• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/100

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

100 Cards in this Set

  • Front
  • Back

Research into the application of mathematics to help make better business decisions is called



a. Information Technology.
b. Management Science.
c. Management Information Systems.
d. Information Management.

Management Science.

In what part of a computer are programs currently being run as well as data being used by the programs stored?



a. Main memory
b. Hard disk
c. Internal bus
d. Register

Main memory

Which of the following is NOT a computer I/O device?



a. Scanner
b. Keyboard
c. Internal bus
d. Memory stick

Internal bus

Off-line storage media is best used for which of the following?



a. Programs
b. Data used daily
c. Backups
d. Databases

Backups

The smallest piece of information is called what?



a. A byte
b. A bit
c. A nibble
d. A word

A bit

A document that contains embedded links to other, related, documents is called



a. hypertext.
b. hyperlink.
c. XML.
d. frame.

hypertext.

Programs that can read any scanned data and extract any written information shown in them are called



a. OMR.
b. MICR.
c. IMR.
d. OCR.

OCR.

A system or subsystem of which only the inputs and outputs are known is referred to as a(n)



a. environment.
b. boundary.
c. black box.
d. constraint.

black box.

Determining the boundary of a system is done to help identify which attribute or attributes of the system?



a. Whether it is a black-box system
b. The users of the system
c. Inputs and outputs of the system
d. The objectives of the system

Inputs and outputs of the system

Which of the following are used to measure the value of a system?



I. Effectiveness


II. Effort


III. Efficiency

Effectiveness & Efficieny

Which of the following would be acceptable subsystems for an accounts receivable system?



I. Validate order data


II. Print invoice


III. Produce item

Validate order data & Print invoice

The creation of a system is called systems



a. analysis.
b. organization.
c. synthesis.
d. decomposition.

synthesis.

Considering a parts distributor as a system, which of the following elements acts as a buffer?



a. The customer order system
b. The order tracking system
c. The warehouse
d. The supplier order system

The warehouse

What is the first step in systems analysis?



a. Defining system boundaries
b. System decomposition
c. Problem definition
d. Defining system constraints

Problem definition

A what-if analysis in which the environment in which the system is to operate is changed is called



a. contingency analysis.
b. systems analysis.
c. documentary analysis.
d. sensitivity analysis.

contingency analysis.

A probabilistic system would be most likely to be used in which case?



a. A system that will deliver answers instantly
b. A system that will deliver the same answer every time


c. A system that can scale massively
d. A system with sharply defined outputs

A system that can scale massively

In designing a system to track orders, which is the first step to take?



a. Buy the computers and scanning equipment.
b. Determine who will use the system and how.
c. Write a program for data entry.
d. Buy order-tracking software.

Determine who will use the system and how.

Which of the following have NOT been used as the basis for a computer?



a. Transistors
b. Vacuum tubes
c. Diodes
d. Integrated circuits

Diodes

The practice of structuring knowledge or data is called



a. information management.
b. information architecture.
c. database management.
d. programming.

information architecture.

Which of the following are interpreted languages?



I. LISP


II. FORTRAN


III. BASIC

FORTRAN & BASIC

The second generation of computers relied on which technology?



a. Relays
b. Vacuum tubes
c. Transistors
d. Integrated circuits

Transistors

Which of the following is true for any hard disk platter?



a. There are fewer tracks than there are cylinders.
b. There are more tracks than there are cylinders.
c. There are exactly the same number of tracks as there are cylinders.
d. The values of tracks and cylinders are entirely unrelated.

There are exactly the same number of tracks as there are cylinders

A technology that can continue to operate even if parts of it break is called



a. self-replicating.
b. fault resistant.
c. self-aware.
d. fault tolerant.

fault tolerant.

The subsystem of a microprocessor that allows the processor to store and retrieve data to and from the RAM is called the



a. control bus.
b. external bus.
c. address bus.
d. local bus.

address bus.

Which of the following is a first-generation computer?



a. IBM 5150
b. ENIAC
c. System/360
d. UNIVAC

UNIVAC

The main problem with autochangers is that



a. they are slower than other devices.
b. they store a vast quantity of data.
c. they require operator assistance.
d. it is difficult to erase data from them.

they are slower than other devices.

