Академический Документы
Профессиональный Документы
Культура Документы
1
Chapter 1 - Objectives
Why information systems are so essential in
business today.
Define an information system from both a
technical and a business perspective.
The complementary assets required for
information technology to provide value to a
business.
Identify and describe contemporary
approaches to the study of information
systems and distinguish between computer
literacy and information systems literacy.
Select One
Data shaped into meaningful form are
called
1. A databank
2. Feedback
3. Knowledge
4. Information
Select One
Data shaped into meaningful form are
called
1. A databank
2. Feedback
3. Knowledge
4. Information (page 14)
Select One
Raw facts that have not been organized
into a useful form are called
1. Information
2. Business objectives
3. Data
4. Information systems
Select One
Raw facts that have not been organized
into a useful form are called
1. Information
2. Business objectives
3. Data (page 14)
4. Information systems
Select One
Which activity of an information system
converts raw input into a meaningful
form?
1. Input
2. Processing
3. Output
4. Feedback
Select One
Which activity of an information system
converts raw input into a meaningful
form?
1. Input
2. Processing (page 15)
3. Output
4. Feedback
Sample Final Exam Questions
1. Business functions
2. Business processes
3. Strategic choices
4. Business objectives
Select One
Logically related sets of activities that
define how business tasks are performed
are called?
1. Business functions
2. Business processes (page 41)
3. Strategic choices
4. Business objectives
Select One
These systems address non-routine
decisions requiring judgment, evaluation,
and insight because there is no agreed-
on procedure for arriving at a solution.
1. Enterprise system
2. Supply chain management (SCM) system
3. Executive support systems
4. Knowledge management system (KMS)
Select One
These systems address non-routine
decisions requiring judgment, evaluation,
and insight because there is no agreed-
on procedure for arriving at a solution.
1. Enterprise system
2. Supply chain management (SCM) system
3. Executive support systems (page 57)
4. Knowledge management system (KMS)
Select One
Systems that span all functional areas
and focus on executing business
processes across the firm are called
1. Cookie
2. Web bug
3. Spyware
4. profiler
Select One
What records information about you
during a Web surfing sessions such as
what Web sites you visited, how long you
were there, what ads you looked at, and
what you purchased?
1. Hacking.
2. Computer abuse.
3. Computer crime.
4. Spamming.
Select One
Illegal acts through the use of the
computer or against the computer
system is called:
1. Hacking.
2. Computer abuse.
3. Computer crime. (page 152)
4. Spamming.
Sample Final Exam Questions
What are Fair Information Practices? (page
140)
What is the major issue of privacy involved
in using cookies? (page 144)
Define and distinguish between the terms
intellectual property, trade secret, copyright,
and patent. What is the basic premise
behind them all? (page 145 146)
How does the rise of computer use in
business threaten employment? (page 155)
Chapter 5
1. Record
2. Bit
3. Byte
4. Field
Select One
In a database, the smallest unit of data a
computer can handle is a:
1. Record
2. Bit (page 226)
3. Byte
4. Field
Select One
Data redundancy occurs when:
1. Relational database
2. Hierarchical database
3. Network database
4. Object-oriented database
Select One
This database model uses a series of
logically related two-dimensional tables
or files to store information:
1. Protocols
2. Algorithms
3. Standards
4. Procedures
Select One
The formal set of rules that govern the
way in which computers communicate
are called
1. Technical
2. Organizational
3. Governmental
4. Environmental.
Select One
Common threats against information
systems come from all of the following
factors except
1. Technical
2. Organizational
3. Governmental (page3 316)
4. Environmental.
Select One
The single greatest cause of network
security breaches is
1. Worms
2. Trojan horses
3. Viruses
4. Spoofing.
Select One
Malware includes all of the following
except
1. Worms
2. Trojan horses
3. Viruses
4. Spoofing (page 319)
Sample Final Exam Questions
Discuss why information systems and networks are
vulnerable to security threats. (page 316 319)
Discuss the system security threats employees
pose. (page 327)
Describe what a risk assessment is and why it's
necessary. (page 330)
Describe policies a firm should develop to help
protect its information assets. (page 331 - 332)
Describe three new authentication technologies for
information systems and the necessity for them.
(page 336)
Chapter 9
1. Ubiquity
2. Disintermediation
3. Reintermediation
4. Marketspace
Select One
Removing the middleman and selling
directly to a consumer in a digital
marketplace is called
1. Ubiquity
2. Disintermediation (page 397)
3. Reintermediation
4. Marketspace
Select One
Currently, the fastest-growing type of
business-to-business e-commerce is:
1. Gantt Chart.
2. Pert Chart.
3. Optimization Chart.
4. Flow Chart.
Select One
This chart shows each project task as a
horizontal bar whose length is
proportional to the time required to
complete it.