Information Systems and Data Management Pre-Test Questions - 1701 Verified Questions

Page 1


Information Systems and Data Management

Pre-Test Questions

Course Introduction

Information Systems and Data Management is a foundational course that explores the role of information systems in organizations and the methods used to organize, store, and retrieve data effectively. Students learn about the design, implementation, and management of databases, as well as data modeling, normalization, and the use of SQL for querying data. The course also addresses the importance of data integrity, security, and privacy, and examines how information systems support business processes, decision-making, and strategic goals. Through practical case studies and hands-on exercises, students gain essential skills for managing and leveraging data assets in modern organizational environments.

Recommended Textbook

Experiencing MIS 4th Canadian Edition by David M. Kroenke

Available Study Resources on Quizplus

17 Chapters

1701 Verified Questions

1701 Flashcards

Source URL: https://quizplus.com/study-set/1016

2

Chapter 1: Information Systems and You

Available Study Resources on Quizplus for this Chatper

113 Verified Questions

113 Flashcards

Source URL: https://quizplus.com/quiz/20141

Sample Questions

Q1) It is expected that the complexity of computer chips will ________ over the next decade.

A) stay about the same

B) obey Moore's Law

C) shrink

D) continue to grow slowly

E) grow more dramatically

Answer: B

Q2) In the next decade, David Ticoll suggests that ________ will almost be free.

Answer: unlimited storage

Q3) Which of the following are NOT the responsibilities of the user of an information system?

A) Backing up data

B) Programming the system

C) Learning how to employ the system to accomplish your goals

D) Helping recover the system

E) Protecting the security of the system and its data

Answer: B

Q4) The Running Room has used its website to increase its ________ to customers.

Answer: reach

To view all questions and flashcards with answers, click on the resource link above. Page 3

Chapter 2: Business Processes and Decision Making

Available Study Resources on Quizplus for this Chatper

118 Verified Questions

118 Flashcards

Source URL: https://quizplus.com/quiz/20142

Sample Questions

Q1) Activities transform resources and data into different kinds of resources and data.

A)True

B)False

Answer: False

Q2) Any item of value can be considered to be a potential resource for a business process.

A)True

B)False Answer: True

Q3) When data is presented with a meaningful context, it becomes information.

A)True

B)False

Answer: True

Q4) The quality of your thinking is a large part of the quality of the information system.

A)True

B)False Answer: True

To view all questions and flashcards with answers, click on the resource link above. Page 4

Chapter 3: Application Extension-Introduction to Business

Process Modeling With Microsoft Visio

Available Study Resources on Quizplus for this Chatper

48 Verified Questions

48 Flashcards

Source URL: https://quizplus.com/quiz/20156

Sample Questions

Q1) One of the added values a business process model provides is the notion of making individuals ________.

Answer: process aware

Q2) Data flow diagrams, UML and systems flowcharts are common process modelling techniques.

A)True

B)False

Answer: True

Q3) Applications that support the development of business process models are referred to as

A) modelling tools.

B) worksheets.

C) information systems.

D) graphics programs.

E) props.

Answer: A

Q4) The lowest amount of detail shown in a DFD is the level 0 or ________.

Answer: top process

Q5) ________ reveals increasing amounts of detail.

Answer: Levelling

To view all questions and flashcards with answers, click on the resource link above. Page 5

Chapter 4: Productivity, Innovation, and Strategy

Available Study Resources on Quizplus for this Chatper

118 Verified Questions

118 Flashcards

Source URL: https://quizplus.com/quiz/20143

Sample Questions

Q1) Receiving and storing raw materials for production would be an example of a(n) ________ in Porter's value chain model.

A) support activity

B) primary activity

C) linkage

D) integrated activity

E) complex activity

Q2) The systems chosen to support a particular competitive strategy may be evaluated according to the support they give that strategy.

A)True

B)False

Q3) When FedEx developed the package tracking application, they were trying to gain competitive advantage through IT ________.

Q4) What are primary activities?

Q5) Porter's concept of a business chain is crucial for developing a competitive strategy. A)True

B)False

Q6) Organizations can gain competitive advantage by reducing ________.