Which of the following is approximately equal to one trillion bytes of data?



a. One gigabyte
b. One nanobyte
c. One terabyte
d. One megabyte

One terabyte

In information systems, data that are related to one individual would be stored in a single



a. file.
b. record.
c. field.
d. cluster.

record.

Each level of a hierarchy consists of a



a. subsystem.
b. node.
c. heterarchy.
d. child.

heterarchy.

The most straightforward method of publicizing information so that it can be viewed outside an organization as well as inside is



a. www.
b. LAN.
c. WAN.
d. e-mail.

www

When using spreadsheets to create graphics, which of the following is the best way to show the number of data points that fall into a category?



a. Scatterplot
b. Pie chart
c. Histogram
d. Box plot

Histogram

Applying Metcalfe's law to an organization would result in which of the following?



a. Having everyone in the organization be connected to the network
b. Giving everyone access to the same data
c. Having everyone use exactly the same type of computer


d. Upgrading everyone's computer to a more powerful one

Having everyone in the organization be connected to the network

Which of the following would most likely be installed on the enterprise level of a company?



a. WLAN
b. LAN
c. WAN
d. MAN

WAN

Which of the following would be the best software program to create a document containing both words and graphics that is to be printed for distribution?



a. Adobe Acrobat
b. Adobe PhotoShop
c. Microsoft PowerPoint
d. Adobe InDesign

Adobe InDesign

Which of the following programs is best suited to creating graphics that are to be used as part of a presentation?



a. Microsoft PowerPoint
b. Adobe Acrobat
c. CorelDraw
d. Netscape Navigator

Microsoft PowerPoint

Which of the following is the best analytical software for use by an individual?



a. Oracle Database
b. Microsoft Excel
c. Minitab
d. Microsoft Word

Microsoft Excel

Using multiple computers spread around an enterprise to work on one task is called



a. CDP.
b. DDP.
c. Client/Server.
d. CORBA.

DDP.

Which of the following is an advantage of the distributed model of computing?



a. No duplication
b. Scalability
c. Lower costs
d. Greater security

Scalability

Which of the following is a system that can deal with large amounts of information, integrate far-ranging data, and deliver high quality of service?



a. Database Management System


b. Enterprise Information System
c. Client-Server System
d. Collaborative Software System

Enterprise Information System

Which of the following is a natural data hierarchy?



a. Sentences
b. Byte
c. Nibble
d. Sector

Sentences

Which of the following software packages is an example of GroupWare?



a. Novell GroupWise
b. Adobe InDesign
c. Oracle Database
d. Microsoft Windows

Novell GroupWise

The process of adjusting tables to remove duplicate data from a relational database is called



a. normalization.
b. compression.
c. indexing.
d. joining.

normalization

Which of the following would be a possible natural key in a table containing employee records?

a. Employee ID number
b. Record number
c. Last name
d. Phone number

Employee ID number

Which of the following should NOT be taken into account when constructing a logical data model?



a. The output of the system


b. The DBMS the system is to run on
c. The inputs into the system
d. The data that are to be stored

The DBMS the system is to run on

Which of the following is NOT an advantage of distributed databases?



a. Modularity
b. Reliance on networks
c. Improved availability
d. Performance improvements

Reliance on networks

SQL refers to a language that operates on which type of database?



a. Relational
b. Network
c. Hierarchical
d. Object-Oriented

Relational

Which of the following is NOT part of the SQL DDL?



a. CREATE
b. ALTER
c. SELECT
d. DROP

SELECT

In relational databases, the information about a database, its tables, and the names of rows and columns in the tables is called



a. DDL.
b. Metadata.
c. DML.
d. SELECT.

Metadata.

The process by which multiple data streams are transmitted over a single transmission medium by interleaving the bits of the different data streams is called



a. code-division multiplexing.
b. time-division multiplexing.
c. frequency-division multiplexing.
d. wavelength-division multiplexing.

time-division multiplexing.

What must be done when moving a host from one side of a router to the other?



a. No changes must be made.
b. The host must get a new IP address.
c. The host must be physically moved.
d. The router must be reconfigured.

The host must get a new IP address.

The method for allocating an IP address to a computer by a central server is called



a. TCP/IP.
b. DHCP.
c. VPN.
d. RARP.

DHCP.

In which of the following is the connection between the originating and receiving node fixed before the data are sent?



