Scheduled maintenance: Saturday, March 6 from 3–4 PM PST
Home
Browse
Create
Search
Log in
Sign up
Upgrade to remove ads
Only $2.99/month
IT Management Final Review
STUDY
Flashcards
Learn
Write
Spell
Test
PLAY
Match
Gravity
Terms in this set (60)
...
...
1. What is included in the governance function of information systems?
a. Monitoring the information systems
b. Training users
c. Oversee the delivery of value by IT to the business
d. Managing IT personnel
c. Oversee the delivery of value by IT to the business
1. Which is a part of IT Governance?
a. Risk Management
b. Supervising the progression of a project
c. Ensuring that the network is properly working
d. End user support for technology
a. Risk Management
1. Who is the top level manager of Information Systems in an organization?
a. Chief Operations Officer
b. Chief Computer Officer
c. Chief Systems Officer
d. Chief Information Officer
d. Chief Information Officer
1. The amount data increases over time in a _____________ manner.
a. Exponential
b. Linear
c. Logarithmic
d. Polynomial
a. Exponential
1. Which of the following are information types:
a. Transformative information
b. Conditional information
c. Analytical information
d. Confirmed information
c. Analytical information
1. Which of the following are not sources of business data?
a. TPS Systems
b. Circuit Quality Systems
c. Social Media Data
d. Customer surveys
b. Circuit Quality Systems
1. This type of data management asset is based around critical nouns of business, fairly static and generally fall into 4 categories: people, things, places and concepts
a. Unstructured
b. Metadata
c. Master Data
d. Transactional
c. Master Data
1. Characteristics of _________ are accurate, timely, relevant, just sufficient, worth its cost, and secured.
a. Low Quality Information
b. High Quality Data
c. High Quality Information
d. Low Quality Data
b. High Quality Data
Discrete variables
countable in a finite amount of time. For example, you can count the change in your pocket. You can count the money in your bank account. You could also count the amount of money in everyone's bank accounts. It might take you a long time to count that last item, but the point is—it's still countable.
Continuous Variables
would (literally) take forever to count. In fact, you would get to "forever" and never finish counting them. For example, take age. You can't count "age". Why not? Because it would literally take forever. For example, you could be:
1. Bar Charts contain what type of Data?
a. Continuous Data
b. Discrete Data
c. Interpreted Data
d. Categorical Data
a. Continuous Data
1. Which of the following is recommended for discrete data?
a. Histograms
b. Bar Charts
c. Line Charts
d. Scatter Plot
a. Histograms
1. Which of the following is not a goal of data visualization?
a. Answer Questions
b. Inspect and Cleanse Data
c. Find Patterns
d. Support Decision Making
b. Inspect and Cleanse Data
1. Which of the following is not an important rules of thumb with regards to data visualization?
a. Who are you creating this for?
b. What type of data are you using?
c. Choose the correct scale. (So you do not mislead the audience)
d. Use color when you have the opportunity.
d. Use color when you have the opportunity.
1. Which variable type cannot be divided?
a. Discrete
b. Eccentric
c. Perishable
d. Numerical
a. Discrete
1. Which of the following is not a component of a business process?
a. Actors
b. Resources
c. Roles
d. Support
d. Support
1. What is an example of a LEVEL ONE process model?
a. Purchasing capital
b. Requests
c. Customer processes
d. Maintenance
c. Customer processes
1. What is an example of a business facing process?
a. Strategic planning
b. New product
c. Order processing
d. Customer billing
a. Strategic planning
1. The following symbol used to document a business process that indicates the beginning or ending of a process and links to other related processes.
