which of the following is not a disadvantage of telecommuting for employees? A. decreased feelings of isolationB. possible loss of fringe benefitsC. lower pay (in some cases)D. no workplace visibilityE. slower promotions

Ans: AResponse: 5.4 Telecommuting

Chapter 6Multiple Choice

The nature of business competition is changing drastically as a result of all of the following except:A. new online companiesB. new business modelsC. the diversity of EC-related products and servicesD. the increase in the number of digitizable productsE. companies are having difficulty integrating their physical and electronic channels

Ans: EResponse: Material immediately following chapter opening case

Electronic commerce provides opportunities to do all of the following except:A. For companies to expand their reachB. For companies to expand at relatively high costC. For companies to put rich information on their Web sitesD. For companies to increase market shareE. For companies to adopt new business models

Ans: B

Response: Material immediately following chapter opening case

In this type of e-commerce, the sellers and buyers are organizations.A. government-to-citizenB. consumer-to-consumerC. business-to-businessD. business-to-consumerE. consumer-to-business

Ans: CResponse: 6.1 Overview of E-Business and E-Commerce

In this type of e-commerce, an organization provides information and services to its workers.A. business-to-employeeB. consumer-to-consumerC. consumer-to-businessD. business-to-consumerE. government-to-business

Ans: AResponse: 6.1 Overview of E-Business and E-Commerce

Direct payment of Social Security benefits is an example of which type of e-commerce?A. government-to-citizenB. consumer-to-consumerC. consumer-to-businessD. business-to-consumerE. business-to-business

Ans: AResponse: 6.1 Overview of E-Business and E-Commerce

If you are an employee managing your fringe benefits over your company’s intranet, you are engaging in which of the following?A. business-to-businessB. business-to-consumerC. consumer-to-consumerD. business-to-employeeE. government-to-citizen

Ans: D

17

Page 18: Final Study Guide MIS315 2010v3S

Response: 6.1 Overview of E-Business and E-Commerce

Which of the following statements regarding the relationship between electronic commerce and search is not correct?A. Purchases often follow successful online searchesB. Shopping carts are often abandoned after unsuccessful online searchesC. Retailers will provide fewer product details to avoid information overload for customersD. Customers will be able to find the closest store offering the product that they wantE. Customers will have more relevant product information in the near future

Ans: CResponse: 6.1 Overview of E-Business and E-Commerce

In _____ auctions, there is one buyer who wants to buy a product. Suppliers submit bids and the lowest bid wins.A. forwardB. staticC. reverseD. physicalE. simple

Ans: CResponse: 6.1 Overview of E-Business and E-Commerce

15. eBay uses a _____ auction.A. forwardB. staticC. reverseD. physicalE. simple

Ans: AResponse: 6.1 Overview of E-Business and E-Commerce

16. _____ auctions employ a request for quotation.A. forwardB. staticC. reverseD. physicalE. simple

Ans: CResponse: 6.1 Overview of E-Business and E-Commerce

In which of the following business models do businesses request quotes from suppliers and use B2B with a reverse auction mechanism?A. find-the-best-priceB. electronic tendering systemC. name-your-own-priceD. online direct marketingE. affiliate marketing

Ans: BResponse: 6.1 Overview of E-Business and E-Commerce

Vendors ask partners to place logos or banners on partners’ site. If customers click on logo, go to vendor’s site and buy, then vendor pays commissions to partners. This is which business model?A. find-the-best-priceB. electronic tendering systemC. name-your-own-priceD. online direct marketingE. affiliate marketing

Ans: EResponse: 6.1 Overview of E-Business and E-Commerce

Which type of electronic commerce is the largest by volume?A. business-to-employeeB. consumer-to-consumerC. business-to-businessD. business-to-consumerE. none of the above

Ans: CResponse: 6.3 Business-to-Business (B2B) Electronic Commerce

Which type of electronic commerce does Amazon practice?A. business-to-employeeB. consumer-to-consumerC. consumer- to-businessD. business-to-consumer

18

Page 19: Final Study Guide MIS315 2010v3S

E. employee-to-business

Ans: DResponse: 6.2 Business-to-Consumer (B2C) Electronic Commerce

This type of e-commerce is known as e-tailing.A. business-to-businessB. collaborative commerceC. intrabusinessD. business-to-consumerE. consumer-to-business

Ans: DResponse: 6.2 Business-to-Consumer (B2C) Electronic Commerce

The advantages of B2C for consumers include all of the following except:A. You can buy from home 24 hours per day, 7 days per week.B. You have a wider variety of products to choose from.C. You typically cannot access additional information, so you do not have information overload.D. You can easily compare prices and features.E. You can find unique items.

