Question Bank Flashcards

1
Q

Which of the following are types of Information Systems?

A) MIS, TPS, DSS
B) URL, HTTP, XML
C) HTML, ASCII, WWW
D) UML, USB, SCM

A

A)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following are types of Information Systems?:

A) MIS, TPS, DSS
B) URL, HTTP, XML
C) HTML, ASCII, WWW
D) UML, USB, SCM

A

A)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

When considering data and information,:

A) data is a collection of unorganized facts and information is data that has been transformed into
something useful
B) data is unimportant and businesses should only consider information
C) data is critical when developing a solution to a problem while information should be considered
only occasionally
D) data and information refer to the same thing

A

A)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

When considering data and information,:

A) data is a collection of unorganized facts and information is data that has been transformed into
something useful
B) data is unimportant and businesses should only consider information
C) data is critical when developing a solution to a problem while information should be considered
only occasionally
D) data and information refer to the same thing

A

A)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The Internet generates business value by:

A) enabling the buying and selling of goods
B) protecting domestic markets from foreign competition
C) promoting trade barriers in areas of the world that are underdeveloped
D) ensuring compliance of government legislation regarding foreign investment

A

A)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The Internet generates business value by:

A) enabling the buying and selling of goods
B) protecting domestic markets from foreign competition
C) promoting trade barriers in areas of the world that are underdeveloped
D) ensuring compliance of government legislation regarding foreign investment

A

A)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Globalisation means:

A) that modern businesses are using information technology to expand their market
B) to find the lowest cost suppliers regardless of location
C) to create 24 hour business days by shovelling work across time zones and nations
D) all of the above
E) none of the above

A

D)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Globalisation means:

A) that modern businesses are using information technology to expand their market
B) to find the lowest cost suppliers regardless of location
C) to create 24 hour business days by shovelling work across time zones and nations
D) all of the above
E) none of the above

A

D)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

___ is the popular name for 802.11 standards for wireless network access.

a) Wi-Fi
b) VoIP
c) Cloud
d) TCP/IP

A

a)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

___ is the popular name for 802.11 standards for wireless network access.

a) Wi-Fi
b) VoIP
c) Cloud
d) TCP/IP

A

a)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The internet is currently using IPv4. What is the next version that will be employed?

a) IPv6
b) IPv4.1
c) IPv5
d) None of the above

A

a)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The internet is currently using IPv4. What is the next version that will be employed?

a) IPv6
b) IPv4.1
c) IPv5
d) None of the above

A

a)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following is not one of the four primary components of a typical e-commerce site?

a) the shopping and ordering system
b) the customer account
c) the payment gateway
d) the security system

A

b)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following is not one of the four primary components of a typical e-commerce site?

a) the shopping and ordering system
b) the customer account
c) the payment gateway
d) the security system

A

b)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A program that is able to copy itself and infect a computer is called:

a) Malware
b) Scareware
c) Virus
d) Worm

A

c)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A program that is able to copy itself and infect a computer is called:

a) Malware
b) Scareware
c) Virus
d) Worm

A

c)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A ____ is a group of people who work across geographic distance.

a) Dispersed team
b) Localized team
c) Dedicated team
d) Virtual team

A

d)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A ____ is a group of people who work across geographic distance.

a) Dispersed team
b) Localized team
c) Dedicated team
d) Virtual team

A

d)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which of the following is not a goal of Business Process Reengineering?

a) reduce costs
b) increase throughput
c) increase speed
d) increase satisfaction

A

d)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which of the following is not a goal of Business Process Reengineering?

a) reduce costs
b) increase throughput
c) increase speed
d) increase satisfaction

