How can we help?

You can also find more resources in our Help Center.

ISM Quizes for Exam 1

Chapters 1 and 11, 4, 5, and 10
STUDY
PLAY
________ include identifying what is to be produced, how frequently and how fast it is to be produced

Requirements

System implementations

Component designs

System definitions
Requirements
A ________ involves balancing of three critical factors: requirements, cost, and time.


WBS

trade-off

test plan

critical path
trade-off
With ________ installation, the organization implements the entire system/business processes on a limited portion of the business.

parallel

phased

pilot

plunge
pilot
Which of the following is an accurate representation of the steps in the business process management
cycle?


model processes; implement processes; assess results; create components

create components; model processes; implement processes; assess results

implement processes; create components; model processes; asses results

model processes; create components; implement processes; assess results
model processes; create components; implement processes; assess results
In a BPMN process diagram, all activities for a given role are shown in that role's ________.

repository

swim lane

gateway

database
swim lane
Which of the following is true for the relationship between business processes and information systems?

A business process need not relate to any information system, but an information system relates to at least one business process.

Information systems incorporate all business process activities, and hence should be developed before business processes.

Starting from processes and working toward information systems is the best option to anticipate future demands and new business processes.

Developing information systems before business processes ensures that all activities are considered in the development process.
A business process need not relate to any information system, but an information system relates to at least one business process.
________ set the stage for the requirements for any information systems and applications that need to be created or adapted.

Business repositories

Business assessments

Business objectives

Business process models
Business process models
Project teams create a ________, which is a hierarchy of the tasks required to complete a project.

critical path

work-breakdown structure

Gantt chart

scope statement
work-breakdown structure
The situation that occurs when adding more resources creates inefficiencies is known as ________.

diseconomies of scale

marginal utility

marginal returns

diseconomies of scope
diseconomies of scale
Once we have defined a project's goals and scope, the immediate next step is to ________.

plan the project

assess feasibility

determine system requirements

form the project team
assess feasibility
A ________ is a person who is well versed in an organization's strategy and who focuses, primarily, on ensuring that business processes and information systems meet the organization's competitive strategies.

business analyst

business application programmer

business administrator

business supervisor
business analyst
What are the four dimensions of feasibility?

planning, process, technical, and schedule feasibility

operational, strategic, technical, and tactical feasibility

cost, schedule, technical, and organizational feasibility

schedule, process, technical, and competitive feasibility
cost, schedule, technical, and organizational feasibility
According to Brooks' Law, adding more people to a late project will ________.

lower the total project cost

speed up the project

create diseconomies of scale

reduce the need for coordination
create diseconomies of scale
During the requirements definition stage of developing an information system, the project team will
include mostly ________.

programmers and testers

testers and business users

business and systems analysts

database designers and administrators
business and systems analysts
In the SDLC, the first major task for an assembled project team is to ________.

design system components

assess the project's feasibility

plan the project

define system goals and scope
plan the project
The ________ phase of the SDLC involves determining hardware and program specifications, planning the database and procedures, and creating job definitions.

requirements analysis

system implementation

component design

system definition
component design
In a ________ installation, the new system runs alongside the old one until it has been tested and is fully
operational.

pilot

phased

parallel

plunge
parallel
In systems development, documents, designs, prototypes, data models, database designs, working data
entry screens, and the like are examples of ________.

reports

resources

components

deliverables
deliverables
The ________ is a sequence of activities that determines the earliest date by which a project will be
completed.

requirement analysis chart

Pareto chart

critical path

scope statement
critical path
An as-is model ________.

documents the current situation of a business process

contrasts the former and current states of a business process

indicates the desired outcome of a business process

represents the ideal state of a business process
documents the current situation of a business process
The five-component framework considers individuals who maintain the data and who support the networks of computers as the ________ component.


people

data

network

procedural
people
According to the five-component model of information systems, the ________ component functions as instructions for the people who use information systems.

hardware

data

procedure

software
procedure
Which of the following is a component of an IS but not of IT?

data

software

hardware

people
people
A ________ must work with business leaders and planners to develop processes and systems that implement the business strategy and goals.

system analyst

business analyst

programmer

technical writer
business analyst
In the information system department, the ________ group manages the process of creating new information systems as well as maintaining existing information systems.

operations

technology

development

manufacturing
development
A security protocol for logging in to a computer is an example of the ________ component of an information system.

software

hardware

procedure

data
procedure
A manager will essentially require ________ skills to clearly understand how the resources that his or her company uses are converted to desired outputs.

experimentation

systems thinking

interpersonal

collaboration
systems thinking
Drother Sports Inc. is a sports equipment provider that markets its products through a chain of retail outlets in three states. As part of its expansion strategy, the company decides to open outlets in six more states and decides to revise its existing business processes. According to the five-component model of information systems, which of the following processes will be the least disruptive to the organization?

moving existing employees and hiring new employees

buying and installing new computers in the new outlets

developing new CRM software for the existing and new outlets

collecting demographic data from the new markets
buying and installing new computers in the new outlets
As production manager at a bottling plant for a cola manufacturer, you asked to receive reports containing figures for raw materials for the current year, but received a report that states last year's figures. This information would qualify as bad information because it is ________.

late

voluminous

inaccurate

too narrow in scope
inaccurate
Which of the following is a major implication of Moore's Law?