Ans: CResponse: 6.2 Business-to-Consumer (B2C) Electronic Commerce

Which of the following is not an advantage of e-tailing?A. you can buy from home, 24 hours per dayB. you have just a few products to choose fromC. you can obtain detailed information on productsD. you can compare competitor’s products and pricesE. all of the above

Ans: BResponse: 6.2 Business-to-Consumer (B2C) Electronic Commerce

When middlemen are eliminated in a fully automated electronic commerce transaction, this is called _____.A. disintegrationB. supply chain integrationC. direct sales

D. disintermediationE. value-added services

Ans: DResponse: 6.2 Business-to-Consumer (B2C) Electronic Commerce

When Ford Motor Company decided to avoid direct online sales, the company was trying to eliminate which of the following?A. federal sales taxesB. customer irritationC. channel conflictD. channel integrationE. state sales taxes

Ans: CResponse: 6.2 Business-to-Consumer (B2C) Electronic Commerce

In _____, direct and indirect materials in one industry are purchased on an as-needed basis.A. horizontal exchangesB. vertical exchangesC. buy-side marketplacesD. functional exchangesE. sell-side marketplaces

Ans: BResponse: 6.3 Business-to-Business (B2B) Electronic Commerce

_____ connect buyers and sellers across many industries and are used mainly for indirect materials.A. Horizontal exchangesB. Vertical exchangesC. Buy-side marketplacesD. Functional exchangesE. Sell-side marketplaces

Ans: AResponse: 6.3 Business-to-Business (B2B) Electronic Commerce

Which of the following is not a limitation of traditional payment methods in electronic commerce?A. cash cannot be used because there is no face-to-face contactB. takes time for payment in the mailC. not all organizations accept credit cards

19

Page 20: Final Study Guide MIS315 2010v3S

D. it is more secure for the buyer to use the telephone than to complete a secure transaction on a computerE. none of the above

Ans: DResponse: 6.4 Electronic Payments

_____ are a payment mechanism similar to regular bank checks but transmitted electronically, with a signature in digital form. A. Electronic checksB. Electronic credit cardsC. Electronic cashD. Electronic walletE. Electronic debit cards

Ans: AResponse: 6.4 Electronic Payments

_____ use credit card numbers, transmitted electronically over the Internet, to pay for goods and services and are encrypted A. Electronic checksB. Electronic credit cardsC. Electronic cashD. Electronic walletE. Electronic debit cards

Ans: BResponse: 6.4 Electronic Payments

_____ are typically used for unplanned B2B purchases for amounts under $2000.A. Electronic checksB. Stored-value money cardsC. Purchasing cardsD. Smart cardsE. Person-to-person payments

Ans: CResponse: 6.4 Electronic Payments

A form of e-cash, _____ allows you to store a fixed amount of prepaid money and then spend it as necessary.A. electronic checksB. stored-value money cardsC. purchasing cardsD. smart cardsE. person-to-person payments

Ans: BResponse: 6.4 Electronic Payments

_____ contain a chip that can store information and can be used for several purposes.A. Electronic checksB. Stored-value money cardsC. Purchasing cardsD. Smart cardsE. Person-to-person payments

Ans: DResponse: 6.4 Electronic Payments

The practice of using similar but not identical domain names is called _____.A. Domain spoofingB. Domain masqueradingC. Domain tastingD. CybersquattingE. Domain fraud

Ans: CResponse: 6.5 Ethical and Legal Issues in E-Business

_____ refers to the practice of registering or using domain names for the purpose of profiting from the goodwill or trademark belonging to someone else.A. Domain spoofingB. Domain masqueradingC. Domain tastingD. CybersquattingE. Domain fraud

Ans: DResponse: 6.5 Ethical and Legal Issues in E-Business

Chapter 7Multiple Choice

Individuals are finding it convenient and productive to use wireless devices for which of the following reasons?A. To make use of time that was formerly wastedB. To become more efficientC. Work locations are more flexibleD. To be able to allocate working time around personal and professional obligationsE. All of the above

