

Introduction to Information Systems
Question Bank
Course Introduction
Introduction to Information Systems provides an overview of the fundamental concepts and practical applications of information systems in modern organizations. The course explores how information systems support business processes, decision-making, and strategy by integrating technology, people, and data. Students will learn about the various types of information systems, including transaction processing systems, management information systems, and decision support systems. Topics also include ethical and social issues in information systems, systems development, and trends such as cloud computing and big data. Through case studies and real-world examples, students will gain insights into the role of information systems in enhancing organizational performance and competitiveness.
Recommended Textbook
Business Data Networks and Security 9th Edition by Raymond R. Panko
Available Study Resources on Quizplus 15 Chapters
1182 Verified Questions
1182 Flashcards
Source URL: https://quizplus.com/study-set/1451

Page 2
Chapter 1: Welcome to the Cloud
Available Study Resources on Quizplus for this Chatper
92 Verified Questions
92 Flashcards
Source URL: https://quizplus.com/quiz/28793
Sample Questions
Q1) Which standard does fragmentation?
A)IP
B)TCP
C)UDP
D)none of the above
Answer: B
Q2) ________ are carried inside ________.
A)Frames, packets
B)Packets, frames
C)Both A and B
D)Neither A nor B
Answer: B
Q3) A switch knows a packet's entire path through a switched network.
A)True
B)False
Answer: False
Q4) The correct metric prefix for kilo is K.
A)True
B)False
Answer: False

Page 3
To view all questions and flashcards with answers, click on the resource link above.
Chapter 2: Network Standards
Available Study Resources on Quizplus for this Chatper
100 Verified Questions
100 Flashcards
Source URL: https://quizplus.com/quiz/28800
Sample Questions
Q1) Which of the following has a header checksum field?
A)TCP
B)UDP
C)both A and B
D)neither A nor B
Answer: C
Q2) Increasing an alternatives field length by one bit always doubles the number of alternatives it can represent.
A)True
B)False
Answer: True
Q3) Ethernet MAC addresses are ________ long.
A)4 octets
B)6 octets
C)32 octets
D)48 octets
Answer: B
To view all questions and flashcards with answers, click on the resource link above.

Page 4

Chapter 3: Network Security
Available Study Resources on Quizplus for this Chatper
152 Verified Questions
152 Flashcards
Source URL: https://quizplus.com/quiz/28801
Sample Questions
Q1) What type of attacker are most attackers today?
A)disgruntled employees and ex-employees
B)criminals
C)hackers motivated by a sense of power
D)cyberterrorists
Answer: B
Q2) Forensic procedures are ways to capture and safeguard data in ways that fit rules of evidence in court proceedings.
A)True
B)False
Answer: True
Q3) An attacker must break through two firewalls to get to a host.This illustrates the principle called ________.(Select the most specific answer.)
A)comprehensive security
B)risk assurance
C)having a DMZ
D)defense in depth
Answer: D
To view all questions and flashcards with answers, click on the resource link above. Page 5
Chapter 4: Network Management
Available Study Resources on Quizplus for this Chatper
96 Verified Questions
96 Flashcards
Source URL: https://quizplus.com/quiz/28802
Sample Questions
Q1) ________ can help reduce the traffic coming into a network.
A)Traffic shaping
B)Compression
C)Both A and B
D)Neither A nor B
Q2) Jitter is a problem for ________.
A)voice over IP (VoIP)
B)streaming media
C)both A and B
D)neither A nor B
Q3) Which of the following is not one of the main elements in SNMP?
A)the manager
B)managed devices
C)the management information base
D)All of the above are main elements in SNMP.
Q4) The percentage of packets that are lost or damaged during delivery is called the ________.
A)packet error rate
B)bit error rate
C)neither A nor B

Page 6
To view all questions and flashcards with answers, click on the resource link above.

