MIS Mid Term Flashcards

1
Q

A ____ system is a type of transaction processing system (TPS).

A

Payroll

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

____ is understanding the role of information in generating and using business intelligence.

A

Information Literacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The supervisor program of an OS is called the ____.

A

Kernel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Sales records are an example of the ____ component of an information system.

A

Internal Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

CD-ROMs and DVDs are examples of ____ disks.

A

Optical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Online brokerage firms operate in a highly competitive environment, so they use information technologies to make their services more unique in order to combat ____.

A

Rivalry Among Existing Competitors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A(n) ____ is a type of memory that must be accessed sequentially.

A

Magnetic Tape

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

____ is the opposite of buyer power.

A

Supplier Power

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

____ memory, which is nonvolatile, holds data when the computer is off or during the course of a program’s operation.

A

Secondary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Using ____ software, you can perform “what if” analysis on data.

A

Spreadsheet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The BIOS is part of the ____.

A

Motherboard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In designing an MIS, the first task is to define the system’s ____ clearly.

A

Objectives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

____ means saving data in computer memory and retrieval is accessing data from memory.

A

Storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The portion of the computer responsible for adding numbers is the ____.

A

ALU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A(n) ____ is the link between devices connected to the computer.

A

Bus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Optical discs use ____ beams to access and store data.

A

Laser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The term RAID stands for ____.

A

Redundant Array of Independent Disks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A successful ____ program helps improve customer service and create a long term relationship between an organization and its customers.

A

CRM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The four Ms of resources are: ____.

A

Manpower, Machinery, Materials, and Money

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Typically, data has a(n) ____ orientation.

A

Time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

In a(n) ____ file, each alphabetic, numeric, or special character is represented with a 7-bit binary number.

A

ASCII

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A ____ is a computer and all software for managing network resources and offering services to a network.

A

Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

The Clipboard’s contents are stored on ____.

A

RAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Management information system (MIS) ____ include programs developed in-house.

A

Software Components

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
A ____ is the size of a character.
Byte
26
With the ____, records can be accessed sequentially or randomly, depending on the number being accessed.
Indexed Sequential Access Method
27
Within a data model, the ____ describes how data is organized and the relationship among records.
Data Structure
28
Accessing one central database server could increase ____ for remote users.
Communication Costs
29
In a relational model, when a primary key for one table appears in another table, it is called a ____ key.
Foreign
30
A database ____, the heart of DBMS software, is responsible for data storage, manipulation, and retrieval.
Engine
31
The structure and organization of data in a database is called the data ____.
Hierarchy
32
Data marts usually have more limited ____ than data warehouses.
Scope
33
____ uses multiple sources of information and provides multidimensional analysis.
OLAP
34
Grouping objects along with their attributes and methods into a class is called ____.
Encapsulation
35
A ____ operation searches data in a table and retrieves records based on certain criteria.
Select
36
A data ____ stores definitions, such as data types for fields, default values, and validation rules for data in each field.
Dictionary
37
A database is a collection of related ____ that can be stored in a central location or in multiple locations.
Data
38
How data is stored on and retrieved from a hard disk is the ____ view.
Physical
39
In a data warehouse, ____ means collecting data from a variety of sources and converting it into a format that can be used in transformation processing.
Extraction
40
Distributing data among multiple sites minimizes the effects of computer ____.
Failures
41
A ____ is a group of related fields in a database.
Record
42
With ____, you request data from a database by constructing a statement made up of query forms.
Query by Example
43
To improve database efficiency, a process called ____ is used.
Normalization
44
The most common data model is the ____ model.
Relational
45
____ tools can be used to examine point-of-sale data to generate reports on customers’ purchase history.
Data-Mining
46
A(n) ____ database has the ability to represent more complex data relationships than a relational database.
Object-Oriented
47
To begin designing a relational database, you must define the ____ structure by defining each table and the fields in it.
Logical
48
____ usually utilize internal data and respond in real time.
OLTP
49
A ____ is a collection of data from a variety of sources used to support decision-making applications and generate business intelligence.
Data Warehouse
50
In the ____ model, each record can have multiple parents and multiple children.
Network
51
A(n) ____ is a set of rules specifying legal and ethical use of a system and activities and the consequences of noncompliance.
Acceptable Use Policy
52
____ attacks inundate a Web site or network with e-mails and other network traffic so that it becomes overloaded and can’t handle legitimate traffic.
Denial-of-Service
53
A ____ attack typically targets Internet servers.
Denial-of-Service
54
____ are a type of access control.
Passwords
55
Amazon.com uses ____ to provided customized book recommendations based on past purchases.
Cookies
56
____ refers to the accuracy of information resources within an organization.
Integrity
57
Data encryption transforms data into a scrambled form called ____.
Ciphertext
58
____ is capturing and recording network traffic.
Sniffing
59
____ is registering, selling, or using a domain name to profit from someone else’s trademark.
Cybersquatting
60
A ____ attack floods a network or server with service requests to prevent legitimate users’ access to the system.
Denial-of-Service
61
Information technology and the Internet has, in essence, resulted in two societal groups: the information rich and the information poor. This is called the ____.
Digital Divide
62
A backup power unit is also called a(n) ____.
UPS
63
____ planning outlines procedures for keeping an organization operational.
Business Continuity
64
A ____ is built-in to a system by its designer.
Backdoor
65
A ____ travels from computer to computer, in a network, but it doesn’t usually erase data.
Worm
66
The McCumber cube defines ____ characteristics of information security.
Nine
67
Intentional threats include ____.
Attacks by Disgruntled Employees
68
A ____ protects new processes.
Patent
69
You make two copies of a software package you just bought and sell one to a friend. This action is ____.
Illegal and Unethical
70
A ____ is used to verify whether a user’s access is valid by logging the user off (after he or she attempts to connect to the network) and then calling the user back at a predetermined number.
Callback Modem
71
Dell, Microsoft, and Unisys Corporation created a partnership to design a voting system for several U.S. states. This is an example of ____.
A Virtual Organization
72
____ are generated by Web server software, record a user’s actions on a Web site.
Log Files
73
Many experts believe management can reduce employee’s unethical behavior by developing and enforcing a ____.
Code of Ethics