University of Alabama MIS 200 Exam 1 Review with complete verified solutions 2025

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/80

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

81 Terms

1
New cards

Personnel records

These are an example of internal sources of data for an information system

2
New cards

Artificial intelligence

Future progress in _____ includes further development in natural language processing that should make information systems easier to use

3
New cards

supplier

In accordance with Porter's Five Forces model, _____ power is high when customers have fewer options and low when customers have more options

4
New cards

objectives

In designing a management information system, the first task is to define the system's _____ clearly

5
New cards

software components

Management information system's (MIS) _____ include programs developed in-house

6
New cards

manpower, machinery, materials, and money

The four Ms of resources are _____

7
New cards

information

The output of an information system is _____.

8
New cards

database administrator

Within the context of the various categories of IT jobs, a _____ must have knowledge and understanding of data warehouse and data-mining tools

9
New cards

Automated payroll

_____ is an example of transaction-processing system.

10
New cards

Job management

The control programs managing computer hardware and software perform the ____ function to control and prioritize tasks performed by the CPU.

11
New cards

Information literacy

____ is understanding the role of information in generating and using business intelligence

12
New cards

it's less fragile than gallium arsenide

An advantage of silicon over gallium arsenide is that:

13
New cards

byte

A ____ is the size of a character

14
New cards

it cannot emit light.

One of the major disadvantages of silicon is that:

15
New cards

128

ASCII defines up to ____ characters

16
New cards

Communication

_____ is a function performed by control programs that controls the transfer of data among parts of a computer system, such as exchange of information between the CPU and I/O devices.

17
New cards

SANs

Typically, ____ are used only in large enterprises because of their cost and installation complexity

18
New cards

data codes

Computers and communication systems use _____ to represent and transfer information between computers and network systems.

19
New cards

operating system (OS)

a set of programs for controlling and managing computer hardware and software

20
New cards

256

Extended ASCII data code allows representation of ______ characters

21
New cards

optical discs

CD-ROMs and DVDs are examples of _____.

22
New cards

Time-shared

____ OSs allow several users to use computer resources simultaneously

23
New cards

it is nonvolatile

ROM is different from RAM in that:

24
New cards

storage

____ means saving data in computer memory and retrieval is accessing data from memory

25
New cards

second

Transistor was the major technology used during the ____ generation of hardware

26
New cards

operating system

An example of a(n) _____ is UNIX

27
New cards

RAM

The Clipboard's contents are stored on ____.

28
New cards

Resource allocation

_____ is a function performed by control programs that manages computer resources, such as storage and memory.

29
New cards

Third-generation

_____ computer languages are machine independent and are called high-level languages

30
New cards

high-level

Java and C++ are ____ languages.

31
New cards

kernel

The supervisor program of an OS is called the ____.

32
New cards

Secondary memory

is nonvolatile, holds data when the computer is off or during the course of a program's operation.

33
New cards

Fifth-generation

IBM System z10 is an example of a ____ computer

34
New cards

Fourth-generation language

Which of the following computer languages is the easiest to use?

35
New cards

Liquid crystal display (LCD)

_____ is the most common output device for soft copy

36
New cards

Optical character reader

Which of the following is an input device?

37
New cards

redundant array of independent disks(RAID)

is an assortment of hard drives connected and setup in ways to help protect or speed up the performance of a computer's disk storage.

38
New cards

Data management

_____ is a function performed by control programs that controls data integrity by generating checksums to verify that data has not been corrupted or changed.

39
New cards

warehouse

A data ____ is a collection of data from a variety of sources used to support decision-making applications and generate business intelligence.

