1. The observation that "The number of transistors per square inch on an integrated chip doubles every 18 months." is known as ________ Law.
A. Murphy's
B. Metcalfe's
C. Moore's
D. Amdahl's
2. Because the cost of data storage and data communications is essentially zero, any routine skill will be ________.
A.performed in-house by skilled professionals
B.outsourced to the lowest bidder
C.performed in-house by semi-skilled professionals
D.outsourced to a vendor who is geographically closer
3.In today's world, skills such as tax accounting and computer programming no longer guarantee job security. What is the reason for this?
A. They are nonroutine skills which are no longer required in these technologically advanced times.
B. They are routine skills which can and will be outsourced to the lowest bidder.
C. They are nonroutine skills which can be performed by only certain groups of employees.
D. They are routine skills which are not needed in most modern organizations.
4. ________ is the ability to make and manipulate models of reality
A. Systems thinking
B. Abstract reasoning
C. Social learning
D. Experimentation
5. A group of components that interact to achieve a purpose is referred to as a(n) ________.
A. Element B. System C. Entity D. Process
6.Which of the following is a valid reason for a company to create a new information system?
A.Most companies in the industry use information systems.
B.The company needs to project a modern image.
C.The new information system will increase employee productivity.
D.The company does not want to fall behind the technology curve.
7. Which of the following is the most crucial requirement for the success of a security system?
A.Firewalls should be installed and updated regularly.
B.Users should take security seriously.
C.Anti-virus software should be installed.
D.Administrative authority should be distributed among team members.
8.The five-component framework of an IS consists of computer hardware, software, data, people & ________.
A. Tools
B. Bugs
C. Procedures
D. Device drivers
9. Effective collaboration is all about being nice to your team members.
A. True
B. False
10. Modeling a unit's components and showing how components' inputs and outputs relate to one another is an example of systems thinking.
A. True
B. False
11. Which of the following would make the best primary key?
A. Student Number
B. Date of Birth
C. All are equally good primary keys
D. Major
12. Microsoft Access is what kind of database?
A. Relational
B. Network
C. Hierarchical
D. None of the above
13. What kind of key is used to link tables together?
A. Foreign key
B. Access key
C. Composite key
D. Primary key
14. What is a person, place or thing about which you wish to keep data?
A.Entity
B.Noun
C.Attribute
D.Relationship
15. A(n)________ is a network of activities, roles, resources, repositories, and data flows that interact to accomplish a business function.
A.Task force
B.Workgroup
C.Grid
D.Business process
16.________ are collections of related tasks that receive inputs and process those inputs to produce outputs.
A.Resources
B.Repositories
C.Activities
D.Databases
17. ________ are sets of procedures.
A.Resources
B.Activities
C.Roles
D.Data flows
18.A decision is a ________.
A.Collection of business records
B.Question that can be answered yes or no.
C.Set of procedures
D.Movement of a data item from one activity to another
19. Which of the following components provide branching points within the flow of a business process?
A. Decisions
B. Repositories
C. Activities
D. Roles
20. ________ are people, facilities, or computer programs that are assigned to roles
A. Repositories
B. Activities
C. Resources
D. Networks
21. A(n) ________ is a collection of business records.
A. Repository
B. Role
C. Resource
D. Activity
22. What is the defining characteristic of the outermost components (hardware and people) of the IS framework?
A.They are sunk costs.
B.They are both sets of instructions.
C.They take actions.
D.They are the costliest components in the framework.
23. John Reed's height is 1.9 meters. This fact is an example of ________ .
A. Substance
B. Information
C. Data
D. Content
24. Which of the following refers to information that is based on correct and complete data, and has been processed correctly as expected?
A. Relevant information
B. Measurable information
C. Accurate information
D. Timely information
25. The competitive strategy followed by an organization is derived from its ________.
A. function
B. structure
C. profits
D. goals
26. The competitive strategy of an organization determines its ________.
A. industry rivals
B. short-term goals
C. value chains
D. structure
27.In which of the following situations would the suppliers have the strongest bargaining power?
A. coffee planters during a season of frost that decreases production
B. companies negotiating compensation during a booming economy
C. providers of logistic support during an economic slowdown
D. a wholesaler declaring a stock-clearance sale
28. Simpson's Lawn Services decides to offer two free mowing services for all customers who booked garden landscaping in the fall. By doing this, which of the following forces is Simpson's addressing?
