You are on page 1of 34

MANAGEMENT INFORMATION SYSTEMS (MIS)

CHAPTER 1 TO 8
QUESTIONS AND ANSWERS
CHAPTER 1
1.1.1 Which of the following statements is NOT accurate regarding how information systems are
transformingbusiness?
A. 196 million people shop online.
B. As of June2014, more than 114 million businesses worldwide had dot-com Internet sites registered.
C. Businesses are starting to use social networking tools to connect to their employees, customer,
and managers worldwide.
D. Forty-six percent of the entire populations now use PCcomputers, sales are soaring.
E.E-commerce and Internet advertising continue to expand. Internet advertising continues to grow
at more than 15 percent per year.

1.1.2 .A digital firm is one in which ________.


A. some of the organization’s most significant business relationships with customers, suppliers, and
employees are digitally enabled and partially mediated
B. the majority of the organization's least significant business relationships with customers,
suppliers, and employees are digitally enabled, but physically mediated
C. nearly all of the organization's most significant business relationships with customers, suppliers,
and employees are digitally enabled and mediated
D. a few of the organization's least significant business relationships with customers, suppliers, and
employees are digitally enabled and mediated
E. the majority of the organization's least significant business relationships with customers,
suppliers, and employees are partially digitally enabled and mediated

1.1.3. All of the following indicate that a business has gained competitive advantage EXCEPT
________.
A. a balanced budget
B. new products, services, and business models
C. improved decision making
D. customer to supplier intimacy
E. operational excellence

1.1.4. The strength of big data and business intelligence applications is that they allow businesses to
________.
A. expand the number of databases
B. centralize decision making
C. look for insights from huge volumes of data and enhance decision making
D. move all data from PCs to mobile devices
E. rely on employees to build value

1.1.5. Businesses are using information technology to ________.


Which statement below does NOT correctly complete the above statement?
A. sense rapidly changing customer demand
B. respond to rapidly changing customer demand
C. achieve higher levels of operational efficiency
D. reduce their dependence on just-in-time inventory
E. reduce inventories to the lowest possible levels

1.1.6. All of the following are interrelated changes in the technology area that impact businesses
EXCEPT ________.
A. the widespread adoption of the mobile computing platform
B. the mobile digital platform
C. the growth of cloud computing
D. quantum computing
E. the growing business use of "big data"

1.2.1. Which one of the following is NOT one of the major business functions or specialized tasks
performed by business organizations and supported by information systems?
A. Human resources
B. Finance and accounting
C. Sales and marketing
D. Manufacturing and production
E. Collective bargaining

1.2.2. An information system can be defined technically as a set of interrelated components that
________ to support decision making and control in an organization.
Which statement below does NOT correctly complete the above statement?
A. distribute information
B. creates data
C. store information
D. process information
E. collects information

1.2.3. An information system can be defined as ________.


A. a plan that a business develops to sell and distribute products
B. a set of raw facts and figures
C. all of the hardware and software that a business needs to achieve its objectives
D. a set of interrelated components
E. many different components that are not connected

1.2.4. Information systems literacy is a broad understanding of information systems, which


encompasses an understanding of the ________ dimensions of systems.
A. management, organizational, and technical
B. management, organizational, and data
C. management, databases, and organizational
D. management, networks, and organizational
E. management, software, and organizational
1.2.5. All of the following are reasons why management information systems drive globalization
EXCEPT ________________.
A. cheap and educated labor
B. global communication cost
C. the emergence of the Internet
D. supply chain cost management
E. access to product and services

1.2.6. A firm's information technology infrastructure comprises computer hardware, computer


software, data management technology, networking and communications technology, and
________.
A. the people required to run and manage them
B. database management systems
C. management of staff administration systems
D. organizational cross-cultural management
E. the Internet of Things

1.3.1. The study of information systems is a multidisciplinary field. Which of the following lists
accurately includes all of the disciplines?
A. Computer Science, Operations Research, Sociology, Mathematics, Economics, Psychology
B. Computer Science, Operations Research, Sociology, Management Science, Economics,
Psychology
C. Management Science, Operations Research, Sociology, Computer Science, Environmental
Research, Psychology
D. Computer Science, Operations Research, Sociology, Management Science, Psychology
E. Psychology, Operations Research, Sociology, Management Science, Economics, Psychology

1.3.2. Select the item below that is NOT one of the ways in which computer science contributes to the
understanding of information systems.
A. Methods of efficient data access
B. Methods of computation
C. Methods of efficient data storage
D. Theory of business process development
E. Establishing theories of computability

1.3.3. All of the following disciplines contribute to the contemporary approaches to information
systems EXCEPT ________.
A. computer science
B. economics
C. operations research
D. philosophy
E. psychology

1.3.4. An approach to the study of information systems that takes into account the information
technology aspects and the people aspects is called the________.
A. technical approach
B. psychological approach
C. sociotechnical approach
D. sociological approach
E. behavioral approach

1.3.5. The________ view jointly optimizes the social and technical systems used in production.
A. organizational
B. sociological
C. technical
D. behavioral
E. sociotechnical

1.3.6. When technology must be changed and designed to fit the needs of the organization and
individuals, it may need to be ________ in order to adjust the fit between the organizational needs
and the technology.
A. reverse engineered
B. deprecated
C. discarded
D. de-optimized
E. optimized

CHAPTER 2
2.1.1. How are information systems related to business processes?
A. Information systems have no relation to the business process.
B. Information systems create and complete all business processes.
C. Information systems are used solely as a reporting tool for sales and marketing.
D. Information systems make it possible for firms to manage all their information, make better
decisions, and improve the execution of their business processes.
E. Information systems are used to monitor the business processes in the finance and accounting
areas for security purposes.

