1/299
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
Which of the following best describes a Management Information System?
The integration of computer systems with the aims of the organization.
MIS integrates all aspects of computer systems as well as the processes used in an organization in order to improve productivity.
The decimal value of the hexadecimal number 1A is what?
26
The '1' in the leftmost (most significant digit) column is equal to 16 in base ten, while the 'A' in the least significant digit is equal to 10. Adding these together gives a total of 26 in base 10.
Hard disk drives are used for what purpose?
I. To store data and programs permanently
II. For running programs
III. To save data that cannot fit in the main memory
a. I only
b. I and II only
c. I and III only
d. I, II, and III
I and III only.
Hard disks are mainly used to store data and programs, but they can also be used as virtual memory when the computer fills up the main memory.
A bit can have how many different values?
a. 1
b. 2
c. 3
d. 4
2.
A bit can either be 'on' or 'off', which translates to the values 1 and 0.
Computer memory that is not directly accessible by the CPU, but must instead be accessed via input/output channels, is called
a. core memory
b. secondary memory
c. internal memory
d. volatile memory
secondary memory.
Secondary memory is storage—such as a hard disk—that must be accessed through I/O channels. Secondary storage is usually non-volatile and has far greater capacity than memory directly accessible by the CPU.
Management information systems consider data from both formal and informal channels. Which of the following is an informal channel?
a. Sales data
b. Data collection agencies
c. Newspapers
d. Balance sheets
Newspapers.
Informal data channels used by management information systems are sources of data that are not integrated directly into the system, but can deliver data that can be used by the system. A newspaper would be considered such an informal channel.
In order to be useful as a resource, information must be
a. accurate
b. complete
c. indivisible
d. redundant
accurate.
Information must be accurate so that it can be used to find further truths. Information can be incomplete and single-sourced, and yet still deliver important data to the system.
The parts of a system are
a. independent
b. interdependent
c. in competition
d. equal
interdependent.
Systems theory describes the interdependence of the parts of a system. A system is only worthy of the name if the parts are, indeed, interdependent.
The design or analysis of a system by recursive factoring of its subsystems into further subsystems is called
a. primitive composition
b. progressive decomposition
c. partial decomposition
d. progressive reasoning
progressive reasoning.
Progressive decomposition is the term for recursively splitting a system into subsystems in order to analyze the overall working of the system.
The difference between a system and a subsystem is
a. a matter of size. A system is larger than a subsystem.
b. a matter of definition. A system can always be the subsystem of another system.
c. that a system must include a human component.
d. a matter of inclusion. A system must consist of multiple subsystems.
a matter of definition. A system can always be the subsystem of another system.
Whether a collection of components is to be considered as a system or a subsystem depends on the problem currently being worked on. Any system can be treated as a stand-alone unit or as a subsystem to another, larger, system.
In analyzing and streamlining a system, which of the following is the most important?
a. Increasing the number of subsystems
b. Reducing the complexity of interconnections
c. Introducing new and better software
d. Adding coordinating interfaces
Reducing the complexity of interconnections.
In order for each subsystem to work at peak efficiency, the interfaces between the subsystems must be as simple as possible. This ensures that each subsystem can concentrate on its given task, rather than spending its time decoding and encoding data, while reducing the complexity of the final, overall, system.
Which of the following is an abstract system?
a. The development of a new accounting system
b. An accounting system
c. The systems development life cycle
d. An order processing system
The systems development life cycle.
An abstract system is a system of concepts and ideas. The systems development life cycle is a template used to create a development plan for a physical system—in this case, a software system.
Which of the following is NOT a constraint of a system?
a. Processing time
b. Transaction type
c. Interactions with existing systems
d. Relevant regulations
Transaction type.
Constraints on a system are pre-existing boundary conditions that affect the system under consideration. They may be self-imposed, such as the processing time, given by the current systems that the system is to work with, or outside restrictions, such as government regulations. The transaction type that a system is to execute is not a constraint on the system, rather, it is an objective of the system.
In order for a feedback loop to be added to a system, which of the following must be defined?
I. Standards
II. Objectives
III. Inputs
a. I, only
b. I and II only
c. II and III only
d. I, II, and III
I and II only.
