ISM Quizes for Exam 1

90 terms by andrea_arnouk

Create a new folder

Advertisement Upgrade to remove ads

Chapters 1 and 11, 4, 5, and 10

________ include identifying what is to be produced, how frequently and how fast it is to be produced

Requirements

System implementations

Component designs

System definitions

Requirements

A ________ involves balancing of three critical factors: requirements, cost, and time.


WBS

trade-off

test plan

critical path

trade-off

With ________ installation, the organization implements the entire system/business processes on a limited portion of the business.

parallel

phased

pilot

plunge

pilot

Which of the following is an accurate representation of the steps in the business process management
cycle?


model processes; implement processes; assess results; create components

create components; model processes; implement processes; assess results

implement processes; create components; model processes; asses results

model processes; create components; implement processes; assess results

model processes; create components; implement processes; assess results

In a BPMN process diagram, all activities for a given role are shown in that role's ________.

repository

swim lane

gateway

database

swim lane

Which of the following is true for the relationship between business processes and information systems?

A business process need not relate to any information system, but an information system relates to at least one business process.

Information systems incorporate all business process activities, and hence should be developed before business processes.

Starting from processes and working toward information systems is the best option to anticipate future demands and new business processes.

Developing information systems before business processes ensures that all activities are considered in the development process.

A business process need not relate to any information system, but an information system relates to at least one business process.

________ set the stage for the requirements for any information systems and applications that need to be created or adapted.

Business repositories

Business assessments

Business objectives

Business process models

Business process models

Project teams create a ________, which is a hierarchy of the tasks required to complete a project.

critical path

work-breakdown structure

Gantt chart

scope statement

work-breakdown structure

The situation that occurs when adding more resources creates inefficiencies is known as ________.

diseconomies of scale

marginal utility

marginal returns

diseconomies of scope

diseconomies of scale

Once we have defined a project's goals and scope, the immediate next step is to ________.

plan the project

assess feasibility

determine system requirements

form the project team

assess feasibility

A ________ is a person who is well versed in an organization's strategy and who focuses, primarily, on ensuring that business processes and information systems meet the organization's competitive strategies.

business analyst

business application programmer

business administrator

business supervisor

business analyst

What are the four dimensions of feasibility?

planning, process, technical, and schedule feasibility

operational, strategic, technical, and tactical feasibility

cost, schedule, technical, and organizational feasibility

schedule, process, technical, and competitive feasibility

cost, schedule, technical, and organizational feasibility

According to Brooks' Law, adding more people to a late project will ________.

lower the total project cost

speed up the project

create diseconomies of scale

reduce the need for coordination

create diseconomies of scale

During the requirements definition stage of developing an information system, the project team will
include mostly ________.

programmers and testers

testers and business users

business and systems analysts

database designers and administrators

business and systems analysts

In the SDLC, the first major task for an assembled project team is to ________.

design system components

assess the project's feasibility

plan the project

define system goals and scope

plan the project

The ________ phase of the SDLC involves determining hardware and program specifications, planning the database and procedures, and creating job definitions.

requirements analysis

system implementation

component design

system definition

component design

In a ________ installation, the new system runs alongside the old one until it has been tested and is fully
operational.

pilot

phased

parallel

plunge

parallel

In systems development, documents, designs, prototypes, data models, database designs, working data
entry screens, and the like are examples of ________.

reports

resources

components

deliverables

deliverables

The ________ is a sequence of activities that determines the earliest date by which a project will be
completed.

requirement analysis chart

Pareto chart

critical path

scope statement

critical path

An as-is model ________.

documents the current situation of a business process

contrasts the former and current states of a business process

indicates the desired outcome of a business process

represents the ideal state of a business process

documents the current situation of a business process

The five-component framework considers individuals who maintain the data and who support the networks of computers as the ________ component.


people

data

network

procedural

people

According to the five-component model of information systems, the ________ component functions as instructions for the people who use information systems.

