

Information Systems in Organizations
Test Questions
Course Introduction
This course explores the critical role that information systems play within modern organizations, examining how technology supports and shapes business processes, decision-making, and competitive advantages. Students will learn about the different types of information systems, their strategic applications, and how they align with organizational goals. Topics include systems analysis and design, data management, enterprise systems, cybersecurity, and the ethical and social implications of information technology. Through case studies and real-world examples, students gain practical insights into leveraging information systems to improve organizational performance and respond to evolving business challenges.
Recommended Textbook
Introduction to Information Systems 4th Canadian Edition by R. Kelly Rainer
Available Study Resources on Quizplus
18 Chapters
1887 Verified Questions
1887 Flashcards
Source URL: https://quizplus.com/study-set/1917

Page 2

Chapter 1: Introduction to Information Systems
Available Study Resources on Quizplus for this Chatper
86 Verified Questions
86 Flashcards
Source URL: https://quizplus.com/quiz/38206
Sample Questions
Q1) Knowledge is data that have been organized so that they have meaning to provide value to the recipient.
A)True
B)False
Answer: False
Q2) A(n)_____________ is a computer program designed to support a specific task or business process.
A)interface
B)application
C)functional area
D)network
E)database
Answer: B
Q3) The Software Project Manager is responsible for A)strategic planning.
B)day-to-day operations of the entire organization.
C)managing IS services such as help desks, hotlines, training, and consulting.
D)managing a particular existing system.
E)managing a particular new systems development project.
Answer: E
To view all questions and flashcards with answers, click on the resource link above. Page 3

Chapter 2: Organizational Strategy, Competitive
Advantage, and Information Systems
Available Study Resources on Quizplus for this Chatper
147 Verified Questions
147 Flashcards
Source URL: https://quizplus.com/quiz/38208
Sample Questions
Q1) Customer intimacy is the process whereby a business learns as much as possible about its customers to better anticipate and address their needs.
A)True
B)False
Answer: True
Q2) ___________ is a website where potential donors can decide where their money can be directed, stating whether it goes to a particular disaster relief fund.
A)GiftFlow.org
B)RedCross.ca
C)Microsoft.ca
D)Kiva.org
Answer: B
Q3) Productivity is the result of optimizing operations and supplier processes.
A)True
B)False
Answer: False
Q4) Differentiate between Porter's competitive forces model and his value chain model. Answer: not answered
To view all questions and flashcards with answers, click on the resource link above. Page 4

Chapter 3: Ethics and Privacy
Available Study Resources on Quizplus for this Chatper
74 Verified Questions
74 Flashcards
Source URL: https://quizplus.com/quiz/38210
Sample Questions
Q1) ____________ issues revolve around who should have access to information and whether they should have to pay for this access.
A)Accessibility
B)Accuracy
C)Privacy
D)Property
Answer: A
Q2) Which of the following statements is correct?
A)An individual's right to privacy is absolute.
B)Determining and enforcing privacy regulations can be difficult.
C)An individual's right to privacy supersedes the needs of society.
D)Advances in information technologies have not affected individual privacy.
E)The Internet has increased individuals' privacy.
Answer: B
Q3) When you access a website, the site could also have access to your data.
A)True
B)False
Answer: True
To view all questions and flashcards with answers, click on the resource link above. Page 5

Chapter 4: Information Security and Controls
Available Study Resources on Quizplus for this Chatper
129 Verified Questions
129 Flashcards
Source URL: https://quizplus.com/quiz/38212
Sample Questions
Q1) Organizations utilize layers of controls because they face so many diverse threats to information security.
A)True
B)False
Q2) Trojan horses are software programs that hide in other computer programs and reveal their designed behaviour only when they are activated.
A)True
B)False
Q3) A ___________ site does not include the actual applications the company runs.
A)cold
B)hot
C)warm
D)neutral
Q4) Cyberterrorism is usually carried out by nations.
A)True
B)False
Q5) A password refers to "something the user is."
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above. Page 6

Chapter 5: Data and Knowledge Management
Available Study Resources on Quizplus for this Chatper
116 Verified Questions
116 Flashcards
Source URL: https://quizplus.com/quiz/38214
Sample Questions
Q1) _____ occurs when the same data are stored in many places.
A)Data isolation
B)Data integrity
C)Data consistency
D)Data redundancy
E)Application/Data dependence
Q2) _____ describes the activities of the business, whereas _____ categorize(s), aggregate(s), and evaluate(s)data generated by the organization's activities.
A)Transaction data, master data
B)Source data, transaction data
C)Operational data, master data
D)Master data, source data
E)Business dimensional data, databases
Q3) Why is data governance so important for organizations?
Q4) An entity is a person, place, thing, or event about which information is maintained.
A)True
B)False
Q5) Describe the six steps of the knowledge management system cycle.
Q6) Define each element of the data hierarchy, in order from smallest to largest.
To view all questions and flashcards with answers, click on the resource link above.