In order for a feedback loop in a system to be successful, the system must have standards with which the states of the system can be compared and objectives that can be compared with the outputs of the system.
A system that uses feedback to control the internal system parameters is called a(n)
a. open-loop system
b. closed-loop system
c. primary system
d. informational system
closed-loop system.
Closed-loop systems are systems where the input and the output are coupled in some way. This is done by feedback; having changes in the output triggers changes within the system and its inputs.
Which of the following represents the most abstract view of a system?
a. Black box
b. Data-flow diagram
c. System context diagram
d. Structural diagram
System context diagram.
The system context diagram shows a system in its context, with all its inputs and outputs. It represents the most abstract view, and it therefore gives a holistic view that allows a better understanding of how the system is to be developed and used.
Which of the following is NOT a definition of synergy?
a. The whole is greater than the sum of its parts
b. Combined action is more important than the sum of the actions of sub-components
c. All actions happen at the same time
d. The whole is not defined by the behavior of the sub-components
All actions happen at the same time.
In using synergy, there is no need for all actions to take place simultaneously. The other three definitions have all been used for the term synergy.
The most widespread application of artificial intelligence precepts in modern computer systems is in which of the following?
a. Neural networks
b. Case-based reasoning
c. Evolutionary Computation
d. Expert Systems
Expert Systems.
Although artificial intelligence held great promise for many years as a basis for making computers think more like humans, most avenues of research have turned into dead ends. Expert systems are a large class of programs that use basics of artificial intelligence to help solve problems.
What is the closest analogy to a transistor as used in digital computers?
a. An amplifier
b. A switch
c. A diode
d. A resistor
A switch.
Although transistors can be used as amplifiers, in digital computation, they are used exclusively as switches. A current applied to one terminal of the transistor allows current to flow between the other two.
Two early programming languages used primarily for scientific and business-related applications are, respectively,
a. Pascal and C
b. Ada and C++
c. BASIC and Java
d. FORTRAN and COBOL
FORTRAN and COBOL.
FORTRAN (FORmula TRANslation) was invented in 1954 and has been used since extensively for scientific programs. COBOL (COmmon Business Oriented Language) was first released in1959 and used, as the name suggests, mainly for business- (and government-) related tasks. Both languages are still in use and have had extensions added that give them features like those found in more modern languages such as Java or C++.
A program that is to run on many different machines would best be written in which of the following languages?
a. Java
b. C++
c. Pascal
d. FORTRAN
Java.
Java was designed to be platform-independent. Java code is compiled to Java bytecode by the Java compiler. This bytecode can be run (interpreted) on any platform running the Java virtual machine (JVM). Any of the other languages would need to be compiled specifically for the machine they are to run on, increasing the overhead in releasing the product.
Code written without any language-specific syntax that can be used as a framework for writing actual code is called
a. source code
b. pseudo code
c. matrix code
d. incorrect
pseudo code.
Pseudo code is used as a first step in writing computer code, allowing the programmer to map out steps and methods without getting bogged down in the minutiae of the actual programming language. Pseudo code is especially helpful if the problem is to be solved in multiple different programming languages.
An algorithm
a. will always lead to the correct solution
b. defines steps leading to a solution
c. is the simplest way to attack a problem
d. can only be programmed one way
defines steps leading to a solution.
Algorithms define a series of steps leading to the solution of a problem. There can be many ways of reaching the same solution, and there is no guarantee that the simplest route will be obvious, nor can it be guaranteed that the correct solution will be found.
The storage that a computer uses to hold the currently running program as well as its data is called
a. primary storage
b. secondary storage
c. tertiary storage
d. off-line storage
primary storage.
Primary storage is the memory that a computer can access directly, without using an I/O channel. Historically, a variety of technologies has been used for primary storage; at this point, it is almost all integrated circuit RAM.
Processor registers generally have which size?
a. A byte
b. A word
c. Two bytes
d. A nibble
A word.
A word is not a fixed value, as it varies from computer to computer. The word size used by a computer is one of its basic values. The size of the word influences a number of other attributes for the processor, including the register size.
Which of the following are semiconductor devices?
I. Transistor
II. Integrated Circuit
III. Vacuum tube
a. I and III only
b. II and III only
c. I and II only
d. I, II, and III
I and II only.