20

Page 21: Final Study Guide MIS315 2010v3S

Ans: EResponse: 7.1 Wireless Technologies

Which type of satellite has the largest footprint?A. low earth orbitB. medium earth orbitC. geostationaryD. polar orbitE. equatorial orbit

Ans: CResponse: 7.1 Wireless Technologies

The area of the earth reached by a satellite’s transmission is called _____.A. HotspotB. CoverageC. FootprintD. ZoneE. Wireless area

Ans: CResponse: 7.1 Wireless Technologies

The greatest problem with GEO satellites is which of the following?A. Propagation delayB. ExpenseC. Orbital lifeD. Size of footprintE. Relative speed with respect to a point on the earth’s surface

Ans: AResponse: 7.1 Wireless Technologies

_____ is a satellite-based tracking system that enables the determination of a person’s position.A. BluetoothB. wireless application protocolC. short message serviceD. wi-fiE. global positioning system

Ans: EResponse: 7.1 Wireless Technologies

The main problem with radio transmission is which of the following?A. Radio waves cannot travel through wallsB. When you travel too far from the source, the signal fadesC. Devices are difficult to installD. Radio waves are slowE. Devices are expensive to install

Ans: BResponse: 7.1 Wireless Technologies

_____ is a wireless standard that enables temporary, short-range connection between mobile devices.A. BluetoothB. wireless application protocolC. short message serviceD. wi-fiE. global positioning system

Ans: AResponse: 7.2 Wireless Computer Networks and Internet Access

_____, with the shortest range of any wireless network, is designed to be used with contactless credit cards.A. Near field communicationsB. BluetoothC. Ultra-widebandD. Wi-FiE. Infrared

Ans: AResponse: 7.2 Wireless Computer Networks and Internet Access

Microwave transmission systems are used for _____ volume, _____ distance, _____ communications.A. Low, long, broadcastB. Low, short, line-of-sightC. High, long, broadcastD. High, short, broadcastE. High, long, line-of-sight

Ans: EResponse: 7.2 Wireless Computer Networks and Internet Access

21

Page 22: Final Study Guide MIS315 2010v3S

Which of the following statements about Wi-Fi is not correct?A. Wi-Fi provides simple Internet access.B. Laptop PCs can contain chips that send and receive Wi-Fi signals.C. Many companies offer free Wi-Fi access in their stores.D. Wi-Fi requires encryption for secure transmissions.E. Wi-Fi is expensive to set up.

Ans: EResponse: 7.2 Wireless Computer Networks and Internet Access

A small geographical perimeter within which a wireless access point provides service to a number of users is called: A. transceiverB. hotspotC. local receptionD. wireless networkE. GPS location

Ans: BResponse: 7.2 Wireless Computer Networks and Internet Access

Today, most wireless local area networks use the _____ standard, which can transmit up to 54 Mbps and has a range of about 300 feet.A. 555.11a/bB. 702.11g/nC. 872.11cD. 802.11g/nE. Wi-Max

Ans: DResponse: 7.2 Wireless Computer Networks and Internet Access

_____ communicate via radio waves using radio antennas placed within adjacent geographic areas.A. BluetoothB. Cell phonesC. SatelliteD. Ultra-widebandE. Near field communications

Ans: B

Response: 7.2 Wireless Computer Networks and Internet Access

Mobile computing has two major characteristics that differentiate it from other forms of computing. What are these two characteristics?A. Mobility, broad reachB. Mobility, lack of expenseC. Security, broad reachD. Security, mobilityE. Broad reach, localization

Ans: AResponse: 7.3 Mobile Computing and Mobile Commerce

With regard to mobile computing, _____ means that knowing where a user is physically is a key to offering relevant products and services. A. ubiquityB. convenienceC. instant connectivityD. personalizationE. localization of products and services

Ans: EResponse: 7.3 Mobile Computing and Mobile Commerce

The development of mobile commerce is driven by all of the following factors except:A. widespread availability of mobile devicesB. the cell phone cultureC. increasing pricesD. bandwidth improvementE. no need for a PC

