Business Information Systems Final Exam Questions - 1126 Verified Questions

Page 1


Business Information Systems

Final Exam Questions

Course Introduction

Business Information Systems explores the integration of information technology with business operations to improve organizational performance and decision-making. The course covers fundamental concepts of information systems, types of software and hardware used in businesses, databases, networking, and security. Students learn how information systems support business processes such as accounting, marketing, finance, and human resources, as well as how they enable strategic advantage and innovation. The course also examines challenges related to system implementation, management, and ethical considerations, preparing students to analyze and design effective information systems solutions in a business context.

Recommended Textbook Technology In Action Complete 12th Edition by

Available Study Resources on Quizplus

17 Chapters

1126 Verified Questions

1126 Flashcards

Source URL: https://quizplus.com/study-set/450

Page 2

Chapter 1: Using Technology to Change the World

Available Study Resources on Quizplus for this Chatper

73 Verified Questions

73 Flashcards

Source URL: https://quizplus.com/quiz/7981

Sample Questions

Q1) Cognitive surplus is the combination of leisure time and creativity tools.

A)True

B)False

Answer: True

Q2) The ________ is a collaboration of several museums that allows online visitors to explore over a thousand pieces of art through tools similar to Google Street View.

Answer: Art Project

Q3) Hardware refers to the programs that give instructions to the computer.

A)True

B)False Answer: False

Q4) Purpose is the simple understanding that you are working for something larger than yourself.

A)True

B)False Answer: True

Q5) ________ asks for small donations from a large number of people.

Answer: Crowdfunding Crowd-funding

To view all questions and flashcards with answers, click on the resource link above. Page 3

Chapter 2: Looking at Computers: Understanding the Parts

Available Study Resources on Quizplus for this Chatper

69 Verified Questions

69 Flashcards

Source URL: https://quizplus.com/quiz/7982

Sample Questions

Q1) An SD card is an example of a(n)________ card. Answer: flash memory memory secure digital

Q2) A(n)________ device is a component, such as a keyboard, that connects to the computer.

Answer: peripheral

Q3) The "brains" of the computer is the ________. Answer: CPU Central Processing Unit processor microprocessor

Q4) The most common type of monitor is a(n)________.

A) liquid crystal display (LCD)

B) light-emitting diode (LED)

C) organic light-emitting diode (OLED)

D) cathode ray tube (CRT)

Answer: A

To view all questions and flashcards with answers, click on the resource link above. Page 4

Chapter 3: Using the Internet: Making the Most of the Web's Resources

Available Study Resources on Quizplus for this Chatper

71 Verified Questions

71 Flashcards

Source URL: https://quizplus.com/quiz/7983

Sample Questions

Q1) To hear and view some multimedia files in a browser, you may need a special program called a(n)________.

Answer: plug-in player

Q2) Facebook and Twitter are popular examples of ________ networks.

Answer: social

Q3) The unique address for a particular website is the ________.

A) protocol

B) domain section

C) client

D) URL

Answer: D

Q4) Which of the following is NOT a social networking site?

A) Facebook

B) YouTube

C) LinkedIn

D) iTunes

Answer: D

Page 5

Q5) ________ is a popular collaborative online encyclopedia.

Answer: Wikipedia

To view all questions and flashcards with answers, click on the resource link above.

Chapter 4: Application Software: Programs That Let You

Work and Play

Available Study Resources on Quizplus for this Chatper

70 Verified Questions

70 Flashcards

Source URL: https://quizplus.com/quiz/7984

Sample Questions

Q1) The two main types of software are system software and ________ software.

Q2) ________ software is used to perform calculations and numerical analyses.

A) Presentation

B) Personal information manager

C) Database

D) Spreadsheet

Q3) ________ software helps run the computer and coordinates instructions between other software and the hardware devices.

A) Application

B) Recovery

C) Productivity

D) System

Q4) Software that manages "back office" functions such as billing, production, inventory management, and human resources management is called ________ software.

A) accounting

B) enterprise resource planning

C) project management

D) customer relationship management

Page 6

Q5) Microsoft Excel is a ________ software program.