A

d)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

One of the first ways that a business seeks to apply IT is through:

a) Communicating
b) Transforming
c) Automating
d) Informating

A

c)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

One of the first ways that a business seeks to apply IT is through:

a) Communicating
b) Transforming
c) Automating
d) Informating

A

c)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

_____ is the ability to create business value with the least cost.

a) Productivity
b) Efficiency
c) Analysis Paralysis
d) Effectiveness

A

a)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

_____ is the ability to create business value with the least cost.

a) Productivity
b) Efficiency
c) Analysis Paralysis
d) Effectiveness

A

a)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

_____ refers to a series of steps or a process (logical sequence of activities) taken in response to some event or activity

a) Conflict resolution
b) Debriefing
c) Problem solving
d) Situational Review

A

c)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

_____ refers to a series of steps or a process (logical sequence of activities) taken in response to some event or activity

a) Conflict resolution
b) Debriefing
c) Problem solving
d) Situational Review

A

c)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Referred to as _____, they focus on the activities of the functional department to improve its efficiency and effectiveness.

a) functional information systems (FIS)
b) workflow management system (WMS)
c) point-of-sale (POS)
d) transaction processing system (TPS)

A

a)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Referred to as _____, they focus on the activities of the functional department to improve its efficiency and effectiveness.

a) functional information systems (FIS)
b) workflow management system (WMS)
c) point-of-sale (POS)
d) transaction processing system (TPS)

A

a)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Most retail stores use a _____ to capture and store much of the data about their products.

a) functional information systems (FIS)
b) workflow management system (WMS)
c) point-of-sale (POS)
d) transaction processing system (TPS)

A

c)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Most retail stores use a _____ to capture and store much of the data about their products.

a) functional information systems (FIS)
b) workflow management system (WMS)
c) point-of-sale (POS)
d) transaction processing system (TPS)

A

c)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

A/An _____ enters, tracks, routes, and processes the many documents used in an organization.

a) Executive information systems (EIS)
b) Document management systems (DMS)
c) Enterprise resource planning (ERP)
d) Logistics management systems (LMS)

A

b)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

A/An _____ enters, tracks, routes, and processes the many documents used in an organization.

a) Executive information systems (EIS)
b) Document management systems (DMS)
c) Enterprise resource planning (ERP)
d) Logistics management systems (LMS)

A

b)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

These systems track materials and other assets upon arrival into the warehouse and inventory.
What is it?

a) Executive information systems (EIS)
b) Document management systems (DMS)
c) Enterprise resource planning (ERP)
d) Logistics management systems (LMS)

A

d)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

These systems track materials and other assets upon arrival into the warehouse and inventory.
What is it?

a) Executive information systems (EIS)
b) Document management systems (DMS)
c) Enterprise resource planning (ERP)
d) Logistics management systems (LMS)

A

d)

35
Q

With respect to _____ , IT can provide important data for executive decision making in setting goals and strategies that align with an organization’s mission and that mitigate business risk.

a) Strategy
b) Operations
c) Reporting
d) Compliance

A

a)

36
Q

With respect to _____ , IT can provide important data for executive decision making in setting goals and strategies that align with an organization’s mission and that mitigate business risk.

a) Strategy
b) Operations
c) Reporting
d) Compliance

A

a)

37
Q

Which of the following is a benefit to the business in B2C e-commerce?

a) Lower prices
b) Shopping 24/7
c) Greater searchability of products worldwide
d) Shorter delivery times for digital products
e) Cheaper electronic transactions

A

e)

38
Q

Which of the following is a benefit to the business in B2C e-commerce?

a) Lower prices
b) Shopping 24/7
c) Greater searchability of products worldwide
d) Shorter delivery times for digital products
e) Cheaper electronic transactions

A

e)

39
Q

When there is an auction when the bidder with the lowest bid wins, it is called a:

a) Reverse auction
b) Low auction
c) Backwards auction
d) Sellers auction

A

a)

40
Q

The traditional procurement process has three key elements. Which of the following is not one of them?

a) the purchase order
b) the invoice
c) the delivery of goods
d) the receipt of goods

A

c)

41
Q

The traditional procurement process has three key elements. Which of the following is not one of them?

a) the purchase order
b) the invoice
c) the delivery of goods
d) the receipt of goods

A

c)

42
Q

B2B transactions can be divided into two types, namely ________ and _________.

a) spot buying, strategic sourcing
b) outsourcing, EDI
c) e-commerce, outsourcing
d) strategic sourcing, e-commerce
e) spot buying, e-commerce

A

a)

