Introduction to Information Systems Final Test Solutions - 1795 Verified Questions

Page 1


Introduction to Information Systems

Final Test Solutions

Course Introduction

Introduction to Information Systems provides a foundational understanding of how information systems are used to support business operations, decision-making, and competitive advantage. The course covers key concepts such as hardware, software, networks, databases, and data management, while exploring the strategic role of information technology in organizations. Students will learn to analyze, design, and evaluate information systems, discuss ethical and security considerations, and examine current trends affecting the field. Through case studies and practical assignments, learners will develop an appreciation for how information systems drive business success and shape the modern digital landscape.

Recommended Textbook

New Perspectives on Computer Concepts 2014 Comprehensive 17th Edition by June Jamrich Parsons

Available Study Resources on Quizplus

12 Chapters

1795 Verified Questions

1795 Flashcards

Source URL: https://quizplus.com/study-set/942 Page 2

Chapter 1: Computers and Digital Basics

Available Study Resources on Quizplus for this Chatper

147 Verified Questions

147 Flashcards

Source URL: https://quizplus.com/quiz/18552

Sample Questions

Q1) In the accompanying figure,the sound wave indicated by B has been sliced into samples and so has been ____________________.

Answer: digitized

Q2) A super-thin slice of semiconducting material packed with microscopic circuit elements is a(n)____.

A) integrated circuit

B) computer chip

C) microchip

D) all of the above

Answer: D

Q3) A problem a hacker can cause after breaking into your computer might be ____.

A) applying for credit in your name

B) sending embarrassing e-mails

C) applying for a mortgage using your data

D) all of the above

Answer: D

Q4) Worldwide economic interdependence of countries that occurs as cross-border commerce increases and as money flows more freely among countries is ____________________.

Answer: globalization

Page 3

To view all questions and flashcards with answers, click on the resource link above.

Chapter 2: Computer Hardware

Available Study Resources on Quizplus for this Chatper

150 Verified Questions

150 Flashcards

Source URL: https://quizplus.com/quiz/18553

Sample Questions

Q1) In RAM,a microscopic electronic part called a(n)____________________ is used to hold a bit.

Answer: capacitor

Q2) The item marked D in the accompanying figure is an audio port.

A)True

B)False

Answer: False

Q3) The <u>microprocessor</u> is the most important component of a computer and usually the most expensive single component._________________________

A)True

B)False

Answer: True

Q4) CD-RW technology allows you to write data to a disc and then later change that data.

A)True

B)False

Answer: True

To view all questions and flashcards with answers, click on the resource link above. Page 4

Chapter 3: Software

Available Study Resources on Quizplus for this Chatper

149 Verified Questions

149 Flashcards

Source URL: https://quizplus.com/quiz/18554

Sample Questions

Q1) In the accompanying figure,the files marked C is a(n)____.

A) data file

B) executable file

C) support program file

D) help file

Answer: C

Q2) The item shown in the accompanying figure is ____.

A) purchased separately from the software

B) really pirated software

C) displayed on-screen when you first install software

D) licensed only to as many as one dozen separate computers

Answer: C

Q3) If you purchase software,it belongs to you,and you can do what you want,including copying it.

A)True

B)False

Answer: False

Q4) In the context of office suites,the term ____________________ refers to a component,such as one for word processing.

Answer: module

To view all questions and flashcards with answers, click on the resource link above. Page 5

Chapter 4: Operating Systems and File Management

Available Study Resources on Quizplus for this Chatper

150 Verified Questions

150 Flashcards

Source URL: https://quizplus.com/quiz/18555

Sample Questions

Q1) Weaknesses of Mac OS include ____.

A) limited selection of applications

B) typically requires more tinkering

C) cryptic command-line user interface

D) all of the above

Q2) The difference between the Save and the Save As commands is that ____.

A) one is used with an existing file and one is used when a new file without a name is open

B) one is used with an existing file,and one is used when you need a new name

C) one is used with an existing file,and one is used when you want to save in a new location

D) all of the above

Q3) The combination of hardware and software that helps people and computers communicate with each other is a user ____________________.

Q4) In the accompanying figure,Music is an example of a ____.

A) drive

B) primary folder

C) secondary folder

D) file name

Q5) The operating system kernel of Mac OS X is based on ____________________.

Page 6

To view all questions and flashcards with answers, click on the resource link above.

Chapter 5: Local Area Networks

Available Study Resources on Quizplus for this Chatper

150 Verified Questions

150 Flashcards

Source URL: https://quizplus.com/quiz/18556

Sample Questions

Q1) A packet always travels from the source directly to the destination,never traveling through intermediate routing devices.

A)True

B)False

Q2) ____________________ switching essentially establishes a private link between one telephone and another for the duration of a call.

Q3) If networked,____ can be accessed by an authorized LAN user.

A) scanners

B) high-capacity storage devices

C) photo printers

D) all of the above

Q4) A protocol known as ____ is designed to automatically distribute IP addresses.

A) DHCP

B) packet switching

C) CSMA/CD

D) a piconet

Q5) ____________________ resources like hardware,software,and data are made available for authorized network users to access.

Q6) A(n)____________________ is the name of a wireless network.

Page 7

To view all questions and flashcards with answers, click on the resource link above.

Chapter 6: The Internet

Available Study Resources on Quizplus for this Chatper

149 Verified Questions

149 Flashcards

Source URL: https://quizplus.com/quiz/18557

Sample Questions

Q1) An Ethernet-compatible network standard designated as IEEE 802.16 is ____.

A) WiFi

B) WiLAN

C) WiMAX

D) WiMAN

Q2) Explain the difference between portable Internet access and mobile Internet access.