Physical size of integrated chips has increased.

Costs of computing and processing have increased.

Costs of data communications and storage have become very low.

Data processing activities have become complex and time consuming.
Costs of data communications and storage have become very low.
Which of the following is a nonroutine cognitive skill?

computer programming skill

tax accounting skill

marketing knowledge

systems thinking ability
systems thinking ability
You are looking to buy a home that costs less than $700,000, but your real estate agent keeps sending you fliers for homes that cost $1,000,000 or more. This information is likely to be useless because it is ________.

irrelevant

late

inaccurate

not reliable
irrelevant
Business users who administer the development of information systems should ________.

refrain from involving themselves in software development

have the skills to be a programmer or a database designer

have a good understanding of programming concepts

take an active role in that system's development
take an active role in that system's development
When presenting an idea to her colleagues, Marjorie failed to consider others' perspectives and got defensive when people asked her questions. This situation indicates that Majorie lacks ________ skills.

systems thinking

experimentation

collaboration

abstract reasoning
collaboration
Which of the following accurately describes the five-component framework of information systems?

computer hardware, software, data, procedures, and people

computer hardware, software, purpose, data, and procedures

computer hardware, software, communication networks, data, and procedures

computer hardware, software, data, people, and purpose
computer hardware, software, data, procedures, and people
Which of the following best defines Management Information Systems (MIS)?

The societal impact computers have on people.

The scientific and practical approach to building computers and applications.

The management and use of information systems to help organizations achieve their goals and objectives.

The building of computers to make people more productive.
The management and use of information systems to help organizations achieve their goals and objectives.
Which of the following components of an IS is the easiest to change and causes the least amount of organizational disruption?

data

software

hardware

procedures
hardware
Which of the following types of skills is most likely be outsourced to the lowest bidder?

abstract reasoning skills

ability to collaborate

ability to experiment

accounting skills
accounting skills
Which of the following is the best example of information, and is not mere data?

the number of students in various grades in a school

the price of company stock on a given day

a list of property prices in a neighborhood

the return on investment of an advertising campaign
the return on investment of an advertising campaign
A customer relationship management (CRM) system contains the names and phone numbers of customers. Such things stored in a CRM system are part of the ________ component.

software

procedure

data

people
data
Main memory is also known as ________.

optical memory

cache memory

read-only memory

random access memory
random access memory
Mac OS and iOS applications are constructed using ________.

Objective C

VB.Net

Java

C#
Objective C
Thin-client applications are limited by the capabilities of the ________.

browser

programing language

hardware

operating system
browser
When using volatile memory, the ________.

processor heats up during operation

processing becomes very slow

files are stored permanently

contents are lost when power is off
contents are lost when power is off
Virtualization is the process by which ________.

one computer hosts the appearance of many computers

many computers are used to control a server

a single server is used to host the operations of a work station

a single operating system is licensed for multiple computers
one computer hosts the appearance of many computers
Which of the following statements is true of firmware?

Users do not need to load firmware into the device's memory.

The software is coded differently from other software.

Firmware is the same as system cache.

Firmware cannot be changed or upgraded.
Users do not need to load firmware into the device's memory.
Linux is an example of a(n) ________.

open source operating system

application software that creates documents

mobile operating system

user community
open source operating system
Ronald runs both Windows 7 and Linux on his desktop computer. This process is called ________.

desktop virtualization

PC virtualization

cloud computing

server virtualization
PC virtualization
Thin-client applications are developed using ________.

Objective-C

C#

Java

HTML5
HTML5
A user interface (UI) is the ________ format of an application.

web-based

presentation

underdeveloped

graphical
presentation
Android applications are developed using _______.

C#

Objective C

Java

VB.Net
Java
An application that requires support beyond a browser on the user's computer is known as a(n) ________.

open source program

thick-client application

cloud application

thin-client application
thick-client application
Which of the following is an example of a vertical-market application software?

Adobe suite used by graphic designers


inventory tracking software for an auto manufacturer

Microsoft PowerPoint used to create presentations

at-home tax preparation software
inventory tracking software for an auto manufacturer
With ________, a computer, such as a desktop or portable computer, hosts several different operating systems.

PC virtualization

grid computing

cloud computing

parallel computing
PC virtualization
Which of the following is a program that controls the computer's resources?

application program

firmware

operating system

server farm
operating system
Which of the following is an advantage to the organization, if its BYOD policy holds the employee responsible for any kind of damage?

Employees gain public access from any device, not just mobile devices.

Employees resist turning over the management of their own hardware to the organization.

The policy appears to be permissive without actually being so.