Ans: CResponse: 7.3 Mobile Computing and Mobile Commerce

Which of the following is not a mobile application in financial services? A. transaction processing systemsB. mobile banking C. wireless electronic payment systemsD. micropaymentsE. wireless wallets

Ans: A

22

Page 23: Final Study Guide MIS315 2010v3S

Response: 7.3 Mobile Computing and Mobile Commerce

Parking meters that you can pay via your mobile telephone is an example of: A. mobile bankingB. wireless electronic paymentC. wireless walletD. brokerage serviceE. money transfer

Ans: BResponse: 7.3 Mobile Computing and Mobile Commerce

Putting ads on top of taxicabs in New York City that change as the cabs travel around the city is an example of: A. viral marketingB. permission advertisingC. geographical advertisingD. location-based advertisingE. direct marketing

Ans: DResponse: 7.3 Mobile Computing and Mobile Commerce

The generic term for technologies that use radio waves to automatically identify individual items is: A. telemetryB. bar codesC. shipping labelsD. radio-frequency identification (RFID)E. wireless access point (WAP)

Ans: DResponse: 7.4 Pervasive Computing

Which of the following is not a problem with bar codes?A. They do not provide enough data.B. They require line-of-sight.C. They can be ripped or soiled.D. They are expensive.E. They identify the manufacturer and product, but not the actual item.

Ans: DResponse: 7.4 Pervasive Computing

_____ collect data from many points over an extended space.A. Bluetooth networksB. Ultra-wideband networksC. Wireless sensor networksD. Wi-Max networksE. Wi-Fi networks

Ans: CResponse: 7.4 Pervasive Computing

The act of locating wireless local area networks while moving around a city is called: A. war dialingB. war drivingC. war hackingD. war crackingE. war chalking

Ans: BResponse: 7.5 Wireless Security

A(n) _____ allows unauthorized entry into a wireless network.A. Lack of encryptionB. Disgruntled employeeC. Open nodeD. Illegal serverE. Rogue access point

Ans: EResponse: 7.5 Wireless Security

_____ refers to efforts by unauthorized users to access data traveling over wireless networks.A. RF jammingB. War drivingC. EavesdroppingD. War chalkingE. Installing rogue access points

Ans: CResponse: 7.5 Wireless Security

In _____, a person or a device intentionally or unintentionally interferes with your wireless network transmissions.A. RF jamming

23

Page 24: Final Study Guide MIS315 2010v3S

B. War drivingC. EavesdroppingD. War chalkingE. Installing rogue access points

Ans: AResponse: 7.5 Wireless Security

Technology Guide 1Multiple Choice

Which of the following is not a component of hardware?A. Primary and secondary storageB. The operating systemC. Input and output technologiesD. Central processing unitE. Communication technologies

Ans: BRef: TG1.2 The Central Processing Unit

Which of the following is not a component of the central processing unit? A. RegistersB. Control unitC. Secondary storageD. Arithmetic-logic unit

Ans: CRef: TG1.2 The Central Processing Unit

The _____ is measured in megahertz or gigahertz.A. clock speedB. word lengthC. bus widthD. line widthE. bandwidth

Ans: ARef: TG1.2 The Central Processing Unit

Gordon Moore (with Moore’s Law) predicted that microprocessor complexity would do which of the following? A. Double every yearB. Double every two yearsC. Increase slowlyD. Decrease slowlyE. Decrease rapidly

Ans: BRef: TG1.2 The Central Processing Unit

Increased microprocessor complexity comes from which of the following?A. Decreasing line widthB. Increasing transistor miniaturizationC. Using new materials for the chip that increase conductivityD. Putting more transistors on the chipE. All of the above

Ans: ERef: TG1.2 The Central Processing Unit

The amount and type of memory that a computer possesses affects which of the following? A. The type of program the computer can runB. The speed of the computerC. The cost of the computerD. The cost of processing dataE. All of the above

Ans: ERef: TG1.3 Computer Memory

Arrange in the correct sequence, from smallest to largest: A. megabyte – kilobyte – gigabyte – terabyte B. kilobyte – megabyte – terabyte – gigabyteC. kilobyte – megabyte – gigabyte – terabyteD. megabyte – terabyte – kilobyte – gigabyteE. kilobyte – gigabyte – megabyte – terabyte