Chapter 5: Wired Ethernet Lans
Available Study Resources on Quizplus for this Chatper
117 Verified Questions
117 Flashcards
Source URL: https://quizplus.com/quiz/28803
Sample Questions
Q1) In LANs,optical fiber typically is used in ________.
A)trunk lines
B)access lines
Q2) An Ethernet data field is 100 octets long.How long will the PAD be?
A)There will not be a PAD.
B)46 octets
C)1,400 octets
D)1,500 octets
Q3) In Ethernet,limiting transmission to 100 meters is done to limit ________.
A)attenuation
B)terminal crosstalk interference
C)both A and B
D)neither A nor B
Q4) The Ethernet data field contains ________.
A)a packet
B)the LLC subheader
C)both A and B
Q5) VLANs can be used to provide security.
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above.

Chapter 6: Wireless Lans I
Available Study Resources on Quizplus for this Chatper
97 Verified Questions
97 Flashcards
Source URL: https://quizplus.com/quiz/28804
Sample Questions
Q1) Which of the following has longer range?
A)802.11g
B)802.11n
C)Both have about the same range.
Q2) What propagation problem becomes worse as frequency increases?
A)inverse square law attenuation
B)electromagnetic interference
C)both A and B
D)neither A nor B
Q3) Wireless network standards operate at ________.
A)the data link layer
B)the internet layer
C)both A and B
D)neither A nor B
Q4) What happens if two nearby access points use the same channel?
A)They will interfere with each other.
B)They will be bonded for joint operation automatically.
C)They will be bonded for joint operation automatically if they use CSMA/CA+ACK.
D)They will be bonded for joint operation automatically if they use RTS/CTS.
To view all questions and flashcards with answers, click on the resource link above. Page 8
Chapter 7: Wireless Lans 2
Available Study Resources on Quizplus for this Chatper
75 Verified Questions
75 Flashcards
Source URL: https://quizplus.com/quiz/28805
Sample Questions
Q1) Which of the following can use access points?
A)802.11
B)Bluetooth
C)both A and B
D)neither A nor B
Q2) What security protocol originally came with 802.11 equipment?
A)802.11i
B)WEP
C)both A and B
D)neither A nor B
Q3) Which offers stronger security?
A)WPA
B)802.11i
C)Both A and B offer equally strong security.
Q4) Which of the following has a dangerous vulnerability that is causing problems today?
A)PEAP
B)802.11i
C)WPA
D)WPS

Page 9
To view all questions and flashcards with answers, click on the resource link above.
Chapter 8: Tcpip Internetworking I
Available Study Resources on Quizplus for this Chatper
96 Verified Questions
96 Flashcards
Source URL: https://quizplus.com/quiz/28806
Sample Questions
Q1) An autonomous system can freely select the exterior dynamic routing protocol it will use.
A)True
B)False
Q2) If the ACK bit is set,the acknowledgment number field MUST have a value.
A)True
B)False
Q3) Which of the following is reliable?
A)TCP
B)IP
C)both A and B
D)neither A nor B
Q4) For a given volume of traffic,which are more expensive?
A)switches
B)routers
C)Both of the above are about equally expensive.
Q5) Compared to normal routing,decision caching is ________.
A)faster
B)less dangerous
C)both A and B

Page 10
To view all questions and flashcards with answers, click on the resource link above.

Chapter 9: Tcpip Internetworking 2
Available Study Resources on Quizplus for this Chatper
104 Verified Questions
104 Flashcards
Source URL: https://quizplus.com/quiz/28807
Sample Questions
Q1) The first stage in IPv6 stateless autoconfiguration is to create an address that can only be used on the host's single network.
A)True
B)False
Q2) SNMPv3 uses ________ for authentication.
A)community names
B)digital certificates and digital signatures
C)a different password for each manager-agent pair
D)all of the above
Q3) ".edu" is a ________.
A)root domain
B)top-level domain
C)second-level domain
D)none of the above
Q4) In SNMP,the manager communicates directly with a(n)________.
A)managed device
B)agent
C)both A and B
D)neither A nor B
To view all questions and flashcards with answers, click on the resource link above. Page 11

Chapter 10: Wide Area Networks
Available Study Resources on Quizplus for this Chatper
84 Verified Questions
84 Flashcards
Source URL: https://quizplus.com/quiz/28794
Sample Questions
Q1) WAN prices are closely related to carrier costs.
A)True
B)False
Q2) A network that runs on the customer premises is a ________.
A)LAN
B)WAN
C)both A and B
D)neither A nor B
Q3) In ADSL,the customer should have ________.
A)splitters
B)an ADSL modem
C)both A and B
D)neither A nor B
Q4) When a cellular customer moves from one city to another,this is ________.
A)roaming
B)a handoff
C)both A and B
D)neither A nor B
To view all questions and flashcards with answers, click on the resource link above.
Page 12