Semiconductor devices are any electronic components that use the properties of semiconductors. The first semiconductors were diodes. Transistors were developed later. Integrated circuits consist of large numbers of transistors on a silicon chip.
In object-oriented programs, classes consist of which two primary features?
a. Attributes and methods
b. Inheritance and attributes
c. Abstraction and methods
d. Inheritance and abstraction
Attributes and methods.
A class consists of attributes, which is the data that is contained in the class, and methods, which is code that operates on these attributes. Abstraction and inheritance are mechanisms used in object-oriented programming, but are not part of the class itself.
Which of the following would be considered a channel in an information system?
a. Data bus
b. Hard disk
c. Keyboard
d. Printer
Data bus.
In an information system, channels transmit data from one part of the system to another. Data buses transmit data either within or between computers.
Which of the following is not a feature of having distributed computing?
a. E-mail
b. File-sharing
c. Printer-sharing
d. Time-sharing
Time-sharing.
Time-sharing is used on mainframe computers to allow multiple users to use the central processing unit of the machine for a certain amount of time. This is unnecessary when each user has a computer with their own CPU at their disposal.
A workgroup that is spread across two or more locations can use which of the following technologies to allow access to all other computers in the workgroup?
a. VPN
b. LAN
c. WLAN
d. MAN
VPN.
A virtual private network (VPN) allows users in different locations to see each other's computers as if they were co-located, without the traffic being vulnerable while in transit between the locations.
Which of the following is the best use for pie charts when creating graphics from spreadsheets?
a. Showing the percentages of a whole
b. Showing the number of items
c. Showing the changes in data over time
d. Showing data relationships
Showing the percentages of a whole.
Pie charts are best used to show the percentages of a whole that are represented by the data being displayed. The full chart reflects 100%, the pie slices the percentage contained by each subcategory.
Which of the following is not needed when using groupware?
a. Server
b. Client
c. Database
d. Software
Database.
Groupware consists of three major parts: A server, a number of clients and the software to run it. The clients and servers are connected by a network, allowing the users to work together.
The private network that contains everything needed by employees of a company is called the
a. Internet
b. LAN
c. Intranet
d. Firewall
Intranet.
An intranet is a private network that is secured from unauthorized use by people outside of a company. It can contain any information—including secret documents—that are needed by the employees. The exact implementation is up to the company in question, but it usually includes an HTTP server.
Which of the following is the cheapest, most secure method of connecting LANs into WANs?
a. Internet
b. PBX
c. VPN
d. Leased lines
VPN.
A VPN is the simplest way of connecting geographically dispersed LANs into WANs. Messages passing between the LANs are encrypted while passing through the Internet, then decrypted at the other end. Since this is an entirely software solution, there is no need for expensive hardware or leased lines.
On which level of organization is one most likely to find dedicated servers?
a. Individual
b. Workgroup
c. Enterprise
d. Team
Enterprise.
Servers contain large quantities of data that are to be accessed from many places, something that is important at the enterprise level of an organization. A workgroup generally will simply use part of one member's computer as a server, since any workgroup member's computer can be accessed by any other member's.
A LAN used in a workgroup requires which of the following?
a. Dedicated server
b. Dedicated systems administrator
c. Both server and administrator
d. None of the above
None of the above.
There is no need for centralized control of LANs used in workgroups. The various computers connected to the LAN can each be used as a server when necessary, and there is no need for a full-time systems administrator for a system this small.
In a workgroup environment, the execution of software is most likely to be a ____ procedure?
a. user
b. operations
c. administration
d. systems
user
User procedures are those operations executed by the user. Users are expected to run software on their own.
Which of the following would be considered part of the operational level of an organization?
a. Planning a new information system
b. Installing new hardware
c. Monitoring transactions
d. Writing new software
Monitoring transactions.
The operational level of an organization is that which keeps track of the current functioning of the system. This includes monitoring transactions and other elementary activities that the enterprise runs on.
Which form of graph would be most likely to be used to show the association between two sets of related data?
a. Scatter plot
b. Pie chart
c. Histogram
d. Box plot
Scatter plot.