Ans: CRef: TG1.3 Computer Memory

Which of the following is not stored in primary storage? A. Data to be processed by the CPUB. Instructions for the CPU as to how to process the dataC. Archival dataD. Operating system programsE. None of the above

Ans: CRef: TG1.3 Computer Memory

24

Page 25: Final Study Guide MIS315 2010v3S

Which of the following is not a type of primary storage? A. RegisterB. Random access memoryC. Flash memoryD. Read-only memoryE. Cache memory

Ans: CRef: TG1.3 Computer Memory

The part of primary storage that holds a software program (or portion of it) and small amounts of data when they are brought from secondary storage is calledA. read-only memoryB. random access memoryC. cache memoryD. registersE. flash memory

Ans: BRef: TG1.3 Computer Memory

Random access memory is _____ and _____. A. volatile, temporaryB. nonvolatile, permanentC. nonvolatile, temporaryD. volatile, permanentE. None of the above

Ans: ARef: TG1.3 Computer Memory

Which of the following is not a type of primary storage? A. Random access memoryB. RegistersC. CacheD. Read-only memoryE. Optical Storage

Ans: ERef: TG1.3 Computer Memory

The type of primary storage, closest to the CPU where the computer can temporarily store blocks of data used most often is calledA. read-only memory

B. registersC. random access memoryD. cache memoryE. flash memory

Ans: DRef: TG1.3 Computer Memory

The type of primary storage where certain critical instructions are safeguarded because the storage is nonvolatile and the instructions can be read only by the computer and not changed by the user is called A. read-only memoryB. random access memoryC. cache memoryD. registersE. flash memory

Ans: ARef: TG1.3 Computer Memory

Secondary storage has which of the following characteristics? A. NonvolatileB. More cost effective than primary storageC. Slower than primary storageD. Can utilize a variety of mediaE. All of the above

Ans: ERef: TG1.3 Computer Memory

_____, a type of enterprise storage system, links groups of hard drives to a specialized microcontroller, which coordinates the drives so they appear to be a single, logical drive.A. Redundant array of independent disks (RAID)B. Storage area network (SAN)C. Network-attached storage (NAS)D. Secondary storageE. Primary storage

Ans: ARef: TG1.3 Computer Memory

_____, a type of enterprise storage system, is an architecture for building dedicated networks that allow rapid and reliable access to storage devices by multiple servers.A. Redundant array of independent disks (RAID)

25

Page 26: Final Study Guide MIS315 2010v3S

B. Storage area network (SAN)C. Network-attached storage (NAS)D. Secondary storageE. Primary storage

Ans: BRef: TG1.3 Computer Memory

To model the weather or simulate nuclear weapons testing, you would most likely use a A. mainframe computerB. workstationC. supercomputerD. personal computerE. active badge

Ans: CRef: TG1.4 Computer Hierarchy

A _____ is used in large enterprises for extensive computing applications that are accessed by thousands of concurrent users.A. supercomputerB. mainframeC. midrange computerD. microcomputerE. laptop computer

Ans: BRef: TG1.4 Computer Hierarchy

Many firms are recentralizing their applications to mainframes for which of the following reasons? A. To support the large number of transactions caused by electronic commerceB. To reduce the total cost of ownership of distributed systemsC. To simplify administration of IT resourcesD. To improve system performanceE. all of the above

Ans: ERef: TG1.4 Computer Hierarchy

A _____ is the least expensive general-purpose computer.A. supercomputerB. mainframeC. midrange computerD. microcomputer/personal computer

E. None of the above Ans: DRef: TG1.4 Computer Hierarchy

In _____, a service provider makes computing resources and infrastructure management available to a customer as needed.A. server farmB. virtualizationC. grid computingD. utility/subscription computingE. the Internet

Ans: DRef: TG1.6 Innovations in Hardware Utilization

_____ refers to the creation of materials, devices, and systems on a scale of billionths of a meter.A. NanotechnologyB. Ultra-large scale integrationC. Very-large scale integrationD. Utility computingE. Edge computing

Ans: ARef: TG1.6 Innovations in Hardware Utilization

Technology Guide 2Multiple Choice

Today, software comprises a larger percentage of the cost of modern computer systems than it did in the early 1950s for which of the following reasons? A. Hardware costs have decreasedB. Hardware performance has increasedC. Software has become increasingly complexD. Building software applications remains slow, complex, and error-proneE. All of the above