43
Q

B2B transactions can be divided into two types, namely ________ and _________.

a) spot buying, strategic sourcing
b) outsourcing, EDI
c) e-commerce, outsourcing
d) strategic sourcing, e-commerce
e) spot buying, e-commerce

A

a)

44
Q

A specific combination of bits represents each data ______.

a) Character
b) Bit
c) Byte
d) Field

A

a)

45
Q

A specific combination of bits represents each data ______.

a) Character
b) Bit
c) Byte
d) Field

A

a)

46
Q

A collection of fields is known as a:

a) Table
b) Entry
c) Category
d) Record
e) Database

A

d)

47
Q

A collection of fields is known as a:

a) Table
b) Entry
c) Category
d) Record
e) Database

A

d)

48
Q

The primary method for accessing and using data in an RDBMS is a:

a) Inquiry
b) Query
c) Investigation
d) Analysis

A

b)

49
Q

The primary method for accessing and using data in an RDBMS is a:

a) Inquiry
b) Query
c) Investigation
d) Analysis

A

b)

50
Q

A _____ extracts and reorganizes subject-area-specific data to allow business professionals to focus on a specific subject area.

a) Data Model
b) Data Warehouse
c) Data Mine
d) Data Mart

A

d)

51
Q

A _____ extracts and reorganizes subject-area-specific data to allow business professionals to focus on a specific subject area.

a) Data Model
b) Data Warehouse
c) Data Mine
d) Data Mart

A

d)

52
Q

The primary technology used to store, manage, and allow efficient access to data is the:

a) database
b) data warehouse
c) data farm
d) cloud computing
e) computer network

A

a)

53
Q

The primary technology used to store, manage, and allow efficient access to data is the:

a) database
b) data warehouse
c) data farm
d) cloud computing
e) computer network

A

a)

54
Q

Off-shoring is:

a) partnership with a business in a distant country
b) partnership with a business outside your country but in the same general geographical area as your business
c) partnership in the same country as a business
d) we do it ourselves

A

a)

55
Q

Off-shoring is:

a) partnership with a business in a distant country
b) partnership with a business outside your country but in the same general geographical area as your business
c) partnership in the same country as a business
d) we do it ourselves

A

a)

56
Q

Which of the following is not an advantage of outsourcing?

a) High level of skill and expertise
b) Internal staff provides project oversight
c) Distraction of in-house IS staff from other duties
d) Generally lower time and costs

A

c)

57
Q

Which of the following is not an advantage of outsourcing?

a) High level of skill and expertise
b) Internal staff provides project oversight
c) Distraction of in-house IS staff from other duties
d) Generally lower time and costs

A

c)

58
Q

A/An _____ actually creates the system itself by coding and deploying the technical infrastructure of the system and programming it to perform required tasks.

a) Project manager
b) Project sponsor
c) Account manager
d) Analyst
e) Developer

A

e)

59
Q

Once the system is up and running, the organization must continuously monitor, maintain, and evaluate it. This describes which phase in the SDLC?

a) Construction
b) Transition
c) Production
d) Retirement

A

c)

60
Q

_____ has become a very popular modelling tool, as it works particularly well for developing object-oriented systems.

a) Hypertext Markup Language (HTML)
b) Extensible Markup Language (XML)
c) Unified Modelling Language (UML)
d) Integrated Development Environments (IDEs)

A

c)

61
Q

_____ is the use of computer-based support in the software development process.

a) Code generation
b) CASE tools
c) Use case diagrams
d) Sequence diagrams
e) Unified Modelling Language (UML)

A

b)

62
Q

_____ is the use of computer-based support in the software development process.

a) Code generation
b) CASE tools
c) Use case diagrams
d) Sequence diagrams
e) Unified Modelling Language (UML)

A

b)

63
Q

The term “social utility” is used to describe:

a) your need to feel like you get a return on your time investment when using a social media site
b) finding ways to welcome new people into an online group
c) how a user’s social experience is validated
d) how usability features can encourage online participation

A

a)