A scatter plot (or scatter graph) is a form of graph that displays data points by displaying one attribute on one axis of the graph and a second attribute on the other axis. In this way, the relationships between the attributes can be seen.
At which level of organization would one most likely find professional systems administrators running the hardware?
a. Team
b. Group
c. Individual
d. Enterprise
Enterprise.
Enterprise systems are complicated enough that a professional systems administrator is required to keep all the servers and other hardware running at peak efficiency. At lower levels, the hardware can generally be run by individuals with assistance from the IT department.
Which of the following is the name for a database in which the methods to manipulate the data are associated with the data itself?
a. Object-oriented database
b. Relational database
c. Network database
d. Indexed database
Object-oriented database.
Object-orientation is a technology that combines data with the methods used to manipulate the data. Although originally conceived to assist in programming, the technology has migrated to databases as well. Object-oriented databases add persistence (which enables program data to survive the termination of the program creating it) to the objects created during the running of object-oriented code.
Which of the following best describes a record in a database?
a. A collection of fields
b. A storage medium
c. A single fact
d. A table
A collection of fields.
A record in a database is composed of a number of facts (as stored in fields) which are usually related. Each record is combined with other records that have the same format to create a table.
A data model in which each data object (except the root object) has exactly one parent and any number of children is called
a. object model
b. relational model
c. network model
d. hierarchical model
hierarchical model.
In the hierarchical data model, each element is the parent of any number of other elements and the child of exactly one other element. This allows for simplified searching by depth-first or breadth-first traverses.
In a relational database, data collected together in a form where each entry has the same format as all the other entries is called a
a. row
b. record
c. table
d. key
table.
Tables are collections of rows in which each row has the same format as every other row in that table. The columns represent one particular fact about each data item.
Which of the following is NOT an element of an Entity-Relationship Diagram?
a. Entity
b. Relationship
c. Action
d. Attribute
Action.
The basic building blocks of Entity-Relationship Diagrams (ERD) are entities, which are connected to other entities via relationships. Both entities and relationships can have attributes. Since only static data is considered, actions are not part of the ERD.
The default join type used in SQL is the
a. cross join
b. inner join
c. left outer join
d. right outer join
inner join.
A JOIN combines two tables so that data from both can be retrieved. An inner join finds the intersection between two tables by limiting the result list to those that are in both tables. This has become the default join in most database languages.
In a relational database, a tuple refers to which data type?
a. Attribute
b. Record
c. File
d. Field
Record.
A tuple refers to a set of name/value pairs. For example, a pair might be (Name = Fred), and a set of pairs might be (Name = Fred, Age = 29, Hair_color = Brown). These sets are implemented as records in a relational database.
The history of all actions performed on or by a database system is stored in the
a. database log
b. database file
c. system log
d. transaction table
database log.
A database log contains a list of records, each of which describes one single action taken by the user or the system. This log is saved in some permanent storage medium and can be used to restore the database after a systems failure.
The amount of data that can be sent through a telecommunications channel is called
a. bandwidth
b. signal/noise ratio
c. information
d. distortion
bandwidth.
Bandwidth is the term for the amount of information that can be passed through a channel per unit of time. Bandwidth is affected by distortion, and the amount of data compared to the noise in a system is the signal/noise ratio.
What is an RS232 cable with cross-linked send and receive lines that is used to connect two computers called?
a. USB
b. LAN
c. Bridge
d. Null modem
Null modem.
A null modem is an RS232 serial cable where the send pin on one connector is connected to the receive pin on the other connector. This allows two computers to connect directly to one another for simple networking.
The IP address that a computer uses must be what?
a. Unique in the world
b. Unique to the network the computer is in
c. Whatever the user selects
d. Unique to the workgroup
Unique to the network the computer is in.
The IP address of a computer must be unique within the network that the computer is operating in. In order for the computer to communicate with the outside world, it must use a gateway in which its signals are given a worldwide unique IP address.
Which of the following is a protocol for sending fixed-length packets across a network?
a. ATM
b. IP
c. SDH
d. LAN
ATM.
Asynchronous transfer mode (ATM) breaks data to be sent across its network into fixed-length packets before sending. Most other protocols send data packets of variable length, with the length being encoded in the metadata of the packet.
