QN01. ______________. focuses on planning, policies, and procedures regarding the use of corporate data and information.
- CIO
- systems analyst
- database administrator
- system operator
Answer
(A)CIO
QN02. The extent to which technology permeates an area or department is called ______________.
- Technology diffusion
- Technology infusion
- Technology collusion
- Technology fusion
Answer
(A)Technology diffusion
QN03. ______________ is any business-related exchange such as payments to employees, sales to customers, or payments to suppliers.
- Data
- E-commerce
- A transaction
- Input
Answer
(C)A transaction
QN04. ______________ is software programs that were developed for a general market and that can be purchased in a store.
- Proprietary software
- Off-the-shelf software
- Contract software
- Application software
Answer
(B)Off-the-shelf software
QN05. ______________ converts ciphertext back into plaintext.
- Encryption
- A firewall
- Decryption
- An encoder
Answer
(C)Decryption
QN06. With the ______________ form of data processing, each transaction is processed immediately.
- OLTP
- batch processing
- active processing
- automated transaction processing
Answer
(A)OLTP
QN07. Using ______________ a decision maker can make hypothetical changes to problem data and observe the impact on the results
- Simulation
- What-if analysis
- Optimization
- Goal-seeking analysis
Answer
(B)What-if analysis
QN08. ______________ involves the investigation of new approaches to existing problems.
- Systems analysis
- Creative analysis
- Critical analysis
- Organizational analysis
Answer
(B)Creative analysis
QN09. Whose responsibility is it to see that the potential consequences of IS use are fully considered?
- IS professionals
- managers
- users
- all of the above
Answer
(A)IS professionals
QN10. The first stage in the problem-solving process is called the ______________ stage. During this stage, potential problems or opportunities are identified and defined.
- Choice
- Design
- Monitoring
- Intelligence
Answer
(C)Monitoring
QN11. Which of the following is NOT a goal of transaction processing systems?
- Capture, process, and store transactions
- Produce a variety of documents related to routine business activities
- Reduce manual effort associated with processing business transactions
- Produce standard reports used for management decision making
Answer
(D)Produce standard reports used for management decision making
QN12. ______________ is a protocol that enables you to copy a file from another computer to your computer.
- SLIP
- Usenet
- Telnet
- FTP
Answer
(D)FTP
QN13. According to the ______________ theory, organizations adapt to new conditions or alter their practices over time.
- Change model
- Organizational learning
- Organizational culture
- Continuous improvement
Answer
(D)Continuous improvement
QN14. ______________ organizational structure employs individuals, groups, or complete business units in geographically dispersed areas who may never meet face to face in the same room.
- traditional
- virtual
- multidimensional
- matrix
Answer
(B)virtual
QN15. ______________ is a collection of single-application software packages in a bundle designed to work similarly so that once you learn the basics for one application, the other applications are easy to learn and use.
- Bundled software
- Software suite
- Productivity applications
- General purpose software
Answer
(B)Software suite
QN16. The data processing activity that involves rekeying miskeyed or misscanned data is called ______________.
- editing
- data storage
- data correction
- data collection
Answer
(C)data correction
QN17. The component of a decision support system that provides decision makers access to a variety of models and assists them in decision making is called the ______________.
- Model base
- model management software
- database
- dialogue manager
Answer
(C)database
QN18. ______________ is a form of transaction processing in which all transactions are collected into a group and processed together.
- Accumulation processing
- Batch processing
- Data collection
- Data collection
Answer
(B)Batch processing
QN19. Information systems that support the firm in its interaction with its environment are said to be performing within the ______________.
- Workgroup sphere of influence
- Global sphere of influence
- Enterprise sphere of influence
- Individual sphere of influence
Answer
(C)Enterprise sphere of influence
QN20. ______________ are individuals who help users determine what outputs they need from the system and construct the plans needed to develop the necessary programs that produce these outputs.
- Data entry operators
- Programmers
- Database administrators
- Systems analysts
Answer
(D)Systems analysts
QN21. The current major stage in the business use of IS is oriented towards ______________.
