

Business Information Systems
Test Bank
Course Introduction
Business Information Systems explores the role of technology in supporting and transforming organizational operations, management, and decision-making. This course covers the fundamentals of information systems, including hardware, software, databases, networking, and cybersecurity, while emphasizing their strategic application in business environments. Students will learn how businesses leverage information systems for competitive advantage, process improvement, and informed decision-making. Real-world case studies demonstrate how modern enterprises use data analytics, enterprise systems, and e-commerce platforms to solve problems and drive innovation. The course also examines ethical, legal, and global issues in information systems management.
Recommended Textbook
New Perspectives Computer Concepts Enhanced Comprehensive 2016 19th Edition by
Available Study Resources on Quizplus 12 Chapters
1290 Verified Questions
1290 Flashcards
Source URL: https://quizplus.com/study-set/1231

Page 2
June Jamrich

Chapter 1: Digital Content
Available Study Resources on Quizplus for this Chatper
100 Verified Questions
100 Flashcards
Source URL: https://quizplus.com/quiz/24289
Sample Questions
Q1) Sampling _______ refers to the number of times per second that a sound is measured during the recording process.
A) rate
B) compression
C) depth
D) sound
Answer: A
Q2) Today's widescreen devices, such as laptops and smartphones, are designed for the 16:9 __________.
A) resolution
B) aspect ratio
C) frame rate
D) all of the above
Answer: B
Q3) Compressed files usually have ______ at the end of the file name.
A) .exe
B) .zip
C) .txt
D) none of the above
Answer: B
To view all questions and flashcards with answers, click on the resource link above. Page 3

Chapter 2: Digital Devices
Available Study Resources on Quizplus for this Chatper
119 Verified Questions
119 Flashcards
Source URL: https://quizplus.com/quiz/24290
Sample Questions
Q1) The operating systems for smartphones are radically different to those used for tablet computers.
A)True
B)False
Answer: False
Q2) Modern processors follow Intel's original numbering sequence.
A)True
B)False
Answer: False
Q3) The term 'stored program' means that a series of instructions for a computing task can be loaded into a computer's memory.
A)True
B)False
Answer: True
Q4) An example of system software is a computer operating system.
A)True
B)False
Answer: True
Q5) A common wireless technology for connecting peripherals is ___________. Answer: Bluetooth
Page 4
To view all questions and flashcards with answers, click on the resource link above.

Chapter 3: Networks
Available Study Resources on Quizplus for this Chatper
100 Verified Questions
100 Flashcards
Source URL: https://quizplus.com/quiz/24291
Sample Questions
Q1) ________ is a wired network technology that is defined by IEEE 802.3 standards. Answer: Ethernet
Q2) LANs use many of the same network technologies as the Internet.
A)True
B)False
Answer: True
Q3) A ______ address is used to uniquely identify devices on LANs.
Answer: MAC, media access control
Q4) A ________ networks allow visitors to access the Internet through a LAN, but doesn't allow them to access other resources and data on the network.
Answer: guest
Q5) Network _________ enables your computer to see other devices on a network, and whether your computer can be seen by others.
Answer: discovery
Q6) Packet loss of less than 2% is required for acceptable streaming, gaming, Skype, and voice calls.
A)True
B)False
Answer: True
To view all questions and flashcards with answers, click on the resource link above. Page 5

Chapter 4: The Web
Available Study Resources on Quizplus for this Chatper
100 Verified Questions
100 Flashcards
Source URL: https://quizplus.com/quiz/24292
Sample Questions
Q1) HTML is the only markup language used on the Web.
A)True
B)False
Q2) In a browser, __________ link to pages that you use frequently.
A) bookmarks
B) favorites
C) both A and B
D) None of the above
Q3) A search engine's_________ processor looks for your search terms in the search engine's indexed database and returns a list of relevant Web sites.
Q4) A(n) ___________ is a program designed to help people locate information on the Web by formulating simple queries.
A) autocomplete
B) search engine
C) Web crawler
D) indexer
Q5) If you wanted to add a feature to your browser, such as an ad-blocker, you would need to install a browser __________.
Q6) _____ is the current HTML specifications.
Page 6
To view all questions and flashcards with answers, click on the resource link above.

Chapter 5: Social Media
Available Study Resources on Quizplus for this Chatper
101 Verified Questions
101 Flashcards
Source URL: https://quizplus.com/quiz/24293
Sample Questions
Q1) On mobile devices, VoIP uses the voice stream, not the data stream.
A)True
B)False
Q2) Blogs and their interconnections are referred to as the ____________.
Q3) __________ are online services that facilitate communication and interaction among people who want to share information.
A) Email
B) Social media
C) Crowdsourcing
D) Geolocation
Q4) A(n) __________ work modifies a copyrighted work but does not substantially change its content or purpose.
Q5) What would you use to set up a feed that monitors your favorite blogs, collects the latest posts, and displays them?
A) RSS reader
B) Blog aggregator
C) Neither of the above
D) Both A and B
Q6) Twitter messages, called _________, carry a limit of 140 characters.
To view all questions and flashcards with answers, click on the resource link above. Page 7

Chapter 6: Software
Available Study Resources on Quizplus for this Chatper
114 Verified Questions
114 Flashcards
Source URL: https://quizplus.com/quiz/24294
Sample Questions
Q1) Chrome OS is an example of a _________ because it depends substantially on processing and storage provided by cloud-based servers.
A) thin client
B) forked license
C) ARM
D) Linux
Q2) Activities called ___________ involve the microprocessor receiving commands as software carries out tasks and while input arrives from the keyboard, mouse, and other devices.
Q3) Purchasing software is the same as buying tangible goods, meaning software can be used, altered, loaned to friends, resold, or given away.
A)True
B)False
Q4) The software application associated with a specific file type is called a __________ application.
Q5) All smartphones use the Android operating system.
A)True
B)False
Q6) Illegal copies of software are referred to as _______ software.
Page 8
To view all questions and flashcards with answers, click on the resource link above.

