CHAPTER 1
1. You follow certain step’s to access the supplementary readings for a course when u sing your organizations library management system. These steps that you follow are examples of the _________ components of an information system.
a. Procedures
b. Hardware
c. Software
d. Data
2. Which of the following is the best description of data?
a. Unbiased information
b. Knowledge derived from facts or figures
c. Information presented in a meaningful context
d. Recorded facts or figures
3. The words that you type in an MS Word document is an example of
a. Processes
b. Data
c. Software
d. Procedures
4. Which of the following is a low tech information system
a. A decision support system that analyzes …show more content…
multiple variables
b. A file of email addresses stored in an email program
c. An inventory tracking system that produces reports every 24 hours
d. A customer support system that keeps track of product issues
5. Good information must be _______
a. Widely available
b. Voluminous
c. Inexpensive
d. Relevant
6. The process of automation is a process of moving work from
a. Instructions to actors
b. Human side to computer side
c. Processes to procedures
d. Actors to instructions
7. ________ refers to making a reasoned analysis of an opportunity, envisioning potential solutions, evaluating these possibilities and developing the most promising ones, consistent with the resources one has
a. Collaboration
b. Systems thinking
c. Abstraction
d. Experimentation
8. Which of the following is a valid guideline for maintain good password etiquette?
a. Give your password to your coworkers if you anticipate that they may need it in your absence
b. Never ask someone else for their password
c. Share your password with IT staff in your organization
d. Write down your password in an accessible location
9. An operating system like windows or Linux is an example of the _____ component of an information system
a. Hardware
b. Procedure
c. Software
d. Data
10. Which of the following ratios has fallen as a result of Moore’s Law
a. Performance/output
b. Output./price
c. Price/performance
d. Performance/input
11. The ________ component in the five component model of information systems is considered a bridge that connects the computer side to the human side
a. Hardware
b. Procedures
c. Data
d. Software
12. Identify how information technology differs from information systems
a. People are an important component of information technology, but not of information system
b. Information systems form a subset of information technology.
c. Unlike information system, information technology is used for producing information
13. Which of the following is a common description of information
a. Knowledge derived from data
b. Collection of unprocessed data
c. Unbiased, non contextual data
d. List of records facts or figures
14. As an IT manager of your organization you need to use a coworkers account to access some information. In keeping with password etiquette, how would you go about getting his password
a. You explain the urgency of the situation and ask the coworker to send you the password through email
b. You submit a formal letter to your coworkers manager explaining the situation and request the password to be sent to you
c. You try out various combinations to see if you can guess the coworkers password
d. You ask the coworker to type in the password where required while you look away
15. Which of the following is a major implication of Moore’s Law?
a. Physical size of integrated chops has increased.
b. Cost of data communication and storage have become very low
c. Data processing activities have become complex and time consuming
d. Costs of computing and processing have increased
16. Which of the following is a nonroute cognitive skill.
a. Systems thinking ability
b. Tax accounting skill
c. Marketing knowledge
d. Computer programing skill
17. Which of the following components in the give comment model of information systems is considered an actor
a. Data
b. Hardware
c. Software
d. Procedure
18. Which of the following is true about the quality of information.
a. There is no such thing as bad information
b. Information needs to be relevant to the subject not to the context
c. The more information you receive the less you can afford to ignore
d. Information should be just barely sufficient for its purpose.
19. _______ is the activity of two or more people working together to achieve a common goal, result or work product.
a. Collaboration
b. Systems thinking
c. Abstract reasoning
d. Experimentation
20. _____ States that the bumper of transistors per square inch on an integrated chip doubles every 18 months
a. Nielsens law
b. Moores law
c. Newtons Law
d. Faradays Law
21. The storage disk in your computer is an example of the ____ component of information system
a. Software
b. Hardware
c. Database
d. Procedure
22. Which of the following is a critical characteristic of good information
a. Ease of creation
b. Low cost
c. Accuracy
d. Abundance of details
23. Which among the following is the most appropriate technique for creating memorable strong passwords
a. Use a collection of randomly picked letters, numbers and special characters
b. Use your favorite foreign words
c. Use dictionary words or phrases as passwords
d. Base your password of the first letters of the words in a phrase
24. Abstract reasoning is the ability to _____
a. Act quickly on a problem
b. Make manipulate models
c. Analyze and perform routine tasks
d. Work with others when performing tasks
25. Which of the following components of an information system is the easiest to change and causes the least amount of organizational disruption when changed.
a. Procedure
b. Hardware
c. Software
d. Developer
Chapter 5
1.
