Ist Quiz 1
Chapter 1 1. Organizations use computers and information systems to reduce costs and gain a(n) ________ in the marketplace. a. Marketing advantage b. Competitive disadvantage c. Quality advantage d. Competitive advantage 2. ________ provides historical, current, and predictive views of business operations and environments and gives organizations a competitive advantage in the marketplace. a. Competitive intelligence b. Computer literacy c. Business intelligence d. Information literacy . A(n) ________ is an organized integration of hardware and software technologies, data, processes, and human elements designed to produce timely, integrated, relevant, accurate, and useful information for decision-making purposes. a. Radio-frequency identification system b. Transaction processing system c. Management information system d. Business intelligence system 4. What is one of the major components of an information system? a. Analysis b. Programmer c. Database d. Knowledge 5.
The ________ component of an information system generates the most useful type of information for decision making, including transaction-processing reports and models for decision analysis. a. Design b. Output c. Process d. Input 6. ________ consists of facts that have been analyzed by the process component and is an output of an information system. a. Information b. Knowledge c. Data d. Database 7. What is a useful quality of information? a. Length b. Compactness c. Ability to stand on its own d. Timeliness 8. Which is one of the four Ms of resources? a. Mobility b. Media c. Management d. Manpower 9.
Need essay sample on "Ist Quiz 1" ? We will write a custom essay sample specifically for you for only $12.90/page
A(n) ________ is used to manage manufacturing resources so that companies can reduce manufacturing costs, increase product quality, and improve inventory decisions. a. Management information system b. Manufacturing information system c. Manufacturing log d. Four-sigma information system 10 The goal of a(n) ________ is to provide information to financial executives in a timely manner. a. Financial information system b. Human resource information system c. Payroll information system d. Manufacturing information system 11. A top line strategy focuses on ________. a. Improving manufacturing quality b. Generating revenue c.
Improving efficiency d. Reducing costs 12. ________ is high when customers have many choices and low when they have few choices. a. Supplier power b. Management power c. Buyer power d. Threat of entrants 13. The threat of ________ is low when duplicating a company’s product or service is difficult. a. New entrants b. Decreased efficiencies c. Market dominance d. Cost containment 14. ________ is high when customers have fewer options and low when customers have more options. a. Buyer power b. Management power c. Competition d. Supplier power 15. The author predicts that the cost of ________ will be less expensive in the future. . processing information b. raw materials c. protecting personal identity information d. quality CHAPTER 2 1. A(n) ________ is the main circuit board containing connectors for attaching additional boards. a. Video board b. Audio board. c. Motherboard d. Expansion board 2. How much RAM can a 32-bit processor use? a. 6 GB b. 2 GB c. 8 GB d. 4 GB 3. The field of ____ involves the applications and properties of light, including its interactions with lasers, fiber optics, telescopes, and so forth. a. Video technologies b. Nanotechnology c. Optical technologies d. Cryptography 4. One one-millionth of a second known as a ________. . Nanosecond b. Millisecond c. Picosecond d. Microsecond 5. In an ASCII file, each alphabetic, numeric, or special character is represented with a(n) ________ binary number. a. 7-bit b. 2-byte c. 6-byte d. 8-bit 6. Touch screens are a type of ________ device. a. Throughput b. Input c. Output d. Storage 7. ________ memory is nonvolatile. a. Main b. Secondary c. Tertiary d. Random access 8. Which is a type of optical disk? a. DVD b. Magnetic tape c. RAID disk d. Portable USB drive 9. A(n) ________ is a dedicated high-speed network consisting of both hardware and software, used to connect and manage shared storage devices. . Wide area network (WAN) b. Local area network (LAN) c. Storage area network (SAN) d. Raid System 10. A(n) ________ is a computer and all the software for managing network resources and offering services to a network. a. Fiber optic network b. Server c. Notebook d. Think client 11. A typical OS consists of control programs and ________ programs. a. Interface b. Processing c. Supervisor d. Client 12. ________ can be commercial software or software developed in-house and is used to perform a variety of tasks on a personal computer. a. Operating system software b. Graphics board driver software . Kernel software d. Application software 13. ________ software is used for drafting and design and has replaced traditional tools, such as T-squares, triangles, paper, and pencils. a. Presentation b. Architecture c. Financial planning and accounting d. Computer-aided design (CAD) 14. The first generation of computer languages is known as ________ language. a. High-level b. Assembly c. Bit d. Machine 15. Which generation of computer language includes visual programming? a. Fifth generation b. Sixth generation c. Fourth generation d. Third generation CHAPTER 3 1.