Chapter 6: Telecommunications and Networking
Available Study Resources on Quizplus for this Chatper
141 Verified Questions
141 Flashcards
Source URL: https://quizplus.com/quiz/38215
Sample Questions
Q1) In a ___________ system, participants are able to seamlessly and electronically share data, voice, images, graphics, and animation.
A)teleconference
B)group decision support
C)telepresence
D)telephone conference call
E)crowdsourcing
Q2) Differentiate among twisted-pair wire, coaxial cable, and fiber-optic cable.
Q3) Describe four categories of network applications.
Q4) In regard to IT network fundamentals, a protocol is:
A)a device that handles the switching of voice and data in a local area network
B)a standard set of rules and procedures for the control of communications in a network
C)a communications service for the connection of devices in a local area network
D)the main communications channel in a wide area network
E)synonymous with network interface card
Q5) A local area network connects two or more communicating devices in a limited geographical area.
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above. Page 8

Chapter 7: E-Business and E-Commerce
Available Study Resources on Quizplus for this Chatper
123 Verified Questions
123 Flashcards
Source URL: https://quizplus.com/quiz/38216
Sample Questions
Q1) Domain tasting is _____________.
A)illegal
B)legal
C)the same as cybersquatting
D)both A and C
Q2) Difficulties in order fulfillment are most closely associated with which type of electronic commerce?
A)Business-to-business
B)Business-to-consumer
C)Government-to-citizen
D)Business-to-employee
E)Mobile commerce
Q3) Which of the following provides a disruptive Taxi service?
A)Nber
B)Aber
C)Uber
D)Iber
E)None of the above
Q4) What is domain tasting? Should it be made illegal?
Q5) Discuss the various types of electronic commerce.
To view all questions and flashcards with answers, click on the resource link above. Page 9
Chapter 8: Wireless, Mobile Computing, and Mobile Commerce
Available Study Resources on Quizplus for this Chatper
123 Verified Questions
123 Flashcards
Source URL: https://quizplus.com/quiz/38217
Sample Questions
Q1) The Internet of Things can be described as ___________.
A)everywhere computing
B)ubiquitous computing
C)embedded computing
D)all of the above
Q2) Frank and his wife, Paula, run a country store in a high-foot-traffic area. Which of the following would not be a beneficial use of mobile technology for their store?
A)Telemetry
B)Location-based
C)Wireless payments
D)Mobile app loyalty program
E)All of these could be used beneficial.
Q3) A small geographical perimeter within which a wireless access point provides service to a number of users is called a ________.
A)transceiver
B)hotspot
C)local reception node
D)wireless network
E)GPS location

Page 10
To view all questions and flashcards with answers, click on the resource link above.

Chapter 9: Social Computing
Available Study Resources on Quizplus for this Chatper
83 Verified Questions
83 Flashcards
Source URL: https://quizplus.com/quiz/38218
Sample Questions
Q1) Web 2.0 media sites allow people to share digital media.
A)True
B)False
Q2) Which of the following statements concerning blogging is false?
A)Anyone can blog.
B)A reader can believe all of the details in a blog.
C)A company can maintain an internal blog site.
D)Blogging can be used in marketing.
E)Tweets are replacing blogging.
Q3) A tag is the way a developer describes a piece of information.
A)True
B)False
Q4) Which of the following is a true statement about the impact of social computing on a business?
A)There is a high cost to using viral marketing
B)It is difficult to gain information about customers
C)A small minority of individuals contribute the majority of feedback and can provide skewed data
D)Social computing does not allow for rapid feedback from customers.
Q5) Compare and contrast blogs and wikis.
To view all questions and flashcards with answers, click on the resource link above. Page 11