2.1.2. Which statement contains business processes associated with the correct functional area?
A. The business processes of paying creditors, creating financial statements, and managing cash
accounts are in the functional area of finance and accounting.
B. The business processes of paying creditors, creating financial statements, and producing bills of
materials are in the functional area of finance and accounting.
C. The business processes of assembling the product, checking the quality, and identifying the
customer are in the functional area of manufacturing and marketing.
D. The business processes of hiring employees, selling the product, and evaluating employees' job
performance are in the functional area of human resources.
E. The business processes of assembling the product, checking for quality, and selling the product
are in the functional area of manufacturing and production.

2.1.3. All of the following are examples of functional business processes EXCEPT:
A. Identifying customers
B. Assembling the product
C. Shipping a product
D. Hiring employees
E. Paying creditors

2.1.4. The functional area that includes the business process of making customers aware of the
product is called ________.
A. corporate ventures
B. sales and marketing
C. finance and accounting
D. manufacturing and production
E. human resources

2.1.5. The business process of fulfilling a customer order involves a complex set of steps that requires
the close coordination of the sales, accounting, and manufacturing ___________.
A. standard procedures
B. computers
C. people
D. functions
E. software components

2.1.6. Information technology today can change the ________, making it possible for people to share
information.
A. means to store data
B. computer hardware
C. computer software
D. people in the organization
E. flow of information

2.2.1. Transaction processing systems keep track of what sort of items in an organization?
A. Banking and credit card information
B. Primary activities and transactions of an organization, such as receipts, cash deposits, payroll,
credit decisions, and the flow of materials out of a factory.
C. POS (point of sale) data
D. Elementary activities and transactions of an organization, such as sales, receipts, cash deposits,
payroll, credit decisions, and the flow of materials in a factory
E. Online sales only

2.2.2. What type of system is used by senior management to help make decisions such as non-routine
decisions requiring judgment, evaluation, and insight?
A. Customer relations management software (CRMS)
B. Executive support system (ESS)
C. Sales management system (SMS)
D. Knowledge management system (KMS)
E. Supply chain management system (SCMS)
2.2.3. Today, businesses rely on large-scale cross-functional systems that _________ the activities of
related business processes and organizational units.
A. are too expensive to support
B. separate
C. consist of computers supporting
D. integrate
E. may be less efficient covering

2.2.4. Systems that keep track of elementary activities of an organization and are often used by
operational managers are called ________.
A. business intelligence systems
B. data mining systems
C. digital dashboards
D. transaction processing systems
E. executive support systems

2.2.5. Systems that are used by senior management to make decisions are called ________.
A. business intelligence systems
B. data mining systems
C. transaction processing systems
D. digital dashboards
E. executive support systems

2.2.6. Systems that span functional areas, focus on executing business processes across the business,
and include all levels of management are called ______________.
A. business intelligence systems
B. executive support systems
C. supply chain management systems
D. enterprise systems
E. transaction processing systems

2.3.1. Select the answer that lists the business benefits of collaboration and social business.
A. Productivity, quantity, innovation, customer service, and financial performance
B. Productivity, quality, innovation, customer retention, and financial performance
C. Productivity, quality, customer service, and financial performance
D. Productivity, quality, innovation, customer service, and financial performance
E. Productivity, quality, innovation, and financial performance

2.3.2. How do enterprise social networking tools create business value?


A. By connecting the members of an organization through profiles, updates, and notifications,
similar to Facebook features, but tailored to internal corporate uses
B. By limiting the amount of time employees can use social media while at work
C. By monitoring vendors and competitors social media presence
D. By monitoring employees and prospective employees social media presence
E. By connecting the customers of an organization through profiles, updates, and notifications on
Facebook and Instagram
2.3.3. Firms that engage their employees, customers, and suppliers with social networking platforms
embrace ________.
A. supply chain management
B. social business
C. change management
D. file sharing
E. e-commerce

2.3.4. A useful tool for storing and sharing corporate knowledge is a(n) ________.
A. executive support systems
B. wiki
C. informationrepository
D. supply chain management systems
E. blog

2.3.5. A tool used for online meetings, interviews, guest speakers, events, and employee training is
a(n) ________.
A. blog
B. online bulletin board system
C. Facebook
D. virtual world
E. wiki

2.3.6. A browser-based collaboration and document sharing platform which is combined with
powerful search features and is installed on corporate servers is called ________.
A. Sharepoint
B. Dropbox
C. Google drive
D. Microsoft Office
E. Facebook

2.4.1. Which answer best describes what the information systems department is responsible for
maintaining?
A. The information systems department is responsible for maintaining the hardware, software,
data storage, and networks that comprise the firm's IT infrastructure.
B. The information systems department is responsible for maintaining the databases that comprise
the firm's IT data infrastructure.
C. The information systems department is responsible for maintaining the data storage and networks
that comprise the firm's IT infrastructure.
D. The information systems department is responsible for maintaining the software of the firm's IT
infrastructure.
E. The information systems department is not responsible for maintenance.
2.4.2. Who is responsible for educating and training users and information systems specialists about
security, keeping management aware of security threats and breakdowns, and maintaining the tools
and policies chosen to implement security?
A. Chief security officer (CSO)
B. Chief information officer (CIO)
C. Chief executive officer (CEO)
D. Local law enforcement agency (LLEA)
E. Chief data officer (CDO)

2.4.3. The information systems department is responsible for maintaining the hardware, software,
data storage, and networks that comprise the firm's IT _______________.
A. infrastructure
B. programming
C. chief operating office
D. payroll
E. personnel

2.4.4. The person responsible for information security in most organizations is the ________.
A. president
B. chief information officer
C. vice president of human resources
D. chief security officer
E. controller

2.4.5. ___________________ are playing an increasingly large role in the design and development of
information systems.
A. End users
B. Chief security officer
C. Suppliers
D. Vice presidents
E. Programmers

2.4.6. The issue of how information systems should be used within an organization is part of
________.
A. the role of the CIO
B. the role of the CEO
C. human resources
D. the role of the board
E. IT governance

CHAPTER 3
3.1.1. What is a disruptive technology?
A. Disruptive technologies can be substitute products that perform below the standards of anything
currently produced.
B. Disruptive technologies can be substitute products that perform as well as or better than
anything currently produced. In othercases disruptive technologies simply extend the market,
usually with less functionality and much less cost, than existing products.
C Disruptive technologies simply extend the market, usually with unstable functionality and greater
cost than existing products.
D. Technologies that do not run on your organizations native app.
E. Technologies that are created by a competitor that are lowering your organizations market share.