a. Process step
Connector
Square
d. Terminator
d. Terminator
1. Which level of process modeling shows end-to-end processes across the above operational areas
a. Level One
b. Level two
c. Level three
d. Level four
b. Level two
1. What kind of information system is a neural network?
a. Transaction Processing system
b. Artificial intelligence system
c. Executive Information System
d. Decision Support System
b. Artificial intelligence system
1. Which computer program is designed to support a specific task, a business process or another application program?
a. Operating System
b. Executive Information System
c. Application Program
d. Computer Operations Program
a. Application Program
1. What is a major characteristic of a Transaction Processing System?
a. The sources of data are mostly external
b. High processing speed isn't necessary
c. Hefty storage is not crucial
d. High level of accuracy is needed
d. High level of accuracy is needed
1. What is the most commonly used Decision Support System?
a. Microsoft PowerBI
b. Microsoft Excel
c. Internet Explorer
d. SAP BEx Analyzer
b. Microsoft Excel
1. An information system designed to provide additional analytical support of organizational data
a. Decision Support System
b. Capture System
c. Transaction Processing System
d. Computer application
a. Decision Support System
1. ERP stands for
a. Excel Reinforcement Program
b. Enterprise Resource Program
c. Executive Representative Planner
d. Enterprise Resource Planning
d. Enterprise Resource Planning
1. What is EDI?
a. Enterprise Decision Information
b. Executive Decision Information
c. Electronic Data Interchange
d. Executive Data Information
c. Electronic Data Interchange
1. Which of the following is true of Transaction Processing Systems?
a. Small amounts of data are processed
b. Inquiry processing is recommended but not required
c. Large storage capacity is needed
d. Input and output data do not need to be standardized
c. Large storage capacity is needed
1. Which of the following is not classified by breadth of support?
a. Departmental
b. Organizational
c. Inter-company
d. Inter-organizational
c. Inter-company
1. SAP is which type of Information Systems?
a. Office Automation System (OAS)
b. Collaborative Systems
c. Supply Chain Management Systems
d. Enterprise Resource Planning System (ERP)
d. Enterprise Resource Planning System (ERP)
1. Information silos arise as a result of ________.
a. the individual users of personal information systems
b. inter-enterprise information system's involvement to find solutions to problems arising within two or more enterprises
c. an organization's plan to create them
d. an organization's growth and increasing use of information systems
d. an organization's growth and increasing use of information systems
1. Which of the following is not a problem posed by information silos?
a. Data duplication
b. Inconsistency
c. Scheduling conflicts
d. Retention Rates
d. Retention Rates
1. Which of the following is a possible solution for information silos?
a. ERI
b. ERP
c. EAT
d. EAP
b. ERP
1. What are the challenges of implementing an ERP system?
a. ERP upgrades, Customer Challenges, & Training
b. Decision-Making Challenges, Training, & Customer Challenges
c. Decision-Making Challenges, People Challenges, & ERP upgrades
d. Outdated Technology, Customer Complaints, & Training
c. Decision-Making Challenges, People Challenges, & ERP upgrades
1. What is the SAP Module abbreviation for Financial Accounting?
a. FA
b. FI
c. FN
d. FG
b. FI
1. Big Data refers to data sets that are at least a ______ or larger in size?
a. Megabyte
b. Petabyte
c. Gigabyte
d. Terabyte
b. Petabyte
1. ______ is a data mining analysis, which measures the effect of a set of variables on another variable.
a. Regression Analysis
b. Market Basket Analysis (MBA)
c. Supervised Data Analysis
d. Unsupervised Data Analysis
a. Regression Analysis
1. Two key activities of collaboration are:
a. Communication and Bounce Back
b. Communication and Iteration
c. Iteration and Bounce Back
d. Bounce Back and Mediational Sources
b. Communication and Iteration
1. Database applications can consist of a collection of which of the following?
a. Forms
b. Figures
c. Records
d. Procedures
a. Forms
1. The process of converting a poorly structured table into two or more well-structured tables is called
a. Database Design
b. Multi-User Processing
c. Normalization
d. Database Management System
c. Normalization
1. Which of the following are parts of a database?
a. Entities
b. Classes
c. Operations
d. States
a. Entities
1. _____ is data that is used to describe data.