The ________ component of a DBMS is used to add, delete, modify and retrieve records from a database. a. Data storage b. Data administration c. Data manipulation d. Data definition 2. With ________, you request data from a database by constructing a statement made up of query forms. a. Structured programming b. Query by example. c. Data definition d. Query by form 3. The ________ component is used to design elements of an application using a database, such as data entry screens, interactive menus, interfaces with other programming languages, and so forth. a. Application generation b. Database engine c.
Data administration d. Data definition 4. A(n) ________ acts as an interface to a database, retrieving data for users and allowing users to enter data in the database. a. Data driven Web site b. Graphical user interface c. Interactive Web interface d. Computational interface 5. With the ________ approach to setting up a distributed DBMS, each site stores a copy of data of the organization’s database. a. Replication b. Allocation c. Fragmentation d. Cooperative 6. In object-oriented programming, grouping objects along with their attributes and methods into a class is called ________. a. Encapsulation . Agglomeration c. Distribution d. Inheritance 7. A ________ is a collection of data from a variety of sources used to support decision-making applications and generate business intelligence. a. Database b. Data warehouse c. DBMS d. Data mart 8 ________ describe the processes used in a data warehouse. a. Storing, loading, and processing b. Input, processing, and output c. Extraction, transformation, and loading d. Extraction, storage, and transformation 9. Collected information is organized in a data warehouse as raw data, summary data, or ________. a. Aggregated data b. Simplified data c.
Sublevel data d. Metadata 10. ________ is information about data and describes the collected data’s content, quality, condition, origin, and other characteristics. a. Descriptive data b. Metadata c. Integrated data d. Subdata 11. ________ generates business intelligence. It uses multiple sources of information and provides multidimensional analysis, such as viewing data based on time, product, and location. a. Online analytical processing b. Online network processing c. Online reporting d. Online transaction processing 12. OLTP is an acronym for ________. a. Operating level testing procedures . Online transaction processing c. Online testing procedures d. Operating level transaction processing 13. ________ is used to discover patterns and relationships in data. a. Marketing analysis b. Data mart analysis c. Algebraic analysis d. Data-mining analysis 14. Generating complex queries and reports is faster and easier with ________ than with ________. a. Databases, data marts b. Data warehouses, data marts c. Databases, data warehouses d. Data warehouses, databases 15. ________ are usually more limited in scope than data warehouses. a. Data marts b. Data superstores c. Data services . DBMSs CHAPTER 4 1. ________ are small text files with a unique ID tag that are embedded in a Web browser and saved on the user’s hard drive. a. Worms b. Primary keys c. Cookies d. Logs 2. ________ is a form of spyware that collects information about the user (without the user’s consent) to display advertisements in the Web browser, based on information it collects from the user’s browsing patterns. a. Marketware b. Adware c. Firmware d. Malware 3. ________ monitor and record keystrokes and can be software or hardware devices. a. Keyloggers b. Keystroke recorders c. Spoofers d. Sniffers A ________ inundates a Web site or network with e-mails and other network traffic so that it becomes overloaded and can’t handle legitimate traffic. a. Phishing attack b. Spoofing attack c. Sabotage attack d. Denial-of-service attack 5. What is the most common identifier used to index and link databases? a. Fingerprint data b. Tax ID number c. Driver’s license number d. Social security number 6. Determining what is legal and illegal is usually ________; identifying ethical from unethical is often ________. a. Difficult, clear b. Clear, clear c. Difficult, difficult d. Clear, difficult 7.