Which of the following is NOT true about telecommunications gateways?
a. They must be run on dedicated computers.
b. They may allow two networks with different IP address spaces to communicate.
c. They may allow two networks with differing protocols to communicate.
d. They usually connect a LAN with a WAN.
They must be run on dedicated computers.
Although gateways were originally often dedicated computers, these days their tasks can be done by either small hardware components or run as part of another computer's tasks.
A token frame in a token-ring network consists of
a. three bytes
b. any number of bytes
c. five bytes
d. two bytes
three bytes.
The token passed around a token-ring network consists of three bytes: starting delimiter, access control, and ending delimiter bytes.
Which of the following technologies uses the phone system's copper 'last mile' to send high-speed (≥128kb) data?
a. ISDN
b. POTS
c. DSL
d. Cable
DSL.
Digital Subscriber Lines (DSL) use the twisted-pair copper wire that connects a subscriber's telephone line to the telephone company's system for both voice and data communication. A DSL modem separates out the two data streams, passing the voice channel to the local telephones and the data to the local computer system.
The technology used to have telephone conversations over the Internet is called
a. VoIP
b. PSTN
c. DID
d. LAN
VoIP.
Voice over IP (VoIP) is the technology used to make telephone connections across the Internet. Voice data is converted into a digital signal, which is passed via the Internet to the receiving computer, where the signal is reconverted to an analog signal.
In data transmission, which of the following refers to a system that allows multiple slower channels to be passed through a smaller number of higher-speed channels?
a. Concentrator
b. Circuit
c. Buffer
d. Protocol
Concentrator.
A concentrator allows a single path to handle data from multiple channels. The concentrator buffers the incoming channels to make sure that only one is using the single path at a time.
A network element that converts binary data into analog signals and vice versa is called a
a. collector
b. soundcard
c. multiplexer
d. modem
modem.
A modem (MOdulator/DEModulator) is a device for converting binary data into analog signals and vice versa so that the data can be transmitted over normal telephone wires. A soundcard converts binary data into sound (analog) and vice versa, but it is not part of a network.
In order to determine the IP address of a domain name, which of the following would have to be consulted?
a. DNS
b. TCP
c. UDP
d. FTP
DNS.
The Domain Name System (DNS) allows any computer connected to the Internet to resolve the IP address of any domain name. This is done by sending a single UDP request to the local DNS server and receiving a UDP reply with the information sought.
What is the maximum throughput of a 10BASE-T cable?
a. 10 Megabits/second
b. 10 Gigabits/second
c. 100 Megabits/second
d. 10 Kilobits/second
10 Megabits/second.
10BASE-T refers to a type of cable used in Ethernet applications. The 10 refers to the throughput of 10 Megabits/second, while the BASE refers to baseband, meaning that there is only one signal on the wire. The T stands for twisted pair wires over which the signals travel.
Which of the following are types of agile software development?
I. Extreme Programming
II. Waterfall Model
III. Rapid Application Development
a. I only
b. I and II only
c. I and III only
d. I, II, and III
I and III only.
Extreme programming and rapid application development are both agile software development methodologies. Both seek to minimize risk by working in short time frames, with each iteration resulting in a working software system. Each new iteration is a step closer to the final product. In contrast, the waterfall model seeks to define all specifications for a product before programming begins.
Which of the following is a criticism of the original waterfall model of systems life cycle development?
a. Each step must be entirely completed before the next step can be taken
b. Users spend too much time learning and using unfinished systems
c. There are no specification documents against which tests can be run
d. The method specifies how the teams are to do the programming
Each step must be entirely completed before the next step can be taken.
The waterfall model of SDLC consists of a series of steps, each of which must be completed before the next step is begun. This means that if problems crop up during the implementation of a system, there is no way to return to a previous step to avoid this problem. There have been numerous adjustments to the waterfall model to get around this issue.
Which of the following refers to the re-testing of software that has been modified to ensure that no new bugs have crept in?
a. Unit testing
b. Stress testing
c. Regression testing
d. Integration testing
Regression testing.
Regression testing is the process of re-testing modified software to ensure that the changes made to the software to add functionality or fix problems have not introduced any new errors. As software is developed, a suite of regression tests are prepared as well, which can be run automatically on any new version of the software.
