MIS remaining exam questions

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/74

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

75 Terms

1
New cards

The Term _, used to describe the cloud, means that the computing resources leased can be increased or decreased dynamically and that organizations only pay for the resources they use.

elastic

2
New cards

Which of the following is a characteristic of cloud-based hosting?

no obsolesce

3
New cards

Which of the following is a characteristic of in-house hosting?

in-depth visibility of disaster preparedness

4
New cards

Which of the following characteristics is a disadvantage of cloud-based hosting?

it involves high dependency on vendor

5
New cards

Compared to in-house hosting, cloud-based hosting .

minimizes the risk of investing in technology that will soon become obsolete

6
New cards

Which of the following cloud offering is just renting the equipment from the cloud vendor?

IaaS

7
New cards

is a category of cloud hosting where vendors provide hosted computers with an operating system, runtime environment, and middleware like a Web server or a DBMS.

PaaS

8
New cards

All of the following are benefits of content delivery networks except ____.

increased load time

9
New cards

A _ is a set of rules for organizing communication

protocol

10
New cards

is the use of information technology to support the sharing of content among networks of users.

social media

11
New cards

A is a product offered to customers that is free for basic service but costs a fee for premium service. I talked about pandora in this example in class

Freemium

12
New cards

Social Media (SM) communities differ from communities in the past in that they are ___.

formed based on mutual interests

13
New cards

are the companies that operate SM sites.

SM application providers

14
New cards

Which of the following is a social media application provider?

LinkedIn

15
New cards

Most social media applications earn their revenue through _.

advertisements

16
New cards

Social media can be used to _.

do all of the above

17
New cards

The primary risk of peer-to-peer support in the context of social media and customer service is _.

loss of control

18
New cards

is when an organization uses Social Media Information Systems to collect customer opinions on products, services, or processes by asking customers for their input.

Crowdsourcing

19
New cards

Social Media sponsored feedback posted on an organizations social media site from customers can result in .

all of the above

20
New cards

The columns in a database are called .

Fields

21
New cards

Within MS Access, if the data entered into a given field is a numerical name, the data should not:

be calculable / include spaces

22
New cards

In Access within the design view, in order to assign a field as the primary key, the user must

Right click on the row of the attribute to be assigned the primary key and click primary key

23
New cards

A(n) is a step-by-step aid that describes each step and walks the user through creating an object in Access.

wizard

24
New cards

Within MS Access, a ____ displays in place of the name of a field in the data sheet view if specified.

caption

25
New cards

In Access, when deciding if a number is a numerical name, you can ask yourself the question, _?

Would I ever use this number in a calculation?

26
New cards

Within MS Access, the task path to import spreadsheet data into an existing table begins with ____.

clicked on external data top level tab

27
New cards

Within MS Access, metadata for a field can be entered in the section of the design view.

description

28
New cards

Which of the following is the smallest data element in a database?

byte

29
New cards

Computers that reside in different geographic locations are connected using a(n) ____.

Wide Area Network (WAN)

30
New cards

_ is the process of converting a poorly-structured table into two or more well-structured tables.

normalization

31
New cards

Metadata are _.

data that describes data

32
New cards

Identify the type of task that a database administrator is performing when validating the data model to be used in a database management system.

development

33
New cards

A database is required instead of a spreadsheet when .

lists involve data with multiple themes

34
New cards

In Access when creating fields in the datasheet view, after you click on the field to be named, you must _.

choose the field’s data type

35
New cards

In an E-R diagram, a(n) _ on a line means that at least one entity of that type is required.

vertical bar

36
New cards

Which of the following is a function of an ISP?

it serves as a gateway to the internet

37
New cards

Which of the following is an international standard language for processing a database?

SQL

38
New cards

Albert creates a relational database to store employee performance statistics. He stores each employee's data in independent rows and creates a column named "" Employee Number"" to assign unique numbers to each employee. This column is referred to as a(n) ____.

PRIMARY KEY

39
New cards

A _ is a set of rules that programs on two communicating devices follow.

protocol

40
New cards

In order to add a description to a field in the datasheet view, first .

click the description button within the table tools fields contextual tab

41
New cards

Memory is expressed in _.