To view all questions and flashcards with answers, click on the resource link above. Page 6

Chapter 5: Application Extension-Introduction to Microsoft

Available Study Resources on Quizplus for this Chatper

44 Verified Questions

44 Flashcards

Source URL: https://quizplus.com/quiz/20155

Sample Questions

Q1) To increase the size of text in a cell, go to the ________ Section of the Home Tab.

A) Alignment

B) Styles

C) Number

D) Font

E) Editing

Q2) To display a preview in Excel, click the FILE button and then the ________ button.

A) Share

B) Info

C) Print

D) Export

E) Open

Q3) Cells are identified by their column letters and row numbers.

A)True

B)False

Q4) Describe how you would enter a new formula that adds the value of two cells into an Excel spreadsheet.

Q5) A formula always begins with a(n) ________ sign.

Page 7

To view all questions and flashcards with answers, click on the resource link above.

Chapter 6: Hardware and Software

Available Study Resources on Quizplus for this Chatper

147 Verified Questions

147 Flashcards

Source URL: https://quizplus.com/quiz/20144

Sample Questions

Q1) One-of-a-kind application software is

A) operating software.

B) software that runs printers.

C) designed for a specific, unique need.

D) like a web browser.

E) memory-swapping software.

Q2) Cloud computing may be more efficient because

A) it uses several computers to address a single problem.

B) it adds to the ability to store data.

C) customers only pay for what they use, and updates are done automatically.

D) it is resident on your computer.

E) it is available only during business hours.

Q3) 1024 GB of data is also referred to as a(n) ________.

Q4) To represent the term "MIS" in a binary language would require ________ bytes of information.

Q5) Computer programs like QuickBooks that perform a specific business function are called ________ software.

Q6) A zettabyte is larger than a kilobyte.

A)True

B)False

Page 8

To view all questions and flashcards with answers, click on the resource link above.

Chapter 7: Database and Content Management

Available Study Resources on Quizplus for this Chatper

114 Verified Questions

114 Flashcards

Source URL: https://quizplus.com/quiz/20145

Sample Questions

Q1) ________ is an example of an enterprise DBMS.

A) Access

B) DB2

C) FoxPro

D) Quattro Pro

E) Paradox

Q2) ________ software assists in creating, maintaining, and manipulating databases.

A) DMS

B) KMS

C) DBMS

D) MIS

E) DBM

Q3) A ________ is a column or group of columns that identifies a unique row in a table.

A) record

B) relationship

C) row

D) key

E) field

Q4) Characters of information are represented by individual ________.

To view all questions and flashcards with answers, click on the resource link above. Page 9

Chapter 8: Extension-Using Microsoft Access 2013

Available Study Resources on Quizplus for this Chatper

49 Verified Questions

49 Flashcards

Source URL: https://quizplus.com/quiz/20153

Sample Questions

Q1) When defining a relationship between two tables in Access, it is important to be sure to drag the correct ________ in the right direction and lay it on the other table.

A) relationship

B) attribute

C) window

D) key

E) table

Q2) When creating a new table in Access, the primary key is set by clicking on the ________ icon.

A) drive

B) switch

C) exclamation mark

D) relationship

E) key

Q3) Access allows users to create tables in a design view.

A)True

B)False

Q4) Access makes it easy to generate database queries by providing an easy-to-use ________ that generates SQL statements automatically.

To view all questions and flashcards with answers, click on the resource link above. Page 10

Chapter 9: Extension-Database Design

Available Study Resources on Quizplus for this Chatper

87 Verified Questions

87 Flashcards

Source URL: https://quizplus.com/quiz/20154

Sample Questions

Q1) A crow's foot diagram is a type of

A) relationship map.

B) data model.

C) E-R diagram.

D) UML model.

E) normalization model.

Q2) Once the entities have been defined, the data model can be implemented directly on the DBMS.

A)True

B)False

Q3) "Name" would be a good identifier for a customer entity in a database application.

A)True

B)False

Q4) Users validate and approve the data model prior to its transformation into a database design.

A)True

B)False

Q5) The number of entities that can be involved in a relationship in a data model is called the ________.