Q3) Non-routable IP address

A)anonymous FTP

B)private IP address

C)symmetric Internet connection

D)static IP address

E)Ping

F)routable IP address

G)asymmetric Internet connection

H)VPN

I)NAP

J)dynamic IP address

K)Internet backbone

L)fixed wireless Internet service

To view all questions and flashcards with answers, click on the resource link above.

Page 8

Chapter 7: The Web and E-mail

Available Study Resources on Quizplus for this Chatper

150 Verified Questions

150 Flashcards

Source URL: https://quizplus.com/quiz/18558

Sample Questions

Q1) Maintains no record of previous interactions

A)pharming

B)spam

C)HTTP

D)cookie

E)phishing

F)Web server

G)XHTML

H)socket

I)B2C

J)anonymous proxy service

K)stateless protocol

L)browser

Q2) HTTP is a protocol that works with TCP/IP to get Web resources to your desktop.

A)True

B)False

Q3) ____________________ is typically used to describe business transactions that are conducted over a computer network.

Q4) What are the advantages of local e-mail?

Q5) PayPal is an example of a(n)____________________ payment service.

To view all questions and flashcards with answers, click on the resource link above. Page 9

Chapter 8: Digital Media

Available Study Resources on Quizplus for this Chatper

150 Verified Questions

150 Flashcards

Source URL: https://quizplus.com/quiz/18559

Sample Questions

Q1) ____ is a digital rights management technology designed to encrypt and control the use of content stored on DVDs.

A) DeCSS

B) AACS

C) CSS

D) Revocation

Q2) ____ preprocesses an image by tweaking the colors in adjoining pixels so that they are the same color whenever possible.

A) BMP

B) PCX

C) JPEG

D) TIFF

Q3) ____ requires Windows Media Player 9 or above.

A) MP3

B) WMA

C) AAC

D) WAV

Q4) A bitmap graphic is divided into a grid of individually colored

Q5) You can select a portion of a bitmap graphic by ____________________ it.

Page 10

To view all questions and flashcards with answers, click on the resource link above.

Chapter 9: The Computer Industry: History,Careers,and Ethics

Available Study Resources on Quizplus for this Chatper

150 Verified Questions

150 Flashcards

Source URL: https://quizplus.com/quiz/18560

Sample Questions

Q1) The ____ Act makes it a criminal offense to knowingly access a computer without authorization.

A) Homeland Security

B) Electronic Communications Privacy

C) USA Patriot

D) Computer Fraud and Abuse

Q2) A calculator that implements instructions autonomously is a(n)____.

A) slide rule

B) abacus

C) mechanical calculator

D) algorithm

Q3) A person who designs,codes,and tests computer programs is a ____.

A) computer specialist

B) computer programmer

C) computer analyst

D) computer technician

Q4) Computer hardware and software are sold through outlets called marketing

To view all questions and flashcards with answers, click on the resource link above. Page 11

Q5) The sharp rise in the stock value of the dot-com industry is called the dot-com

Chapter 10: Information Systems Analysis and Design

Available Study Resources on Quizplus for this Chatper

150 Verified Questions

150 Flashcards

Source URL: https://quizplus.com/quiz/18561

Sample Questions

Q1) An information system must support the needs of people who engage in many different organizational activities.

A)True

B)False

Q2) Software testing might reveal ____ (errors)in the software,which must be corrected by the software developer.

A) blings

B) bumps

C) blips

D) bugs

Q3) With current ____ technologies,corporations have no way to lock down their branding elements.

A) HTTP

B) FTP

C) URI

D) UML

Q4) Describe in detail the following three common threats to data stored on corporate information systems: Natural disasters,Power outages,and Equipment failures.

Q5) EIS stands for ____________________.

To view all questions and flashcards with answers, click on the resource link above. Page 12

Chapter 11: Databases

Available Study Resources on Quizplus for this Chatper

150 Verified Questions

150 Flashcards

Source URL: https://quizplus.com/quiz/18562

Sample Questions

Q1) ____ can block unauthorized users and limit activities of authorized users.

A) Activity controls

B) Access controls

C) Monitoring controls

D) Keystroke controls

Q2) ____ is the SQL command used to introduce a brand-new database or table.

A) BUILD

B) NEW

C) CREATE

D) START

Q3) A(n)____________________ key is a field that contains data unique to a record.

Q4) To provide a quality database interface,a designer might ____.

A) arrange fields in a logical order

B) minimize on-screen instructions to save space

C) position entry areas randomly

D) use only one type of control on the interface

Q5) In the accompanying figure,the relationship shown in the bottom row is a many-to-many relationship.

A)True

B)False

Page 13

To view all questions and flashcards with answers, click on the resource link above.

Chapter 12: Computer Programming

Available Study Resources on Quizplus for this Chatper

150 Verified Questions

150 Flashcards

Source URL: https://quizplus.com/quiz/18563

Sample Questions

Q1) Signed certificates assure users that the original software is free of viruses and bugs.

A)True

B)False

Q2) In the threat model STRIDE,the E stands for ____ or modifying user rights to gain access to data.

A) elevation of service

B) edification

C) elevation of privilege

D) electrification

Q3) A hierarchical diagram of potential attacks against a system is an attack

Q4) The first widely used,standardized procedural computer language was ____.

A) BASIC

B) C

C) Fortran

D) C++

Q5) A software program that identifies its source and carries a digital certificate attesting to its authenticity is code identified as being ____________________.

To view all questions and flashcards with answers, click on the resource link above. Page 14

Turn static files into dynamic content formats.

CreateΒ aΒ flipbook