Chapter 7: Digital Security
Available Study Resources on Quizplus for this Chatper
106 Verified Questions
106 Flashcards
Source URL: https://quizplus.com/quiz/24295
Sample Questions
Q1) A ______________ exploit usually begins with a virus warning and an offer to disinfect the infected device.
A) rogue antivirus
B) virus hoax
C) RAT
D) backdoor
Q2) Hackers can use ports to communicate with devices in botnets.
A)True
B)False
Q3) __________ are standalone programs that masquerade as useful utilities or applications
Q4) ____________ is a term for a person who devises and carries out a scam in order to accomplish a goal.
A) Main-in-the-middle
B) RAT
C) Internet worm
D) none of the above
Q5) Password managers store passwords in a(n) _________ file
Q6) Password entropy is a measure in _____ of a password's unpredictability.
Q7) Common classifications of _________ include viruses, worms, and trojans.
To view all questions and flashcards with answers, click on the resource link above. Page 9

Chapter 8: The Ict Industry
Available Study Resources on Quizplus for this Chatper
117 Verified Questions
117 Flashcards
Source URL: https://quizplus.com/quiz/24296
Sample Questions
Q1) The terms outsourcing and offshoring are the same thing.
A)True
B)False
Q2) What generation of cell phone technology was the first to offer true mobile broadband?
A) 1G
B) 2G
C) 3G
D) 4G
Q3) Which of the following i would be considered a mechanical calculator?
A) Schickard's Calculator
B) Pascaline
C) de Colmar's Arithmometer
D) all of the above
Q4) _____________ is the use of ICT technology to carry out politically motivated attacks designed to infiltrate, sabotage, or damage an opponent's information systems and defensive capabilities.
Q5) It was not until the ______-generation of computers that portable operating systems, such as CP/M and UNIX, provided programmers with similar operating system commands across hardware platforms.
To view all questions and flashcards with answers, click on the resource link above. Page 10

Chapter 9: Information Systems
Available Study Resources on Quizplus for this Chatper
121 Verified Questions
121 Flashcards
Source URL: https://quizplus.com/quiz/24297
Sample Questions
Q1) Fraud alerts interfere with your ability to receive instant credit.
A)True
B)False
Q2) Customer __________ programs such as Zappos VIP help attract and retain customers.
Q3) The process of designing, entering, and testing the rules in an expert system is referred to as __________.
A) DSS
B) knowledge engineering
C) expert system
D) decision model
Q4) In business circles, the galaxy of services that revolve around customers is called ___________.
Q5) A(n) ___________ is the sequence of organizations, people, activities, information, and resources involved in moving a product or service from supplier to customer.
A) supply chain
B) payment gateway
C) ecommerce application
D) payment processing routine
To view all questions and flashcards with answers, click on the resource link above. Page 11

Chapter 10: Databases
Available Study Resources on Quizplus for this Chatper
102 Verified Questions
102 Flashcards
Source URL: https://quizplus.com/quiz/24298
Sample Questions
Q1) The entire Internet contains about a zettabyte of data.
A)True
B)False
Q2) In a(n) _________ database, a table is a sequence of records, similar to a flat file.
Q3) Data _________ refers to computer algorithms that analyze information to discover previously unknown and useful information, including relationships and patterns.
A) analytics
B) OLAP
C) mining
D) model
Q4) __________ are the most commonly used database clients.
A) Local software
B) Apps
C) Browsers
D) none of the above
Q5) A primary key is a ____________ that contains data unique to a record.
Q6) In the context of database security, user ______ management allows access to data on an as-needed basis.
Page 12
To view all questions and flashcards with answers, click on the resource link above.

Chapter 11: Programming
Available Study Resources on Quizplus for this Chatper
120 Verified Questions
120 Flashcards
Source URL: https://quizplus.com/quiz/24299
Sample Questions
Q1) In Prolog programming, a(n) __________ represents one of the main subjects that a fact describes.
Q2) Agile methodologies tend to be used for large software development projects involving more than ten developers, geographically dispersed development teams, and life-critical applications.
A)True
B)False
Q3) Prolog programming is all about facts and rules.
A)True
B)False
Q4) VDEs for mobile devices are based on a(n) ___________ that a programmer manipulates to design the user interface for an app.
Q5) A(n) ___________ is a template for a group of objects with similar characteristics.
Q6) The procedural approach is best used for problems that can be solved by following a step-by-step algorithm.
A)True
B)False
Q7) A program must __________ without any errors before it can be run.
To view all questions and flashcards with answers, click on the resource link above. Page 13

Chapter 11: Step-By-Step Programming With Python
Available Study Resources on Quizplus for this Chatper
90 Verified Questions
90 Flashcards
Source URL: https://quizplus.com/quiz/24300
Sample Questions
Q1) A good name for a variable that will contain a first name would be "last_name."
A)True
B)False
Q2) Which of the following words is a logical operator in Python?
A) NOT
B) OR
C) AND
D) all of the above
Q3) _______ programming is a style of programming that focuses on using objects to design and build applications.
Q4) A ____ is a named memory location that holds data specified by a programmer or entered by an end user.
Q5) Python keywords, such as print and class, are not allowed as variable names.
A)True
B)False
Q6) The process of creating a variable is sometimes referred to as _____ a variable.
Q7) Instruction code for a computer program is based on an algorithm.
A)True
B)False
Q8) To ______ a variable means to add an amount to its current value.
To view all questions and flashcards with answers, click on the resource link above. Page 14