Chapter 11: Networked Applications
Available Study Resources on Quizplus for this Chatper
95 Verified Questions
95 Flashcards
Source URL: https://quizplus.com/quiz/28795
Sample Questions
Q1) The way in which application layer functions are spread among computers to deliver service to users is called ________.
A)distributed processing
B)peer-to-peer computing
C)client/server computing
D)an application architecture
Q2) The detailed method of Skype's encryption for confidentiality is unknown.
A)True
B)False
Q3) A networked application is an application that requires a network to operate.
A)True
B)False
Q4) An organization that provides cloud services is called a cloud ISP.
A)True
B)False
Q5) In virtualization,each virtual machine acts like a stand-alone computer to its users.
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above. Page 13

Chapter 12: Module a More on Tcp
Available Study Resources on Quizplus for this Chatper
4 Verified Questions
4 Flashcards
Source URL: https://quizplus.com/quiz/28796
Sample Questions
Q1) A TCP segment carries data octets 456 through 980.The following TCP segment is a supervisory segment carrying no data.What value is in the sequence number field of the latter TCP segment?
A)456
B)457
C)980
D)981
Q2) Flow control in TCP depends on the ________ field.
A)acknowledgement number
B)window size
C)both A and B
D)neither A nor B
Q3) A TCP segment begins with octet 8,658 and ends with octet 12,783.What number does the sending host put in the sequence number field?
A)8,658
B)8,659
C)12,783
D)12,784
To view all questions and flashcards with answers, click on the resource link above.
14

Chapter 13: Module B More on Modulation
Available Study Resources on Quizplus for this Chatper
12 Verified Questions
12 Flashcards
Source URL: https://quizplus.com/quiz/28797
Sample Questions
Q1) QAM uses ________.
A)amplitude modulation
B)phase modulation
C)both A and B
D)neither A nor B
Q2) QPSK modulation uses ________ phases.
A)2
B)4
C)8
D)15
Q3) BPSK uses ________ phase levels.
A)2
B)4
C)8
D)15
Q4) QAM uses ________ levels.
A)loudness
B)frequency
C)both A and B
D)neither A nor B
To view all questions and flashcards with answers, click on the resource link above. Page 15

Chapter 14: Module C More on Telecommunications
Available Study Resources on Quizplus for this Chatper
47 Verified Questions
47 Flashcards
Source URL: https://quizplus.com/quiz/28798
Sample Questions
Q1) In telephone wiring,there needs to be four wires for each computer on the floor in
A)horizontal distribution
B)vertical distribution
C)both A and B
D)neither A nor B
Q2) ICCs provide telephone transmission service ________.
A)within LATAs
B)between LATAs
C)between different countries
D)all of the above
Q3) A ring topology is attractive because it brings ________.
A)higher speed
B)lower cost
C)greater reliability
D)all of the above
Q4) For PBXs,camp-on is ________.
A)a user service
B)an attendant service
C)a management service
To view all questions and flashcards with answers, click on the resource link above. Page 16

Chapter 15: Module D Directory Servers
Available Study Resources on Quizplus for this Chatper
11 Verified Questions
11 Flashcards
Source URL: https://quizplus.com/quiz/28799
Sample Questions
Q1) A group of Active Directory domains organized in a hierarchy is a ________.
A)network
B)tree
C)forest
D)none of the above
Q2) A company may have many AD domains.
A)True
B)False
Q3) In AD,there is complete replication between domain controllers ________.
A)in the same domain
B)in adjacent levels in the domain hierarchy
C)throughout a tree
D)throughout a forest
Q4) In AD,there is partial replication between domain controllers ________.
A)in the same domain
B)in different domains at adjacent levels in the domain hierarchy
C)both A and B
D)neither A nor B
To view all questions and flashcards with answers, click on the resource link above. Page 17