Ans: ERef: TG2.1 Significance of Software

The set of computer programs used to manage hardware resources is calledA. Microsoft Office SuiteB. application softwareC. general softwareD. systems softwareE. personal application software

26

Page 27: Final Study Guide MIS315 2010v3S

Ans: DRef: TG2.1 Significance of Software

The set of computer instructions that provides specific functionality to a user is calledA. transaction processing softwareB. application softwareC. general softwareD. systems softwareE. microcode

Ans: BRef: TG2.1 Significance of Software

Which of the following is not a function of the operating system?A. Allocates CPU time and main memory to programs running on the computerB. Provides an interface between the user and the hardwareC. Supervises the overall operation of the computerD. Increases the complexity of the system to the userE. None of the above

Ans: DRef: TG2.2 Systems Software

_____ means that several parts of the same application can work simultaneously. A. MultithreadingB. MultitaskingC. Time-sharingD. ScalabilityE. Multiprocessing

Ans: ARef: TG2.2 Systems Software

_____ occurs when a computer system with two or more processors runs more than one program, or thread, at a given time by assigning them to different processors.A. MultithreadingB. MultitaskingC. Time-sharingD. ScalabilityE. Multiprocessing

Ans: E

Ref: TG2.2 Systems Software

_____ are programs that sort records, create directories and sub-directories, restore accidently deleted files, and manage memory usage.A. System utilitiesB. General application softwareC. Personal application softwareD. System performance monitorsE. System security monitors

Ans: ARef: TG2.2 Systems Software

_____ are programs that protect a computer system from unauthorized use, fraud, and destruction.A. System utilitiesB. General application softwareC. Personal application softwareD. System performance monitorsE. System security monitors

Ans: ERef: TG2.2 Systems Software

Creating specific application software using an organization’s own resources is called what?A. OutsourcingB. Consultant-based developmentC. In-house developmentD. Contract softwareE. Application service providers

Ans: CRef: TG2.3 Application Software

Off-the-shelf software _____.A. may not match an organization’s current work processes and dataB. is more flexible in making modificationsC. requires more risk because all features and performance are not knownD. is rarely tested prior to release

Ans: ARef: TG2.3 Application Software

Which of the following is not a factor in the selection of software?

27

Page 28: Final Study Guide MIS315 2010v3S

A. Size and location of the user baseB. Number of the CDs required for the softwareC. CostsD. In-house technical skillsE. System capabilities

Ans: BRef: TG2.4 Software Issues

In order to protect their software from illegal distribution, vendors often rely on _____ A. encryptionB. private security agentsC. software licensingD. Internet-based distribution methods

Ans: CRef: TG2.4 Software Issues

_____ is software whose source code is available at no cost to developers and users.A. FreewareB. SharewareC. Open systemsD. Open source softwareE. Software-as-a-service

Ans: DRef: TG2.4 Software Issues

Which of the following is not an advantage of open-source software?A. Produces high quality codeB. Produces code that can be changed to meet the needs of the usersC. Bugs are discovered quicklyD. Limited support is available only through online communities of core developersE. Produces reliable code

Ans: DRef: TG2.4 Software Issues

Which of the following is not a disadvantage of open-source software?A. Organizations need in-house technical support or a maintenance contract from a third partyB. May not be easy to useC. May take time and money to train usersD. May not be compatible with existing systems

E. Runs slower than comparable vendor-developed software

Ans: ERef: TG2.4 Software Issues

_____ is software that typically allows no access to the underlying source code.A. FreewareB. SharewareC. Open systemsD. Open source software

Ans: BRef: TG2.4 Software Issues

Programming languages that use icons, symbols, and pull-down menus to develop applications are called _____A. object-oriented languagesB. second generation languagesC. visual programming languagesD. JavaE. third generation languages

Ans: CRef: TG2.5 Programming Languages

In an object-oriented language, one of the primary advantages of an object is that it contains _____ A. reusable codeB. reusable dataC. embedded graphicsD. messagesE. no errors

Ans: ARef: TG2.5 Programming Languages

Technology Guide 3Multiple Choice

Which of the following statements is not correct?A. You should use credit cards with your picture on them.B. You may use virtual credit cards for additional security.