3.1.2. Routines for producing goods and services are sometimes called ________.
A. standard operating procedures
B. information systems
C. manufacturing systems
D. production systems
E. payment systems

3.1.3. A stable, formal social structure that takes resources from the environment and processes
them to produce output is called a(n) ________.
A. organization
B. environment
C. functional unit
D. business unit
E. capital and labor

3.1.4. A collection of routines and behaviors make up a(n) ________.


A. standard operating procedure
B. organizational culture
C. business process
D. disruptive technology
E. organizational environment

3.1.5. ________ encompasses people in organizations occupying different positions with different
specialties, concerns, and perspectives with divergent viewpoints.
A. Organizational politics
B. Standard operating procedure
C. Organizational environment
D. Disruptive technology
E. Business process

3.1.6. Substitute products that perform as well as or better than anything currently produced are
called ________.
A. standard operating products
B. business processes
C. disruptive technologies
D. organizational environments
E. cloud computing products

3.2.1. From the point of view of economics, IT changes ________.


A. too rapidly to be correctly included in a yearly budget
B. neither the cost of data acquisition or the cost of information
C. the costs of information but has no effect on relative costs of capital
D. both the costs of data acquisition and the costs of information
E. both the relative costs of capital and the costs of information

3.2.2. Information technology, especially the use of networks, can help firms lower the cost of
________, making it worthwhile for firms to contract with external suppliers instead of using internal
sources.
A. freelance outsourcing
B. market participation (transaction costs)
C. collective bargaining
D. benefits for employees
E. outsourcing management

3.2.3. One of the reasons that information technology flattens an organization is ________.
A. information technology decreases management efficiency
B. decision-making rights have been taken away from lower-level employees due to a lack of
information
C. information technology has narrowed the distribution of information in the organization
D. information technology gives less power to lower-level employees
E. managers receive much more timely and accurate information, thus requiring less managers
3.2.4. The most common reason for failure of large projects to succeed is ________.
A. organizational resistance to change
B. lack of proper project management
C. staff with poor skill-sets
D. lack of senior management support
E. failure of technology

3.2.5. The accessibility, storage, and distribution of information and knowledge is increased
dramatically by ________.
A. intranets
B. business intelligence systems
C. cloud computing
D. the Internet
E. transaction processing systems

3.2.6. All of the following are organizational factors to consider when building a new system EXCEPT:
A. The type of organization and its leadership
B. The structure of the organization
C. The organization's culture and politics
D. Executive compensation
E. The environment in which the organization must function
3.3.1. What are the four generic strategies used in conjunction with information systems?
A. Product capitalization, low-cost leadership, focus on market domination, and customer and
supplier control
B. Low-cost leadership, product differentiation, focus on market niche, and strengthening
customer and supplier intimacy
C. Data differentiation, low-cost leadership, focus on information domination, and customer and
supplier intimacy
D. Product differentiation, low-cost leadership, focus on market domination, and customer and
supplier intimacy
E. Product capitalization, product differentiation, focus on market niche, and customer and supplier
control

3.3.2. A powerful, current example of a rapidly expanding ecosystem is the mobile Internet platform.
In this ecosystem there are four industries; select the answer that identifies them.
A. Device makers, Wi-Fi providers, independent software applications providers, and Internet service
providers
B. Device owners, wired telecommunication firms, software providers, and Wi-Fi providers
C. Device retailers, wireless telecommunication firms, independent software applications providers,
and Internet service providers
D. Device makers, wireless telecommunication firms, open source applications providers, and
Internet service providers
E. Device makers, wireless telecommunication firms, independent software applications providers,
and Internet service providers

3.3.3. Firms that do better than others are said to have a(n) ________.
A. better market share
B. competitive advantage
C. change management
D. better organizational culture
E. more productive workforce

3.3.4. All of the following are components of Michael Porter's Competitive Forces Model EXCEPT:
A. New market entrants
B. Agents
C. Customers
D. Suppliers
E. Substitute products

3.3.5. All of the following are advantages of new market entrants EXCEPT:
A. They often hire younger, less expensive, and often more innovative workers
B. They are not encumbered by worn-out brand names
C. They are not locked into old plants and equipment
D. They have less capital than an established company
E. They are more highly motivated than traditional occupants an industry

3.3.6. Information systems are used to enable a _____________ market focus, and help companies
serve this target market better than competitors.
A. neutral
B. digital
C. general
D. specific
E. national

3.4.1. The more successfully a firm can align information technology with its business goals, the
________.
A. more profitable it will be
B. more high tech it will be
C. less successful it will be
D. more controlled it will be
E. more its data will cost

3.4.2. To identify the types of systems that provide a strategic advantage to their firms, select the list
that contains all the questions managers should ask.
A. What competition is there in the industry in which the firm is located? What are the business, firm,
and industry value chains for this particular firm? Have we aligned IT with our business strategy and
goals?

B. What products does our competitor offer that we offer? Can any of our value chains be
automated? Can we use cloud services?

C .What is the structure of the industry in which the firm is located? What are the business, firm,
and industry value chains for this particular firm? Have we aligned IT with our business strategy and
goals?

D. Can we purchase an "off the shelf" system? Can we outsource the development? What system
does our competitor use?

E. What will the cost be to develop the IS system? Will we be able to develop in house? Will we use a
native app or Web app?