The organization can sniff employees' mobile traffic.
The policy appears to be permissive without actually being so.
The ________ is called the "brain" of the computer.

storage hardware

read only memory

central processing unit

random access memory
central processing unit
When you buy an operating system for your personal computer, you are actually buying a software ________.

patent

upgrade

license

copyright
license
Programs that perform business functions, such as general ledger and accounting, are known as ________.

operating systems

system software

application software

firmware
application software
Which of the following is a function of an application program?

accessing a customer database

allocating main memory to programs

performing memory swapping

allocating resources to a computer
accessing a customer database
Which of the following is a nonvolatile memory device?

optical memory device

main memory

random access memory

cache memory
optical memory device
A client-server application that requires nothing more than a browser is called a ________.

desktop application

thick-client application

firmware

thin-client application
thin-client application
Which of the following is an example of a closed source project?

Microsoft Office

Firefox

Android

Ubuntu
Microsoft Office
The term "open source" means that the source code of the program is ________.

available for licensing if desired

available only to carefully vetted contractors

available to the public

less stable and platform dependent
available to the public
To run a program or process data, the computer first transfers the program or data from disk to the ________.

main memory

input device

cache memory

central processing unit
main memory
A ________ is a request for data from a database.
data entry

report

query

command
query
If a professor wants to track data that involves multiple themes like student grades, student emails and student office visits, it is best he/she uses a __________ rather than a __________ which is best for data consisting of a single theme.

DBMS, spreadsheet

spreadsheet, database

database, spreadsheet

database, DBMS
database, spreadsheet
Columns that belong to a different table than the one in which they reside are called ________.

attributes

foreign keys

primary keys

internal records
foreign keys
An administrator should create ________ before developing a database design.

data aggregator

query model

data model

data application
data model
A student management system allows students to have multiple majors and advisers are assigned to handle multiple students and courses. This is an example of a(n) ________ relationship.

1:N

1:1

N:M

M:1
N:M
A primary key used in a database is a ________.

group of rows that are formed to identify a unique table or file

column or group of columns that identifies a unique row in a table

character or byte that represents fields or columns

group of tables or files formed to identify a unique field or row
column or group of columns that identifies a unique row in a table
________ are the final judges as to what data the database should contain and how the records in that database should be related to one another.

Administrators

Developers

Users

Designers
Users
A database design team transforms entities into tables and expresses relationships by defining ________.

cardinalities

attributes

foreign keys

departments
foreign keys
Entities in a data model have ________ that describe the characteristics of the entity.

characters

primary keys

codes

attributes
attributes
In the following image, the VEND_CODE in the PRODUCT table represents a(n) __________ because it creates the logical connection between the two tables.

foreign key

linking key

primary key

entity key
foreign key
A data integrity problem will occur only if ________.

there are multiple administrators

data are duplicated

the database is very large

there are complex relationships
data are duplicated
A data model is a ________.

logical representation of database data

repository of unprocessed data

collection of isolated databases

set of programs to retrieve data
logical representation of database data
In an E-R diagram, a line between two entities represents a(n) ________.

attribute

identifier

cardinality

relationship
relationship
Phone number, email address, first and last name, are all examples of ___________ because they describe the characteristics of an entity.

tables

identifiers

attributes

foreign keys
attributes
Every table in a normalized database has ________.

duplicated data model

single theme

maximum cardinality

specialized query format
single theme
The purpose of a(n) ________ is to keep track of things.

cloud

database

storage folder

application software
database
A(n) ________ DBMS is designed to process large organizational and workgroup databases.

operational

process

personal

enterprise
enterprise
______ is the standard language for inserting, updating, and deleting data in a database.

DBMS

HTML

XML

SQL
SQL
________ is the process of converting a poorly- structured table into two or more well-structured tables.

Optimization

Normalization

Refactoring

Standardization
Normalization
Albert creates a relational database to store employee performance statistics. He stores each employee's data in independent rows and creates a column named "Employee Number" to assign unique numbers to each employee. This column is referred to as a(n) ________.

primary key

identifier

foreign key

primary record
primary key
Brenda, the sales manager of a firm, wants to generate a particular report containing sales analyses of the second and third quarter of the year. After accessing the DBMS, she should type the keyword into a ________ form to obtain the information that she wants.

report

reference

data entry

query
query
Brad, a project manager, wants to build a database to integrate information about employees and tasks that they handle. Brad wants to track information such as task name, percentage completed, and employee name. These aspects that Brad wants to track are called ________.

identifiers

records

primary keys

entities
entities
A database developer is likely to use a(n) ____________ to serve as the blueprint for building a database. This tool describes the entities, attributes, and relationships among entities.

entity-relationship data model

normalization table

database management system

database design model
entity-relationship data model
Identify the first step in transforming a data model into a relational database design.

representing the data relationships

normalizing the data and files

creating foreign keys

creating a table for each entity
creating a table for each entity
To ensure that every row in a table is unique, a column or combination of columns must be selected to serve as the ________.

primary field

primary key

unique key

foreign key
primary key