The purpose of an ____ is to keep track of things
a. Cloud
b. Application software
c. Storage folder
d. Database
2. The columns in a database are called_____.
a. Tables
b. Fields
c. Records
d. Files
3. The rows in a database are called
a. Fields
b. Files
c. Tables
d. Records
4. The tables that appear in a database are known as
a. Applications
b. Files
c. Records
d. Fields
5. A primary key is used in a database is a
a. Character or byte that represents fields or column
b. Group of tables or files formed to identify a unique field or row
c. Column or group of column that identifies a unique row in a table
d. Group of rows that are formed to identify a unique table or file
6. Columns that belong to a different table than the ones in which they reside are called _____
a. Foreign keys
b. Internal records
c. Primary keys
d. Attributes
7. Metadata are_____
a. Data stored on the main server
b. Error logs of databases
c. Encrypted transmissions
d. Data that describe data
8. An ______ is a program used to create, process and administer a database
a. DBMS
b. Operating system
c. Data Mart
d. KMS
9. Which of the following is an example of database management system?
a. MS Excel
b. Access
c.
Unix
d. Ubuntu
10. Which of the following is an international standard language for processing a database
a. SQL
b. DB2
c. Paradox
d. MS Access
11. A _____ is a collection of forms, reports, queries and programs that process a database
a. Database application
b. Data field
c. Database design
d. Data model
12. _____ Forms are used to read insert, modify and delete data
a. Request
b. Reporting
c. Data entry
d. Query
13. A ________ is a request for data from a database
a. Data entry
b. Quarry
c. Command
d. Report
14. A ______ DBMS is designed to process large organizational and workgroup database.
a. Process
b. Personal
c. Operational
d. Enterprise
15. An organization buys a proprietary database application to be used by a small workgroup of five people. This is an example of an ______ DBMS
a. Open source
b. Enterprise
c. Interenterprise
d. Personal
16. ______ is an example of a personal DBMS
a. Oracle database
b. DB2
c. Access
d. SQL server
17. A _____ describes the data and relationships that will be stored in a database
a. Data application
b. Data aggregator
c. Query model
d. Data model
18. In data model, an ______ is something that a user wants to track
a. Primary key
b. Byte
c. Record
d. Entity
19. Entities in a data model have____ that describes the characteristics of the entity
a. Attributes
b. Codes
c. Characters
d. Primary key
20. In the ER diagrams, a line between two entities represents an
a. Cardinality
b. Attribute
c. Relationship
d. Identifier
21. The forked lines on the right side of the line on an er diagram that indicates a 1:N relationship between two entities is referred to as ______
a. Maximum cardinality
b. Crows feet
c. Minimum cardinality
d. Kerberos
22. _______ is the process of converting a data model into tables relationships and data constraints
a. Database design
b. Database querying
c. Database aggregation
d. Data mining
23. ______ is the process of converting a poorly structured table into two or more well structured tables
a. Refactoring
b. Standardization
c. Normalization
d. Optimization
24. In a database when data items disagree with one another this leads to an
a. Adaption conflict
b. Lost update problem
c. Data integrity Problem
d. Crows foot paradigm
25. _____ Are the final judges as to what data the database should contain and how the records in that database should be related to one another
a. Administrators
b. Users
c. Designers
d. Developers
Chapter 3:
1. Which of the following factors determines the structure, features and functions of an information system used in a company
a. the competitive strategy
b. the value of its brands
c. the technology used by competitors
d. the size of the company
2. Porter's five forces model is used to assess ________
a. industry structure
b. internal competition
c. market share
d. lifecycles of products
3. According to Porter's five forces model, which of the following firms would be least affected by the threat of substitutes?
