Principles of Business Information Systems 4TH EDITION
All for this textbook (10)
Written for
University of South Africa (Unisa)
INF1505 - Introduction To Business Information Systems (INF1505)
All documents for this subject (60)
Seller
Follow
lisaolgameyer
Content preview
revision questions for exams
Multiple Choice
Identify the choice that best completes the statement or answers the question.
1. ____ media operate on line-of-sight.
a. Coaxial c. Terrestrial microwave
b. Multipoint d. Fiber optic
2. Typically, ____ are used only in large enterprises because of their cost and installation complexity.
a. SANs c. CD-ROMs
b. NASs d. hard disks
3. ____ refers to the accuracy of information resources within an organization.
a. Availability c. Confidentiality
b. Integrity d. Security
4. ____ technology uses special hardware and software to give users the feeling of being part of an environment.
a. Immersion c. Interaction
b. Simulation d. Telepresence
5. ____ data is information in its original form.
a. Summary c. Raw
b. Open d. Transformed
6. A typical PDA includes a(n) ____.
a. external monitor c. external keyboard
b. mouse d. calendar
7. A ____ is an inexperienced, usually young hacker.
a. black hat c. white hat
b. wizard d. script kiddie
8. In the ____ phase, analysts define the problem and generate alternates for solving it.
a. requirements gathering and analysis c. design
b. implementation d. planning
9. Using the ____ model transfers the old retail model to the e-commerce world by using the medium of the
Internet.
a. mixed c. brokerage
b. advertising d. merchant
10. The decision maker defines associations between alternatives and criteria during the ____ phase of the
decision-making process.
a. intelligence c. design
b. implementation d. choice
11. The ____ component of a DSS coordinates the other components.
a. user interface c. DSS engine
b. model base d. database
12. The cost of industrial robots can range from ____ and more.
a. $10,000 to $30,000 c. $100,000 to $250,000
b. $50,000 to $100,000 d. $500,000 to $1,000,000
13. The term RAID stands for ____.
a. redundant access for independent devices
b. random access for independent disks
c. redundant array of independent disks
d. random array of independent drives
,14. The ____ topology is costly and difficult to maintain.
a. bus c. star
b. ring d. mesh
15. ____ components of a VR system enable users to see and hear the virtual world.
a. Manual navigation control
b. Visual and aural
c. Walker
d. Central coordinating processor and software system
16. Intelligent agents are also called ____.
a. moles c. bots
b. rootkits d. rats
17. ____ is a social networking Web site.
a. Sony Music Group c. Facebook
b. XML d. Droid
18. In the URL, http://www.csub.edu/~hbidgoli/books.html, ____ represents the name of a directory in which files
are stored.
a. books.html c. www.csub.edu
b. http d. ~hbidgoli
19. Which term refers to the rate computed by dividing the number of clicks an ad gets by the total impressions
bought?
a. cost per click rate(CPC) c. click-through rate (CTR)
b. cost per thousand (CPM) d. cost per impression rate (CPI)
20. TVs that adjust screen color and texture for each frame and stabilize the volume based on the viewer’s location
in the room are demonstrating ____.
a. personal agent qualities c. fuzzy logic
b. surveillance d. artificial neural capabilities
21. ____ uses computer-generated, three-dimensional images to create the illusion of interaction in a real-world
environment.
a. Wi-Fi c. Nanotechnology
b. VR technology d. WiMAX
22. ____ refers to giving objects in a VR environment texture and shading for a 3-D appearance.
a. Telepresence c. Simulation
b. Interaction d. Immersion
23. ____ is a Web-based personal financial management service that is an example of SaaS.
a. Mint.com c. Basecamp
b. Salesforce.com d. Google Talk
24. A ____ is the size of a character.
a. nibble c. word
b. byte d. bit
25. Extensive training is one solution to the problem of ____ feasibility.
a. economic c. technical
b. schedule d. operational
26. Cloud computing includes components in the form of ____ as a service (IaaS).
a. Internet c. infrastructure
b. investment d. information
27. ____ are usually formed for people to exchange opinions and ideas on a specific topic, usually of a technical or
scholarly nature.
a. Discussion groups c. IRC
, b. News groups d. E-mail groups
28. How data is stored on and retrieved from a hard disk is the ____ view.
a. physical c. logical
b. hard copy d. storage
29. E-commerce fulfills the product information activity using ____.
a. phone calls c. Web sites
b. e-mail d. faxes
30. The most common way to index and link databases is using ____.
a. names c. addresses
b. Social Security numbers d. driver’s license numbers
31. In the ____, Matsushita in Japan built a virtual kitchen that enabled customers to change fixtures and
appliances and alter the design on a computer and then virtually walk around the kitchen space.
a. 1970s c. 1990s
b. 1980s d. 2000s
32. ____ analysis is available in spreadsheet programs such as Microsoft Excel.
a. What-is c. What-if
b. Lookup d. Cause-and-effect
33. One advantage of grid computing is ____, meaning that if one node on the grid fails, another node can take
over.
a. parallel processing c. scalability
b. improved reliability d. sharing
34. Integrating ____ into the SDLC process is a good idea to ensure the system’s success.
a. feasibility checkpoints c. operating costs
b. RAD d. intangible benefits
35. A(n) RSS feed makes use of ____ to distribute Web content.
a. HTML c. Twitter
b. XML d. podcasting
36. Nanotechnology incorporates techniques that involve the structure and composition of materials on a ____.
a. nanoframe c. nanobyte
b. nanometer d. nanoscale
37. Level 1 security involves ____.
a. front-end servers c. corporate networks
b. physical security d. back-end systems
38. An attack by a ____ hacker might not be an actual threat to an organization’s security system.
a. black hat c. white hat
b. wizard d. script kiddie
39. The problem of missing deadlines is common in the information systems field, but designers can often
minimize this problem by using ____ tools.
a. dataflow c. project management
b. CASE d. flowchart
40. Record keeping, payroll, and simple inventory problems are examples of ____ tasks.
a. unstructured c. structured
b. automated d. semistructured
41. What is the first step in client/server communication?
a. The server receives the query.
b. The results are formatted and displayed.
c. The user creates a query.
d. The client accepts a request.
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller lisaolgameyer. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $2.77. You're not tied to anything after your purchase.