Which of the following is NOT part of the design phase of the system development?
a. Determine specifications for hardware
b. Write design guidelines for the software
c. Determine information needs of the end user
d. Determine database needs
Determine information needs of the end user.
Determining what the end user will need from a system is part of the analysis phase of systems development. All outputs should be determined before starting on the design phase.
Which of the following is NOT a significant problem in end-user computing?
a. Wasted resources
b. Uncaught errors
c. High overhead
d. Computer viruses
High overhead.
Allowing the end-users to write and install their own programs has many advantages, but also opens the door to numerous problems. Among these are wasted resources (if two end-users write software to do the same task), uncaught errors (which would be caught in the testing done in traditional systems design), and computer viruses (since each computer can install programs, every one could import a virus). High overhead, however, is generally not a problem, as users require less assistance from the central IT department.
Software development teams usually do NOT include
a. database architects
b. programmers
c. customer support engineers
d. testers
customer support engineers.
Customer support engineers mediate between the users of the product and the software development team, usually by way of the testing department. They are not included in the software development teams, though their input is often important to changes made in the product after it is launched.
Which of the following is a disadvantage associated with agile software development?
a. Little documentation is produced.
b. User comments can be integrated easily.
c. There is great flexibility in producing code.
d. You always have a running program.
Little documentation is produced.
Since most communication in agile programming is done in face-to-face meetings, coupled with using working software as a metric, very little documentation is produced in comparison to other software development methods.
According to Microsoft, how many layers should a logical model have?
a. 1
b. 2
c. 3
d. Any number
3.
A logical model should consist of three layers: user layer, business layer and data layer. In the physical model derived from this, these layers might be consolidated into fewer layers.
Which of the following is the final test to be conducted on a system?
a. Integration
b. Acceptance
c. System
d. Unit
Acceptance.
Acceptance tests are run to determine whether a system fulfills all the requirements as set forth in the specifications. Acceptance tests can be run either at the manufacturer's site or on-site.
In ____ development, a system is developed in increments.
a. iterative
b. arbitrary
c. monolithic
d. spiral
iterative
Iterative and incremental development is an agile development methodology where software systems are developed in increments. At each step, a working program is produced, so it can easily be determined how the process is progressing.
In transitioning from one system to another, the technique that discontinues the old system before starting the new system is called
a. parallel operation
b. flash conversion
c. pilot conversion
d. conversion design
flash conversion.
Flash (also direct) conversion is a method of systems conversion where the old system is turned off before the new system is started. All data must be transferred—and transformed—during the conversion process.
Technical, operational, and economic feasibility are all part of which step in systems development life cycle?
a. Systems analysis
b. Maintenance
c. Installation
d. Design
Systems analysis.
Feasibility studies are an important aspect of the systems analysis of a project. They ensure that the system can be created given the current parameters, before too much money and time are spent on implementing the system.
Which of the following is a top-down system development method?
a. DSDM
b. Waterfall model
c. Extreme programming
d. FDD
Waterfall model.
In top-down systems development, the system is looked on as a whole, which is then subdivided into parts, each of which is again seen as a whole. Each part is again subdivided until the parts are small enough to be created as a whole. While designing the system, subsystems not yet created are treated as black boxes, with the understanding that they will be created and programmed at a later date. The waterfall model is an example of this methodology.
Software bought from a vendor that needs no modification is often called
a. an application suite
b. a shrink-wrap application
c. an embedded system
d. an application programming interface
a shrink-wrap application.
Shrink-wrap applications are off-the-shelf software that can be installed and used with minimal or no customization. Such applications have limited and specialized uses and are particularly valuable when data from the programs is to be widely distributed.
Which of the following is a CASE tool?
a. Perforce
b. WordPerfect
c. Rational Rose
d. Mozilla Firefox
Rational Rose.
Computer-aided software engineering (CASE) tools are programs that help in the analysis and design of software. Rational Rose is an IBM product for software modeling. It uses the unified modeling language and can produce software source code, as well as doing round-trip engineering.
Which of the following is NOT a problem with allowing the end-user complete control over the software on their computer?
a. Multiple versions of the same program must be supported.
b. Unwanted and poorly understood interactions cause programs to fail.
c. Different file formats make information interchange difficult.
d. There can be difficulty in transmitting data files between computers.
