Multiple Choice Questions:

December 16, 2017 | Author: Ophelia Higgins | Category: N/A
Share Embed Donate


Short Description

1 02 Multiple Choice Questions: 1. What is the difference between information technology (IT) and a management informati...

Description

0

Multiple Choice Questions: 1. What is the difference between information technology (IT) and a management information system (MIS)? A) B) C) D)

IT is a type of MIS MIS is a type of IT IT and MIS are the same IT is hardware and MIS is software

2. What is a manager’s primary use of a MIS? A) B) C) D)

to facilitate problem solving and decision making to facilitate quality control to monitor inventory to evaluate productivity

3. Which of the following identifies the input and output of a MIS? A) B) C) D)

input = information; output = decisions input = information; output = data input = data; output =decisions input = data; output = information

4. An automated teller machine (ATM) is an example of which type of MIS? A) B) C) D)

expert system operations information system transaction processing system decision support system

5. Which component of a computer system is responsible for executing software instructions? A) B) C) D)

input device operating system central processing unit primary storage

1

6. Which of the following networks is the most secure? A) B) C) D)

intranet extranet cloud wireless

7. Which software application would be best to use to perform and analyze calculations on production data? A) B) C) D)

accounting presentation database spreadsheet

8. What type of e-commerce occurs when WalMart buys merchandise from a supplier over the Internet? A) B) C) D)

B2C C2C C2B B2B

9. Which of the following threatens information security? A) B) C) D)

authentication encryption viruses cookies

10. Which of the following would best protect a business against unethical computer use? A) B) C) D)

information privacy policy computer use policy email policy internet use policy

2

11. Which of the following best defines a set of methods or techniques for acquiring, organizing, storing, manipulating, and transmitting information? A) B) C) D)

management information system (MIS) information technology data mining decision support system

12. Which of the following best describes the type of system that gathers, organizes, and summarizes data in a form that is valuable to managers? A) B) C) D)

transaction processing system expert system decision support system operations information system

13. Which of the following best describes a private, company wide network, closed to public access? A) B) C) D)

intranet extranet virtual private network cloud computing

14. Which of the following best describes a semiprivate network that uses Internet technology and allows more than one company to access the same information? A) B) C) D)

intranet extranet virtual private network cloud computing

15. Which of the following best describes a network in which a company’s data and applications are stored at offsite data centers that are accessed over the Internet? A) B) C) D)

intranet extranet virtual private network cloud computing

3

16. What is the difference between hardware and software? A) Hardware is the set of programs and procedures used to operate a computer, while software is the physical devices associated with computing. B) Hardware is the physical devices associated with computing, while software is the set of programs and procedures used to operate a computer. C) Hardware is a set of applications that control how technology tools work together, while software is a set of applications that tell a computer how to process information. D) Hardware is a set of applications that tell a computer how to process information, while software is a set of applications that control how technology tools work together.

17. Which of the following best describes the type of system software that provides additional functionality to the operating system for a specific purpose? A) B) C) D)

application software hardware utility software shareware

18. What is the difference between freeware and shareware? A) Freeware controls application software, while shareware provides additional information for application software to process. B) Shareware controls application software, while freeware provides additional information to application software to process. C) Freeware is software that is absolutely free for the taking, while shareware is copyrighted, but distributed free of charge. D) Freeware is copyrighted software that is distributed free of charge, while shareware is software that is absolutely free for the taking.

