Zeer complete samenvatting van business Information systems, geschreven door een IT-er!
Samenvatting Information Systems (NL)
Information Technology Summary Ch. 1, 2, 4-8, 11-13
Alles voor dit studieboek
(3)
Geschreven voor
University of South Africa (Unisa)
INF1505 - Introduction To Business Information Systems (INF1505)
Alle documenten voor dit vak (60)
Verkoper
Volgen
lisaolgameyer
Voorbeeld van de inhoud
revision questions for exams
Multiple Choice
Identify the choice that best completes the statement or answers the question.
1. ____ media operate on line-of-sight.
a. Coaxial c. Terrestrial microwave
b. Multipoint d. Fiber optic
2. Typically, ____ are used only in large enterprises because of their cost and installation complexity.
a. SANs c. CD-ROMs
b. NASs d. hard disks
3. ____ refers to the accuracy of information resources within an organization.
a. Availability c. Confidentiality
b. Integrity d. Security
4. ____ technology uses special hardware and software to give users the feeling of being part of an environment.
a. Immersion c. Interaction
b. Simulation d. Telepresence
5. ____ data is information in its original form.
a. Summary c. Raw
b. Open d. Transformed
6. A typical PDA includes a(n) ____.
a. external monitor c. external keyboard
b. mouse d. calendar
7. A ____ is an inexperienced, usually young hacker.
a. black hat c. white hat
b. wizard d. script kiddie
8. In the ____ phase, analysts define the problem and generate alternates for solving it.
a. requirements gathering and analysis c. design
b. implementation d. planning
9. Using the ____ model transfers the old retail model to the e-commerce world by using the medium of the
Internet.
a. mixed c. brokerage
b. advertising d. merchant
10. The decision maker defines associations between alternatives and criteria during the ____ phase of the
decision-making process.
a. intelligence c. design
b. implementation d. choice
11. The ____ component of a DSS coordinates the other components.
a. user interface c. DSS engine
b. model base d. database
12. The cost of industrial robots can range from ____ and more.
a. $10,000 to $30,000 c. $100,000 to $250,000
b. $50,000 to $100,000 d. $500,000 to $1,000,000
13. The term RAID stands for ____.
a. redundant access for independent devices
b. random access for independent disks
c. redundant array of independent disks
d. random array of independent drives
,14. The ____ topology is costly and difficult to maintain.
a. bus c. star
b. ring d. mesh
15. ____ components of a VR system enable users to see and hear the virtual world.
a. Manual navigation control
b. Visual and aural
c. Walker
d. Central coordinating processor and software system
16. Intelligent agents are also called ____.
a. moles c. bots
b. rootkits d. rats
17. ____ is a social networking Web site.
a. Sony Music Group c. Facebook
b. XML d. Droid
18. In the URL, http://www.csub.edu/~hbidgoli/books.html, ____ represents the name of a directory in which files
are stored.
a. books.html c. www.csub.edu
b. http d. ~hbidgoli
19. Which term refers to the rate computed by dividing the number of clicks an ad gets by the total impressions
bought?
a. cost per click rate(CPC) c. click-through rate (CTR)
b. cost per thousand (CPM) d. cost per impression rate (CPI)
20. TVs that adjust screen color and texture for each frame and stabilize the volume based on the viewer’s location
in the room are demonstrating ____.
a. personal agent qualities c. fuzzy logic
b. surveillance d. artificial neural capabilities
21. ____ uses computer-generated, three-dimensional images to create the illusion of interaction in a real-world
environment.
a. Wi-Fi c. Nanotechnology
b. VR technology d. WiMAX
22. ____ refers to giving objects in a VR environment texture and shading for a 3-D appearance.
a. Telepresence c. Simulation
b. Interaction d. Immersion
23. ____ is a Web-based personal financial management service that is an example of SaaS.