There can be difficulty in transmitting data files between computers.
In allowing users to install their own software on their computers, the IS department loses a certain amount of control over the system. They must be prepared to deal with multiple versions of multiple programs, as well as helping users translate between file formats used by incompatible programs. However, this does not affect the actual transmission of data files from one computer to another.
The ____ are the results that must be in place before the next step in the development process may be begun.
a. documentation
b. tests
c. exit criteria
d. specifications
exit criteria
Exit criteria are requirements that are to be met in a certain stage of a project. The criteria are different in each development stage and may include documentation, specifications, completed tests, or code.
The study of all the systems in use in a company in order to determine the present level of performance is called an
a. MIS study
b. MIS audit
c. MIS trace
d. MIS PROD
MIS audit.
An MIS audit is a way to determine how well the current MIS is working in a company. During an MIS audit, sample transactions are traced through the system to determine how well controls are working. Any weaknesses are reported to management.
Adding more programmers to a project that is running behind schedule has what effect on the schedule?
a. Delays it further
b. Speeds it up
c. Has no effect
d. Stops it completely
Delays it further.
According to Brook's law, trying to speed up a delayed software delivery by adding new programmers is counterproductive, as the time spent bringing the new programmers up to speed wastes more time than it saves in the end.
Implementing a system at just a few locations in order to study its effectiveness before rolling it out company-wide is called
a. acceptance test
b. rollout
c. installation
d. pilot program
pilot program.
A pilot program allows a company to assess the strengths and weaknesses of a system without introducing it to everyone who will eventually use it. It assumes that the system will scale well when broadly introduced.
The single most important factor in determining what systems to build and install in an organization is
a. the hardware already installed
b. the software used and understood by users
c. the information needs of the user
d. the ability of managers to access information about the system
the information needs of the user.
In developing a system, it is of utmost importance to determine what information should be available to which users. Without understanding the information needs of the users, proper decisions about the IS to be developed cannot be made.
An invitation to suppliers to submit an offer for a product or service is called a ____
a. RFP
b. BAFO
c. NOP
d. ERP
RFP.
A Request For Proposals (RFP) is a solicitation for offers to provide certain goods and services. The offers will often include a complete plan on how to implement the system to be provided.
Which of the following would be a good metric for determining the value of an MIS system?
a. How much the system is used
b. How much the system cost
c. How many clients have been installed
d. How many users are connected
How much the system is used.
When assessing the value of an MIS, an important metric is how much the system is being used. If users are using the MIS for all possible transactions, rather than just the ones that they are forced to use, the system is proving its worth. Simply counting the installed base is not enough to determine the value of a system.
Which of the following are components of a decision support system?
I. Data management component
II. Model management component
III. User interface management component
a. I only
b. I and II only
c. II and III only
d. I, II, and III
I, II, and III.
A decision support system (DSS) consists of a data management component, usually a database, a component to manage the models used by the DSS, and a way to manage the user interface.
Transaction processing systems are responsible for which of the following features?
a. Atomicity
b. Consistency
c. Isolation
d. Durability
Atomicity.
Transaction processing systems are middleware that ensure that transactions are performed fully or roll the state of the system back to the pre-transaction state. This is called atomicity.
Neural networks are most likely to be used directly in which of the following systems?
a. Office automation systems
b. Enterprise information systems
c. Transaction processing systems
d. Data mining systems
Data mining systems.
Neural networks, which can be used to search for patterns, are useful in data mining, which consists mainly of searching large amounts of data for patterns. Enterprise information systems may include data mining as an input, but not as their main focus.
An expert system
a. is always capable of learning
b. seeks to find answers for a specific set of problems
c. learns through feedback
d. allows for incorrect input data
seeks to find answers for a specific set of problems.
Expert systems have a very limited focus for the problems they can solve. In general, the more tightly constrained the problem area, the better the expert system is. They require, however, proper input from the operator, and usually it is necessary for the user to sanity-check the output. Expert systems do not learn automatically, but change only through reprogramming.
A ticket tracking system used to track issues uncovered by members of the testing staff is called
a. customer support system
b. bug tracking system
c. transaction processing system
d. response system
bug tracking system.
