University of Alabama MIS 200 Exam 1 Review

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/157

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

158 Terms

1
New cards

Personnel records

These are an example of internal sources of data for an information system

2
New cards

True

A personnel information system helps in choosing the best job candidate.

3
New cards

False

An effective financial information system (FIS) should provide timely, accurate, and integrated information about the marketing mix.

4
New cards

True

Business Intelligence (BI) includes historical views and predictive views of business operations

5
New cards

False

Buyer power is high when customers have few choices and low when they have many choices.

6
New cards

True

Computers are most beneficial in transaction-processing operations.

7
New cards

Artificial intelligence

Future progress in _____ includes further development in natural language processing that should make information systems easier to use

8
New cards

False

Customers, competitors, and suppliers are examples of internal data sources.

9
New cards

supplier

In accordance with Porter's Five Forces model, _____ power is high when customers have fewer options and low when customers have more options

10
New cards

objectives

In designing a management information system, the first task is to define the system's _____ clearly

11
New cards

False

In the context of an information systems job, a database administrator writes computer programs or software segments that allow the information system to perform a specific task

12
New cards

software components

Management information system's (MIS) _____ include programs developed in-house

13
New cards

False

Most information systems avoid using graphical user interfaces

14
New cards

True

Rivalry among existing competitors is high when many competitors occupy the same marketplace position

15
New cards

False

Skill in using word processing software is an example of information literacy

16
New cards

False

The focus of a top-line strategy for successfully competing in a marketplace is improving efficiency by reducing overall costs

17
New cards

manpower, machinery, materials, and money

The four Ms of resources are _____

18
New cards

information

The output of an information system is _____.

19
New cards

True

The terms "information systems" and "information technologies" are used interchangeably.

20
New cards

database administrator

Within the context of the various categories of IT jobs, a _____ must have knowledge and understanding of data warehouse and data-mining tools

21
New cards

Automated payroll

_____ is an example of transaction-processing system.

22
New cards

False

Twitter is an example of a management information system (MIS).

23
New cards

True

The quality of information is determined by its usefulness to users.

24
New cards

Information literacy

____ is understanding the role of information in generating and using business intelligence

25
New cards

False

The data component of an information system is considered the output to the system

26
New cards

True

A redundant array of independent disks (RAID) system is a collection of disk drives used for fault tolerance and improved performance.

27
New cards

False

An object code must be translated into source code in order for the computer to be able to read and execute

28
New cards

True

Flash memory is used in memory cards.

29
New cards

Job management

The control programs managing computer hardware and software perform the ____ function to control and prioritize tasks performed by the CPU.

30
New cards

True

A serial port is a communication interface through which information is transferred one bit at a time.

31
New cards

False

A NAS offers only storage; a SAN system offers both storage and file services.

32
New cards

False

Both the ALU and the control unit are part of the BIOS

33
New cards

it's less fragile than gallium arsenide

An advantage of silicon over gallium arsenide is that:

34
New cards

True

Random access memory can be read from and written to

35
New cards

byte

A ____ is the size of a character

36
New cards

it cannot emit light.

One of the major disadvantages of silicon is that:

37
New cards

128

ASCII defines up to ____ characters

38
New cards

True

NAS is popular for Web servers and e-mail servers because it lowers management costs and helps make these servers more fault tolerant

39
New cards

Communication

_____ is a function performed by control programs that controls the transfer of data among parts of a computer system, such as exchange of information between the CPU and I/O devices.

40
New cards

False

A byte is a single value of 0 or 1

41
New cards

False

Sometimes, 4GLs are called procedural languages.

42
New cards

SANs

Typically, ____ are used only in large enterprises because of their cost and installation complexity

43
New cards

False

With NAS, as the number of users increase, the performance increases too

44
New cards

True

Inkjet printers produce characters by projecting electrically charged droplets of ink onto paper that create an image

45
New cards

data codes

Computers and communication systems use _____ to represent and transfer information between computers and network systems.

46
New cards

operating system (OS)

a set of programs for controlling and managing computer hardware and software

47
New cards

256

Extended ASCII data code allows representation of ______ characters

48
New cards

optical discs

CD-ROMs and DVDs are examples of _____.