a. Mint.com c. Basecamp
b. Salesforce.com d. Google Talk
24. A ____ is the size of a character.
a. nibble c. word
b. byte d. bit
25. Extensive training is one solution to the problem of ____ feasibility.
a. economic c. technical
b. schedule d. operational
26. Cloud computing includes components in the form of ____ as a service (IaaS).
a. Internet c. infrastructure
b. investment d. information
27. ____ are usually formed for people to exchange opinions and ideas on a specific topic, usually of a technical or
scholarly nature.
a. Discussion groups c. IRC
, b. News groups d. E-mail groups
28. How data is stored on and retrieved from a hard disk is the ____ view.
a. physical c. logical
b. hard copy d. storage
29. E-commerce fulfills the product information activity using ____.
a. phone calls c. Web sites
b. e-mail d. faxes
30. The most common way to index and link databases is using ____.
a. names c. addresses
b. Social Security numbers d. driver’s license numbers
31. In the ____, Matsushita in Japan built a virtual kitchen that enabled customers to change fixtures and
appliances and alter the design on a computer and then virtually walk around the kitchen space.
a. 1970s c. 1990s
b. 1980s d. 2000s
32. ____ analysis is available in spreadsheet programs such as Microsoft Excel.
a. What-is c. What-if
b. Lookup d. Cause-and-effect
33. One advantage of grid computing is ____, meaning that if one node on the grid fails, another node can take
over.
a. parallel processing c. scalability
b. improved reliability d. sharing
34. Integrating ____ into the SDLC process is a good idea to ensure the system’s success.
a. feasibility checkpoints c. operating costs
b. RAD d. intangible benefits
35. A(n) RSS feed makes use of ____ to distribute Web content.
a. HTML c. Twitter
b. XML d. podcasting
36. Nanotechnology incorporates techniques that involve the structure and composition of materials on a ____.
a. nanoframe c. nanobyte
b. nanometer d. nanoscale
37. Level 1 security involves ____.
a. front-end servers c. corporate networks
b. physical security d. back-end systems
38. An attack by a ____ hacker might not be an actual threat to an organization’s security system.
a. black hat c. white hat
b. wizard d. script kiddie
39. The problem of missing deadlines is common in the information systems field, but designers can often
minimize this problem by using ____ tools.
a. dataflow c. project management
b. CASE d. flowchart
40. Record keeping, payroll, and simple inventory problems are examples of ____ tasks.
a. unstructured c. structured
b. automated d. semistructured
41. What is the first step in client/server communication?
a. The server receives the query.
b. The results are formatted and displayed.
c. The user creates a query.
d. The client accepts a request.
Voordelen van het kopen van samenvattingen bij Stuvia op een rij:
Verzekerd van kwaliteit door reviews
Stuvia-klanten hebben meer dan 700.000 samenvattingen beoordeeld. Zo weet je zeker dat je de beste documenten koopt!
Snel en makkelijk kopen
Je betaalt supersnel en eenmalig met iDeal, creditcard of Stuvia-tegoed voor de samenvatting. Zonder lidmaatschap.
Focus op de essentie
Samenvattingen worden geschreven voor en door anderen. Daarom zijn de samenvattingen altijd betrouwbaar en actueel. Zo kom je snel tot de kern!
Veelgestelde vragen
Wat krijg ik als ik dit document koop?
Je krijgt een PDF, die direct beschikbaar is na je aankoop. Het gekochte document is altijd, overal en oneindig toegankelijk via je profiel.
Tevredenheidsgarantie: hoe werkt dat?
Onze tevredenheidsgarantie zorgt ervoor dat je altijd een studiedocument vindt dat goed bij je past. Je vult een formulier in en onze klantenservice regelt de rest.
Van wie koop ik deze samenvatting?
Stuvia is een marktplaats, je koop dit document dus niet van ons, maar van verkoper lisaolgameyer. Stuvia faciliteert de betaling aan de verkoper.
Zit ik meteen vast aan een abonnement?
Nee, je koopt alleen deze samenvatting voor €2,66. Je zit daarna nergens aan vast.