3.4.3. ________ of an organization's profits can be attributed to the alignment of the business with
IT.
A. About 50 percent
B. About 10 percent
C. One-third
D. All
E. None

3.4.4. In order to align IT with business as well as use information systems correctly managers need
to perform a ________.
A. institutional review
B. strategic transition
C. structured walkthrough
D. strategic systems analysis
E. value chain analysis

3.4.5. The digital firm era requires a more dynamic view of the boundaries among industries, firms,
customers, and suppliers, with competition occurring among industry sets in a business
______________.
A. software
B. culture
C. ecosystem
D. manner
E. structure

3.4.6. When a firm adopts strategic systems that affect both the social and technical elements of the
organization, this can be considered _____________, a movement between levels of sociotechnical
systems.
A. strategic changes
B. strategic switches
C. strategic transitions
D. strategic evolutions
E. strategic revolutions

4.1.1.Ethical issues in information systems have been given new urgency by ________.
A. the rise of the Internet and electronic commerce
B. the number of unauthorized virtual visitors to the United States
C. credit card companies facing millions in loses
D. the dot com bubble
E. Facebook and Instagram

4.1.2. Which answer contains the correct list of moral dimensions of the Information Age?
A. Information rights and obligations, property rights and obligations, accountability and control,
system quality
B. Internet rights, property rights and obligations, accountability and control, system quality, quality
of life
C. Property rights and obligations, accountability and control, system quality, quality of life
D. Information rights and obligations, property rights and obligations, accountability and control,
system quality, quality of life
E. Information rights and obligations, property rights and obligations, system quality, quality of life

4.1.3. The principles of right and wrong that guide an individual are called ________.
A. rules
B. environment
C. ethics
D. company policy
E. laws

4.1.4. Ethical issues in information systems have become more of an urgent topic because of the rise
of ________.
A. negative organizational environment
B. business processes
C. disruptive technology
D. organizational culture
E. the Internet and e-commerce

4.1.5. The introduction of new information technology has a ripple effect which raises many issues.
These issues have the following moral dimensions: information rights and obligations, property
rights and obligations, system quality, quality of life, and ________.
A. organizational culture
B. corporate profits
C. business process
D. accountability and control
E. organizational environment
4.1.6. All of the following are moral dimensions of issues pertaining to the information age EXCEPT:
A. system quality
B. quality of life
C. accountability and control
D. property rights and obligations
E. quality of service

4.2.1. What are the basic concepts that form the underpinning of an ethical analysis of information
systems and those who manage them?
A. Responsibility, accountability, liability, and due process
B. Margins, accountability, liability, and due process
C. Obligation, liability and due process
D. Responsibility, definition, liability, and due process
E. Responsibility, accountability, and due process

4.2.2. When confronted with a situation that seems to present ethical issues, which steps should you
walk through to analyze it?
A. Identify and describe the facts clearly, define the conflict or dilemma and identify the higher-
order values involved, identify the stakeholders, identify the options that you can reasonably take,
identify the potential consequences of your options.

B. Identify problematic facts clearly, define the problem and identify the stakeholders responsible,
identify the legal actions that you can reasonably take, identify the potential financial consequences.

C. Identify problematic facts clearly, define the problem and identify the higher-ups involved, identify
the legal actions that you can reasonably take, identify the potential financial consequences.

D. Identify responsible person or persons, define the conflict or dilemma, identify the stakeholders,
and identify the potential consequences.

E. Identify responsible person or persons, remove yourself from the conflict or dilemma, notify the
stakeholders, and identify the potential consequences.

4.2.3________ means that that you accept the potential costs, duties, and obligations for the
decisions you make.
A. Accountability
B. Feasibility
C. Responsibility
D. Liability
E. Due process

4.2.4. Immanuel Kant's Categorical Imperative states ________.


A. do unto others as you would have them do unto you
B. take the action that produces the least harm or the least potential cost
C. take the action that achieves the higher or greater value
D. if an action is not right for everyone to take, it is not right for anyone
E. assume that virtually all tangible and intangible objects are owned by someone else unless there is
a specific declaration otherwise

4.2.5. Promises by professions to regulate themselves in the general interest of society are called
________.
A. laws
B. risk aversion principles
C. honoring property rights
D. codes of conduct
E. licensing

4.2.6. All of the following are steps which should be taken when confronted with a new ethical
situation EXCEPT:
A. Analyze the organizational structure
B. Identify and describe the facts clearly.
C. Identify the options that you can reasonably take.
D. Identify the stakeholders.
E. Define the conflict or dilemma and identify the higher-order values involved.

4.3.1.FIP is a set of principles governing the collection and use of ________.


A. files from the Internet that are private
B. information about other countries
C. financial institution policies
D. information about individuals
E. private funds collected on the Internet

4.3.2.What is a Web beacon?


A. A small program that calls to browsers to visit a Web site
B. A Google program to direct clicks to a Web site
C. A Web program that forces users to click on a link
D. Small software programs that keep a record of users' online clickstream
E. A Bing initiative to increase traffic to OneDrive

4.3.3. In Europe, the protection of personal data is protected by the 2012 ________.
A. local government
B. individual organizations
C. professional societies
D. EU Commission Reform
E. state government

4.3.4. A set of principles governing the collection and use of information about users is called
________.
A. fair information practices
B. Internet privacy model
C. Freedom of Information Act
D. fair exchange practices
E. Computer Matching and Privacy Protection Act of 1988

4.3.5. "The Right to Be Forgotten" is a set of principles governing the use, retention, and deletion of
________ by Internet companies.
A. personal data
B. information about other countries
C. private funds collected on the Internet
D. files from the Internet that belong to corporations
E. financial institution policies

4.3.6. Tiny software programs that keep track of where a user visited on the Internet and report this
back to a server are called ________.
A. session variables
B. Trojan horses
C. SQL injection
D. cookies
E. Web beacons

4.4.1. Although software bugs and facility catastrophes are likely to be widely reported in the press,
by far the most common source of business system failure is ________.
A. natural disaster
B. data quality
C. power outages
D. government intervention
E. hackers