Chapter 10: Information Systems Within the Organization
Available Study Resources on Quizplus for this Chatper
118 Verified Questions
118 Flashcards
Source URL: https://quizplus.com/quiz/38219
Sample Questions
Q1) Greg is mowing lawns in the neighborhood for the summer. He does not need an information system.
A)True
B)False
Q2) What are ad-hoc (on-demand)reports? Why does an organization need to be able to run ad-hoc reports?
Q3) Financial management, operations management, and human resource management are extended ERP modules.
A)True
B)False
Q4) Enterprise resource management is an enterprise-wide effort to acquire and retain customers.
A)True
B)False
Q5) Which of the following is not an example of a transaction?
A)A person hired
B)A payroll check generated
C)A service sold
D)Printing a report
E)Checking out at Walmart
To view all questions and flashcards with answers, click on the resource link above. Page 12

Chapter 11: Customer Relationship Management and Supply Chain Management
Available Study Resources on Quizplus for this Chatper
175 Verified Questions
175 Flashcards
Source URL: https://quizplus.com/quiz/38220
Sample Questions
Q1) __________ systems study customer behaviour and perceptions to provide business intelligence.
A)CRM
B)Collaborative CRM
C)Operational CRM
D)Analytical CRM
E)Transactional CRM
Q2) Vertical integration is a business strategy in which a company purchases its ______ suppliers.
A)downstream
B)internal
C)instream
D)upstream
Q3) A company's suppliers, suppliers' suppliers, and the processes for managing them is the:
A)suppliers' chain
B)external supply chain
C)upstream portion of the supply chain
D)downstream portion of the supply chain
E)entire supply chain
To view all questions and flashcards with answers, click on the resource link above. Page 13

Chapter 12: Business Intelligence
Available Study Resources on Quizplus for this Chatper
109 Verified Questions
109 Flashcards
Source URL: https://quizplus.com/quiz/38221
Sample Questions
Q1) Sally is working for her uncle for the summer in the marketing department of Proctor & Gamble. She tells you she does data mining all day long. Which of the following statements is false?
A)Data mining can be used to prove assumptions.
B)Data mining is used to identify unknown patterns.
C)Data mining can explain why things happened.
D)Data mining can predict what will happen.
E)Data mining can be used to identify customers.
Q2) Decision-support systems support only lower- and middle-level managers.
A)True
B)False
Q3) Describe how your university could use a decision support system in its admissions process.
Q4) In the definition of management, the organization's goals are considered
A)input
B)process
C)output
D)none of the above
Q5) Explain how what-if analysis is employed, using examples.
Page 14
To view all questions and flashcards with answers, click on the resource link above.

Chapter 13: Acquiring Information Systems and Applications
Available Study Resources on Quizplus for this Chatper
135 Verified Questions
135 Flashcards
Source URL: https://quizplus.com/quiz/38222
Sample Questions
Q1) The earlier in the development process that errors are detected, the less expensive they are to correct.
A)True
B)False
Q2) Differentiate between the IT strategic plan and the IS operational plan.
Q3) A key principle of the scrum approach for agile development is that users cannot change their minds during a project.
A)True
B)False
Q4) Which of the following is NOT one of the 3 objectives the IT strategic plan must meet to allow an organization to achieve its goals?
A)Alignment with the strategic plan
B)Clearly defined IT steering committee
C)IS development resources allocated
D)Seamless IT architecture
Q5) A request for proposal (RFP)is sent to potential customers.
A)True
B)False
Q6) Describe the vendor selection process for an information system.
To view all questions and flashcards with answers, click on the resource link above. Page 15

Chapter 14: Technology Guide 1 : Hardware
Available Study Resources on Quizplus for this Chatper
81 Verified Questions
81 Flashcards
Source URL: https://quizplus.com/quiz/38205
Sample Questions
Q1) Which of the following is the correct order of the computer hierarchy, from smallest to largest?
A)Supercomputers, mainframe computers, midrange computers, microcomputers
B)Microcomputers, midrange computers, mainframe computers, supercomputers
C)Microcomputers, mainframe computers, midrange computers, supercomputers
D)Supercomputers, midrange computers, mainframe computers, microcomputers
Q2) Secondary storage has which of the following characteristics?
A)It is nonvolatile.
B)It is more cost-effective than primary storage.
C)It is slower than primary storage.
D)It can utilize a variety of media.
E)All of these
Q3) Which of the following is an example of source-data automation?
A)Keyboard
B)Mouse
C)Barcode reader
D)Voice recognition
Q4) Describe the components that make up hardware.
Q5) Compare and contrast supercomputers, mainframes, midrange computers, and microcomputers.
Page 16
To view all questions and flashcards with answers, click on the resource link above.