To view all questions and flashcards with answers, click on the resource link above. Page 11

Chapter 10: Networks and Collaboration

Available Study Resources on Quizplus for this Chatper

121 Verified Questions

121 Flashcards

Source URL: https://quizplus.com/quiz/20146

Sample Questions

Q1) ________ transmits signals using light rays.

A) Coaxial cable

B) Radiowaves

C) Microwaves

D) Optical fibre cable

E) UTP

Q2) What is the difference between a LAN and a WAN? Give an example of how each one could be used in business.

Q3) ISPs cannot commit to offer performance-level guarantees to users.

A)True

B)False

Q4) According to the text, "weak ties" can

A) connect us to the same number of people as strong links.

B) hinder our networking abilities.

C) be a hindrance for connecting to everyone in six degrees.

D) be crucial to connecting you to everyone in six degrees.

E) be impossible in social settings.

Q5) A(n) ________ is a virtual private pathway over a public or shared network from the VPN client to the VPN server.

Q6) Any text sent via HTTPS is ________ and therefore is relatively safe.

Page 12

To view all questions and flashcards with answers, click on the resource link above.

Chapter 11: Competitive Advantage and Business Processes

Available Study Resources on Quizplus for this Chatper

121 Verified Questions

121 Flashcards

Source URL: https://quizplus.com/quiz/20147

Sample Questions

Q1) There are three factors of information: purpose, ________, and means.

Q2) ________ is a business process for managing all contacts between an organization and its suppliers.

A) SRM

B) CRM

C) BRM

D) KRM

E) FRM

Q3) The purpose of relationship management applications is to

A) extend social marketing effectiveness.

B) reduce accounts receivable.

C) advertise promotions in a timely way.

D) get new customers.

E) maximize the value of the existing customer base.

Q4) Most organizations today have a mixture of functional and integrated systems.

A)True

B)False

Q5) What is an industry standard process?

Q6) Systems that integrate all of an organization's core processes are called ________ systems.

Page 13

To view all questions and flashcards with answers, click on the resource link above.

Chapter 12: Decision Making and Business Intelligence

Available Study Resources on Quizplus for this Chatper

139 Verified Questions

139 Flashcards

Source URL: https://quizplus.com/quiz/20148

Sample Questions

Q1) Customer's web clicking behaviour is called ________.

Q2) What is online transaction processing?

Q3) Data-mining systems use heuristic techniques to process data to find hidden patterns and relationships among the data.

A)True

B)False

Q4) The purpose of a business intelligence system is to provide information that A) improves decision making.

B) can be summarized.

C) is less granular.

D) follows privacy legislation.

E) has only one level of complexity.

Q5) Generally it is better to have data that is too fine rather than too coarse.

A)True

B)False

Q6) With________, data miners develop a model prior to the analysis and apply statistical techniques to data to estimate parameters of the model.

Q7) If a part number is changed, but the data in the data warehouse does not reflect this change the data is said to be ________.

To view all questions and flashcards with answers, click on the resource link above. Page 14

Chapter 13: E-commerce, Social Networking, and Web 20

Available Study Resources on Quizplus for this Chatper

110 Verified Questions

110 Flashcards

Source URL: https://quizplus.com/quiz/20149

Sample Questions

Q1) Disintermediation is the elimination of sales taxes when selling online.

A)True

B)False

Q2) ________ ecommerce concerns sales between a supplier and a retail customer or consumer.

Q3) Compared to traditional processing, Web 2.0 processing is characterized by

A) software as a product, extensive advertising and publishing.

B) controlled, fixed interface, viral marketing and software as a free service.

C) viral marketing, software as a free service, mashups encouraged.

D) product value fixed, user participation, software as a product.

E) publishing, organic interfaces, value increases with more users.

Q4) When Dell computers sells to a federal agency, this is called

A) C2C ecommerce.

B) B2G ecommerce.

C) C2G ecommerce.

D) B2B ecommerce.

E) Customer relationship management.

Q5) ________ is the buying and selling of goods and services over public and private computer networks.

Page 15

Q6) ________ companies do not take title to the goods they sell.