hardware

data

procedure

software

procedure

Which of the following is a component of an IS but not of IT?

data

software

hardware

people

people

A ________ must work with business leaders and planners to develop processes and systems that implement the business strategy and goals.

system analyst

business analyst

programmer

technical writer

business analyst

In the information system department, the ________ group manages the process of creating new information systems as well as maintaining existing information systems.

operations

technology

development

manufacturing

development

A security protocol for logging in to a computer is an example of the ________ component of an information system.

software

hardware

procedure

data

procedure

A manager will essentially require ________ skills to clearly understand how the resources that his or her company uses are converted to desired outputs.

experimentation

systems thinking

interpersonal

collaboration

systems thinking

Drother Sports Inc. is a sports equipment provider that markets its products through a chain of retail outlets in three states. As part of its expansion strategy, the company decides to open outlets in six more states and decides to revise its existing business processes. According to the five-component model of information systems, which of the following processes will be the least disruptive to the organization?

moving existing employees and hiring new employees

buying and installing new computers in the new outlets

developing new CRM software for the existing and new outlets

collecting demographic data from the new markets

buying and installing new computers in the new outlets

As production manager at a bottling plant for a cola manufacturer, you asked to receive reports containing figures for raw materials for the current year, but received a report that states last year's figures. This information would qualify as bad information because it is ________.

late

voluminous

inaccurate

too narrow in scope

inaccurate

Which of the following is a major implication of Moore's Law?

Physical size of integrated chips has increased.

Costs of computing and processing have increased.

Costs of data communications and storage have become very low.

Data processing activities have become complex and time consuming.

Costs of data communications and storage have become very low.

Which of the following is a nonroutine cognitive skill?

computer programming skill

tax accounting skill

marketing knowledge

systems thinking ability

systems thinking ability

You are looking to buy a home that costs less than $700,000, but your real estate agent keeps sending you fliers for homes that cost $1,000,000 or more. This information is likely to be useless because it is ________.

irrelevant

late

inaccurate

not reliable

irrelevant

Business users who administer the development of information systems should ________.

refrain from involving themselves in software development

have the skills to be a programmer or a database designer

have a good understanding of programming concepts

take an active role in that system's development

take an active role in that system's development

When presenting an idea to her colleagues, Marjorie failed to consider others' perspectives and got defensive when people asked her questions. This situation indicates that Majorie lacks ________ skills.

systems thinking

experimentation

collaboration

abstract reasoning

collaboration

Which of the following accurately describes the five-component framework of information systems?

computer hardware, software, data, procedures, and people

computer hardware, software, purpose, data, and procedures

computer hardware, software, communication networks, data, and procedures

computer hardware, software, data, people, and purpose

computer hardware, software, data, procedures, and people

Which of the following best defines Management Information Systems (MIS)?

The societal impact computers have on people.

The scientific and practical approach to building computers and applications.

The management and use of information systems to help organizations achieve their goals and objectives.

The building of computers to make people more productive.

The management and use of information systems to help organizations achieve their goals and objectives.

Which of the following components of an IS is the easiest to change and causes the least amount of organizational disruption?

data

software

hardware

procedures

hardware

Which of the following types of skills is most likely be outsourced to the lowest bidder?

abstract reasoning skills

ability to collaborate

ability to experiment

accounting skills

accounting skills

Which of the following is the best example of information, and is not mere data?

the number of students in various grades in a school

the price of company stock on a given day

a list of property prices in a neighborhood

the return on investment of an advertising campaign

the return on investment of an advertising campaign

A customer relationship management (CRM) system contains the names and phone numbers of customers. Such things stored in a CRM system are part of the ________ component.

software

procedure

data

people

data

Main memory is also known as ________.

optical memory

cache memory

read-only memory

random access memory

random access memory

Mac OS and iOS applications are constructed using ________.