I. ATM


II. IP


III. PSTN

ATM & PSTN

The baud rate in communications is



a. equal to the bit rate of transmission.
b. less than the bit rate of transmission.
c. more than the bit rate of transmission.
d. may be less than or the same as the bit rate.

may be less than or the same as the bit rate.

Which of the following allows for either voice communication or sub-64k data transmission?



a. POTS
b. ISDN
c. DSL


d. LAN

POTS

ISDN systems have which advantage over standard phone systems?



a. Can transmit either voice or data signals
b. Have separate control channels
c. Can be used to call any phone worldwide


d. Can do call waiting and caller ID

Have separate control channels

Which of the following is the lowest level in the OSI reference model?



a. Transport layer


b. Network layer
c. Physical layer
d. Application layer

Physical layer

The network topology refers to which of the following?



a. The space in which the network resides
b. The pattern of links between network nodes
c. The network's speed
d. The standards used by the network

The pattern of links between network nodes

What would be the final destination of a UUCP message addressed to dale!fred!tom!bert?



a. User dale at computer bert
b. User tom at computer bert
c. User bert at computer tom
d. User bert at computer dale

User bert at computer tom

Which of the following IP addresses would be located in a private network?



a. 199.239.136.245
b. 192.168.45.121
c. 12.130.91.101
d. 12.129.147.65

192.168.45.121

Which of the following is NOT an advantage of fiber optic cables over copper cables?



a. Higher bandwidth
b. Can cover greater distances
c. Easier to splice
d. Less crosstalk

Easier to splice

What is the process of going backwards in the systems development life cycle called?



a. Reverse engineering
b. Reengineering
c. Maintenance
d. Decompilation

Reverse engineering

Which of the following is a method used to restructure code without changing what it does?



a. Editing
b. Compiling
c. Code generation
d. Refactoring

Refactoring

A software tool that combines editing, compiling, and (usually) versioning tools in one integrated environment is called



a. IDE.
b. UML.
c. GUI.
d. CPU.

IDE.

A UML tool can take existing source code and derive a UML model from it. What is this called?



a. Reengineering
b. Reverse engineering
c. Refactoring
d. Code generation

Reverse engineering

Which of the following would be the first step in introducing end-user computing?



a. Installing software
b. Upgrading hardware
c. Training users
d. Classifying users

Classifying users

Which of the following is the traditional method of project management?



a. Agile
b. Iterative
c. Phased
d. Incremental

Phased

Which of the following does NOT occur during the implementation stage of the system life cycle?



a. Testing
b. Documentation
c. Training


d. Conversion

Documentation

In extreme programming, how many software engineers are assigned to each individual class being written?



a. 1
b. 2
c. 3
d. Any number

2

Under traditional system development, which of the following are NOT members of the development team?



a. Program manager
b. Technical lead
c. Users
d. Programmers

Users

In which of the following cases might pilot conversion be used?



a. The system contains complex data that needs to be transferred.
b. A small system needs to be converted.
c. Only a small number of users are affected by the migration.
d. A new system with new data is being created.

The system contains complex data that needs to be transferred.

Which of the following is done during the preliminary investigation step in systems life cycle development?



a. Define the need for a system.
b. Define the requirements of a system.
c. Define the outputs of a system.
d. Define the inputs to a system.

Define the need for a system.

Which of the following is a problem with enterprise analysis?



a. It may not get the data needed for analysis.
b. It can create too much data to be fully analyzed.
c. It looks only at certain aspects of the enterprise.
d. It does not look at interactions with other enterprises.

It can create too much data to be fully analyzed.

The spiral model of development uses which of the following strategies of system development?



I. Top-down


II. Bottom-up


III. Agile

Top-down & Bottom-up

Testing, training, and data conversion are all part of which stage of systems development?



a. Design
b. Maintenance
c. Installation
d. Analysis

Installation

IBM's business system planning (BSP) method is rarely used these days. Which of the following would be one of the reasons for this?



a. BSP is not oriented to data as much as modern systems are.
b. BSP does not cover all areas newer methods do.
c. BSP is very comprehensive and therefore time consuming and expensive.
d. BSP does not have a firmly defined set of steps.

BSP is very comprehensive and therefore time consuming and expensive.

Which of the following are parts of an MIS department?



