1) Two information systems that support the entire organization are
A. enterprise resource planning systems and dashboards
B. transaction processing systems and office automation systems
C. enterprise resource planning systems and transaction processing systems
D. expert systems and office automation systems
Answer: C
2) _______ is the direct use of information systems by employees in their work
A. Transaction processing systems
B. End-user computing
C. Decision support systems
D. Management information systems
Answer: B
3) ______ attempt to duplicate the work of human experts by applying reasoning capabilities
A. Expert systems
B. Dashboards
C. Business intelligence systems
D. Decision support systems
Answer: A
4) _______ issues involve who may obtain information and how much they should pay for this information
A. Privacy
B. Accessibility
C. Property
D. Transferability
Answer: B
5) _____ issues involve collecting, storing, and disseminating information about individuals.
A. Privacy
B. Accuracy
C. Property
D. Accessibility
Answer: A
6) Your company’s computers have been taken over by an attacker and used to attack another organization’s information systems. Your problem is which of the following?
A. Poor security policies and procedures
B. Lack of due diligence
C. Downstream liability
D. Poor service-level agreements
Answer: C
7) You are the only person in your office to upgrade to Microsoft® Word 2010. Before you share documents with coworkers, you should do which of the following?
A. Print out a backup copy of documents
B. Run the Compatibility Checker
C. Burn all documents to CD
D. Create a document summary
Answer: B
8) Which of the following is detected by the contextual spelling checker?
A. Duplicate words
B. Irregular capitalization
C. Use of their when you should use there
D. Improper use of commas and other punctuation
Answer: