Upgrade to remove ads
MIS exam 1 review
Terms in this set (123)
By definition, the CIO is a direct report of the CEO
Information technology is defined as computer hardware and software for processing and storing information, as well as communications technology (voice and data) for transmitting information.
What lead to an increase in IT investments by organizations in the 1990s:
An object-oriented, platform-independent programming language, developed by Sun Microsystems and frequently used for Web-based applications, is:
What are two operating systems that are categorized as "open systems"?
Linux and UNIX
Encapsulation is one of the important features of objects (in object-oriented programming) in which a subclass inherits the properties, methods, and events of the class to which it belongs.
The language translator program which translates an entire 3GL or 4GL program into machine language before any of the program is executed is called a(an):
The CPU is made up of two components, the control unit and memory.
The stored-program concept allows users to specify a list of operations that can be carried out at electronic speeds, rather than waiting for the user to specify each operation separately.
Virtual memory is a procedure by which the operating system switches portions of programs between main memory and direct access files so that portions of enough programs are stored in main memory to enable efficient multiprogramming; to the user, it appears as though an unlimited amount of main memory is available.
What are the two major categories of computer software?
application and support
When a data item is retrieved from a memory cell, either to print out the item or to use it in a computation, the contents of the cell are unchanged.
Which of the following is an example of communications interface software that is used to transfer files from one computer system to another?
What are some benefits associated with the procedural language COBOL?
The language resembles English.
It is standardized.
It is relatively easy to learn.
What are some advantages of 4GL programs over 3GL programs?
fewer lines of code
easier to write
easier to understand and modify
What are some examples of a computer output device?
voice response unit
What are some examples of applications software?
inventory record-keeping programs.
What are some advantages of secondary storage devices compared to main memory?
Which type of computer is often used for numerically intensive scientific calculations or to act as an extremely large Web server?
Which type of computer serves as the heart of the computing systems for many, perhaps most, major corporations and government agencies? This type of computer system also can act as a large Web server, as a server in a client/server application, and has the widest range of available applications.
"Perfect" information is always valuable to a decision maker.
Information is used to make decisions
People are an important part of an information system.
Most businesses use information technology (except possibly a antique store in Abilene).
A sub-system is part of a larger system.
A system is a collection of elements organized to perform some task or achieve a goal.
Information has context, relevance, and meaning whereas data is just "raw facts".
The "connection" between two systems, sub-systems or system components is called an interface.
What are some things that were given as a good reason to take this course?
all business professionals use computers and information technology.
information technology is ubiquitous.
need to know how to get out of a computer (in an emergency).
Cache memory is
located on the CPU
A Universal Resource Locator (URL) is used to locate packets in a network.
A broadband service offered by telephone companies that uses copper wires already installed in homes and offices to connect to the Internet is referred to as:
A common transmission medium that consists of a heavy copper wire at the center, surrounded by insulating material, then a cylindrical conductor, and finally an outer protective plastic covering is called a:
A private, packet-switched network using the public Internet is referred to as a(n):
By 2004, the number of cell phones in use in the United States was greater than the number of wired phones in homes.
Conversion of digital to analog signals so that the signals can travel over conventional telephone lines is accomplished with a device called a modem.
Early in the decade of the 2010s, two different technologies WiMAX and LTE (Long Term Evolution) -are competing to become the dominant 4G network technology.
In the United States, the two giants in the telephone industry in the decade of the 2010s are:
Verizon and AT&T
The CSMA/CD and CSMA/CA protocols are designed to manage which of the following:
The term modem stands for Modulator of Digital Electronic Messages.
The term Ethernet is often used as a synonym with which of the following types of local area networks:
contention bus network
Using an Infrastructure as a Service provider can enable an organization to avoid major capital investments for network equipment as well as computer servers and storage.
What is a key characteristic of a dedicated line versus a switched line?
provides a direct transmission between sender and receiver
What is a key difference between 4G and 3G networks?
4G has higher data transmission rates than 3G.
When considering network protocols, why is the multilayer OSI model still important?
It provides a conceptual framework for how communication takes place in networks.