I. Development


II. Production support


III. Sales

Development & Production support

MIS most often bases its recommendations on the results of research done in which area?



a. Physics
b. Operations research
c. Electrical engineering
d. Computer science

Operations research

Which of the following is external information an MIS may need to be able to process?



a. Sales figures
b. Demographic data
c. Worker productivity
d. Production costs

Demographic data

In direct cutover, the change from one system to another happens in what way?



a. From one moment to the next
b. Gradually, step by step
c. Never
d. In order of increasing value to the company

From one moment to the next

Enterprise Resource Planning systems are most likely to be used in which industries?



a. Software
b. Manufacturing
c. Banking
d. Insurance

Manufacturing

Which data from an organization are stored in a data warehouse?



a. All current and historical data
b. Historical data only
c. Current data only
d. Metadata

All current and historical data

Systems that are used to process the internals of a company's business are called



a. office automation systems.
b. back office systems.
c. decision support systems.
d. electronic meeting systems.

back office systems.

A bar chart used to visualize the timing and interdependencies of a project is called a



a. histogram.
b. Gantt chart.
c. candlestick chart.


d. omograph.

Gantt chart.

A data warehouse



a. consists of multiple, different databases.
b. allows for queries using a common query tool.
c. allows for multiple standards.
d. is a repository for all business data.

allows for queries using a common query tool.

Which of the following would be a likely output from an executive support system?



a. Subroutines
b. Windows
c. Pie charts
d. Processes

Pie charts

An electronic document management (EDM) system would NOT allow a user to do which of the following?



a. Read a document written by someone else.
b. Change a document without logging changes.
c. Forward a document to another user.
d. Set protections on a document so no one else can read it.

Change a document without logging changes.

The most likely user of a decision support system would be a



a. programmer.
b. vice president.
c. clerical worker.
d. salesperson.

vice president.

Systems to automate and integrate business practices in manufacturing companies are called



a. RFQ.
b. ERP.
c. EIS.
d. DSS.

ERP.

Which of the following is NOT generally true of intelligent agent software?



a. It can adapt.
b. It uses precepts of artificial intelligence.
c. It can only solve pre-defined questions.
d. It can analyze itself.

It can only solve pre-defined questions

Which of the following best describes an SRM?



a. A system for tracking customer issues
b. A system for automating administrative duties
c. A system for managing hardware
d. A system for tracking the sourcing and purchasing of inventory

A system for tracking the sourcing and purchasing of inventory

A decision support system (DSS) that finds and retrieves information that is NOT in any predefined format is called a



a. data-driven DSS.
b. model-driven DSS.
c. document-driven DSS.
d. knowledge-driven DSS.

document-driven DSS

Which of the following best describes EMS?



a. They are executive information systems.
b. They are group decision support systems.


c. They are management information systems.
d. They are transaction-processing systems.

They are group decision support systems.

In which of the following systems is backward chaining reasoning most often used?



a. Transaction processing systems
b. Expert systems
c. Office automation systems
d. Telecommunications systems

Expert systems

Which of the following is a part of the Sarbanes-Oxley Act?



a. Public companies must retain all records, including electronic records, pertaining to the company's performance.
b. Any attempt to circumvent anti-piracy measures built into software is a crime.
c. Provides for ensuring that the integrity, quality, and objectivity of data released by federal agencies is maximized.
d. Requires banks to report certain transactions to the government.

Public companies must retain all records, including electronic records, pertaining to the company's performance.

Which of the following is an encryption algorithm useful for both signing and encryption?



a. DES
b. PKI
c. DSA
d. RSA

RSA

Which of the following would be the most secure password?



a. lkatsa
b. secret
c. s3cr3t
d. jak1ls

jak1ls

Which of the following is NOT a part of physical computer security?



a. Locks
b. Fences
c. Authentication
d. Safes

Authentication

Which of the following is used to ensure that security-relevant source or object code cannot be reverse engineered to determine how it works?



a. Decompilation
b. Translation
c. Code obfuscation
d. Code completion

Code obfuscation

Which of the following best describes liability, as pertains to information systems?



a. Damages caused by incorrect software
b. Money borrowed from others
c. Damages caused by incorrect application of software
d. Pension obligations

Damages caused by incorrect software

Which of the following systems is most likely to be used to protect against crime, both internal and external?



a. ERP
b. DSS
c. TPS
d. OAS

ERP