28

Page 29: Final Study Guide MIS315 2010v3S

C. You should use debit cards whenever possible for additional security.D. Virtual credit cards cannot be used for in-store purchases. E. Signatures on credit cards are often impossible to read.

Ans: CResponse: TG3.2 Behavioral Actions to Protect Your Information Assets

Your liability with credit cards is typically _____, where your liability with debit cards is _____? A. the amount in your bank account, your credit limitB. your credit limit, the amount in your bank accountC. the amount in your bank account, zeroD. your credit limit, zeroE. zero to $50, the amount in your bank account

Ans: EResponse: TG3.2 Behavioral Actions to Protect Your Information Assets

Which of the following statements about companies that provide proactive protection of your information assets is not correct?A. These companies allow their customers to lock their credit files.B. These companies ensure that new lines of credit cannot be opened unless their clients unlock their credit files.C. These companies operate independently of the three major credit reporting agencies.D. Signing up with these companies means that merchants and banks must have verbal or written permission from their customers before opening new credit in their names.E. These companies will proactively monitor their clients’ credit files at the three credit reporting agencies.

Ans: CResponse: TG3.2 Behavioral Actions to Protect Your Information Assets

Personal firewalls perform all of the following functions except:A. They should make your computer invisible. B. They should seek out the origin of malware in an attempt to block it in the future.C. They should alert you to suspicious behavior.

D. They should block outbound connections that you do not initiate.E. They should tell you when a program or connection is attempting to do something that you do not want.

Ans: BResponse: TG3.3 Computer-Based Actions to Protect Your Information Assets

_____ software logs keystrokes, e-mails, applications, windows, Web sites, Internet connection, passwords, chat conversations, Web cams, and screenshots.A. FirewallB. Anti-malwareC. MonitoringD. Content filteringE. Anti-spyware

Ans: CResponse: TG3.3 Computer-Based Actions to Protect Your Information Assets

Content filtering software performs all of the following functions except A. blocks access to undesirable Web sitesB. records all Web sites visitedC. proactively monitor computers against malware attacksD. records both sides of chat conversations E. enable users to selectively filter content

Ans: CResponse: TG3.3 Computer-Based Actions to Protect Your Information Assets

Methods you should use to protect your portable devices and information include all of the following except A. use two-factor authenticationB. do not leave your portable devices in plain view in a carC. keep your portable devices in an inconspicuous containerD. encrypt the hard drive of your laptopE. all of the above

Ans: EResponse: TG3.3 Computer-Based Actions to Protect Your Information Assets

29

Page 30: Final Study Guide MIS315 2010v3S

For security in your wireless computing, you should use the _____ encryption standard, rather than the older _____ encryption standard. A. WPA, WEPB. WPA2, WPAC. WEP, WPAD. WPA2, WEPE. WEP, WPB

Ans: DResponse: TG3.3 Computer-Based Actions to Protect Your Information Assets

Technology Guide 4

The function of _____ is to convert digital signals to analog signals and vice-versa.A. ModemsB. MultiplexersC. Front-end processorsD. ServersE. Clients

Ans: AResponse: TG4.1 The Telecommunications System

_____ signals convey information in wave form, where _____ signals convey information in digital, binary form.A. Analog, packetB. Analog, digitalC. Digital, packetD. Digital, analogE. Packet, analog

Ans: BResponse: TG4.1 The Telecommunications System

_____ allow a single communications channel to carry data transmissions simultaneously from many sources.A. ModemsB. MultiplexersC. Front-end processorsD. ServersE. Clients

Ans: B

Response: TG4.1 The Telecommunications System

_____ manage all routing communications with peripheral devices for a large computer system. A. ModemsB. MultiplexersC. Front-end processorsD. ServersE. Clients

Ans: CResponse: TG4.1 The Telecommunications System

Which of the following is not a communications channel?A. Fiber optic cableB. Satellite transmissionC. Twisted-pair wireD. Integrated circuitsE. Cellular radio

Ans: DResponse: TG4.1 The Telecommunications System

The cable medium with the highest bandwidth is:A. Twisted-pair wireB. Coaxial cableC. Fiber optic cableD. Cellular radioE. Copper cable