4

19. What are the four types of e-commerce transactions? A) business-to-business (B2B), business-to-consumer (B2C), manufacturer-tobusiness (M2B), and manufacturer to consumer (M2C) B) manufacturer-to-business (M2B), manufacturer-to-consumer (M2C), consumerto-business (C2B), and consumer-to-consumer (C2C) C) business-to-business (B2B), business-to-consumer (B2C), supplier-to-business (S2B), and supplier-to-consumer (S2C) D) business-to-business (B2B), business-to-consumer (B2C), consumer-to-business (C2B), and consumer-to-consumer (C2C)

20.Which of the following types of e-commerce transactions is expected to increase over the next several years due to customer’s desire for greater purchasing convenience and lower prices? A) B) C) D)

business-to-consumer (B2C) consumer-to-business (C2B) manufacturer-to-business (M2B) supplier-to-business (S2B)

21. Which of the following types of e-commerce transactions is ebay.com, Craigslist, and Amazon.com’s marketplace an example of? A) B) C) D)

business-to-business (B2B) consumer-to-consumer (C2C) manufacturer-to-consumer (M2C) supplier-to-consumer (S2C)

22. Which type of technology security relates to logins used to access a network? A) B) C) D)

encryption firewall authentication identity protection

5

23. Which of the following online security threats requests personal information be returned to the sender? A) B) C) D)

phishing worm trojan horse email scam

6

True/false Questions: 1. Information technology is the set of methods or techniques for acquiring, organizing, storing, manipulating, and transmitting information. A) True B) False

2. Management information systems (MIS) are specific forms of IT that managers utilize to generate the specific, detailed information they need to perform their roles effectively. A) True B) False

3. Data mining is processed data that is output for a MIS. A) True B) False

4. Transaction processing systems are used to obtain sales, inventory, accounting and other performance related information. A) True B) False

5. Decision support systems are systems that provide models that aid managers in making nonprogrammed or atypical decisions. A) True B) False

7

6. For information to be useful to managers it must possess four characteristics: usefulness, completeness, timeliness, and relevance. A) True B) False

7. A network is a system for data exchange and resource sharing by linking computers to a central database. A) True B) False

8. To be considered a network, there must be at least 3 or more computers linked. A) True B) False

9. A wide area network (WAN) is a group of computers in close proximity, such as an office building. A) True B) False

10. The Internet is the world’s largest network. A) True B) False

11. One of the slowest forms of high speed Internet is wireless (LMCS). A) True B) False

12. An intranet is a company-wide network, closed to public access, that uses Internet-type technology. A) True B) False

8

13. An extranet is a private data network that creates secure connections over regular Internet lines. A) True B) False

14. Extranets are less secure than intranets, but more secure than public accessed networks. A) True B) False

15. A cloud computing network stores a company’s data and applications at one or more offsite data centers that are accessed through the Internet. A) True B) False

16. Wireless and mobile are synonymous, in that it means technology can travel with the user who can use the technology to download software, email, and web pages. A) True B) False

17. VoIP is the Internet infrastructure that is used to route emails over the Internet. A) True B) False

18. RFID tags are electronic chips placed on goods to relay information, such as location, to electronic readers. A) True B) False

9

19. The primary storage or computer’s main memory interprets and executes software instructions. A) True B) False

20.Secondary storage is removable hardware used to store data for long-term storage or portability. A) True B) False

21. An output device is hardware used to see, hear, or accept the results of information processing requests. A) True B) False

22. An input device is hardware used to send information from one location and receive it at another. A) True B) False

23. System software is the set of instructions that tell a computer how to process information for a specific purpose. A) True B) False

24. Shareware is copyrighted software that is distributed free of charge to potential customers. A) True B) False

10

25. E-commerce is the buying and selling of goods over the Internet. A) True B) False

26. A social network is an Internet site that facilitates relationships among people and businesses. A) True B) False

27. Encryption analyzes information entering and leaving a network and prevents transmission of information without proper markings. A) True B) False

28. Cyberterrorism is an extreme form of hacking. A) True B) False

11

Short Answer questions: 1. What are the four classifications of MIS systems?

2. Explain the differences between an intranet and extranet.

3. Explain the differences between hardware and software.

4. Describe what input, output, and communication devices are, and give examples of each.

5. What are the four types of e-commerce transactions?

6. What are the steps to minimize the threat of a computer or network virus infection?

12

View more...

Comments

Copyright � 2017 SILO Inc.