64
Q

The term “social utility” is used to describe:

a) your need to feel like you get a return on your time investment when using a social media site
b) finding ways to welcome new people into an online group
c) how a user’s social experience is validated
d) how usability features can encourage online participation

A

a)

65
Q

It is clear that ________ and __________ are critical components to building a successful interactive media site.

a) design, usability
b) interaction, ease of use
c) utility, support
d) environment, participation

A

a)

66
Q

It is clear that ________ and __________ are critical components to building a successful interactive media site.

a) design, usability
b) interaction, ease of use
c) utility, support
d) environment, participation

A

a)

67
Q

Folksonomy can be described as:

a) tags
b) collective cloud tag
c) viral social interactions
d) mashups

A

b)

68
Q

Folksonomy can be described as:

a) tags
b) collective cloud tag
c) viral social interactions
d) mashups

A

b)

69
Q

Which of the following is an example of competitive intelligence?

a) using a bootleg copy of software
b) having someone pose as a potential customer to get pricing information
c) cutting and pasting information into a document without citing the source
d) sending emails to accounts with the authorization of the account owner

A

b)

70
Q

Which of the following is an example of competitive intelligence?

a) using a bootleg copy of software
b) having someone pose as a potential customer to get pricing information
c) cutting and pasting information into a document without citing the source
d) sending emails to accounts with the authorization of the account owner

A

b)

71
Q

PIPEDA stands for:

a) Privacy, Information Protection, and Ethics Domestic Act
b) Personal Information Protection and Electronic Documents Act
c) Privacy, Information, Protective Enterprise Distribution Act
d) Provincial Information Protection and Electronic Documents Act

A

b)

72
Q

PIPEDA stands for:

a) Privacy, Information Protection, and Ethics Domestic Act
b) Personal Information Protection and Electronic Documents Act
c) Privacy, Information, Protective Enterprise Distribution Act
d) Provincial Information Protection and Electronic Documents Act

A

b)

73
Q

The primary focus of IT governance is on:

a) decision rights associated with it
b) information processing
c) network vulnerabilities
d) technology acquisition and modernization

A

a)

74
Q

The primary focus of IT governance is on:

a) decision rights associated with it
b) information processing
c) network vulnerabilities
d) technology acquisition and modernization

A

a)

75
Q

Ethics is closely linked to:

a) religion
b) morality and a society’s widely shared understanding of what is right and wrong
c) an individual’s personal values
d) an individual’s moral codes

A

b)

76
Q

Ethics is closely linked to:

a) religion
b) morality and a society’s widely shared understanding of what is right and wrong
c) an individual’s personal values
d) an individual’s moral codes

A

b)

77
Q

Ethics is closely linked to:

a) religion
b) morality and a society’s widely shared understanding of what is right and wrong
c) an individual’s personal values
d) an individual’s moral codes

A

b)

78
Q

The basic premise of Moore’s law is

a. IT makes people more efficient.
b. the density of transistors on a computer chip doubles roughly every 20 months.
c. people tend to want more information than they need.
d. IT makes people more productive.
e. computer memory is getting bigger.

A

b)

79
Q

The basic premise of Moore’s law is

a. IT makes people more efficient.
b. the density of transistors on a computer chip doubles roughly every 20 months.
c. people tend to want more information than they need.
d. IT makes people more productive.
e. computer memory is getting bigger.

A

b)

80
Q

What is an Information System?

a. An information system is a group of components that interact to produce information.
b. Computer hardware and software.
c. Software development process.
d. A framework describing human computer interaction.
e. An information gathering application.

A

a)

81
Q

What is an Information System?

a. An information system is a group of components that interact to produce information.
b. Computer hardware and software.
c. Software development process.
d. A framework describing human computer interaction.
e. An information gathering application.

A

a)

82
Q

What of the following is not a function of the central processing unit?

a. Stores results in memory
b. Performs arithmetic and logical comparisons
c. Stores data
d. Performs calculations
e. Selects instructions

A

c)

83
Q

What of the following is not a function of the central processing unit?

a. Stores results in memory
b. Performs arithmetic and logical comparisons
c. Stores data
d. Performs calculations
e. Selects instructions

A

c)