a. Metadata
b. Database
c. Biodata
d. DBMS
a. Metadata
1. What is responsible for creating tables and defining their relationships?
a. Database
b. Database Management System (DBMS)
c. Database application
d. Data entry personnel
b. Database Management System (DBMS)
1. Which of the following can be a problem with multi-user databases?
a. Lost Update Problem
b. Unclear Data Problem
c. Access Problem
d. Browser Identifier Problem
a. Lost Update Problem
1. Big Data differs from relational databases by all of the following except their:
a. Huge Volume
b. Rapid Velocity
c. Rates of Return
d. Great Variety
c. Rates of Return
1. When using a Gantt chart for scheduling diagrams, how are the task durations represented?
a. Vertical bars
b. Horizontal bars
c. Vertical and horizontal lines
d. Boxes and links
b. Horizontal bars
1. Studies have found that ___% to ___ % of all IT projects fail at one stage or another.
a. 20% to 40%
b. 40% to 60%
c. 60% to 80%
d. 10% to 20%
b. 40% to 60%
1. Project Initiation involves:
a. Assessing size, scope/complexity, and establish procedures
b. Define discrete activities and the work required to complete each activity
c. Plans created that are put into action
d. Closing down the project and wrapping it up
a. Assessing size, scope/complexity, and establish procedures
1. What major factor that can make or break a project?
a. Price
b. Timeliness
c. User-Friendly
d. Resources availability
c. User-Friendly
1. Which is not a construct in the circle of risk?
a. Assets
b. Attacks
c. Countermeasures
d. Safeguard
d. Safeguard
1. What is security?
a. The protection afforded to an automated information system in order to attain the applicable objectives.
b. An effective information security program is essential to the protection of the integrity and value of the organization's data
c. The potential for loss, damage or destruction of an asset as a result of a threat exploiting a vulnerability.
d. An action, process, device, or system that can prevent, or mitigate the effects of, threats to a computer, server or network.
a. The protection afforded to an automated information system in order to attain the applicable objectives.
1. What is infrastructure in IT?
a. It is the hardware, software, networks that provides the framework needed to support the applications, data, and communications of the enterprise
b. The hardware that provides computing power and data storage for several files
c. The means of providing a centralized location for shared computing resources
d. The basic physical and organizational structures and facilities (e.g., buildings, roads, and power supplies) needed for the operation of a society or enterprise
a. It is the hardware, software, networks that provides the framework needed to support the applications, data, and communications of the enterprise
1. What types of hardware does infrastructure manage as a responsibility?
a. Cloud Applications
b. Operating Systems
c. Desktops/Laptops
d. Automated Procedures
c. Desktops/Laptops
1. Which of the following is not a server type?
a. Web Server
b. Database Server
c. Manual Server
d. Print Server
c. Manual Server
1. The three main components of IT infrastructure consist of________ , _________ and __________ .
a. Hardware, software, networks
b. Hardware, software, servers
c. Software, servers, operating systems
d. Operating systems, anti-virus, networks
a. Hardware, software, networks
1. What networks connect computers in close proximity to shared resources and data/information?
a. Local Area Networks (LAN)
b. Wide Area Networks (WAN)
c. Personal Area Networks (PAN)
d. WiFi
a. Local Area Networks (LAN)
1. A __________ is a type of hardware that provides computing power and data storage for several different devices.
a. Server
b. Network
c. WAN
d. LAN
a. Server
1. LAN is a network that...
a. Connects computers together in a close proximity
b. Connects systems in a wide region
c. Connects networks to networks
d. Allows users to access the wide web
a. Connects computers together in a close proximity
1. Which of these is a server type?
a. Network server
b. Knowledge server
c. Processing server
d. Print server
d. Print server
YOU MIGHT ALSO LIKE...
Ch.11.4 Helpdesk: How Businesses Use Databases_sc
36 terms
BEC - IT Part One
101 terms
Study unit 11
95 terms
IST 202 Chapter 6
93 terms
OTHER SETS BY THIS CREATOR
K02 Who's Who
20 terms
Buyer Behavior - Quiz 1
44 terms
IT Management Final 2.0
22 terms
LWY Missions Trip Verses
12 terms