Information Systems Flashcards
What is considered the heart of any information system?
The operating system
The applications
The database
The physical infrastructure
The database
Which type of information system should be accessed by the vice president of sales for a national department store chain who wants to see the previous day’s sales receipts?
An expert information system
A decision support system
A process control system
A transaction processing system
A transaction processing system
How does a virtual private network contribute to a firm’s workforce productivity?
-Employees have dedicated resources solely for their use on the corporate
network.
-A VPN pools network resources for employee use when working remotely.
-Employees are enabled to work remotely with secure connectivity to the corporate network via the internet.
-A carrier’s facilities provide a secure, dedicated connection to the corporate
network.
Employees are enabled to work remotely with secure connectivity to the corporate network via the internet.
What are three ways cloud computing services enhance company productivity?
Through more efficient application updates
Through better resource utilization
Through greater application availability for remote workers
Through elimination of application downtime
Through dedication of resources to each user
Through more efficient application updates
Through better resource utilization
Through greater application availability for remote workers
For which type of communication should employees have an ethical expectation of privacy from company monitoring?
-Personal calls made on company phones
-Personal emails sent from work computers
-Personal letters sent through the company mail -room
-Personal emails received on work accounts
Personal letters sent through the company mail room
Which activity raises ethical issues heightened by the capabilities of data mining?
-Giving customers a choice to store their data or not
-Storing customer data for transactional convenience
-Using customer data for company marketing campaigns
-Selling customer data for external marketing research
Selling customer data for external marketing research
Which intent of spyware creates a company security issue?
-The intent to sabotage programs with malicious intent
-The intent to destroy data contained on storage devices
-The intent to report on a user’s Internet activity
-The intent to deny network access to outside users
The intent to report on a user’s Internet activity
How does a virtual private network (VPN) contribute to a firm’s workforce productivity?
A) It provides faster internet speeds for remote workers
B) It eliminates the need for company security policies
C) It enables employees to work remotely with secure connectivity to the corporate network via the internet
D) It increases the cost of IT infrastructure
employers are enabled to work remotely with secure connectivity to the corporate network via the internet
What are three ways cloud computing services enhance company productivity? (Choose 3 answers)
A) Through better resource utilization
B) Through elimination of application downtime
C) Through reduction of internet bandwidth
D) Through dedication of resources to each user
Through better resource utilization
through elimination of application downtime
through dedication of resources to each user
What do managers use support systems for?
A) Marketing strategies
B) Decisions
C) Employee training
D) Payroll processing
decisions
Information systems for business activities fall under which support system?
A) Strategic support system
B) Financial support system
C) Operational support system
D) Human resources support system
operational support systems
Which two types of information systems are considered operational support systems?
A) Process control system
B) Decision support system
C) Transaction process system
D) Executive information system
process control system, transaction
process system
A Decision Support System (DSS) belongs to which support system?
A) Operational support system
B) Management support system
C) Human resources support system
D) Financial support system
Management support system
Is something that is ethical always legal?
A) Yes, ethical decisions are based on laws
B) No, ethics and laws do not always align
C) Only if the decision benefits the company
D) Ethical decisions are always considered legal in court
no
When two or more users connect using Ethernet or WiFi to the same server to share printers or other information, what is this called?
A) Cloud computing network
B) Wide Area Network (WAN)
C) Local Area Network (LAN)
D) Virtual network
local area network (LAN)
what are advantages to WiFi
mobility,
expansion of LAN
What are the four components of an information system?
A) Hardware, software, data, and network
B) Task, people, structure (or roles), and technology
C) Input, process, output, and feedback
D) Central processing unit, memory, storage, and connectivity
Task, people, structure (or roles), and technology
Which of the following are types of information systems?
A) Office Automation Systems
B) Decision Support Systems
C) Executive Support Systems
D) All of the above
All of the above ✅
Support systems are:
A) Software used for customer service
B) Tools and technologies that leverage human capacity to think and solve problems
C) Systems that only store historical data
D) A type of cloud storage solution
Tools and technologies that leverage human capacity to think and solve problems
Executive support systems are:
A) A tool used only by mid-level managers
B) A type of management support system that facilitates and supports senior executive information and decision-making needs
C) A type of software used for customer interactions
D) A database for storing HR records
A type of management support system that facilitates and supports senior executive information and decision-making needs ✅
Expert systems are:
A) A computer system that emulates the decision-making ability of a human expert
B) A simple database used for storing customer transactions
C) A method of financial forecasting
D) A type of hardware used in AI development
A computer system that emulates the decision-making ability of a human expert ✅
Describe the sources of marketing research data.