4.4.2. What is technostress?


A. Stress induced by computer and cell phone use
B. Legal terminology for strain on a relationship resulting in separation or divorce
C. The strain on the Internet caused by the increase in users over the past 20 years
D. Stress caused by the ever changing OS's of users' preferred devices
E. Strain on device's circuits caused by using apps not designed for the device's OS

4.4.3. The commission of illegal acts against a computer or through the use of a computer is called
________.
A. cyber tracing
B. cyber-stalking
C. computer abuse
D. computer crime
E. data breach

4.4.4. The most common source of business system failure is (are) ________.
A. data quality
B. facility catastrophes
C. software bugs
D. cyber crime
E. viruses

4.4.5. The world is facing the challenge of a global _____________, which means that people in
poorer countries have much less access to technology.
A. digital divide
B. digital reflux
C. lack of equipment
D. Internet access
E. lack of training

4.5.6. The newest computer-related malady is ________________, in which computer and cell phone
use induce stress.
A. computer vision syndrome
B. tendonitis
C. detached retina
D. carpal tunnel syndrome
E. technostress
CHAPTER 5
5.1.1 Ethical issues in information systems have been given new urgency by ________.
A. credit card companies facing millions in losses
B. the dot com bubble
C. the number of unauthorized virtual visitors to the United States
D. Facebook and Instagram
E. the rise of the Internet and electronic commerce

5.1.2. The IT infrastructure in organizations today is an outgrowth of more than 50 years of evolution
in computing platforms. There have been five stages in this evolution, each representing a different
configuration of computing power and infrastructure elements. Select the list below with the correct
five eras.

A. academic mainframe and commercial computing, military computers, client/server networks,


enterprise computing, and cloud and mobile computing
B. general-purpose mainframe and minicomputer computing, personal computers, client/server
networks, enterprise computing, and cloud and mobile computing
C. vacuum tube computers, transistor computers, microprocessor computer, enterprise computing,
and cloud and mobile computing
D. general-purpose mainframe and minicomputer computing, military computers, client/server
networks, enterprise computing, and cloud and mobile computing
E. special-purpose mainframe, personal computers, server networks, enterprise computing, and
cloud computing

5.1.3. ________ provide data, voice, and video connectivity to customers.


A. Application software services
B .Physical facilities management services
C. Telecommunication services
D.IT management services
E. Data management services

5.1.4. All of the following are eras in IT infrastructure evolution except ________.
A. general purpose mainframe and mini-computer era
B. personal computer era
C. the disruptive technology era
D. enterprise computing era
E. client/server era

5.1.5. A model of computing that firms turned to that included networking standards and software
tools that could integrate disparate networks and applications throughout the firm into a business-
wide infrastructure is called ________.
A. enterprise computing
B .distributed computing
C. client/server computing
D. cloud computing
E. mobile computing

5.1.6._______ states that the number of components that a computer chip can hold doubles every
two years.
A. Metcalfe's Law
B. The Law of Mass Digital Storage
C. Brooks' Law
D. Moore's Law
E. Archimedes' principle

5.2.1. Ninety percent of all PC's at the client level use which OS?
A. Java
B. Windows
C. Linux
D. Unix
E. OSx

5.2.2. What are legacy systems?


A. Systems that do not run on a recognized OS
B. Systems created to research family legacy
C. Generally older transaction processing systems created for mainframe computers
D. Systems still running an older version of Windows DOS
E. Systems that have their components and OS built by the same company

5.2.3. A computer consisting of a circuit board with processers and memory cards stored in racks is
called a(n) ________.
A. tower
B. blade server
C. desktop computer
D. cloud computer
E. laptop computer
5.2.4.________ is an inexpensive and robust general purpose open source operating system
platform.
A. Linux
B. Google Chrome OS
C. Microsoft Windows
D. iOS
E. Android

5.2.5. A ________ maintains a large Web server, or series of servers, and provides fee-paying
subscribers with space to maintain their websites.

A. flash drive
B. network attached storage device
C.local area network
D. wide area network
E. Web hosting service

5.2.6 _______ systems are older transaction processing systems, usually created for mainframes.

A. Transaction processing
B. Networked
C.Legacy
D. Database
E. Software

5.3.1. BYOD is one aspect of the consumerization of IT, in which new information technology first
emerges in the ________ and spreads into ________.
A. consumer market business organizations;
B. smartphone market; PC market
C. PC market; smartphone market
D. business organizations; consumer market
E. American market; European market

5.3.2. At some hospitals, a growing number of surgeons are using ________ to stream their
operations online, float medical images in their field of view, and hold video consultations with
colleagues as they operate.
A. web cams
B. video cams
C. smartphones
D. Google Glass
E. iPads

5.3.3. All of the following are wearable computing devices EXCEPT ________.
A. smart badges
B. smart glasses
C. smartwatches
D .activity trackers
E. tablet computers

5.3.4. The term used to describe new information technology that first emerges in the popular end-
user market place and then spreads into business organizations is ________ of IT.
A. marketization
B. businessization
C. globalization
D. producerization
E. Consumerization

5.3.5. A type of computer which could be in many states at once is called a ________.
A. blade server
B. nanocomputer
C. stateful computer
D. quantum computer
E. micro computer

5.3.6. All of the following are essential characteristics of the cloud EXCEPT ________.
A. ubiquitous network access
B. Web beacons
C. rapid elasticity
D. on-demand self-service
E. location-independent resource pooling

5.4.1. Select an open source operating system from the list below.
A. Adobe Bridge
B. OSx
C. Windows 7
D Linux
E. Windows 8

5.4.2. What does HTML stand for?


A. Highlight-Text Markup Language
B. Hypertext Markup Link
C. Hyperthread Markup Language
D. Hypertext Manual Link
E. Hypertext Markup Language

5.4.3. Free software produced by a team of hundreds of thousands of programmers around the
world is called ________.

A. commercial software
B. open source software
C. proprietary software
D. legacy software
E. closed source software

5.4.4. The leading operating system on servers, mainframe computers, and supercomputers is
________.
A.HP-UX
B.MVS
C.Microsoft Windows
D.Unix
E.Linux