To view all questions and flashcards with answers, click on the resource link above.

Chapter 14: Acquiring Information Systems Through Projects

Available Study Resources on Quizplus for this Chatper

112 Verified Questions

112 Flashcards

Source URL: https://quizplus.com/quiz/20150

Sample Questions

Q1) It may be necessary to create a(n) ________ if the new system will involve a new database or extensive changes to an existing database.

Q2) Information technology project management is a

A) certification process to create a unique product, service, or result.

B) collection of techniques and methods to plan, coordinate, and complete IT projects.

C) project management knowledge bank.

D) series of rules that regulate IT projects.

E) set of best practices from managing technology IT projects.

Q3) PMBOK first published in 1996 is now in its ________ edition.

A) first

B) second

C) third

D) fourth

E) fifth

Q4) Systems development is primarily a technical task for programmers and hardware designers.

A)True

B)False

Page 16

Q5) Project feasibility has ________ dimensions.

To view all questions and flashcards with answers, click on the resource link above.

Chapter 15: Application Extension-Introduction to Microsoft Project

Available Study Resources on Quizplus for this Chatper

42 Verified Questions

42 Flashcards

Source URL: https://quizplus.com/quiz/20157

Sample Questions

Q1) MS Project allows a project manager to control resources. A)True

B)False

Q2) MS Project is a full-service project management software because it focuses on A) organizing tasks.

B) providing access to project documentation.

C) managing schedules.

D) tracking employee hours.

E) providing support for the project management process.

Q3) MS Project is a sophisticated relational ________ that stores information about tasks, resources, schedules, baselines, and budgets.

Q4) MS Project allows a project manager to ________ resources.

Q5) MS Project provides a variety of screens to capture the full picture of the project. A)True B)False

Q6) Dependencies are reflected in the Gantt chart screen. A)True

B)False

17

Q7) Dependencies are reflected in the ________ screen.

To view all questions and flashcards with answers, click on the resource link above.

Chapter 16: Structure, Governance, and Ethics

Available Study Resources on Quizplus for this Chatper

105 Verified Questions

105 Flashcards

Source URL: https://quizplus.com/quiz/20151

Sample Questions

Q1) The triple bottom line for organizations includes measuring profitability, social performance and employee satisfaction.

A)True

B)False

Q2) Bill 198 is commonly known as the Sarbanes-Oxley Act.

A)True

B)False

Q3) The SOX Act and Bill 198 both require management to create ________ sufficient to produce reliable financial statements and to protect an organization's assets.

Q4) A financial audit can be defined as an examination and verification of a company's ________ and accounting records by an accredited professional.

Q5) Your company agrees to collaborate on a supply chain relationship with another firm. During the collaboration, you discover by mistake that they have given you access to all their inventory and sales data.

You look at this and find that you can see the prices and quantities of products they are buying from all their other suppliers. This can give you an enormous advantage in competing for their business. What should you do?

To view all questions and flashcards with answers, click on the resource link above.

Page 18

Chapter 12: Managing Information Security and Privacy

Available Study Resources on Quizplus for this Chatper

113 Verified Questions

113 Flashcards

Source URL: https://quizplus.com/quiz/20152

Sample Questions

Q1) If you suspect an organization has inappropriately disclosed your personal information to a 3rd party, you can lodge a complaint with

A) Industry Canada.

B) RCMP.

C) the local police.

D) Revenue Canada.

E) Office of the Privacy Commissioner of Canada.

Q2) Unauthorized data disclosure is a major type of security problem. How do the different sources of threats exploit this problem?

Q3) An organization's security ________ has three components: senior management involvement, safeguards, and an incident response.

Q4) The sources of security problems are human error, malicious activity, and ________.

Q5) What is meant by the term "malware"? How can we safeguard against it?

Q6) When someone calls and pretends to be from a credit card company in order to check the validity of your credit card number, they are most likely engaging in

Q7) ________ occurs when a person gains unauthorized access to a computer system.

Q8) What is an unauthorized data disclosure?

To view all questions and flashcards with answers, click on the resource link above. Page 19

Turn static files into dynamic content formats.

Create a flipbook