a. A firm that sells the only drug a disease
b. A convenience store that sells retail products
c. A used car dealership in New York
d. Corner latte shops in Atlanta
4. According to Porter's five forces model, which of the following would be most affected by the threat of substitutes?
a. Google adwords
b. Microsoft Windows OS
c. Southwest Airlines
d. Boeing jets
5. According to Porter's five forces model, in which of the following situations would the suppliers have the highest bargaining power?
a. A single vendor providing raw materials to many department stores
b. A fashion outlet catering to a niche market
c. A large retailer buying goods from many small suppliers
d. Banking liquidating during a fire sale
6. According to Porter's five forces model, in which of the following examples would rivalry be considered as a weak force affecting the market?
a. Packaged food manufactures
b. Book sellers
c. Used car dealers
d. Military services
7. A group of grain farmers in a surplus year will have reduced
a. Risk of rivalry
b. Bargaining power
c. Threat of substitutes
d. Threat of new entrants
8. The automobile industry is characterized by many manufactures and intense competition among them. The statement illustrates _______
a. Low threat of substitutions
b. High bargaining power of suppliers
c. Low bargaining power of customers
d. High levels of rivalry
9. An automobile company decides to improve the quality of all its products and bring more variety into its product line. The company has decided to adopt ________.
a. Industry wide cost leadership
b. Focused cost leadership
c. Industry wide differentiation
d. Focused differentiation
10. Focused differentiation occurs when ____
a. The customers are highly price sensitive
b. A better product is provided within an industry segment
c. There is limited competition in an industry
d. Products quality improves across an entire industry
11. The difference between the value that an activity generates and the cost of the activity is called the
a. Margin
b. Value addition
c. Revenue
d. Turnover
12. Porter defined value as the _______
a. Extent of after sale service provided to customers
b. Amount of money that a customer is will to pay for an offering
c. Actual money exchanged in return of a product / service
d. Perceived satisfaction on the customers and sellers after a transaction
13. Identify the activity in the value chain that involves receiving and handling of raw materials and other inputs to the product.
a. Inbound logistics
b. Operations
c. Procurement
d. Outbound logistics
14. The difference between the total value added and the total cost incurred is called the _____ of the value chain
a. Gross turnover
b. Gross revenue
c. Actual value
d. Total Margin
15. Which of the following value chain activities involves transforming raw materials into a finished product or service
a. Marketing
b. Operations
c. Maintenance
d. Inbound logistics
16. Which of the following value chain activities involves collecting, storing, and physically distributing the product to buyers?
a. Outbound logistics
b. Customer service
c. Inbound logistics
d. Operations
17. Which of the following value chain activities involves inducing buyers to purchase a product and providing a means for them to do so?
a. Inbound logistics
b. Outbound logistics
c. Sales and marketing
d. Operations
18. Which of the following value chain activities involves assisting users with handling of the products after sale, thus maintaining and enhancing the products' value?
a. Inbound logistics
b. Operations
c. Outbound logistics
d. Customer service
19. Which of the following is considered a support activity in the value chain of business
a. Customer service
b. Contact negation
c. Marketing
d. Operations
20. According to porters model of business activities, interactions across value activities are called
a. Models
b. Cross functionalities
c. Linkages
d. Support activities
21. ________ argues that firms should create new, more efficient business processes that integrate the activities of all departments involved in a value chain.
a. Internal supply chain design
b. Market differentiation model
c. Business process design
d. Product differentiation model
22. A(n) ________ is a network of activities that generate value by transforming inputs into outputs.
a. Information systems
b. Business process
c. Linkage process
d. Competitive Strategy
23. Cost of the business process is the sum of the cost of the inputs and the _______
a. Value of the outputs
b. Value of products
c. Cost of the outputs
d. Cost of the activates
24. A database is an example of a
a. Procedure
b. Linkage
c. Value chain
d. Repository
25. Which of the following principles of competitive advantage is related to process implementations
a. Differentiating products
b. Enhancing services
c. Locking in suppliers
d. Creating new products