Bug tracking systems are systems that ensure that bugs found in software systems are properly handled. Bugs can be entered, distributed, marked as fixed, and re-tested. These systems ensure that problems uncovered will not be forgotten or misplaced.
Which of the following is a computer-based system that helps teams of users find solutions to problems?
a. GDSS
b. DSS
c. DBMS
d. GPS
GDSS.
Group Decisions Support Systems (GDSS) allow groups of users to work on problems together, even if they can't be brought together in one place. The system allows the users to gather ideas and information from all participants and synthesize solutions or partial solutions to the problems set.
A system for managing customers and the interaction with them is called
a. CRM
b. CSS
c. BRM
d. DMA
CRM.
Customer relationship management (CRM) refers to both the tools and systems used for managing interaction with customers. The CRM system may consist of several software tools to oversee customer e-mails, contacts, and queries.
Which of the following is a knowledge work system?
I. Microsoft Excel
II. Autodesk AutoCAD
III. Corel WordPerfect
a. II only
b. I and III only
c. I and II only
d. I, II, and III
I, II, and III.
Knowledge work systems are systems that help users deal with problems that require technical knowledge. All of the above systems are used by knowledge workers in different fields: Excel for accounting, AutoCAD by designers, and WordPerfect by clerical workers.
Which of the following would NOT be part of an electronic meeting system?
a. Electronic brainstorming tools
b. Analysis tools
c. Polling tools
d. Rank order vote tools
Analysis tools.
Electronic meeting systems are systems that allow all members of a meeting to collaborate by simultaneously inputting ideas. The purpose is to generate and evaluate ideas, not to analyze them with analysis tools.
Which of the following theorems underlies most expert system calculations?
a. Binomial theorem
b. Fermat's theorem
c. Pythagorean theorem
d. Bayes' theorem
Bayes' theorem.
Bayes' theorem of the conditional probabilities of two events is heavily used in expert system calculation. Given the probability of one event, it calculates the probability of a second event.
The Electronic Communications Privacy Act does NOT protect e-mails from being read by
a. the government with a court order
b. third parties without no legitimate access
c. employers of users who are e-mailing
d. Internet service providers
employers of users who are e-mailing.
ECPA (1986) only protects e-mails under certain circumstances, and does not protect employees from having e-mail that is on the employers' equipment being read by the employers.
Which of the following is a software product for encryption of digital data?
a. RSA
b. PGP
c. DSA
d. DES
PGP.
Pretty Good Privacy (PGP) is a software product that can encrypt any form of digital data. It is most commonly used for e-mail, both for encryption of the messages and authentication of the sender.
What is hardware or software that stops certain network traffic from passing between two networks called?
a. Host
b. Modem
c. Transceiver
d. Firewall
Firewall.
Firewalls can be either hardware or software, and they selectively allow data to pass between two networks. They are usually used to ensure that all network traffic in a local network is shielded from traffic on the Internet.
Which of the following is a secure method for logging into a remote computer?
a. TELNET
b. SSH
c. CSH
d. rlogin
SSH.
Secure SHell (SSH) is a program (and a protocol) for logging into remote computers. It can be used in place of the insecure TELNET and rlogin.
The best-known certificate for computer security experts is called
a. CISSP
b. Cisco
c. CSDP
d. LPIC
CISSP.
Certified Information Systems Security Professionals (CISSP) is a certification administered by the International Information Systems Security Certification Consortium. CISSP-certified security professionals have demonstrated a wide range of knowledge in the field.
Encryption methods where the government has control of passwords that can decrypt any messages using the method are called ____ cryptography.
a. symmetric
b. public-key
c. key escrow
d. binding
key escrow
In key escrow cryptography, the government (or other controlling authority) is given a key for each instance of the method installed. This allows the government to decrypt any message encrypted by this method.
Which of the following is a system that prevents data loss in the case of a power outage?
a. UBS
b. SMS
c. USB
d. UPS
UPS.
An Uninterruptible Power Supply (UPS) is a device that ensures that power to a system is not lost if there is a power outage. UPSs can also ensure that other problems in the electricity, such as fluctuating voltages, do not affect the system.