- Cost reduction and productivity
- Gaining competitive advantage
- Strategic advantage and costs
- Improved customer relationship management
Answer
(B)Gaining competitive advantage
QN22. A ______________ is an abstraction or an approximation that is used to represent reality.
- Model
- System parameter
- System performance standard
- System
Answer
(A)Model
QN23. ______________ attacks have overwhelmed the capacity of some of the Web's most established and popular sites.
- Spam
- Credit card fraud
- Denial-of-service
- Spoofing
Answer
(C)Denial-of-service
QN24. ______________ gives the computer the ability to make suggestions and act like an expert in a particular field.
- Decision support systems
- Virtual reality systems
- Management information systems
- Expert systems
Answer
(D)Expert systems
QN25. ______________ is an Internet service that enables you to log on to another computer and access its public files.
- Telnet
- FTP
- Content streaming
- Instant messaging
Answer
(A)Telnet
QN26. ______________ describes various program functions and help users operate the computer system
- A computer program
- Documentation
- Systems software
- A computer system platform
Answer
(B)Documentation
QN27. Which of the following statements, about the use of decision support systems, is true?
- They are applied only to the choice phase of the problem-solving process.
- They are only applied to frequent, recurring problems.
- They are only applied to highly-structured problems
- They assist decision makers at all levels within the organization.
Answer
(D)They assist decision makers at all levels within the organization.
QN28. The value of information is directly linked to ______________ .
- its accuracy and completeness
- its verifiability
- its simplicity and security
- how it helps decision makers achieve organizational goals
Answer
(A)its accuracy and completeness
QN29. ______________ often referred to as "rules of thumb," are commonly accepted guidelines or procedures that usually lead to a good decision.
- Optimization models
- Satisficing models
- Heuristics
- Programmed decisions
Answer
(D)Programmed decisions
QN30. ______________ represent(s) the application of information concepts and technology to routine, repetitive, and usually ordinary business transactions
- E-commerce
- Transaction processing systems
- Management information systems
- Decision support systems
Answer
(B)Transaction processing systems
QN31. ______________ is the process of converting a message into a secret code and changing the encoded message back to regular text.
- Encryption
- Fraud
- Encoding
- Cryptography
Answer
(D)Cryptography
QN32. Problems that are routine and have well-defined relationships are called ______________.
- Structured problems
- Programmed decisions
- Simple problems
- Heuristics
Answer
(A)Structured problems
QN33. ______________ is an awareness and understanding of a set of information and ways that information can be made useful to support a specific task or reach a decision
- Knowledge
- Data
- Feedback
- A process
Answer
(A)Knowledge
QN34. Day's critical activities and is typically available at the beginning of each workday.
- Demand report
- scheduled report
- key-indicator report
- exception report
Answer
(C)key-indicator report
QN35. ______________ is factors that are essential to the success of certain functional areas of an organization.
- Mission-critical factors
- Critical success factors
- Performance objectives
- Strategic factors
Answer
(B)Critical success factors
QN36. The four key questions related to fairness in information use are ______________
- cost, timing, content, and frequency
- notice, consent, accuracy, and authorization
- knowledge, control, notice, and consent
- knowledge, accuracy, timing, and permission
Answer
(D)knowledge, accuracy, timing, and permission
QN37. Which of the following SDLCs listed below takes an iterative approach to the systems development process?
- end user
- RAD
- prototyping
- traditional waterfall
Answer
(B)RAD
QN38. ______________ is a crime in which the imposter obtains key pieces of personal information in order to impersonate the victim.
- Social engineering
- Dumpster diving
- Computer fraud
- Identity theft
Answer
(A)Social engineering
QN39. The translation of strategic and organizational goals into system development initiatives is called ______________.
- Systems development
- information systems planning
- project planning
- project definition
Answer
(B)information systems planning
QN40. Information systems that monitor the elementary activities and transactions of the organizations are ______________.
- management-level systems.
- operational-level systems.
- knowledge-level systems.
- strategic systems.
Answer
(A)management-level systems.