BYTES

42
New cards

Cloud Resources are _ because many different organizations use the same physical hardware.

pooled

43
New cards

The connection between a VPN server is called a(n) _.

tunnel

44
New cards

Columns that are keys to different tables than the ones in which they reside are called _.

foreign keys

45
New cards

Within MS Access the purpose of assigning a currency data type is to .

"Specify that the data entered into the field will be a number with formatting such as dollar signs, commas and decimal places"

46
New cards

take computers with wireless connections through an area and search for unprotected wireless networks and then monitor and intercept wireless traffic at will.

Drive-by sniffers

47
New cards

When it in _.

Brackets

48
New cards

A is a person who is well versed in an organization's strategy and focuses on ensuring that business processes and information systems meet the organization's competitive strategies.

Business analyst

49
New cards

In the lecture, I talked about Ashley Madison, the website that makes money on adultery, and how they were hacked by Anonymous, the dark web hacker group that hacks sites based on ethical considerations. After Anonymous published customer lists and member status, Ashley Madison was able to recover quickly and be back in business. This security procedure is an example of __.

backup and recovery; unauthorized data disclosure

50
New cards

A is a network of activities, repositories, roles, resources, and flows that interact to accomplish a business function.

Business process

51
New cards

Within MS Access, in order to specify the name of a calculated field, the user .

Create, query design, customer table, close, expand it, click on options

52
New cards

OR condition queries are specified _.

Staggered row

53
New cards

is a sophisticated, possibly long-running computer hack that is perpetrated by large, well-funded organizations such as governments.

Advanced persistent threat

54
New cards

Which of the following statements is TRUE about the relationship between business processes and information systems?

A business process need not relate to any information system, but an information system relates to at least one business process.

55
New cards

Within MS Access, the Wildcard character is a(n) ___.

Stands for anything; Asterix

56
New cards

When creating a query in Access, in order to query a specific record the user utilizes the row in the query design grid.

TABLE

57
New cards

Within MS Access, to access the Zoom feature that lets you see query details such as a calculation field's math within the Query Design Grid, you use your mouse to access the _.

Right click, zoom, change font,

58
New cards

Which of the following is a function of the technology office in an organization's information systems (IS) department?

Investigating new information systems

59
New cards

In the information system (IS) department, the group manages the process of creating new information systems as well as maintaining existing information systems.

DEVELOPMENT

60
New cards

Which of the following is considered a computer crime?

Hacking of information systems

61
New cards

A person claiming to be from central IT called Chris and asked him to participate in a password reset audit. The person had Chris change his password to the word ""123456"", and then again to a secret passphrase only Chris knew. Later that day Chris noticed odd system behavior, and then the system crashed. Chris was a victim of .

Pretexting

62
New cards

Rapid application development, the unified process, extreme programming, and development are when the software developer and business domain expert work closely creating, delivering and testing workable versions of applications in a short amount of time.

Agile development

63
New cards

Which of the following describes a malicious act committed to cause software to malfunction using an online form field entry?

SQL injection

64
New cards

Which of the following is generally a responsibility of users of information systems?

Following security and backup procedures

65
New cards

One of the reasons outsourcing is undertaken is to .

Cap an organization's financial exposure

66
New cards

In a business process, a(n) is defined as a collection of something.

Repository

67
New cards

A is a person who is well versed in an organization's strategy and focuses on ensuring that business processes and information systems meet the organization's competitive strategies.

Business analyst

68
New cards

Hackers from foreign adversarial governments that continue to attack U.S. infrastructure and private U.S. companies are examples of __.

Persistent threats

69
New cards

The purpose of the group is to protect data and information assets by establishing data standards and data management practices and policies.

Data administration

70
New cards

Which of the following is a right of users of information systems?

Receive effective training

71
New cards

Developing, operating, and maintaining an organization's computing infrastructure is a major function of the department.

Information systems

72
New cards

Users should not bother IS personnel for trivial issues, instead they should fulfill their responsibilities by .

Learning basic computer skills

73
New cards

In the context of security threats, pretexting, sniffing, spoofing, and phishing are all examples of .

Unauthorized data disclosure

74
New cards

In the system implementation phase of the systems development life cycle (SDLC), with installation, the new system runs alongside the old one until it has been tested and is fully operational.

Parallel

75
New cards

ER diagram stands for ____.

Entity Relationship Diagram