Objective C

VB.Net

Java

C#

Objective C

Thin-client applications are limited by the capabilities of the ________.

browser

programing language

hardware

operating system

browser

When using volatile memory, the ________.

processor heats up during operation

processing becomes very slow

files are stored permanently

contents are lost when power is off

contents are lost when power is off

Virtualization is the process by which ________.

one computer hosts the appearance of many computers

many computers are used to control a server

a single server is used to host the operations of a work station

a single operating system is licensed for multiple computers

one computer hosts the appearance of many computers

Which of the following statements is true of firmware?

Users do not need to load firmware into the device's memory.

The software is coded differently from other software.

Firmware is the same as system cache.

Firmware cannot be changed or upgraded.

Users do not need to load firmware into the device's memory.

Linux is an example of a(n) ________.

open source operating system

application software that creates documents

mobile operating system

user community

open source operating system

Ronald runs both Windows 7 and Linux on his desktop computer. This process is called ________.

desktop virtualization

PC virtualization

cloud computing

server virtualization

PC virtualization

Thin-client applications are developed using ________.

Objective-C

C#

Java

HTML5

HTML5

A user interface (UI) is the ________ format of an application.

web-based

presentation

underdeveloped

graphical

presentation

Android applications are developed using _______.

C#

Objective C

Java

VB.Net

Java

An application that requires support beyond a browser on the user's computer is known as a(n) ________.

open source program

thick-client application

cloud application

thin-client application

thick-client application

Which of the following is an example of a vertical-market application software?

Adobe suite used by graphic designers


inventory tracking software for an auto manufacturer

Microsoft PowerPoint used to create presentations

at-home tax preparation software

inventory tracking software for an auto manufacturer

With ________, a computer, such as a desktop or portable computer, hosts several different operating systems.

PC virtualization

grid computing

cloud computing

parallel computing

PC virtualization

Which of the following is a program that controls the computer's resources?

application program

firmware

operating system

server farm

operating system

Which of the following is an advantage to the organization, if its BYOD policy holds the employee responsible for any kind of damage?

Employees gain public access from any device, not just mobile devices.

Employees resist turning over the management of their own hardware to the organization.

The policy appears to be permissive without actually being so.

The organization can sniff employees' mobile traffic.

The policy appears to be permissive without actually being so.

The ________ is called the "brain" of the computer.

storage hardware

read only memory

central processing unit

random access memory

central processing unit

When you buy an operating system for your personal computer, you are actually buying a software ________.

patent

upgrade

license

copyright

license

Programs that perform business functions, such as general ledger and accounting, are known as ________.

operating systems

system software

application software

firmware

application software

Which of the following is a function of an application program?

accessing a customer database

allocating main memory to programs

performing memory swapping

allocating resources to a computer

accessing a customer database

Which of the following is a nonvolatile memory device?

optical memory device

main memory

random access memory

cache memory

optical memory device

A client-server application that requires nothing more than a browser is called a ________.

desktop application

thick-client application

firmware

thin-client application

thin-client application

Which of the following is an example of a closed source project?

Microsoft Office

Firefox

Android

Ubuntu

Microsoft Office

The term "open source" means that the source code of the program is ________.

available for licensing if desired

available only to carefully vetted contractors

available to the public

less stable and platform dependent

available to the public

To run a program or process data, the computer first transfers the program or data from disk to the ________.

main memory

input device

cache memory

central processing unit

main memory

A ________ is a request for data from a database.
data entry

report

query

command

query

If a professor wants to track data that involves multiple themes like student grades, student emails and student office visits, it is best he/she uses a __________ rather than a __________ which is best for data consisting of a single theme.

DBMS, spreadsheet

spreadsheet, database

database, spreadsheet

database, DBMS

database, spreadsheet

Columns that belong to a different table than the one in which they reside are called ________.

attributes

foreign keys

primary keys

internal records

foreign keys

An administrator should create ________ before developing a database design.

data aggregator

query model

data model

data application

data model

A student management system allows students to have multiple majors and advisers are assigned to handle multiple students and courses. This is an example of a(n) ________ relationship.