A) Data generated and stored within the company, such as accounting records, sales data, supplier information, and customer solvency
B) Only information from external sources
C) Data gathered only from online customer surveys
D) Financial records unrelated to business operations
Data generated and stored within the company, such as accounting records, sales data, supplier information, and customer solvency
What is considered the heart of any information system?
A) The Database
B) The Hardware
C) The Internet
D) The Operating System
The Database
What is the earliest year a Millennial would have been born?
A) 1981
B) 1975
C) 1980
D) 2000
1980
Which of the following is NOT one of the four components of an information system?
A) People
B) Technology
C) Financial reporting
D) Structure (or roles)
Financial reporting
What are the different types of information systems?
A) Transaction Processing Systems, Office Automation Systems, Knowledge Work Systems
B) Accounts Payable, Accounts Receivable, Financial Statements
C) Hardware, Software, Cloud Storage
D) Operating Systems, Network Systems, Programming Systems
Transaction Processing Systems, Office Automation Systems, Knowledge Work Systems
Support systems are:
A) Physical infrastructure for data storage
B) Tools and technologies that enhance human capacity for problem-solving
C) Methods used exclusively in government operations
D) Limited to executive decision-making
Tools and technologies that enhance human capacity for problem-solving
Expert systems are:
A) Simple databases for storing customer data
B) Designed for basic administrative tasks
C) Computer systems that emulate human expert decision-making
D) Primarily used for social media marketing
Computer systems that emulate human expert decision-making
What is considered the heart of any information system?
A) The internet
B) The hardware
C) The database
D) The software
The database
Which type of information system should be accessed by the vice president of sales for a national department store chain who wants to see the previous day’s sales receipts?
A) Decision support system
B) Executive information system
C) Transaction processing system
D) Enterprise resource planning system
Transaction processing system
How does a virtual private network contribute to a firm’s workforce productivity?
A) It eliminates the need for an internet connection
B) It increases data storage capacity
C) Employees are enabled to work remotely with secure connectivity to the corporate network via the internet
D) It reduces the cost of employee salaries
Employees are enabled to work remotely with secure connectivity to the corporate network via the internet
What are three ways cloud computing services enhance company productivity? (Choose 3 answers)
A) Through more efficient application updates
B) Through better resource utilization
C) Through eliminating the need for cybersecurity
D) Through greater application availability for remote workers
Through more efficient application updates
Through better resource utilization
Through greater application availability for remote workers
Which intent of spyware creates a company security issue?
A) The intent to increase webpage loading speeds
B) The intent to report on a user’s internet activity
C) The intent to improve targeted advertising
D) The intent to block spam emails
The intent to report on a user’s internet activity
What is data?
A) Financial reports
B) Facts, figures, and other evidence gathered through observations
C) Processed information for decision-making
D) Information used for analyzing company performance
Facts, figures, and other evidence gathered through observations
What can result from poorly protected employee or customer data?
A) Identity theft
B) Fraudulent transactions
C) Financial instability
D) Regulatory penalties
Identity theft
What is the purpose of firewalls?
A) Limit data transfers to certain locations and log system use so that managers can identify threats to a system’s security
B) Prevent unauthorized users from accessing databases
C) Encrypt sensitive financial information
D) Block all incoming data traffic
Limit data transfers to certain locations and log system use so that managers can identify threats to a system’s security
What is a Virtual Private Network (VPN)?
A) A network that stores company data
B) A private data network that creates secure connections, or “tunnels,” over regular Internet lines
C) A service that protects physical assets from theft
D) A method for reducing network bandwidth
A private data network that creates secure connections, or “tunnels,” over regular Internet lines
What is an expert system?
A) A machine learning tool for stock analysis
B) A management information system that uses artificial intelligence to solve problems
C) A management information system that employs human knowledge, embedded in a computer, to solve problems that ordinarily require human expertise
D) A database for customer support services
A management information system that employs human knowledge, embedded in a computer, to solve problems that ordinarily require human expertise