Chapter 15: Technology Guide 2 : Software
Available Study Resources on Quizplus for this Chatper
59 Verified Questions
59 Flashcards
Source URL: https://quizplus.com/quiz/38207
Sample Questions
Q1) _____ is(are)a written description of a computer program's functions.
A)Explanatory instructions
B)Documentation
C)Graphical user interface
D)Plug and play
E)README files
Q2) In order to protect their software from illegal distribution, vendors often rely on ____________.
A)Secure packaging
B)Private security agents
C)Software licensing
D)Internet-based distribution methods
E)Personal honesty
Q3) As hardware costs have decreased over the past 20 years, software costs have also decreased)
A)True
B)False
Q4) _________ refers to a computer program that has been developed by a vendor and is available for purchase in a prepackaged form.
Q5) ___________ is a written description of the program's functions.
To view all questions and flashcards with answers, click on the resource link above. Page 17

Chapter 16: Technology Guide 3 : Cloud Computing
Available Study Resources on Quizplus for this Chatper
65 Verified Questions
65 Flashcards
Source URL: https://quizplus.com/quiz/38209
Sample Questions
Q1) ______________ handles all aspects of an application: the software, the resources to run it, and storing the data.
A)Infrastructure-as-a-service model
B)Platform-as-a-service model
C)Software-as-a-service model
D)SOAP model
Q2) Paula owns a variety store in a tourist town. The store recently went online, and the response has been remarkable. The store's current infrastructure is running close to capacity, so handling the influx of orders is taking much longer than it should. Which of the following suggestions might be the best solution for the company?
A)Add another server to their infrastructure.
B)Use grid computing to process the orders across many servers.
C)Use cloud computing services.
D)Use the services of a utility computing provider.
E)Convert their existing servers to virtual services.
Q3) Only small organizations can benefit from cloud computing.
A)True
B)False
Q4) Discuss web services.
To view all questions and flashcards with answers, click on the resource link above. Page 18

Chapter 17: Technology Guide 4 : Intelligent Systems
Available Study Resources on Quizplus for this Chatper
68 Verified Questions
68 Flashcards
Source URL: https://quizplus.com/quiz/38211
Sample Questions
Q1) Which of the following is not a characteristic of genetic algorithms?
A)Selection
B)Crossover
C)Transformation
D)Mutation
Q2) Which of the following statements concerning expert systems is false?
A)The knowledge base contains facts.
B)The knowledge base contains rules.
C)An expert system can explain its recommendation.
D)The blackboard displays the recommendation.
E)Expert systems cannot learn from their own mistakes.
Q3) Fuzzy logic defines subjective concepts.
A)True
B)False
Q4) _________ gives preference to better and better outcomes.
A)Crossover
B)Evolution
C)Mutation
D)Selection
Q5) Compare and contrast fuzzy logic and neural networks.
To view all questions and flashcards with answers, click on the resource link above. Page 19

Chapter 18: Technology Guide 5 Protecting Your Information Assets
Available Study Resources on Quizplus for this Chatper
55 Verified Questions
55 Flashcards
Source URL: https://quizplus.com/quiz/38213
Sample Questions
Q1) _____________ is an example of a behavioural action you can take to protect your information assets.
A)Don't download files/software from websites you don't know or trust
B)Limit your use of debit cards
C)Never post personal information about yourself on social networking sites
D)Update your privacy settings on Facebook, Twitter, etc.
Q2) Discuss the pros and cons of using credit cards vs. debit cards.
Q3) A single-cut shredder is sufficient to shred your documents at home, whereas a cross-cut (confetti)shredder is necessary at work because your work documents are more sensitive.
A)True
B)False
Q4) Your liability with credit cards is typically ________, whereas your liability with debit cards is _________.
A)the amount in your bank account, your credit limit
B)your credit limit, the amount in your bank account
C)the amount in your bank account, zero
D)your credit limit, zero
E)zero, the amount in your bank account
Q5) What functions should a personal firewall provide for you?
To view all questions and flashcards with answers, click on the resource link above. Page 20