40
New cards

fragmentation

The ____ approach to setting up a distributed DBMS addresses how tables are divided among multiple locations

41
New cards

logical

To begin designing a relational database, you must define the ____ structure by defining each table and the fields in it

42
New cards

physical

The ____ view involves how data is stored on and retrieved from storage media

43
New cards

select

A ____ operation searches data in a table and retrieves records based on certain criteria

44
New cards

OLTP (online transaction processing)

____ generally uses internal data and responds in real time

45
New cards

Foreign Key

In a relational model, when a primary key for one table appears in another table it is called a

46
New cards

AND

We use the ____ operator when all conditions are required to be met

47
New cards

project

A ____ operation pares down a table by eliminating columns according to certain criteria

48
New cards

normalization

____ improves database efficiency by eliminating redundant data and ensuring that only related data is stored in a table

49
New cards

administration

The data ____ component is used for tasks such as backup and recovery, security, and change management

50
New cards

Primary Key

uniquely identifies every record in a relational database.

51
New cards

raw data

____ is information in its original form.

52
New cards

dictionary

A data ____ stores definitions, such as data types for fields, default values, and validation rules for data in each field

53
New cards

hierarchy

The structure and organization of data in a database is called a data ____

54
New cards

extraction

In a data warehouse, ____ means collecting data from a variety of sources and converting it into a format that can be used in transformation processing.

55
New cards

allocation

The ____ approach to setting up a distributed DBMS combines fragmentation and replication

56
New cards

data mining tools

Business analytics uses ____ to support decision-making activities

57
New cards

encapsulation

Grouping objects along with their attributes and methods into a class is called ____

58
New cards

data mart

A _______________ is usually a smaller version of a data warehouse, used by a single department or function

59
New cards

replication

The ____ approach to a distributed DBMS has each site store a copy of the data in the organization's database.

60
New cards

summary data

____ gives users subtotals of various categories

61
New cards

CRUD stands for; c

create, read, update, delete

62
New cards

comes from a variety of sources

Data in a data warehouse can be differentiated from data in a database in that the former ____

63
New cards

network

In the ____ model, each record can have multiple parent and child records

64
New cards

set of integrity rules

The ____ in a database model defines the boundaries of a database, such as maximum and minimum values allowed for a field

65
New cards

OLAP

____ uses multiple sources of information and provides multidimensional analysis.

66
New cards

set of operation rules

The ____ in a database model describes methods, calculations, and so forth that can be performed on data, such as updating and querying data.

67
New cards

digital divide

Information technology and the Internet have, in essence, resulted in two societal groups: the information rich and the information poor. This is called the ____

68
New cards

cybersquatting

____ is registering, selling, or using a domain name to profit from someone else's trademark

69
New cards

spamming

___ has created decency concerns, because these e-mails often contain explicit language or nudity

70
New cards

61%

What percent of emails were considered unnecessary in 2012?

71
New cards

copyright

Generally, ____ laws protect tangible material, such as books and drawings

72
New cards

illegal but ethical

You make two copies of a software package you just bought for personal use, incase the original software fails and you need a backup. This action is

73
New cards

green computing

_____ involves the design, manufacture, use, and disposal of computers and servers in such a way that there is minimal impact on the environment

74
New cards

log files

____ generated by Web server software, record a user's actions on a Web site

75
New cards

accountability

In the context of the important concepts regarding Web and network privacy, ____ refers to issues involving both the user's and the organization's responsibilities and liabilities.

76
New cards

Fair Use Doctrine

The ____ means you can use copyrighted material for certain purposes, such as quoting passages of a book in literary reviews

77
New cards

nonrepudiation

In the context of the important concepts regarding Web and network privacy, _____ is a method for binding all the parties to a contract

78
New cards

legal but unethical

A banker uses the information a client enters in a loan application to sell other financial products to this client. This action is _____

79
New cards

a virtual organization

Dell, Microsoft, and Unisys Corporation created a partnership to design a voting system for several U.S. states. This is an example of ____

80
New cards

cookies

Amazon.com uses ____ to provide customized book recommendations based on past purchases

81
New cards

upgrading

Clerical workers using computers for word-processing tasks is an example of job _____