Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
100 Cards in this Set
- Front
- Back
Research into the application of mathematics to help make better business decisions is called
a. Information Technology. |
Management Science. |
|
In what part of a computer are programs currently being run as well as data being used by the programs stored?
a. Main memory |
Main memory |
|
Which of the following is NOT a computer I/O device?
|
Internal bus |
|
Off-line storage media is best used for which of the following?
|
Backups |
|
The smallest piece of information is called what?
a. A byte |
A bit |
|
A document that contains embedded links to other, related, documents is called
a. hypertext. |
hypertext. |
|
Programs that can read any scanned data and extract any written information shown in them are called
a. OMR. |
OCR. |
|
A system or subsystem of which only the inputs and outputs are known is referred to as a(n)
a. environment. |
black box. |
|
Determining the boundary of a system is done to help identify which attribute or attributes of the system?
a. Whether it is a black-box system |
Inputs and outputs of the system |
|
Which of the following are used to measure the value of a system?
I. Effectiveness II. Effort III. Efficiency |
Effectiveness & Efficieny |
|
Which of the following would be acceptable subsystems for an accounts receivable system?
I. Validate order data II. Print invoice III. Produce item |
Validate order data & Print invoice |
|
The creation of a system is called systems
a. analysis. |
synthesis. |
|
Considering a parts distributor as a system, which of the following elements acts as a buffer?
a. The customer order system |
The warehouse |
|
What is the first step in systems analysis?
a. Defining system boundaries |
Problem definition |
|
A what-if analysis in which the environment in which the system is to operate is changed is called
a. contingency analysis. |
contingency analysis. |
|
A probabilistic system would be most likely to be used in which case?
a. A system that will deliver answers instantly c. A system that can scale massively |
A system that can scale massively |
|
In designing a system to track orders, which is the first step to take?
a. Buy the computers and scanning equipment. |
Determine who will use the system and how. |
|
Which of the following have NOT been used as the basis for a computer?
|
Diodes |
|
The practice of structuring knowledge or data is called
a. information management. |
information architecture. |
|
Which of the following are interpreted languages?
I. LISP II. FORTRAN III. BASIC |
FORTRAN & BASIC |
|
The second generation of computers relied on which technology?
a. Relays |
Transistors |
|
Which of the following is true for any hard disk platter?
|
There are exactly the same number of tracks as there are cylinders |
|
A technology that can continue to operate even if parts of it break is called
a. self-replicating. |
fault tolerant. |
|
The subsystem of a microprocessor that allows the processor to store and retrieve data to and from the RAM is called the
a. control bus. |
address bus. |
|
Which of the following is a first-generation computer?
a. IBM 5150 |
UNIVAC |
|
The main problem with autochangers is that
a. they are slower than other devices. |
they are slower than other devices. |
|
Which of the following is approximately equal to one trillion bytes of data?
|
One terabyte |
|
In information systems, data that are related to one individual would be stored in a single
a. file. |
record. |
|
Each level of a hierarchy consists of a
a. subsystem. |
heterarchy. |
|
The most straightforward method of publicizing information so that it can be viewed outside an organization as well as inside is
a. www. |
www |
|
When using spreadsheets to create graphics, which of the following is the best way to show the number of data points that fall into a category?
|
Histogram |
|
Applying Metcalfe's law to an organization would result in which of the following?
d. Upgrading everyone's computer to a more powerful one |
Having everyone in the organization be connected to the network |
|
Which of the following would most likely be installed on the enterprise level of a company?
|
WAN |
|
Which of the following would be the best software program to create a document containing both words and graphics that is to be printed for distribution?
|
Adobe InDesign |
|
Which of the following programs is best suited to creating graphics that are to be used as part of a presentation?
|
Microsoft PowerPoint |
|
Which of the following is the best analytical software for use by an individual?
|
Microsoft Excel |
|
Using multiple computers spread around an enterprise to work on one task is called
a. CDP. |
DDP. |
|
Which of the following is an advantage of the distributed model of computing?
|
Scalability |
|
Which of the following is a system that can deal with large amounts of information, integrate far-ranging data, and deliver high quality of service?
b. Enterprise Information System |
Enterprise Information System |
|
Which of the following is a natural data hierarchy?
|
Sentences |
|
Which of the following software packages is an example of GroupWare?
|
Novell GroupWise |
|
The process of adjusting tables to remove duplicate data from a relational database is called
a. normalization. |
normalization |
|
Which of the following would be a possible natural key in a table containing employee records? |
Employee ID number
|
|
Which of the following should NOT be taken into account when constructing a logical data model?
b. The DBMS the system is to run on |
The DBMS the system is to run on |
|
Which of the following is NOT an advantage of distributed databases?
|
Reliance on networks |
|
SQL refers to a language that operates on which type of database?
a. Relational |
Relational |
|
Which of the following is NOT part of the SQL DDL?
|
SELECT |
|
In relational databases, the information about a database, its tables, and the names of rows and columns in the tables is called
a. DDL. |
Metadata. |
|
The process by which multiple data streams are transmitted over a single transmission medium by interleaving the bits of the different data streams is called
a. code-division multiplexing. |
time-division multiplexing. |
|
What must be done when moving a host from one side of a router to the other?
a. No changes must be made. |
The host must get a new IP address. |
|
The method for allocating an IP address to a computer by a central server is called
a. TCP/IP. |
DHCP. |
|
In which of the following is the connection between the originating and receiving node fixed before the data are sent?
