Preview

Jst Any

Powerful Essays
Open Document
Open Document
1244 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Jst Any
Family Name First Name

………………................ ………………………….

Student Number ……………………….. List Number Table Number ………………………… ………………………….

COM 110
Introduction to Business Information systems Prof. Mohamed Watfa

AUTUMN SESSION 2010

SAMPLE MIDTERM EXAMINATION
Time Allowed: 1.5 Hours Total Number of Questions: 25 Total Number of Pages (incl. this page): 9

DIRECTIONS TO CANDIDATES
1. 2. Total marks: 100 Answer ALL questions from parts 1 and 2. Part 1 contains 20 questions for a total of 20 points. Part 2 contains 4 essay questions for a total of 60 points. Part 3 contains a short case study and is worth 20 points. This exam is worth 25% of your final grade for COM 110.

3.

LAPTOPS/BOOKS/NOTES ARE NOT ALLOWED

THIS EXAM PAPER MUST NOT BE REMOVED
Page 1 of 9

PART I (MULTIPLE CHOICE QUESTIONS) 20 Questions, 1 pt/Question, 20 Points Total
Instructions: Circle the correct answer in the following Multiple Choice Questions. Each question is worth 1 point for a total of 20 points. 1) The keyboard and monitor are an example of which of the five components? A) Hardware B) Software C) Procedures D) Data

2) The five-component framework is symmetrical in design. The two outermost components are: A) hardware and software B) data and software C) people and procedures D) people and hardware

3) Inventions, standards, and products are examples of ________. A) information systems B) methods C) information technology D) hardware systems

4) Which of the following is NOT part of the network that comprises business processes? A) Systems B) Activities C) Facilities D) Resources

5) Business processes are ________. A) resources B) inventory management C) systems D) functions

Page 2 of 9

6) Which of the following is not a characteristic of good information? A) Freely available B) Accurately relayed C) Produced in time D) Contextually relevant 7) Information is defined as: A) data B) data and related activities C) systems produced from data D)

You May Also Find These Documents Helpful

  • Powerful Essays

    It255 Final Study Guide

    • 843 Words
    • 4 Pages

    4. Which of the following is a detailed written definition of how software and hardware are to be used?…

    • 843 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    cHEM CHP1

    • 945 Words
    • 4 Pages

    10) Employing scientific information to develop new materials to benefit society is an example of ________.…

    • 945 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 204 Quiz

    • 2478 Words
    • 10 Pages

    You follow certain step’s to access the supplementary readings for a course when u sing your organizations library management system. These steps that you follow are examples of the _________ components of an information system.…

    • 2478 Words
    • 10 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Fi363 Final Study Guide

    • 457 Words
    • 2 Pages

    The examination contains twenty multiple choice questions valued at 5 points each (100 points total) and five essay questions valued at 40 points each (200 points total). The total value of the examination is 300 points.…

    • 457 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    LINUX 4.1 QUESTIONS

    • 505 Words
    • 3 Pages

    1. What three components make up the X Windows System? What is the additional component?…

    • 505 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    APES exam prep

    • 1701 Words
    • 7 Pages

    In most cases, these multiple-choice items are entirely stand-alone, or unrelated to each other. In a few cases, two items may both refer to a single stimulus—generally a graph, table, or…

    • 1701 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Unit 3 Quiz

    • 866 Words
    • 4 Pages

    13. Which of these systems help executives organize their interactions with external environment by providing graphics and communications technologies in boardrooms?…

    • 866 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Chapter 2 MIS Kroenke

    • 4745 Words
    • 24 Pages

    2) In swimlane format, ________ are specific tasks that need to be accomplished as part of a business process.…

    • 4745 Words
    • 24 Pages
    Good Essays
  • Satisfactory Essays

    Mism 2301 Syllabus

    • 701 Words
    • 3 Pages

    3. To explore the components of an IT infrastructure and how they support the applications and business.…

    • 701 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    This document has three parts: PART A the two page answer sheet for the multiple choice questions; PART B the short answer question paper; and PART C the multiple choice question paper. Please return this instruction cover sheet and PART A and PART B (with your answers recorded). You do not need to return PART C.…

    • 1533 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Finalexamstudyguide

    • 422 Words
    • 2 Pages

    The examination contains twenty multiple choice questions valued at 5 points each (100 points total) and five essay questions valued at 40 points each (200 points total). The total value of the examination is 300 points.…

    • 422 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Database Exam Paper

    • 4799 Words
    • 20 Pages

    7) Patient allergy information is an example of an asset with a moderate requirement for integrity. 8) The more critical a component or service, the higher the level of availability required. 9) Data origin authentication provides protection against the duplication or modification of data units. 10) The emphasis in dealing with passive attacks is on prevention rather than detection. 11) Data integrity is the protection of data from unauthorized disclosure. 12) Information access threats exploit service flaws in computers to inhibit use by legitimate users. 13) Viruses and worms are two examples of software attacks. 14) A connection-oriented integrity service deals with individual messages without regard to any larger context and generally provides protection against message modification only. 15) Pervasive security mechanisms are not specific to any particular OSI security service or protocol layer. MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question. 16) _________ security consists of measures to deter, prevent, detect, and correct security violations that involve the transmission of information. A)…

    • 4799 Words
    • 20 Pages
    Powerful Essays
  • Satisfactory Essays

    What involves shared participation in business processes, such as workflow, in which knowledge is hard-coded as rules?…

    • 865 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    1. There is no minimum or maximum number of pages. Use all the pages necessary to provide complete and well synthesized responses to each question.…

    • 80 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Health Services

    • 341 Words
    • 2 Pages

    The final exam is valued at 250 points and made up of 10 multiple choice (6 points each), 4 short answer (15 points each), and 5 essay questions (25 points each). To earn full points, the short answer questions need to be answered in complete sentences; for the essay questions, you need to provide detailed responses that directly answer all parts of the question and provide supporting details and/or examples.…

    • 341 Words
    • 2 Pages
    Good Essays