When data can be transmitted in both directions on a telecommunications line, but not simultaneously, the transmission type is referred to as:
Which company was the most visible early adopter of using RFID for inventory management?
Which of the following OSI model layers receives a packet of data from the transport layer and adds header data to it to identify the route the packet is to take to its destination?
Which of the following is a (are) primary reason(s) for networking an organization's computers together?
sharing of peripherals such as printers.
sharing of data.
enables client/server applications.
Which of the following is a term used to describe transmission speed of a network?
What are some characteristics of fiber-optic transmission?
faster transmission than twisted pair of wires.
more secure than other media because it does not emit radiation.
not affected by power-line surges or electromagnetic interference.
What are some primary functions performed by a telecommunications network?
a. transmission of voice
c. tracking of out-of-service devices
d. transmission of data
What are some characteristics of a star network topology?
b. relatively easy to identify which cable has failed
c. if central device fails, whole network fails
d. easy to add additional devices
What are some advantages of a wireless LAN versus a wired LAN?
b. takes planning, but relatively easy to install
c. enables users of mobile devices to connect to a LAN
d. can be used as an overlay network to permit employees to connect their laptops to the corporate network from anywhere in the building
What most accurately describes the conversion function of telecommunications?
changing coding system or speed when moving data between devices on the network
What most accurately describes the routing function of telecommunications?
choosing the most efficient path for a message to be sent over the Internet
Which of the following network protocols is used on the Internet and has become the de facto standard protocol for networking around the world?
Which of the following networking hardware devices forwards all messages it receives to all devices that are connected to it, whether or not the messages need to go there?
What are some true statements about network topologies.
a. A bus topology can be thought of as a simple "linear" topology.
b. A ring topology is wired like a bus, except the ends of the cable are connected.
d. In a mesh topology, devices are directly connected to two, three, or more other devices in a seemingly irregular pattern.
What are some facts about bluetooth
b. It is short-range radio technology built into a microchip.
c. It enables cellular communication with home appliances as well as permitting wireless communication between a computer and a mouse, keyboard, and printer.
d. Bluetooth technology standards are available free of royalties to any company that wishes to use them.
what are some facts about Wi-Fi
a. Wi-Fi is a wireless technology for local area networks.
b. Wi-Fi is used in buildings with wired LANs to enable mobile access to the organizational networks.
d. Wi-Fi networks use a CSMA/CA protocol to avoid message failures.
what are some facts about active RFID
b. They can transmit information continuously, on request, or on a predetermined schedule.
c. They have their own power supply.
d. They are more expensive than passive tags.
Which statement describes a major difference between a LAN and a WAN?
a. usage by a corporation
b. geographic distance between devices being networked
c. usage of wireless media
Which transmission medium requires an unobstructed straight line between the transmitter and the receiver?
Which type of file requires the greatest bandwidth?
one minute of a video
Which type of technology relies on line-of-sight transmission?
A bottom-up approach to describe the data structure and other requirements of an organization, in which reports, screens, and relevant documents are analyzed, is called:
A characteristic of a business entity that uniquely distinguishes it from other instances of the entity for the long term is called a(n):
A data dictionary/directory, or DD/D, contains each of the following, except:
database server definitions
A top-down data modeling approach to describe the data structure and other requirements of an organization, independent of any particular reports or screens, is called:
what are some true statements about using a pre-existing (packaged) data model
b. the modeling projects require less time and money.
c. it may be easier to share data with other organizations in the industry.
d. it is likely to work well with other applications from the same vendor.
An example of a data exchange language to pass data between computers for e-business is:
An example of a query language used for posing queries to a database is:
Data that unambiguously describes other data for enterprise use are called:
Data warehouses provide a method for making historical and current data accessible for queries by many people throughout an organization.
Determining the physical arrangement of data based on the data currently required by the business and expected to be required in the future is part of which of the following data resource management functions?
organize and make accesible
what are some critical steps in data quality initiative
a. cleaning up existing data errors.
c. establishing procedures to prevent errors.
d. verifying that third-party vendors provide clean data.
For legal reasons, all data should be stored indefinitely.
If an organization maintains application independence, then application software can more easily be abandoned or replaced.
In an ERD, a characteristic of a customer entity is diagrammed as a(n):
The data modeling guideline that captures the need that justified the data modeling effort is specified in the:
The data modeling guideline that specifies the functional, business division, and/or corporate coverage is called the:
The permissible range or set of values for each data element is defined by integrity rules.
The process of creating simple data structures from more complex ones, which yields a data model that is very stable and useful across many different requirements, is called:
What organizational role or unit is responsible for functions such as maintaining metadata, reducing redundant data, and improving data quality across an organization?
What organizational role or unit is responsible for functions such as physical database design, database interfaces with other technologies, and database recovery methods?
What organizational role or unit is responsible for the quality of the data in a particular subject database or departmental area?
Which of the following is a justification given for laws that control data flows across national borders?
both protect a domestic industry and protect individual privacy
Which of the following is a rationale for data ownership?
a. the need to protect the privacy of personal data
b. the need to protect trade secrets
c. the need to share data with those who "need to know"
what is true about managing data in today's large organizations?
a. Application software is separate from the database software.
c. Data exists in databases for operational and managerial purposes.
d. The need to manage data is continuous.
Which of the following prescribes who can do what and when to each kind of data?
what are some true statements about information processing with application independence
a. Data are captured and stored in an operational database.
c. Subsets and aggregated operational data may be periodically transferred to a long-term data warehouse.
d. none of these
Which of the following statements about managing data is true?
Reconciling inconsistent data can require a significant amount of time and money.
Which of the following statements is true about the retention of data?
Some national laws require that certain types of data must be retained for certain periods of time.
A data warehouse is a _________ collection of information-gathered from many different ___________ databases-that supports business analysis activities and decision-making tasks.
What is a foreign key?
A primary key of one table that appears as an attribute in another table and acts to provide a logical relationship among the two tables
what is a primary key?
A field (or group of fields) that uniquely identifies a given entity in a table
Why do relational databases use primary keys and foreign keys?
to create logical relationships
What is packet-switching?
Occurs when the sending computer divides a message into a number of efficiently sized units called packets, each of which contains the address of the destination computer
What is network topology?
Refers to the geometric arrangement of the actual physical organization of the computers and other network devices in a network
What is a telecommunications system?
Enables the transmission of data over public or private networks
What is a router?
An intelligent connecting device that examines each packet of data it receives and then decides which way to send it onward toward its destination
What is a protocol?
A standard that specifies the format of data as well as the rules to be followed during transmission
What is a peer-to-peer network?
Any network without a central file server and in which all computers in the network have access to the public files located on all other workstations
What is a network?
A communications, data exchange, and resource-sharing system created by linking two or more computers and establishing standards, or protocols, so that they can work together
Network transmission media refers to the various types of media used to carry the signal between computers.
What is a client/server network?
A model for applications in which the bulk of the back-end processing, such as performing a physical search of a database, takes place on a server, while the front-end processing, which involves communicating with the users, is handled by the clients
What is a client?
A computer that is designed to request information from a server
What is a large computer network usually spanning a city?
What is the arithmetic logic unit?
Performs all arithmetic operations (for example, addition and subtraction) and all logic operations (such as sorting and comparing numbers)
Which of the following represents megahertz?
the number of millions of CPU cycles per second
What is roughly 1 million bytes?
The protocol of the internet was developed by IBM.
What advantage did the founders of the internet have ?
didn't need to make money
What are the three primary network types?
LAN, WAN, MAN
Virtual memory is a memory management technique that makes the computer act as thought there is more physical memory than there actually is.
APIs are ways applications communicate with the operating system.
A typical "byte" has how many bits?
A phonebook works more like a file than a database.
A "program" can access the database by using "embedded SQL"
Metadata is "data about the data" that helps define the data entity consistently across organizational departments.
Machine level languages are the most efficient in terms of CPU processing.
In the beginning all computer processing was "batch" processing.
THIS SET IS OFTEN IN FOLDERS WITH...
MIS Chapter 1
MIS chapter 2
MIS Chapter 5
MIS Chapter 6
YOU MIGHT ALSO LIKE...
Accounting Information Systems
MIS 2223 Exam 4
cis quiz 4
Final For Technology in Action