5.4.5. ________ is an object-oriented programming language that is processor and operating system
independent.
A. C
B. ADA
C. C++
D. Java
E. Visual Basic

5.4.6 A set of self-contained services that communicate with one another to create a working
software application is called a ________.
A. XML
B. Software package
C. Web service
D. service-oriented architecture
E. HTML

5.5.1. What does scalability refer to?


A. The ability of a system to "scale" across different operating systems
B. The ability to weight links to your Web resource
C. The ability to access Web resources on desktop or mobile device
D. The ability of a computer, product, or system to expand to serve a large number of users without
breaking down
E. ability to add one application to another (add a database onto a Web page) on your systems

5.5.2. Which list below contains all the factors you can use to answer the question: How much should
our firm spend on IT infrastructure?
A. Your firm's business strategy, your firm's IT strategy, infrastructure, and cost, information
technology assessment, competitor software services, and competitor firm IT infrastructure
investments
B. Market demand for your firm's services, your firm's business strategy, your firm's IT strategy,
infrastructure, and cost, information technology assessment, and competitor firm services
C. Market demand for your firm's cloud services, your firm's software strategy, infrastructure, and
cost, information technology assessment, competitor firm services, and competitor firm IT
infrastructure investments
D. Market demand for your firm's services, your firm's business strategy, your firm's IT strategy,
infrastructure and cost, information technology assessment, competitor firm services, and
competitor firm IT infrastructure investments
E. Market demand for your competitor's services, your competitor's IT strategy, infrastructure, and
cost, information technology assessment, competitor firm services, and competitor firm IT
infrastructure investments

5.5.3. The ability of a computer, product, or system to expand to serve more users without breaking
down is called ________.
A. expandability
B. scalability
C .immutability
D. scopability
E. self-healing

5.5.4. All of the following are important questions about IT governance EXCEPT ________.
A. how data should be stored in a database
B. relationship between central and distributed IT
C. central versus distributed IT
D. who will control and manage the firm's IT infrastructure
E. allocation of infrastructure costs

5.5.5. The following factors determine how much a firm spends on IT infrastructure EXCEPT:
A. competitive firms' IT strategy and investments
B. the firm's business strategy
C. market demand for your firm's customer services
D. the firm's IT strategy
E. the firm's physical location

5.5.6. All of the following are total cost of ownership infrastructure components EXCEPT ________.

A. staff salaries
B .hardware acquisition
C. Installation
D. Training
E. software acquisition

CHAPTER 6
6.1.1. A record describes a(n) ________ which is a person, place, thing, or event on which we store
and maintain information. Each characteristic or quality describing a particular ________ is called a(n)
________.
A. entity; entity; attribute
B. entity; entity; field
C. file; file; field
D. field; field; byte
E. bit; bit; byte
6.1.2. Data redundancy is the presence of ________ in multiple files.
A. coarse data
B. re-indexed data
C. non-indexed data
D. duplicate data
E. fine data

6.1.3 A group of related fields, such as a student's name, course details, course start date, and grade
is called a(n) ________.
A. byte
B. record
C. field
D. file
E. bit

6.1.4. A person's age, a place's name, or other characteristic that is stored in a database is called a(n)
________.
A. object
B. bit
C. entity
D. file
E. attribute

6.1.5. Coupling of files used to store information and the application program is called ________.
A. program-data dependence
B. client/server computing
C. program-data independence
D. enterprise computing
E. data redundancy

6.1.6. Data is considered to be ________ when the same attribute has different values.
A. cleansed
B. inconsistent
C. safe
D. redundant
E. dependent upon a program

6.2.1. A DBMS reduces data redundancy and inconsistency by ________.


A. minimizing isolated files with repeated data
B. utilizing a data index
C. pre-formatting data
D. uncoupling program and data
E. stripping out redundancy and inconsistency using SQL

6.2.2. The most popular type of database today for PCs as well as for larger computers and
mainframes is ___________ database.
A. Linux's Apache
B. the relational
C. M204 (Model 204)
D. noSQL
E. iRelational

6.2.3 A(n) ________ enables an organization to centrally manage and organize data.
A. storage area network
B. cloud computer
C. database management system
D. laptop computer
E. desktop computer

6.2.4. The unique identifier in one table that appears in another table is called the ________.
A. columns
B. primary key
C. candidate key
D. tuple
E. foreign key

6.2.5. In relational databases, the ________ operation creates a subset of records in the file that
meet stated criteria.
A. join
B. aggregate
C. select
D. truncate
E. project

6.2.6. ________ use a more flexible data model and are designed for big data.
A. Online analytical processing systems
B. Non-relational database management systems
C. Relational databases
D. Legacy systems
E. Data warehouses

6.3.1. To describe datasets with volumes so huge that they are beyond the ability of typical DBMS to
capture, store, and analyze, the term __________ is used.
A. relational data
B. large data
C. cloud data
D. terra data
E. big data

6.3.2 For handling unstructured and semi-structured data in vast quantities, as well as structured
data, organizations are using _____________.
A. Datapalooza
B. Access
C. DataNet
D. MySQL
E. Hadoop

6.3.3. A(n) ________ is a database that stores historic and current data for the use of decision makers
in the organization.
A. transaction processing system
B. data warehouse
C. in-memory database
D. flat-file system
E. non-traditional database management system

6.3.4. Huge volumes of semi-structured and unstructured Web traffic, e-mail messages, and tweets
are called ________.
A. big data
B. data warehouses
C. Hadoop
D. Linux
E. in-memory computing

6.3.5. __________________ use(s) both relational and non-relational technologies that are optimized
for analyzing large datasets.
A. A data warehouse
B. Data analytics
C. Online analytic processing (OLAP)
D. Analytic platforms
E. Hadoop