To view all questions and flashcards with answers, click on the resource link above.

Chapter 6: Understanding and Assessing Hardware: Evaluating Your System

Available Study Resources on Quizplus for this Chatper

71 Verified Questions

71 Flashcards

Source URL: https://quizplus.com/quiz/7986

Sample Questions

Q1) There are ________ levels of cache memory.

A) five

B) eight

C) three

D) four

Q2) Some of the cache memory of a CPU is ________.

A) inside the CPU, itself

B) on the hard disk drive

C) on a nearby SSD

D) in cloud storage

Q3) RAID 0 automatically duplicates your data and saves it on two identical drives.

A)True

B)False

Q4) To speed up the display of graphics, a(n)________ is installed on some video cards.

A) GPU

B) CPU

C) ALU

D) SSD

Q5) ________ drives are 100 times faster than mechanical hard drives.

To view all questions and flashcards with answers, click on the resource link above. Page 7

Chapter 7: Networking: Connecting Computing Devices

Available Study Resources on Quizplus for this Chatper

70 Verified Questions

70 Flashcards

Source URL: https://quizplus.com/quiz/7987

Sample Questions

Q1) WPA stands for ________.

Q2) The most popular transmission media option for wired home Ethernet networks is ________ cable.

A) fiber-optic

B) power-line

C) unshielded twisted-pair (UTP)

D) coaxial

Q3) Public places where you can wirelessly connect to the Internet are known as ________.

Q4) ________ is often referred to as "high-speed Internet."

Q5) WEP stands for ________.

Q6) A P2P network needs network operating system software installed on every node.

A)True

B)False

Q7) WEP is a stronger form of security than WPA.

A)True

B)False

Q8) A(n)________ network is one where each computer can communicate directly with the others, rather than having a separate device exercise central control over the entire network.

To view all questions and flashcards with answers, click on the resource link above. Page 8

Chapter 8: Digital Devices and Media: Managing a Digital Lifestyle

Available Study Resources on Quizplus for this Chatper

70 Verified Questions

70 Flashcards

Source URL: https://quizplus.com/quiz/7988

Sample Questions

Q1) SMS technology sends both text and pictures.

A)True

B)False

Q2) ________ is a texting service that supports both text and multimedia content.

Q3) A main difference between the tablet and the smartphone is the ________.

A) operating system

B) touch-screen interface

C) screen size

D) Internet connectivity

Q4) Smartphones all use the Android operating system.

A)True

B)False

Q5) VoIP uses ________ technology similar to email to transmit voice over the internet.

A) digital

B) analog

C) binary

D) IP

To view all questions and flashcards with answers, click on the resource link above. Page 9

Q6) A specialized chip included in the cell phone that handles digital compression data is called the ________.

Chapter 9: Securing Your System: Protecting Your Digital

Data and Devices

Available Study Resources on Quizplus for this Chatper

70 Verified Questions

70 Flashcards

Source URL: https://quizplus.com/quiz/7989

Sample Questions

Q1) A(n)________ takes advantage of file transport methods to spread on its own.

A) worm

B) script virus

C) encryption virus

D) macro virus

Q2) A time bomb virus can be triggered on a certain date.

A)True

B)False

Q3) The terms virus and worm actually mean the same thing.

A)True

B)False

Q4) Currently, there are no antivirus programs for mobile devices.

A)True

B)False

Q5) Spyware programs that monitor keystrokes with the intent of stealing passwords, login IDs, or credit card information are referred to as ________.

Q6) Unwanted, unsolicited e-mail is referred to as ________.

Q7) A(n)________ can help block unwanted, unsolicited e-mail.

Q8) ________ is malware that tries to convince you that your computer is infected with a virus. Page 10

To view all questions and flashcards with answers, click on the resource link above. Page 11

Chapter 10: Behind the Scenes: Software Programming

Available Study Resources on Quizplus for this Chatper

70 Verified Questions

70 Flashcards

Source URL: https://quizplus.com/quiz/7990

Sample Questions

Q1) In the "Making a Plan" step of the PDLC, a(n)________ is written in natural, ordinary language describing exactly what the computer program is to do.

