MIS Mid Term Flashcards

1
Q

A ____ system is a type of transaction processing system (TPS).

A

Payroll

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

____ is understanding the role of information in generating and using business intelligence.

A

Information Literacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The supervisor program of an OS is called the ____.

A

Kernel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Sales records are an example of the ____ component of an information system.

A

Internal Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

CD-ROMs and DVDs are examples of ____ disks.

A

Optical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Online brokerage firms operate in a highly competitive environment, so they use information technologies to make their services more unique in order to combat ____.

A

Rivalry Among Existing Competitors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A(n) ____ is a type of memory that must be accessed sequentially.

A

Magnetic Tape

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

____ is the opposite of buyer power.

A

Supplier Power

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

____ memory, which is nonvolatile, holds data when the computer is off or during the course of a program’s operation.

A

Secondary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Using ____ software, you can perform “what if” analysis on data.

A

Spreadsheet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The BIOS is part of the ____.

A

Motherboard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In designing an MIS, the first task is to define the system’s ____ clearly.

A

Objectives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

____ means saving data in computer memory and retrieval is accessing data from memory.

A

Storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The portion of the computer responsible for adding numbers is the ____.

A

ALU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A(n) ____ is the link between devices connected to the computer.

A

Bus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Optical discs use ____ beams to access and store data.

A

Laser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The term RAID stands for ____.

A

Redundant Array of Independent Disks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A successful ____ program helps improve customer service and create a long term relationship between an organization and its customers.

A

CRM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The four Ms of resources are: ____.

A

Manpower, Machinery, Materials, and Money

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Typically, data has a(n) ____ orientation.

A

Time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

In a(n) ____ file, each alphabetic, numeric, or special character is represented with a 7-bit binary number.

A

ASCII

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A ____ is a computer and all software for managing network resources and offering services to a network.

A

Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

The Clipboard’s contents are stored on ____.

A

RAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Management information system (MIS) ____ include programs developed in-house.

A

Software Components

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

A ____ is the size of a character.

A

Byte

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

With the ____, records can be accessed sequentially or randomly, depending on the number being accessed.

A

Indexed Sequential Access Method

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Within a data model, the ____ describes how data is organized and the relationship among records.

A

Data Structure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Accessing one central database server could increase ____ for remote users.

A

Communication Costs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

In a relational model, when a primary key for one table appears in another table, it is called a ____ key.

A

Foreign

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

A database ____, the heart of DBMS software, is responsible for data storage, manipulation, and retrieval.

31
Q

The structure and organization of data in a database is called the data ____.

32
Q

Data marts usually have more limited ____ than data warehouses.

33
Q

____ uses multiple sources of information and provides multidimensional analysis.

34
Q

Grouping objects along with their attributes and methods into a class is called ____.

A

Encapsulation

35
Q

A ____ operation searches data in a table and retrieves records based on certain criteria.

36
Q

A data ____ stores definitions, such as data types for fields, default values, and validation rules for data in each field.

A

Dictionary

37
Q

A database is a collection of related ____ that can be stored in a central location or in multiple locations.

38
Q

How data is stored on and retrieved from a hard disk is the ____ view.

39
Q

In a data warehouse, ____ means collecting data from a variety of sources and converting it into a format that can be used in transformation processing.

A

Extraction

40
Q

Distributing data among multiple sites minimizes the effects of computer ____.

41
Q

A ____ is a group of related fields in a database.

42
Q

With ____, you request data from a database by constructing a statement made up of query forms.

A

Query by Example

43
Q

To improve database efficiency, a process called ____ is used.

A

Normalization

44
Q

The most common data model is the ____ model.

A

Relational

45
Q

____ tools can be used to examine point-of-sale data to generate reports on customers’ purchase history.

A

Data-Mining

46
Q

A(n) ____ database has the ability to represent more complex data relationships than a relational database.

A

Object-Oriented

47
Q

To begin designing a relational database, you must define the ____ structure by defining each table and the fields in it.

48
Q

____ usually utilize internal data and respond in real time.

49
Q

A ____ is a collection of data from a variety of sources used to support decision-making applications and generate business intelligence.

A

Data Warehouse

50
Q

In the ____ model, each record can have multiple parents and multiple children.

51
Q

A(n) ____ is a set of rules specifying legal and ethical use of a system and activities and the consequences of noncompliance.

A

Acceptable Use Policy

52
Q

____ attacks inundate a Web site or network with e-mails and other network traffic so that it becomes overloaded and can’t handle legitimate traffic.

A

Denial-of-Service

53
Q

A ____ attack typically targets Internet servers.

A

Denial-of-Service

54
Q

____ are a type of access control.

55
Q

Amazon.com uses ____ to provided customized book recommendations based on past purchases.

56
Q

____ refers to the accuracy of information resources within an organization.

57
Q

Data encryption transforms data into a scrambled form called ____.

A

Ciphertext

58
Q

____ is capturing and recording network traffic.

59
Q

____ is registering, selling, or using a domain name to profit from someone else’s trademark.

A

Cybersquatting

60
Q

A ____ attack floods a network or server with service requests to prevent legitimate users’ access to the system.

A

Denial-of-Service

61
Q

Information technology and the Internet has, in essence, resulted in two societal groups: the information rich and the information poor. This is called the ____.

A

Digital Divide

62
Q

A backup power unit is also called a(n) ____.

63
Q

____ planning outlines procedures for keeping an organization operational.

A

Business Continuity

64
Q

A ____ is built-in to a system by its designer.

65
Q

A ____ travels from computer to computer, in a network, but it doesn’t usually erase data.

66
Q

The McCumber cube defines ____ characteristics of information security.

67
Q

Intentional threats include ____.

A

Attacks by Disgruntled Employees

68
Q

A ____ protects new processes.

69
Q

You make two copies of a software package you just bought and sell one to a friend. This action is ____.

A

Illegal and Unethical

70
Q

A ____ is used to verify whether a user’s access is valid by logging the user off (after he or she attempts to connect to the network) and then calling the user back at a predetermined number.

A

Callback Modem

71
Q

Dell, Microsoft, and Unisys Corporation created a partnership to design a voting system for several U.S. states. This is an example of ____.

A

A Virtual Organization

72
Q

____ are generated by Web server software, record a user’s actions on a Web site.

73
Q

Many experts believe management can reduce employee’s unethical behavior by developing and enforcing a ____.

A

Code of Ethics