1:N

1:1

N:M

M:1

N:M

A primary key used in a database is a ________.

group of rows that are formed to identify a unique table or file

column or group of columns that identifies a unique row in a table

character or byte that represents fields or columns

group of tables or files formed to identify a unique field or row

column or group of columns that identifies a unique row in a table

________ are the final judges as to what data the database should contain and how the records in that database should be related to one another.

Administrators

Developers

Users

Designers

Users

A database design team transforms entities into tables and expresses relationships by defining ________.

cardinalities

attributes

foreign keys

departments

foreign keys

Entities in a data model have ________ that describe the characteristics of the entity.

characters

primary keys

codes

attributes

attributes

In the following image, the VEND_CODE in the PRODUCT table represents a(n) __________ because it creates the logical connection between the two tables.

foreign key

linking key

primary key

entity key

foreign key

A data integrity problem will occur only if ________.

there are multiple administrators

data are duplicated

the database is very large

there are complex relationships

data are duplicated

A data model is a ________.

logical representation of database data

repository of unprocessed data

collection of isolated databases

set of programs to retrieve data

logical representation of database data

In an E-R diagram, a line between two entities represents a(n) ________.

attribute

identifier

cardinality

relationship

relationship

Phone number, email address, first and last name, are all examples of ___________ because they describe the characteristics of an entity.

tables

identifiers

attributes

foreign keys

attributes

Every table in a normalized database has ________.

duplicated data model

single theme

maximum cardinality

specialized query format

single theme

The purpose of a(n) ________ is to keep track of things.

cloud

database

storage folder

application software

database

A(n) ________ DBMS is designed to process large organizational and workgroup databases.

operational

process

personal

enterprise

enterprise

______ is the standard language for inserting, updating, and deleting data in a database.

DBMS

HTML

XML

SQL

SQL

________ is the process of converting a poorly- structured table into two or more well-structured tables.

Optimization

Normalization

Refactoring

Standardization

Normalization

Albert creates a relational database to store employee performance statistics. He stores each employee's data in independent rows and creates a column named "Employee Number" to assign unique numbers to each employee. This column is referred to as a(n) ________.

primary key

identifier

foreign key

primary record

primary key

Brenda, the sales manager of a firm, wants to generate a particular report containing sales analyses of the second and third quarter of the year. After accessing the DBMS, she should type the keyword into a ________ form to obtain the information that she wants.

report

reference

data entry

query

query

Brad, a project manager, wants to build a database to integrate information about employees and tasks that they handle. Brad wants to track information such as task name, percentage completed, and employee name. These aspects that Brad wants to track are called ________.

identifiers

records

primary keys

entities

entities

A database developer is likely to use a(n) ____________ to serve as the blueprint for building a database. This tool describes the entities, attributes, and relationships among entities.

entity-relationship data model

normalization table

database management system

database design model

entity-relationship data model

Identify the first step in transforming a data model into a relational database design.

representing the data relationships

normalizing the data and files

creating foreign keys

creating a table for each entity

creating a table for each entity

To ensure that every row in a table is unique, a column or combination of columns must be selected to serve as the ________.

primary field

primary key

unique key

foreign key

primary key

Please allow access to your computer’s microphone to use Voice Recording.

Having trouble? Click here for help.

We can’t access your microphone!

Click the icon above to update your browser permissions above and try again

Example:

Reload the page to try again!

Reload

Press Cmd-0 to reset your zoom

Press Ctrl-0 to reset your zoom

It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.

Please upgrade Flash or install Chrome
to use Voice Recording.

For more help, see our troubleshooting page.

Your microphone is muted

For help fixing this issue, see this FAQ.

Star this term

You can study starred terms together

NEW! Voice Recording

Create Set