Type
Quiz
Book Title
Business Driven Information Systems 5th Edition
ISBN 13
978-0073402987

COMP 10923

July 20, 2017
What is the most secure type of authentication?
A. something the user knows such as a user ID and password
B. something the user has such as a smart card or token
C. something that is part of the user such as a fingerprint or voice signature
D. A combination of all of these are correct.
Which methodology aims for customer satisfaction through early and continuous
delivery of useful software components developed by an iterative process with a design
point that uses the bare minimum requirements?
A. RAD methodology
B.agile methodology
C. waterfall methodology
D. extreme programming
Michael Porter defined the Five Forces Model and the potential pressures that can hurt
sales. Which of the following is not one of the potential pressures that can hurt sales?
A. Suppliers can drive down profits by charging more for supplies.
B. New market entrants can steal potential investment capital.
C. Substitute products can steal customers.
D. Competition can steal customers.
What is a project?
A.a temporary activity undertaken to create a unique product, service, or result
B. the application of knowledge, skills, tools, and techniques to project activities in
order to meet or exceed stakeholder needs and expectations from a project
C. any measurable, tangible, verifiable outcome, result, or item that is produced to
complete a project or part of a project
D. the representation of key dates when a certain group of activities must be performed
Which of the following is not a core driver of the information age?
A. information
B. knowledge
C.Internet of Things
D. data
What converts an audio broadcast to a digital music player?
A. podcasting
B. videoconferencing
C. photo sharing
D. email
Artificial intelligence stimulates human thinking and behavior, such as the ability to
reason and learn. What is the ultimate goal of AI?
A. to build an intelligent system
B. to build an intelligent agent
C. to build a system that can mimic human intelligence
D. to build a system that can mimic an expert agent
What tests individual units or pieces of code for a system?
A.unit testing
B. development testing
C. integration testing
D. user acceptance testing
What is a computer that has a flat screen and uses a mouse or fingertip for input instead
of a keyboard?
A. tablet
B. PDA
C. laptop computer
D. desktop computer
Automatic vehicle location (AVL) ________.
A.uses GPS tracking to track vehicles
B. uses plastic or conductive polymers instead of silicon-based microchips, allowing
them to be washed or exposed to water without damaging the chip
C. is a device that measures the acceleration (the rate of change of velocity) of an item
and is used to track truck speeds or taxi cab speeds
D. is a satellite-based navigation system providing extremely accurate position, time,
and speed information
What software contains course information such as a syllabus and assignments and
offers drop boxes for quizzes and homework along with a grade book?
A. preventive security software
B. personal information management software
C. crash-proof software
D. course management software
What consists of equipment designed to store large volumes of data for long-term
storage?
A. primary storage
B. secondary storage
C. a memory stick
D. flash memory
Which of the following provides real-time information in response to requests?
A. sales system
B. transactional system
C.real-time system
D. salary system
Sustainable MIS is a critical part of ________ within a company.
A. company Standard for the green initiative
B.corporate social responsibility
C. social expectations
D. society concerns
What takes a new approach to middleware by packaging commonly used applications
together, reducing the time needed to integrate applications from multiple vendors?
A. enterprise systems
B. enterprise application integration
C. middleware
D.enterprise application integration middleware
Order date, amount sold, and customer number are all forms of data.
Jessica started her own online company, which specializes in selling items for
bachelorette parties, wedding parties, and baby showers. Due to the fact that she only
operates online, her MIS infrastructure needs to be fast, efficient, and accurate ensuring
the best possible experience for her customers. Which of the following is a critical
component in Jessica's MIS infrastructure?
A. hardware and software
B. client
C. server
D.All of these are correct.
What is a category of AI that attempts to emulate the way the human brain works?
A. intelligent system
B. artificial intelligence
C. expert systems
D. neural network
What combines the physical resources, such as servers, processors, and operating
systems, from the applications?
A.server virtualization
B. network virtualization
C. disaster recovery as a service
D. storage virtualization
What is a special type of rewritable read-only memory (ROM) that is compact and
portable?
A. RAM
B. ROM
C. volatility
D. flash memory
What is the overall process for developing information systems, from planning and
analysis through implementation and maintenance?
A.SDLC
B. software customization
C. off-the-shelf application
D. sign-off
Which of the following represents the ring topology?
A. All devices are connected to a central cable or backbone.
B. All devices are connected to a central device, called a hub.
C. All devices are connected to one another in the shape of a closed loop, so that each
device is connected directly to two other devices, one on either side of it.
D. Groups of star-configured workstations are connected to a linear bus backbone cable.
What is mobile?
A.means the technology can travel with the user; for instance, users can download
software, email messages, and web pages onto a laptop or other mobile device
B. refers to any type of operation accomplished without the use of a hard-wired
connection
C. a wireless PAN technology that transmits signals over short distances among cell
phones, computers, and other devices
D. provides communication for devices owned by a single user that work over a short
distance
What focuses on creating artificial intelligence devices that can move and react to
sensory input?
A. 3D Printing
B.robotics
C. drones
D. RFID
Which of the following describes an ERP system?
A. ERP systems provide a foundation for collaboration between departments.
B. ERP systems enable people in different business areas to communicate.
C. ERP systems have been widely adopted in large organizations to store critical
knowledge used to make the decisions that drive the organization's performance.
D.All of these are correct.
John works for Internal Computer Specialists, which focuses on helping small business
owners resolve MIS infrastructure issues. John's tasks include cleaning and replacing
motherboards, cables, and internal components such as DVDs and hard drives. What
does John's role at Internal Computer Specialists focus on fixing?
A.hardware
B. clients
C. backup
D. recovery
Information integrity issues occur when a system produces incorrect, inconsistent, or
duplicate data.
Sandy works as the Chief Knowledge Officer for Bend Lumbar Company. She has been
given the responsibility to create a product or service that will bring an added value to
its customers to increase the company's revenue. Sandy determines that the best value
she can add is by creating a service that offers free next day shipping on any order over
$50. Where in the value chain is Sandy adding value?
A. the primary value activity outbound logistics
B. the primary value activity inbound logistics
C. the primary value activity marketing and sales
D. the primary value activity operations
Gordon Moore, the cofounder of Intel, established which MIS law?
A. Intel's Law
B. Gordon's Law
C.Moore's Law
D. Lee's Law
What captures transaction and event information using technology to (1) process the
information according to defined business rules, (2) store the information, and (3)
update existing information to reflect the new information?
A. OLTP
B. OLAP
C. TPS
D. DSS
What is the type of knowledge that is contained in people's heads?
A. explicit knowledge
B. virtual knowledge
C. tacit knowledge
D. pure knowledge
Dirty data is erroneous or flawed data. The complete removal of dirty data from a
source is impractical or virtually impossible.

Subscribe Now

Sign up to view full document

View Document