6.3.6. All of the following are types of information obtained from data mining EXCEPT ________.
A. clutering
B. associations
C. Web beacons
D. classification
E. sequences

6.4.1 One study found that 10 to 25 percent of customer and prospect records contain critical data
errors. Correcting these errors at their source and following best practices for promoting data
quality increased the productivity of the sales process and generated a(n) _______ increase in
revenue.
A. 73 percent
B. zero percent
C. 66 percent
D. 10 to 25 percent
E. 35 percent

6.4.2. Data cleansing, also known as _________, consists of activities for detecting and correcting
data in a database that are incorrect, incomplete, improperly formatted, or redundant.
A. compiling
B. datalizing
C. data scrubbing
D. first normal form
E. normalizing

6.4.3. A(n) ________ specifies the rules of an organization for sharing and disseminating information.
A. disaster recovery plan
B. information policy
C. information protocol
D. information toolset
E. quality assurance plan

6.4.4. The corporate function that is responsible for defining and organizing the content of the
database as well as database maintenance is ________.
A. data administration
B. data cleansing
C. senior management
D. database administration
E. network operations

6.4.5. _______ deals with the data employed in an enterprise, including the policies and processes
for managing the availability, usability, integrity, and security of the data.
A. Data consistency auditing
B. Post-mortem analysis
C. VPN analysis
D. End-user surveying
E. Data governance

6.4.6 The process of detecting and correcting errors in a database is called ________.
A. data transmission
B. data mining
C. data cleansing
D. normalization
E. data extraction

CHAPTER 7
7.1.1. What is a method of slicing digital messages into parcels called?
A. Digi-slicing
B. Pixelating
C. Packet switching
D. Decomposing
E. Parcel slicing
7.1.2 Which list contains the most widely used network operating systems?
A. Microsoft Windows Server, OSX Server, and UNIX
B. Internet Explorer, FireFox, and Chrome
C. Microsoft Windows Server, OSX Server, and Novell Open Enterprise Server
D. Microsoft Windows Server, Linux, and Novell Open Enterprise Server
E. Microsoft Windows Server, Linux, and Ubuntu

7.1.3 The network operating system (NOS) ________.


A. routes network traffic
B. serves as a connection point between computers.
C. resides only on the server in the network
D. provides Internet connectivity
E. is always the same as the operating system on each client

7.1.4 A simple device that connects network components and sends a packet of data to all other
connected devices is called a(n) ________.
A. hub
B. switch
C. client
D. server
E. router

7.1.5 The method of slicing digital messages into pieces, sending the pieces over different
communication media, and then reassembling the pieces is called ________.
A. client/server computing
B. routing
C. enterprise computing
D. packet switching
E. switching

7.1.6 he part of the Transmission Control Protocol/Internet Protocol (TCP/IP) that is closest to the
client end-user is called the ________.
A. application layer
B. Internet layer
C. transport layer
D. switching layer
E. network interface layer

7.2.1. What is the function of a modem?


A. Transforms digital signals into binary numbers
B. Transforms binary signals into analog form
C .Slow the Internet signal to a speed the computer can process
D .It is a meter to control Internet speed
E. Transforms digital signals into analog form (and vice versa)

7.2.2. Which list below contains all the principal network types?
A. Internet, intranet, and extranet
B. LAN, CAN, MAN, and Wi-Fi
C. Peerless, Wi-Fi, and Homegroup
D. LAN, NAN, MAN, and WAN
E. LAN, CAN, MAN, and WAN

7.2.3 A(n) ________ is a discrete binary waveform used for transmission of data.
A. digital signal
B. analog signal
C. discrete signal
D. electric current
E. sine wave

7.2.4. A(n) __________________ network treats all processors equally and within a PC-based office
environment is used primarily in small networks with 10 or fewer users
A. local area network
B. metropolitan area network
C. Ethernet
D. peer-to-peer network
E. wide area network

7.2.5. The number of cycles per second that can be sent through a telecommunications medium is
measured in ________.
A. latency
B. bandstands
C. compression factors
D. bandwidth
E. Hertz

7.2.6. All the following are physical transmission media EXCEPT


A. coaxial cable
B. twisted pair
C. fiber-ptic cable
D. POWER LINES
E. wireless transmission media

7.3.1. Every computer on the Internet is assigned a unique __________.


A. IP Address
B. TCP Address
C. http address
D. bit identifier
E. www address

7.3.2. What agency controls the assignment of IP addresses?


A. S.M.A.R.T.
B. U.S. Post Office
C. ICANN
D. Google
E. MicrosofT

7.3.3. __ offer guaranteed delivery of data, voice, and video at 1.54 Mbps.
A Ethernet connections
B. Satellite Internet connections
C. Cable Internet connections
D. Digital subscriber line (DSL) T1 lines
E. T9 connections

7.3.4. ________ converts domain names to IP addresses.


A. A local area network
B. TCP protocol
C. A wide-area network
D. IP protocol
E. The domain name system (DNS)

7.3.5. A new version of IP addressing, which contains 128-bit addresses, is called ________.
A. IP128
B. Internet2
C. IPv5
D. IPv6
E. TCP/IP

7.3.6. All of the following are major Internet services EXCEPT ________.
A. IM
B. FTP
C. e-mail
D. Web beacons
E. Telnet

7.4.1 What is the popular name for the 802.15 wireless networking standard?
A. Bluetooth
B. WNS (wireless networking standard)
C. Wi-Max
D. TCP/IP
E. LAN-Fi
7.4.2 What systems provide a powerful technology for tracking the movement of goods throughout
the supply chain?
A. LAN-Fi
B. Wi-Max
C. Https
D. QR Scanner
E. Radio frequency identification (RFID)

7.4.3 _______ is the popular name for a networking standard useful for creating small personal-area
networks.
A. Voice-over IP (VOIP)
B. Bluetooth
C. VPN
D. Blacktooth
E. TCP/IP

