

Fundamentals of Information Systems Review Questions
Course Introduction
Fundamentals of Information Systems introduces students to essential concepts, components, and applications of information systems in organizations. The course examines the role of information technology in supporting business operations, decision-making, and strategic objectives, covering topics such as hardware, software, databases, networks, and system development life cycles. Students also explore issues related to data management, cybersecurity, ethical considerations, and emerging technologies, acquiring a foundational understanding of how information systems drive innovation and efficiency in modern enterprises.
Recommended Textbook
Using MIS 7th Edition by David M. Kroenke
Available Study Resources on Quizplus
13 Chapters
1464 Verified Questions
1464 Flashcards
Source URL: https://quizplus.com/study-set/1396

Page 2
Chapter 1: The Importance of MIS
Available Study Resources on Quizplus for this Chatper
120 Verified Questions
120 Flashcards
Source URL: https://quizplus.com/quiz/27806
Sample Questions
Q1) Which of the following is the least critical aspect of good information?
A) data accuracy
B) timeliness of data
C) additional data
D) relevance of data
Answer: C
Q2) Jeff is the IT manager of his organization. He needs to use his coworker's account to access some information. In keeping with password etiquette, how should he go about getting his coworker's password?
A) He should request the coworker to type in the password on the system without Jeff looking at it.
B) He should explain the urgency of the situation and ask the coworker to send the password through email.
C) He should submit a formal letter to his coworker's manager, explaining the situation and requesting that the password be sent to him.
D) He should try out various combinations to see if he can guess his coworker's password.
Answer: A
To view all questions and flashcards with answers, click on the resource link above.

3
Chapter 2: Business Processes, Information Systems, and Information
Available Study Resources on Quizplus for this Chatper
123 Verified Questions
123 Flashcards
Source URL: https://quizplus.com/quiz/27810
Sample Questions
Q1) The use of a conference call is an example of ________ communication.
A) sequential
B) synchronous
C) indirect
D) unidirectional
Answer: B
Q2) Identify the project management phase in which the tasks of a project are performed.
A) finalizing
B) doing
C) planning
D) starting
Answer: B
Q3) Which of the following alternatives for sharing content provides version control?
A) Microsoft Office
B) WebApps
C) Google Docs
D) Microsoft SharePoint
Answer: D

Page 4
To view all questions and flashcards with answers, click on the resource link above.
Chapter 3: Organizational Strategy, Information Systems, and Competitive Advantage
Available Study Resources on Quizplus for this Chatper
119 Verified Questions
119 Flashcards
Source URL: https://quizplus.com/quiz/27811
Sample Questions
Q1) FunText is a company that owns an app used for text messaging. It recently offered a membership extension of six months without any additional charges to its existing customers who had registered for a three-year membership. By doing this, which competitive strategy did FunText implement?
A) creation of a new service
B) product differentiation
C) locking in customers
D) locking in suppliers
Answer: C
Q2) To determine if an information system delivers net savings in costs, the cost of developing and operating the information system will need to be offset against the gains in reduced errors and paper, ink, and printing costs.
A)True
B)False
Answer: True
Q3) An inventory of raw materials is an example of a repository.
A)True
B)False
Answer: True

Page 5
To view all questions and flashcards with answers, click on the resource link above.

Chapter 4: Hardware and Software
Available Study Resources on Quizplus for this Chatper
124 Verified Questions
124 Flashcards
Source URL: https://quizplus.com/quiz/27812
Sample Questions
Q1) The CPU stores results of computations on the hard drive.
A)True
B)False
Q2) ________ is a term that refers to the visual overhead in a computer display.
A) Chrome
B) Charms
C) Botnet
D) Cookie
Q3) Which of the following is the operating system designed by Apple?
A) Android
B) Unix
C) Linux
D) Mac OS
Q4) Thin-client applications are typically limited by the capabilities of the ________.
A) programming language
B) browser
C) hardware
D) operating system
Q5) What is UI?
To view all questions and flashcards with answers, click on the resource link above. Page 6