Ans: CResponse: TG4.1 The Telecommunications System

Data is sent through a fiber-optic cable by:A. Optical switchB. Electromagnetic switchC. LaserD. MultiplexerE. Optical modem

Ans: CResponse: TG4.1 The Telecommunications System

By using an Integrated Services Digital Network (ISDN) service, an organization will be able to transmit _____ data than if it used Digital Subscriber Line (DSL) .A. More voice

30

Page 31: Final Study Guide MIS315 2010v3S

B. MoreC. LessD. The same amount ofE. More streaming video

Ans: CResponse: TG4.1 The Telecommunications System

_____ refers to the range of frequencies available in any communications channel.A. ProtocolB. BroadbandC. CapacityD. NarrowbandE. Bandwidth

Ans: EResponse: TG4.1 The Telecommunications System

Which of the following are advantages of computer networks?A. Enable organizations to be more flexibleB. Enable companies to share hardware, computer applications, and dataC. Enable geographically dispersed employees to work togetherD. Provide a critical link between businesses and their customersE. All of the above

Ans: EResponse: TG4.2 Types of Networks

The components of a local area network include which of the following?A. File serverB. Client computersC. Wireline or wireless communications mediaD. Network interface cardsE. All of the above

Ans: EResponse: TG4.2 Types of Networks

Which of the following is not a component of a local area network?A. File serverB. Client computersC. BridgeD. Network interface cards

E. All of the above

Ans: CResponse: TG4.2 Types of Networks

A(n) _____ connects dissimilar networks.A. EthernetB. network interface cardC. bridgeD. gatewayE. file server

Ans: DResponse: TG4.2 Types of Networks

A(n) _____ connects two or more devices in a limited geographical area.A. local area networkB. wide area networkC. personal area networkD. enterprise networkE. value added network

Ans: AResponse: TG4.2 Types of Networks

A(n) _____ connects similar networks.A. routerB. network interface cardC. bridgeD. gatewayE. file server

Ans: CResponse: TG4.2 Types of Networks

A(n) _____ sends messages through several connected LANs or to a wide area network.A. routerB. network interface cardC. bridgeD. gatewayE. file server

Ans: AResponse: TG4.2 Types of Networks

A(n) _____ allows a device to physically connect to a local area network’s communications medium.

31

Page 32: Final Study Guide MIS315 2010v3S

A. file serverB. network interface cardC. network operating systemD. communications channelE. gateway

Ans: BResponse: TG4.2 Types of Networks

Characteristics of wide area networks include all of the following except:A. provided by individual companiesB. have large capacityC. cover large geographical areasD. combine multiple communications channelsE. the Internet is an example of a wide area network

Ans: AResponse: TG4.2 Types of Networks

In order to ensure that computers developed by different manufacturers can communicate, _____ have been developed.A. protocolsB. client/server architecturesC. WANsD. application software packagesE. developmental architectures

Ans: AResponse: TG4.3 Network Fundamentals

A protocol isA. a device that handles the switching of voice and data in a local area networkB. a standard set of rules and procedures for control of communications in a networkC. a communications service for the connection of devices in a local area networkD. the main communications channel in a wide area networkE. synonymous with network interface card

Ans: BResponse: TG4.3 Network Fundamentals

In TCP/IP, IP is responsible forA. disassembling and reassembling of packets during transmission

B. establishing the Internet connection between two computersC. moving packets over the networkD. sequencing the transfer of packets across the networkE. error checking

Ans: AResponse: TG4.3 Network Fundamentals

Which of the following is not a characteristic of packet switching ?A. Packets contain a sequence numberB. Packets are routed through different pathsC. Packets require dedicated circuitsD. Packets use TCP/IP to carry their dataE. Packets contain destination addressing

Ans: CResponse: TG4.3 Network Fundamentals

A type of processing that links two or more computers in an arrangement in which some machines provide computing services for user computers is best described asA. open systemsB. client/serverC. peer-to-peerD. centralized E. mainframe-centric

Ans: BResponse: TG4.3 Network Fundamentals

BitTorrent uses a process called _____, which eliminates file-sharing bottlenecks by having everyone share little pieces of a file at the same time.A. leechingB. collaborationC. packet switchingD. torrentsE. swarming

Ans: EResponse: TG4.3 Network Fundamentals

32