49
New cards

Time-shared

____ OSs allow several users to use computer resources simultaneously

50
New cards

it is nonvolatile

ROM is different from RAM in that:

51
New cards

storage

____ means saving data in computer memory and retrieval is accessing data from memory

52
New cards

second

Transistor was the major technology used during the ____ generation of hardware

53
New cards

false

A petabyte is 230 bytes

54
New cards

operating system

An example of a(n) _____ is UNIX

55
New cards

RAM

The Clipboard's contents are stored on ____.

56
New cards

Resource allocation

_____ is a function performed by control programs that manages computer resources, such as storage and memory.

57
New cards

Third-generation

_____ computer languages are machine independent and are called high-level languages

58
New cards

False

The hardware components of a computer system consist of programs written in computer languages.

59
New cards

True

ENIAC is an example of a first-generation computer.

60
New cards

high-level

Java and C++ are ____ languages.

61
New cards

kernel

The supervisor program of an OS is called the ____.

62
New cards

True

A disadvantage of trackball is that positioning is sometimes less precise than with a mouse

63
New cards

Secondary

____ memory, which is nonvolatile, holds data when the computer is off or during the course of a program's operation.

64
New cards

Fifth-generation

IBM System z10 is an example of a ____ computer

65
New cards

True

A magnetic disk is a type of secondary memory device

66
New cards

Fourth-generation language

Which of the following computer languages is the easiest to use?

67
New cards

True

A bus can be internal or external

68
New cards

False

The contents of Programmable read-only memory (PROM) can be erased and reprogrammed

69
New cards

Liquid crystal display (LCD)

_____ is the most common output device for soft copy

70
New cards

Optical character reader

Which of the following is an input device?

71
New cards

True

Trackballs are ideal for notebook computers because they occupy less space than a mouse

72
New cards

redundant array of independent disks

The term RAID stands for ____

73
New cards

True

C++ and Java are examples of high-level language

74
New cards

True

The split keyboard has been developed for better ergonomics.

75
New cards

Data management

_____ is a function performed by control programs that controls data integrity by generating checksums to verify that data has not been corrupted or changed.

76
New cards

True

Although a database can consist of only a single file, it is usually a group of files

77
New cards

warehouse

A data ____ is a collection of data from a variety of sources used to support decision-making applications and generate business intelligence.

78
New cards

fragmentation

The ____ approach to setting up a distributed DBMS addresses how tables are divided among multiple locations

79
New cards

logical

To begin designing a relational database, you must define the ____ structure by defining each table and the fields in it

80
New cards

physical

The ____ view involves how data is stored on and retrieved from storage media

81
New cards

False

Disks are sequential access devices, whereas tapes are random access devices

82
New cards

select

A ____ operation searches data in a table and retrieves records based on certain criteria

83
New cards

OLTP (online transaction processing)

____ generally uses internal data and responds in real time

84
New cards

foreign

In a relational model, when a primary key for one table appears in another table it is called a ____ key

85
New cards

AND

We use the ____ operator when all conditions are required to be met

86
New cards

project

A ____ operation pares down a table by eliminating columns according to certain criteria

87
New cards

False

The indexed sequential access method (ISAM) is slow and becomes increasingly useful as the number of records becomes larger.

88
New cards

True

A database is a critical component of information systems because any type of analysis that is done is based on data available in the database.

89
New cards

True

The use of OR operator means that only one of the conditions must be met.

90
New cards

normalization

____ improves database efficiency by eliminating redundant data and ensuring that only related data is stored in a table

91
New cards

administration

The data ____ component is used for tasks such as backup and recovery, security, and change management

92
New cards

False

With the indexed sequential access method (ISAM), records cannot be accessed randomly

93
New cards

True

A database engine converts logical requests from users into their physical equivalents by interacting with other components of the DBMS

94
New cards

primary

A ____ key uniquely identifies every record in a relational database.

95
New cards

raw data

____ is information in its original form.

96
New cards

True

In contrast to the query languages used to interact with a relational database, interaction with an object-oriented database takes places via methods

97
New cards

dictionary

A data ____ stores definitions, such as data types for fields, default values, and validation rules for data in each field

98
New cards

hierarchy

The structure and organization of data in a database is called a data ____

99
New cards

extraction

In a data warehouse, ____ means collecting data from a variety of sources and converting it into a format that can be used in transformation processing.

100
New cards

allocation

The ____ approach to setting up a distributed DBMS combines fragmentation and replication