Q2) In object-oriented terms, a new, modified class is called the ________ class.

Q3) ________ is the instructions programmers have written in a higher-level language.

A) Executable code

B) Base code

C) Compiled code

D) Source code

Q4) The standard set of vocabulary for pseudocode is specific and detailed.

A)True

B)False

Q5) Bottom-up design is a systematic approach in which a problem is broken into a series of high-level tasks.

A)True

B)False

Q6) Second-generation languages are also known as assembly languages.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 12

Chapter 11: Behind the Scenes: Databases and Information Systems

Available Study Resources on Quizplus for this Chatper

70 Verified Questions

70 Flashcards

Source URL: https://quizplus.com/quiz/7991

Sample Questions

Q1) A last name field is an example of a field that should have a default value.

A)True

B)False

Q2) A(n)________ report provides a consolidated picture of detailed data and usually includes some calculation or visual displays of information.

Q3) A field ________ is a property that must be met before an entry can be accepted into the field.

Q4) Data mining analyzes and investigates large amounts of data with the intention of discovering significant patterns or trends.

A)True

B)False

Q5) A ________ check compares the values of data in two or more fields to see whether those values are reasonable.

A) correctness

B) range

C) consistency

D) numeric

Q6) A data dictionary is also referred to as a(n)________.

13

Q7) In a database, another term for a table is a(n)________.

To view all questions and flashcards with answers, click on the resource link above.

Chapter 12: Behind the Scenes: Networking and Security in the Business World

Available Study Resources on Quizplus for this Chatper

71 Verified Questions

71 Flashcards

Source URL: https://quizplus.com/quiz/7992

Sample Questions

Q1) ________ technology places data packets inside other data packets.

Q2) A(n)________ is used exclusively by a select group of employees, customers, suppliers, volunteers, or supporters.

Q3) A(n)________ server is a heavily secured server located between a company's secure internal network and its firewall.

A) transitional

B) armored

C) bastion host

D) proxy

Q4) In a ________ network, data collisions can occur fairly easily because the network is essentially composed of a single cable.

A) Star

B) Bus

C) Hierarchical

D) Cluster

Q5) NIC stands for ________.

Q6) A(n)________ is made up of two or more LANs that are miles apart.

To view all questions and flashcards with answers, click on the resource link above. Page 14

Q7) A(n)________ provides wireless devices with a sending and receiving connection point to the network.

Chapter 13: Behind the Scenes: How the Internet Works

Available Study Resources on Quizplus for this Chatper

69 Verified Questions

69 Flashcards

Source URL: https://quizplus.com/quiz/7993

Sample Questions

Q1) ________ is the process of encoding e-mail so that only the person with a corresponding key can decode and read the message.

Q2) When using ________-key encryption, only the message sender and recipient have the code.

Q3) A(n)________ address is a unique number that identifies a computer, server, or device connected to the Internet.

A) TCP

B) IP

C) SMTP

D) NetBIOS

Q4) ________ is a method of communication in which a dedicated connection is formed between two points and the connection remains active during the transmission.

Q5) An IP address in the form 197.169.100.1 is called a(n)________.

A) sequential access number

B) dotted quad

C) encryption key

D) random number

Q6) .com and .edu are examples of a(n)________.

To view all questions and flashcards with answers, click on the resource link above. Page 15

Chapter 14: The History of the Personal Computer

Available Study Resources on Quizplus for this Chatper

38 Verified Questions

38 Flashcards

Source URL: https://quizplus.com/quiz/7980

Sample Questions

Q1) Within a year of its introduction in 1981, the ________ dominated the personal computer market.

Q2) The Alto computer, built by ________, was the first to use a graphical user interface (GUI).

A) Apple

B) Microsoft

C) Xerox

D) IBM

Q3) One of the reasons the Apple II computer was popular was that ________.

A) it had a mouse input device

B) the operating system was stored in ROM

C) it had a hard drive

D) it was inexpensive

Q4) The Turing Machine was a computer that entered the commercial market.