Chapter 5: Database Processing
Available Study Resources on Quizplus for this Chatper
123 Verified Questions
123 Flashcards
Source URL: https://quizplus.com/quiz/27813
Sample Questions
Q1) Metadata are ________.
A) code used for server-side processing
B) error logs of databases
C) data that describe data
D) encrypted data transmissions
Q2) Identify the type of task that a database administrator is performing when validating the data model to be used in a database management system.
A) development
B) adaptation
C) backup and recovery
D) operation
Q3) Managing the impact of database structure changes on applications and users is an operational task for a database administrator.
A)True
B)False
Q4) Browser applications are thin-client applications that need to be pre-installed on the users' computers.
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above. Page 7

Chapter 6: The Cloud
Available Study Resources on Quizplus for this Chatper
120 Verified Questions
120 Flashcards
Source URL: https://quizplus.com/quiz/27814
Sample Questions
Q1) Bluetooth is a common wired protocol designed to transmit data over long distances.
A)True
B)False
Q2) Which of the following characteristics is a disadvantage of cloud-based hosting?
A) loss of control over data location
B) ongoing support costs
C) increased management requirements
D) significant development effort
Q3) Wired LAN connections use the IEEE 802.3 protocol, whereas wireless LAN connections use the IEEE 802.11 protocol.
A)True
B)False
Q4) A(n) ________ is a number that identifies a particular device.
A) domain
B) IP address
C) hyperlink
D) href
Q5) What is a virtual private network (VPN)? Explain how VPNs ensure the security of transmissions.
To view all questions and flashcards with answers, click on the resource link above. Page 8

Chapter 7: Organizations and Information Systems
Available Study Resources on Quizplus for this Chatper
116 Verified Questions
116 Flashcards
Source URL: https://quizplus.com/quiz/27815
Sample Questions
Q1) Lead generation and lead tracking are processes concerning the sales and marketing department.
A)True
B)False
Q2) Dynamic processes support operational activities.
A)True
B)False
Q3) How should organizations manage employee resistance to change, in the context of new enterprise systems?
Q4) Enterprise application integration is a suite of applications, a database, and a set of inherent processes for consolidating business operations into a single, consistent, computing platform.
A)True
B)False
Q5) ________ are predesigned procedures for using software products.
A) Inherent processes
B) Triggers
C) Modules
D) Service descriptions
Q6) Define dynamic processes and list their characteristics.
Page 9
To view all questions and flashcards with answers, click on the resource link above.

Chapter 8: Social Media Information Systems
Available Study Resources on Quizplus for this Chatper
120 Verified Questions
120 Flashcards
Source URL: https://quizplus.com/quiz/27816
Sample Questions
Q1) Explain each element in the SLATES model.
Q2) Social CRM is more structured and controlled than traditional CRM.
A)True
B)False
Q3) Social networking procedures are more informal for SM sponsors than they are for social networking users.
A)True
B)False
Q4) Describe the roles of social media sponsors and social media application providers.
Q5) ________ is the dynamic social media process of employing users to participate in product design or product redesign.
A) Crowdsourcing
B) Outsourcing
C) Homesourcing
D) Farmshoring
Q6) Describe a hyper-social organization. Name the four pillars of a hyper-social organization.
Q7) What is the difference between Web 2.0 processing and traditional processing?
Q8) Describe "defenders of belief" and "seekers of the truth."
To view all questions and flashcards with answers, click on the resource link above. Page 10

Chapter 9: Business Intelligence Systems
Available Study Resources on Quizplus for this Chatper
122 Verified Questions
122 Flashcards
Source URL: https://quizplus.com/quiz/27817
Sample Questions
Q1) There are activities in business processes that do not involve an information system.
A)True
B)False
Q2) In the system implementation phase of the SDLC, with plunge installation, existing systems are used by the organization until the new one is fully operational.
A)True
B)False
Q3) According to Brooks' Law, adding more people to a late project will ________.
A) guarantee efficiencies
B) speed up the project
C) create diseconomies of scale
D) reduce the need for coordination
Q4) In business processes, resources are collections of procedures.
A)True
B)False
Q5) Agile development methodologies welcome changes in requirements.
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above. Page 11