Which countries restrict or forbid Internet access to their citizens or try to censor the information? a. Russia, Vietnam, and Malaysia b. United Kingdom, Canada, and Australia c. United Arab Emirates, China, and Brazil d. Burma, China, and Singapore 8. What is a legal exception to copyright laws? a. Trademarks b. Internet file sharing c. Fair use doctrine d. Intellectual property rule 9. ________ laws protect tangible material, such as books, drawings, and so forth. a. Trade secret b. Copyright c. Patent d. Trademark 10. How long do patents last? a. 10 years b. 14 or 20 years c. The author’s lifetime d. 8 or 12 years 1. Companies make use of laws on ________, which cover ideas, information, and innovations. a. Trademarked information b. Confidential information c. Company secrets d. Trade secrets 12. ________ is registering, selling, or using a domain name to profit from someone else’s trademark. a. Cybersquatting b. Software piracy c. Copyrighting d. Digital dividing 13. Some believe that information technology has created a ________ between the “haves” and the “have-nots. ” a. Socio-economic divide b. Computer divide c. Digital divide d. Technological divide 14. ________ enables some workers to perform their jobs from home. . Teletraveling b. Telecommuting c. Internet commuting d. Virtual working 15. Health problems are often associated with the ________ in which computers are used. a. Air quality b. Environment c. Noise level d. Order CHAPTER 5 1. ________ ensures that computers and networks are operating, and that authorized users can access the information they need. a. Assurance b. Integrity c. Availability d. Confidentiality 2. ________ is a collection of disk drives used to store data in multiple places. a. A firewall b. Fault-tolerant architecture c.
A RAID system d. A DIR system 3. _______ systems ensure availability in case of a system failure by using a combination of hardware and software. a. Distributed b. Power backup c. Firewall d. Fault-tolerant 4. A ________ is a programming routine built into a system by its designer or programmer to enable the programmer to bypass system security and sneak back into the system later to access programs or files. a. Hacker dooer b. Side door c. Golden egg d. Backdoor 5. A ________ is used to verify whether a user’s access is valid by logging the user off (after he or she attempts to connect to the network) and then calling the user back at a predetermined number. . Firewall b. Return call modem c. Callback modem d. Cable modem 6. A(n) ________ is a combination of numbers, characters, and symbols that’s entered to allow access to a system. a. Plaintext b. Entry code c. Password d. Cipher 7. ________ are designed to protect systems from unauthorized access to preserve data integrity. a. Encryption controls b. Human resource controls c. Access controls d. Network security cards 8. _______ security is a software feature that erases the screen and signs the user off automatically after a specified length of inactivity. a. Terminal resource . Logon protection c. Access resource d. Monitor protection 9. A(n) ________provides a secure “tunnel” through the Internet for transmitting messages and data via a private network. a. Firewall b. Virtual private network c. Tunneling network d. Telecommute network 10. A commonly used encryption protocol is ________, which manages transmission security on the Internet. a. Pretty Good Privacy b. Secure Sockets Layer c. Universal Encryption Standard d. Advanced Encryption Standard 11. ________ is essential in case a dispute over a transaction is raised. a. Confidentiality b.
Integrity c. Recognition d. Nonrepudiation 12. In ________ (also called “secret key encryption”), the same key is used to encrypt and decrypt the message. The sender and receiver must agree on the key and keep it secret. a. Symmetric encryption b. Plaintext encryption c. Unicode encryption d. Asymmetric encryption 13. Section 404 of the ________ Act of 2002 requires IT professionals to document and test the effectiveness of security measures protecting information technology and systems, including general computer controls, application controls, and system software controls. . Kennedy-Kassebaum b. Sarbanes-Oxley c. Health Insurance Portability Protection d. Souter-Healey 14 ________ outlines procedures for keeping an organization operational in the face of a network attack, intrusion, or natural disaster. a. Information security planning b. Business disaster planning c. Strategic event planning d. Business continuity planning 15 The cost of security incidents is estimated to be ________ percent of revenue for large companies yearly, and ________ percent for small and mid-sized companies. a. 2. 2, 0. 5 b. 2. 0, 3. 5 c. 0. 5, 1. 0 d. 5. 2, 0. 8