A. the control exercised by Acme Corp. who supplies Simpson with lawn mowers
B. the power held by the landlord of the Simpson office space
C. the threat posed by Roger's Landscapes, a new competitor
D. the bargaining power of the City Football Club who are their customers
29. Porter's model includes the bargaining power of which of the following groups as one of the five factors?
A. investors
B. competitors
C. employees
D. customers
30 In Porter's five factor model, each of the three competitive forces concerns the danger of ________.
A. suppliers favoring rival companies
B. customers taking their business elsewhere
C. investors refusing to back up new projects
D. employees not working towards organizational goals
31. Two strength factors that relate to all three competitive forces are ________ and customer loyalty.
A. market forces
B. nature of products
C. customer satisfaction
D. switching costs
32. If customers perceive the benefits of a substitute to be similar to that of a product then ________.
A. the threat of the substitute is weak
B. the price should be increased to retain market
C. the threat from the substitute is strong
D. there is no threat from the substitute
33. Which of the following is an example of a competitive strategy employed by a firm?
A. increasing the price of its product when raw material prices increase
B. laying off staff in order to cut down costs during a recession period
C. advertising its products nationwide like its competitor organizations
D. launching a unique product targeted at a section of consumers
34. Free question break - answer A.
A. CORRECT
B. WRONG
C. WRONG
D. Two WRONGS don't make a RIGHT. ANSWER A
35.How many bits are in an ASCII byte?
A. 1
B. 2
C. 4
D. 8
36. Direct access is to _______________as sequential access is to _________________.
A. Hard Drive/USB Drive
B. USB Drive/DVD Drive
C. Hard Drive/Magnetic Tape
D. None of the above.
37.The Internet and the World Wide Web are interchangeable terms.
A. True
B. False
38.What class of software manages and controls the resources of a computer system?
A. Application
B. Operating System
C. Productivity
D. Database
39. Which of the following types of computer displays uses less power?
A. CRT
B. LCD
C. Plasma
D. None of the above they¿re all pigs.
40. The primary pair of protocols used by the Internet for all data transmission are:
A. TCP/IP
B. XML/HTML
C. XML/WiFi
D. SMTP/HTTP
41. RAM memory is described as volatile because __________.
A. it can be read and used but it cannot be altered
B. data and programs can be transferred into and out of RAM
C. the programs and data stored in RAM are erased when the power to the computer is turned off.
D. it retains its contents even when the power is turned off
42. Which of the following operating systems is most commonly used?
A. Linux
B. Windows
C. Unix
D. Mac OS
43. Which of the following is true of a client?
A. They usually have multiple CPUs.
B. They have software that enables them to connect to a network.
C. They have limited video displays or no display at all.
D. They can process emails or large shared databases.
44. Free question break - answer A.
A. CORRECT
B. WRONG
C. WRONG
D. Two WRONGS don¿t make a RIGHT¿ANSWER A.
45. The process of creating and maintaining information systems is called:
A. systems development
B. computer programming
C. systems definition
D. computer design
46. As opposed to program development, system development is:
A. more specialized
B. more comprehensive
C. less integrated
D. less comprehensive
47. Information systems are never off-the-shelf because they involve:
A. programs
B. data
C. people
D. all of the above
48. System development is a process for creating and ________ information systems.
A. programming
B. upgrading
C. modifying
D. maintaining
49. ________ are a major challenge for developing information systems.
A. Difficulties of determining requirements
B. Changes in requirements
C. Scheduling difficulties
D. All of the above
50. According to Brook's Law, adding more people to a late system development project will:
A. delay the project's completion
B. decrease the overall cost
C. decrease the time needed to finish
D. add no additional coordination requirements
51. Which of the following is NOT a dimension of feasibility?
A. Cost
B. Schedule
C. Time
D. Technical
52.________ refers to whether existing information technology is likely to be able to meet the needs of the new system.
A. Schedule
B. Organizational
C. Technical
D. Cost
53. In a ________ installation, the new system runs alongside the old one until it has been tested and is fully operational.
A. pilot
B. phased
C. plunge
D. parallel
54. Which of the following is the main activity of the maintenance phase of the SDLC?
A. Fix problems
B. Program interfaces
C. Add new components
D. Train users