I. ATM II. IP III. PSTN |
ATM & PSTN |
|
The baud rate in communications is
a. equal to the bit rate of transmission. |
may be less than or the same as the bit rate. |
|
Which of the following allows for either voice communication or sub-64k data transmission?
d. LAN |
POTS |
|
ISDN systems have which advantage over standard phone systems?
a. Can transmit either voice or data signals d. Can do call waiting and caller ID |
Have separate control channels |
|
Which of the following is the lowest level in the OSI reference model?
b. Network layer |
Physical layer |
|
The network topology refers to which of the following?
|
The pattern of links between network nodes |
|
What would be the final destination of a UUCP message addressed to dale!fred!tom!bert?
a. User dale at computer bert |
User bert at computer tom |
|
Which of the following IP addresses would be located in a private network?
|
192.168.45.121 |
|
Which of the following is NOT an advantage of fiber optic cables over copper cables?
|
Easier to splice |
|
What is the process of going backwards in the systems development life cycle called?
a. Reverse engineering |
Reverse engineering |
|
Which of the following is a method used to restructure code without changing what it does?
|
Refactoring |
|
A software tool that combines editing, compiling, and (usually) versioning tools in one integrated environment is called
a. IDE. |
IDE. |
|
A UML tool can take existing source code and derive a UML model from it. What is this called?
a. Reengineering |
Reverse engineering |
|
Which of the following would be the first step in introducing end-user computing?
|
Classifying users |
|
Which of the following is the traditional method of project management?
|
Phased |
|
Which of the following does NOT occur during the implementation stage of the system life cycle?
d. Conversion |
Documentation |
|
In extreme programming, how many software engineers are assigned to each individual class being written?
a. 1 |
2 |
|
Under traditional system development, which of the following are NOT members of the development team?
|
Users |
|
In which of the following cases might pilot conversion be used?
|
The system contains complex data that needs to be transferred. |
|
Which of the following is done during the preliminary investigation step in systems life cycle development?
|
Define the need for a system. |
|
Which of the following is a problem with enterprise analysis?
|
It can create too much data to be fully analyzed. |
|
The spiral model of development uses which of the following strategies of system development?
I. Top-down II. Bottom-up III. Agile |
Top-down & Bottom-up |
|
Testing, training, and data conversion are all part of which stage of systems development?
a. Design |
Installation |
|
IBM's business system planning (BSP) method is rarely used these days. Which of the following would be one of the reasons for this?
a. BSP is not oriented to data as much as modern systems are. |
BSP is very comprehensive and therefore time consuming and expensive. |
|
Which of the following are parts of an MIS department?
I. Development II. Production support III. Sales |
Development & Production support |
|
MIS most often bases its recommendations on the results of research done in which area?
a. Physics |
Operations research |
|
Which of the following is external information an MIS may need to be able to process?
|
Demographic data |
|
In direct cutover, the change from one system to another happens in what way?
a. From one moment to the next |
From one moment to the next |
|
Enterprise Resource Planning systems are most likely to be used in which industries?
a. Software |
Manufacturing |
|
Which data from an organization are stored in a data warehouse?
a. All current and historical data |
All current and historical data |
|
Systems that are used to process the internals of a company's business are called
a. office automation systems. |
back office systems. |
|
A bar chart used to visualize the timing and interdependencies of a project is called a
a. histogram. d. omograph. |
Gantt chart. |
|
A data warehouse
a. consists of multiple, different databases. |
allows for queries using a common query tool. |
|
Which of the following would be a likely output from an executive support system?
|
Pie charts |
|
An electronic document management (EDM) system would NOT allow a user to do which of the following?
|
Change a document without logging changes. |
|
The most likely user of a decision support system would be a
a. programmer. |
vice president. |
|
Systems to automate and integrate business practices in manufacturing companies are called
a. RFQ. |
ERP. |
|
Which of the following is NOT generally true of intelligent agent software?
|
It can only solve pre-defined questions |
|
Which of the following best describes an SRM?
|
A system for tracking the sourcing and purchasing of inventory |
|
A decision support system (DSS) that finds and retrieves information that is NOT in any predefined format is called a
a. data-driven DSS. |
document-driven DSS |
|
Which of the following best describes EMS?
c. They are management information systems. |
They are group decision support systems. |
|
In which of the following systems is backward chaining reasoning most often used?
|
Expert systems |
|
Which of the following is a part of the Sarbanes-Oxley Act?
|
Public companies must retain all records, including electronic records, pertaining to the company's performance. |
|
Which of the following is an encryption algorithm useful for both signing and encryption?
|
RSA |
|
Which of the following would be the most secure password?
|
jak1ls |
|
Which of the following is NOT a part of physical computer security?
|
Authentication |
|
Which of the following is used to ensure that security-relevant source or object code cannot be reverse engineered to determine how it works?
|
Code obfuscation |
|
Which of the following best describes liability, as pertains to information systems?
|
Damages caused by incorrect software |
|
Which of the following systems is most likely to be used to protect against crime, both internal and external?
|
ERP |