Indicate whether the statement is true or false.
1. Channel bandwidth refers to the diameter of the telecommunications media.
2. Modems convert analog signals to digital signals for transmission over a network.
3. A personal area network is a wireless network that connects information networking devices within a small area, such as an office, home, or several floors of a building.
4. Application programs interact with systems software, and the systems software directs computer hardware to perform the necessary tasks.
5. Sequential access storage devices allow data to be accessed more quickly than direct access storage devices.
6. The technology infrastructure is a set of shared IS resources that form the foundation of each computer-based information system.
7. When organizing a database, key considerations include determining what data to collect, who will have access to it, how they might want to use it, and how to monitor database performance.
8. Disruptive change often results in new, successful companies and offers consumers the potential of new products and services at reduced costs and superior performance.
Multiple Choice: Identify the choice that best completes the statement or answers the question.
9. ________ is/are used to temporarily hold small units of program instructions and data immediately before, during, and after execution by the CPU.
a. Main memory
b. The ALU
c. Registers
d. The CPU
10. One advantage of proprietary software versus off-the-shelf software is that _____
a. the initial cost is lower
b. the software is likely to be of high quality because many customer firms have tested the software and helped identify its bugs
c. the software is likely to meet the basic business needs that are common across organizations
d. being involved in the development offers control over the results
11. _____ consists of computer programs that govern the operation of the computer.
a. Hardware
b. Applications
c. Software
d. Telecommunications
12. With _____ , the software engineer drags and drops graphical objects such as buttons and menus onto the application form.
a. assembly language
b. visual programming
c. machine code
d. fourth generation language
13. The _____ is a description that involves "telling" the DBMS the logical and physical structure of the data and the relationships among the data for each user.
a. entity relationship diagram
b. schema
c. data model
d. data manipulation language
14. A ________ is s field or set of fields in a record that uniquely defines the record.
a. attribute
b. primary key
c. key
d. data item
15. RAID storage devices provide organizations with data storage that is _____.
a. fault tolerant
b. extremely low cost
c. exceedingly fast
d. unlimited in storage capacity
16. _____ consists of computer equipment used to perform input, processing, and output activities.
a. Information technology
b. Telecommunications
c. Technology infrastructure
d. Hardware
17. The ________ is the heart of the operating system and controls its most critical processes.
a. user interface
b. kernel
c. utility programs
d. boot up disk
18. The goal of the _____ phase of systems development is to gain a clear understanding of the problem to be solved or opportunity to be addressed.
a. systems analysis
b. systems design
c. systems investigation
d. systems implementation
19. The smallest piece of data used by a computer is the _____.
a. entity
b. bit
c. byte
d. character
20. The ability of an organization to achieve its goals is often a function of the organization's _____
a. overall structure
b. ability to change
c. culture
d. all of the above
21. With the _____ basic processing alternative, processing devices are placed at various remote locations and each device is isolated and does not communicate with any other processing device.
a. distributed processing
b. centralized processing
c. file processing
d. decentralized processing
22. Total cost of ownership includes these costs
a. cost to acquire an item
b. end-user costs
c. technical support costs
d. all of the above
23. As long as the tables in a relational database share one common _____, the tables can be linked to provide useful information and reports.
a. primary key
b. characteristic
c. file
d. attribute
24. _____ are the most powerful computers with the fastest processing speed and highest performance.
a. Blade servers
b. Mainframe computers
c. Workstations
d. Supercomputers
25. ______ is a measure of the extent to which a system achieves its goals.
a. Efficiency
b. Performance rate
c. Reliability
d. Effectiveness
26. Data warehouses allow managers to _____ to get increasing levels of detail about business conditions.
a. roll up
b. slice and dice
c. drill down
d. extract data
27. With network management software, a network manager can _____
a. monitor the use of individual computers as well as shared hardware devices
b. ensure compliance with software licenses
c. scan for licenses
d. all of the above
28. _____ is a measure of how widely technology is spread throughout an organization.
a. Technology infusion
b. Technology diffusion
c. Technology acceptance
d. Technology adoption
29. _____ is a network that connects users and their computers in a geographical area that spans a campus or a city.
a. Metropolitan area network
c. Wide Area network
b. Local area network
d. Personal area network
30. Green computing is focused at the efficient and environmentally responsible _____ of IS related products.
a. design and manufacture
b. disposal
c. operation
d. all of the above
31. _____ investigates the additional profits or benefits that are generated as a percentage of the investment in IS technology.
a. Net present value
b. Earnings growth
c. Return on investment
d. Market share
32. With a VPN ______
a. users are often provided a token that displays a constantly changing password
b. users can gain wide area network access
c. users can gain access to an organization's private network
d. all of the above
33. A database is a collection of integrated and related _____.
a. fields
b. records
c. attributes
d. files
34. The area covered by one or more interconnected wireless access points is commonly called a(n) _____.
a. reception area
b. coverage zone
c. hot spot
d. access area
35. _____ is the use of a collection of computers, often owned by many people or different organizations, to work in a coordinated manner to solve a common problem.
a. cloud computing
b. parallel computing
c. grid computing
d. none of the above
36. The _____ is a device that combines data from multiple data sources into a single output signal that carries multiple channels.
a. transmission media
b. multiplexer
c. modem
d. switch
37. A(n) ______ enables users to share a certain number of outside lines to make telephone calls to people outside the organization.
a. DSL
b. modem
c. Wi-MAX
d. PBX
38. _____ is an important component of every information system that helps organizations to achieve their goals.
a. Hardware
b. Feedback mechanism
c. Software
d. Data
39. A type of memory whose contents are not lost if the power is turned off is said to be _____.
a. multicore
b. RAM
c. nonvolatile
d. none of the above
40. ______ is a collection of instructions and commands used to define and describe data and relationships in a specific database.
a. user view
b. data definition language
c. schema
d. data manipulation language
41. An operating system with _____ capabilities allows a user to run more than one application at the same time.
a. networking capability
b. memory management
c. hardware independence
d. multitasking
42. The idea of ________ is to constantly seek ways to improve business processes and add value to products and services.
a. reengineering
b. disruptive change
c. process redesign
d. continuous improvement
43. After a computer system is started, portions of the operating system are transferred to _____ as they are needed.
a. the CPU
b. the back-up rescue disk
c. memory
d. none of the above
44. If an industry has low entry and exit costs and the technology needed to start and maintain a business is commonly available, this creates ________.
a. a threat of new entrants
b. increased bargaining power of customers and suppliers
c. a threat of substitute products and services
d. all of the above
45. _____ is (are) considered to be the most important element in a computer-based information system.
a. Hardware
b. Procedures
c. Software
d. People
46. The use of middleware to connect disparate systems has evolved into an approach for developing software and systems called ______.
a. cloud computing
b. service oriented architecture
c. rapid application development
d. Software as a Service
47. The _____ are low-cost, centrally managed computers with no extra drives or expansion slots and limited capabilities.
a. netbook computer
b. thin client computer
c. laptop computer
d. desktop computer
48. The process of defining relationships among data to create useful information requires ______
a. an information system.
b. knowledge
c. intelligence
d. intuition
49. A risk involved with using an application service provider is that _____
a. sensitive information could be compromised
b. a disaster could disable the ASP's data center
c. the ASP could be incapable of keeping its servers and network up and running consistently
d. all of the above
50. Customer relationship management programs help companies manage _____
a. programs to retain loyal customers
b. marketing and advertising
c. finished product inventory
d. a. and c.