A)True

B)False

Q5) Released in 1984, the Apple Macintosh was the first computer that used 3.5-inch floppy disks.

A)True

B)False

Page 16

To view all questions and flashcards with answers, click on the resource link above.

Chapter 5: System Software: The Operating System, Utility

Programs, and File Management

Available Study Resources on Quizplus for this Chatper

68 Verified Questions

68 Flashcards

Source URL: https://quizplus.com/quiz/7985

Sample Questions

Q1) Using hard disk space to temporarily store data or instructions from RAM is referred to as ________.

A) spooling

B) interrupting

C) compressing

D) virtual memory

Q2) The Windows utility program that removes unnecessary files from the hard drive is called ________.

Q3) C:\Windows\System32\drivers\etc\protocol is an example of a file ________.

A) extension

B) type

C) path

D) list

Q4) All of the following can be used in an OS X file name EXCEPT ________.

A) :

B) #

C) %

D) $

Q6) Most supercomputers use the ________ operating system. Page 17

Q5) If your computer is thrashing, increase ________ to solve the problem.

To view all questions and flashcards with answers, click on the resource link above.

Page 18

Chapter 15: Information Technology Ethics

Available Study Resources on Quizplus for this Chatper

34 Verified Questions

34 Flashcards

Source URL: https://quizplus.com/quiz/7979

Sample Questions

Q1) ________ behavior is behavior where a person has no sense of right and wrong and has no interest in the moral consequences of their actions.

Q2) Utilitarianism focuses on adherence to moral duties and rights.

A)True

B)False

Q3) Which of the following countries has a software piracy rate over 70%?

A) United States

B) China

C) Yemen

D) Sweden

Q4) Most states have enacted antibullying laws.

A)True

B)False

Q5) Relativism holds that moral principles are dictated by cultural tastes and customs.

A)True

B)False

Q6) Enacted in 2002, the ________ Act requires companies to provide an anonymous method for employees and third parties to report complaints, including ethics violations.

To view all questions and flashcards with answers, click on the resource link above. Page 19

Chapter 16: Under the Hood

Available Study Resources on Quizplus for this Chatper

35 Verified Questions

35 Flashcards

Source URL: https://quizplus.com/quiz/7978

Sample Questions

Q1) ________ is the final step of the CPU machine cycle.

Q2) The collection of commands that a CPU executes is called the instruction set.

A)True

B)False

Q3) Mainstreaming boosts CPU performance by enabling the CPU to work on more than one processing stage at a time.

A)True

B)False

Q4) The hexadecimal number C represents the decimal number ________.

A) 16

B) 13

C) 12

D) 10

Q5) ________ is the semiconductor material used to make transistors.

A) Silicon

B) Titanium oxide

C) Carbon

D) Strontium nitrate

Q6) Mathematical operations and comparisons are performed in the ________.

Q7) The Intel i7 Extreme Edition is a CPU that uses ________ processing.

To view all questions and flashcards with answers, click on the resource link above. Page 20

Chapter 17: Careers in IT

Available Study Resources on Quizplus for this Chatper

36 Verified Questions

36 Flashcards

Source URL: https://quizplus.com/quiz/7977

Sample Questions

Q1) When a business hires a third-party firm to provide services it once offered itself, it is called ________.

A) offshoring

B) project outing

C) telecommuting

D) outsourcing

Q2) Women in Technology International (WITI)is a global trade association for professional women knowledgeable in technology.

A)True

B)False

Q3) People skills are a valuable asset in any IT field.

A)True

B)False

Q4) Which information technology job has the highest growth rate?

A) Computer systems analysts

B) Computer support specialists

C) Computer programmers

D) Database administrators

Q5) The percentage of this demographic group in the IT workforce is only 25%:

Q6) Network administrators are sometimes called network ________.

To view all questions and flashcards with answers, click on the resource link above. Page 21

Turn static files into dynamic content formats.

Create a flipbook
Business Information Systems Final Exam Questions - 1126 Verified Questions by Quizplus - Issuu