7.4.4 One or more access points providing wireless Internet access in a public place is called a(n)
________.
A. hotspot
B. network operation
C. wireless sensor network
D. WiMax
E. 802.11

7.4.5 _____ is very useful for inventory and supply chain management.
A. VPN analysis
B. Post-mortem analysis
C. RFID
D. A sensor network
E. End-user survey

7.4.6 The process of detecting and correcting errors in a database is called ________.
A. data extraction
B. data transmission
C. normalization
D. data mining
E. data cleansing
CHAPTER 8
8.1.1 Which below is the correct definition of "war driving"?
A. Unauthorized access to a satellite ISP
B. Eavesdroppers physically steal a wireless network router to gain access
C. Gaining access to a network using physical force
D. After gaining access to a wireless signal "lock it up" and "drive" off, leaving the access point
inaccessible
E. Eavesdroppers drive by buildings or park outside and try to intercept wireless network traffic

8.1.2 What type of attack takes advantage of vulnerabilities in poorly coded Web application
software to introduce malicious program code?
A. AppWorm
B. SQL injection
C. Macrovirus
D. Worm
E. Rootkit attack

8.1.3. When thinking about the vulnerability of information systems to destruction, error, and abuse,
security refers to ________.
A. the policies in place to prevent unauthorized access to an organization's network
B. the policies, procedures, and technical measures used to prevent unauthorized access,
alteration, theft, or physical damage to information systems
C. control over all secure access to an organization's network
D. resident software on client machines
E. referential integrity constraints placed on a database

8.1.4. A software program that appears to be benign but then does something other than expected
is called a ________.
A. Storm
B. macro virus
C. Trojan horse
D. virus
E. Worm

8.1.5. A type of malware that takes advantage of poorly coded Web applications is called ________.
A. Storm
B. Conficker
C. Ransomware
D. spyware
E. SQL injection attacks

8.1.6 Hackers flooding a network server with many thousands of false communication requests is
called ________.
A. a denial-of-service attack
B. pharming
C. a drive-by download
D. spoofing
E. an SQL injection attack

8.2.1. _______ is the scientific collection, examination, authentication, preservation, and analysis of
data held on or retrieved from computer storage media so the information can be used in a court of
law.
A. Data mining
B. Pharming
C. Infomatics
D. Phishing
E. Computer forensics

8.2.2. If you work in the health care industry, your firm will need to comply with which Act below?
A. HIPAA
B. Gramm-Leach-Bliley Act
C. Sarbanes-Oxley Act
D. S.O.P.A.
E. P.I.P.P.A.

8.2.3. The law that requires companies and their management to safeguard the accuracy and
integrity of financial information that is used internally and released externally is called the ________.
A. Children's Online Privacy Protection Act (COPPA)
B. CAN-SPAM Act
C. Health Insurance Portability and Accountability Act (HIPAA)
D. Sarbanes-Oxley Act
E. Gramm-Leach-Bliley Act

8.2.4. The career field that deals with collection and examination of computer data for legal evidence
is called ________.
A. data warehousing
B. computer security
C. computer forensics
D. information assurance
E. data mining

8.2.5. Data which are not visible to the average user are called ________.
A. transient data
B. information
C. status data
D. ambient data
E. meta-data

8.2.6. A firm's ________ should include an awareness of computer forensics.


A. strategic plan
B. growth plan
C. staffing plan
D. information technology plan
E. contingency planning process

8.3.1 What is business continuity planning?


A. A business plan for technology continuity for all vendors working with the company
B. A business plan to restore operations after a disaster strikes
C. A business plan for mission continuity for the foreseeable future
D. A business plan for financial continuity for the foreseeable future
E. A business plan for technology continuity within all segments of the company
8.3.2 What would describe proper use of the firm's information resources and computing equipment,
including desktop and laptop computers, wireless devices, telephones, and the Internet?
A.A security policy
B.EULA
C. Acceptable use policy
D. Proper access policy
E. Risk assessment policy

8.3.3. All of the following are general controls EXCEPT ________.


A. implementation controls
B. data security controls
C. software controls
D. hardware controls
E. input controls

8.3.4. A risk ________ determines the level of risk to an organization if an activity or process is not
properly controlled.
A. profile
B. policy
C. audit
D. assessment
E. alignment

8.3.5. ________ consists of processes and tools to identify the valid users of a system.
A. Security process
B. An acceptable use policy
C. Identity management
D. A security policy
E. Login accounts

8.3.6 A(n) ________ consists of statements ranking information risks, identifying acceptable security
goals, and identifying the mechanisms for achieving these goals.
A. acceptable use policy
B. security policy
C. disaster recovery plan
D. information systems audit
E. business continuity plan

8.4.1 When the data in a message is converted from plain text to cipher text, a process called
_________ is used.
A. binary code conversion
B. plain2cipher
C. encryption
D. decryption
E. Cipherization

8.4.2 What type of systems contain redundant hardware, software, and power supply components
to create an environment that provides continuous, uninterrupted service?
A. Fault-tolerant computer systems
B. This is new technology that is not in service yet.
C. Safety Power Environment Systems (SPES)
D. R.H.S.P.S.
E. UPS

8.4.3 A technology for identity management which uses systems that read and interpret individual
human traits, such as fingerprints, irises, and voices, in order to grant or deny is called ________.
A. smartcard
B. two-phase authentication
C. TCP/IP
D. a token
E.biometric authentication

8.4.4. A combination of hardware and software that prevents unauthorized users from accessing a
network is called a ________.
A. switch
B. server
C. router
D. firewall
E. hotspot

8.4.5._______ prevents, detects, and removes malware, including computer worms, Trojan horses,
spyware, and adware.
A. Network address translation
B. An intrusion detection system
C. A sensor network
D. A unified threat management system
E. Antivirus software

8.4.6. A form of encryption that uses two keys is called ________.


A. the Caesar cipher
B. digital certificates
C. symmetric key encryption
D. public key encryption
E. application proxy filtering

You might also like