Chapter 10: Information Systems Security
Available Study Resources on Quizplus for this Chatper
118 Verified Questions
118 Flashcards
Source URL: https://quizplus.com/quiz/27807
Sample Questions
Q1) ________ requires the user to request BI results.
A) Push publishing
B) Pull publishing
C) Desktop publishing
D) Accessible publishing
Q2) Define business intelligence and BI systems.
Q3) In supervised data mining, a model is developed after the analysis.
A)True
B)False
Q4) Push publishing requires the user to request BI results.
A)True
B)False
Q5) Which of the following is an example of a supervised data mining technique?
A) cluster analysis
B) market-basket analysis
C) regression analysis
D) click streaming
Q6) What are MapReduce and Hadoop?
Q7) Describe the functions of data warehouses and the need for them.
Q8) What is the objective of performing a market-basket analysis?
To view all questions and flashcards with answers, click on the resource link above. Page 12

Chapter 11: Information Systems Management
Available Study Resources on Quizplus for this Chatper
105 Verified Questions
105 Flashcards
Source URL: https://quizplus.com/quiz/27808
Sample Questions
Q1) The steering committee serves an important communication function between the executive group and the users of IS.
A)True
B)False
Q2) With the exception of system analyst, all the major job positions in the IS industry require business knowledge.
A)True
B)False
Q3) If the outsource vendor's employees have gained significant knowledge of the company, ending the agreement is a major risk.
A)True
B)False
Q4) Which of the following statements is true about outsourcing?
A) It increases budgetary instability due to the level of risk involved.
B) It saves both direct and indirect management time.
C) It invariably leads to diseconomies of scale.
D) It guarantees a higher level of quality than that provided in-house.
Q5) Explain the major IS planning functions.
Q6) Describe the loss of control associated with outsourcing.
Page 13
To view all questions and flashcards with answers, click on the resource link above.

Chapter 12: Information Systems Development
Available Study Resources on Quizplus for this Chatper
123 Verified Questions
123 Flashcards
Source URL: https://quizplus.com/quiz/27809
Sample Questions
Q1) When an employee is terminated, IS administrators should receive advance notice so that they can ________.
A) destroy the employee's records
B) plan for new recruitment
C) disseminate information
D) remove the user account and password
Q2) Technical safeguards involve the hardware and software components of an information system.
A)True
B)False
Q3) Which of the following is likely to be accepted by a poorly designed application, leading to improper disclosure of data?
A) public key
B) asymmetric encryption
C) key escrow
D) SQL injection
Q4) Phishing is a technique for intercepting computer communications.
A)True
B)False
Q5) Define threat, vulnerability, safeguard, and target.
Page 14
To view all questions and flashcards with answers, click on the resource link above.

Chapter 13: The International Dimension
Available Study Resources on Quizplus for this Chatper
31 Verified Questions
31 Flashcards
Source URL: https://quizplus.com/quiz/27818
Sample Questions
Q1) Which of the following statements is true of a supply chain?
A) All members of the supply chain of a firm must have close geographical proximity.
B) Every supply chain should include suppliers, manufacturers, distributors, retailers, and customers.
C) Each organization in a chain is connected to just one company up and down the chain.
D) A supply chain includes transportation companies, warehouses, and inventories.
Q2) The bullwhip effect is a phenomenon in which the variability in the size and timing of orders decreases at each stage of the supply chain.
A)True
B)False
Q3) International organizations have more IS and IT assets, and those assets are exposed to more risk and greater uncertainty.
A)True
B)False
Q4) List the issues that need to be addressed when localizing a computer program.
Q5) How can information reduce or eliminate the bullwhip effect?
To view all questions and flashcards with answers, click on the resource link above.
15