

Introduction to Information Systems
Final Test Solutions
Course Introduction
Introduction to Information Systems provides a foundational understanding of how information systems are used to support business operations, decision-making, and competitive advantage. The course covers key concepts such as hardware, software, networks, databases, and data management, while exploring the strategic role of information technology in organizations. Students will learn to analyze, design, and evaluate information systems, discuss ethical and security considerations, and examine current trends affecting the field. Through case studies and practical assignments, learners will develop an appreciation for how information systems drive business success and shape the modern digital landscape.
Recommended Textbook
New Perspectives on Computer Concepts 2014 Comprehensive 17th Edition by June Jamrich Parsons
Available Study Resources on Quizplus
12 Chapters
1795 Verified Questions
1795 Flashcards
Source URL: https://quizplus.com/study-set/942 Page 2

Chapter 1: Computers and Digital Basics
Available Study Resources on Quizplus for this Chatper
147 Verified Questions
147 Flashcards
Source URL: https://quizplus.com/quiz/18552
Sample Questions
Q1) In the accompanying figure,the sound wave indicated by B has been sliced into samples and so has been ____________________.
Answer: digitized
Q2) A super-thin slice of semiconducting material packed with microscopic circuit elements is a(n)____.
A) integrated circuit
B) computer chip
C) microchip
D) all of the above
Answer: D
Q3) A problem a hacker can cause after breaking into your computer might be ____.
A) applying for credit in your name
B) sending embarrassing e-mails
C) applying for a mortgage using your data
D) all of the above
Answer: D
Q4) Worldwide economic interdependence of countries that occurs as cross-border commerce increases and as money flows more freely among countries is ____________________.
Answer: globalization

Page 3
To view all questions and flashcards with answers, click on the resource link above.

Chapter 2: Computer Hardware
Available Study Resources on Quizplus for this Chatper
150 Verified Questions
150 Flashcards
Source URL: https://quizplus.com/quiz/18553
Sample Questions
Q1) In RAM,a microscopic electronic part called a(n)____________________ is used to hold a bit.
Answer: capacitor
Q2) The item marked D in the accompanying figure is an audio port.
A)True
B)False
Answer: False
Q3) The <u>microprocessor</u> is the most important component of a computer and usually the most expensive single component._________________________
A)True
B)False
Answer: True
Q4) CD-RW technology allows you to write data to a disc and then later change that data.
A)True
B)False
Answer: True
To view all questions and flashcards with answers, click on the resource link above. Page 4

Chapter 3: Software
Available Study Resources on Quizplus for this Chatper
149 Verified Questions
149 Flashcards
Source URL: https://quizplus.com/quiz/18554
Sample Questions
Q1) In the accompanying figure,the files marked C is a(n)____.
A) data file
B) executable file
C) support program file
D) help file
Answer: C
Q2) The item shown in the accompanying figure is ____.
A) purchased separately from the software
B) really pirated software
C) displayed on-screen when you first install software
D) licensed only to as many as one dozen separate computers
Answer: C
Q3) If you purchase software,it belongs to you,and you can do what you want,including copying it.
A)True
B)False
Answer: False
Q4) In the context of office suites,the term ____________________ refers to a component,such as one for word processing.
Answer: module
To view all questions and flashcards with answers, click on the resource link above. Page 5

Chapter 4: Operating Systems and File Management
Available Study Resources on Quizplus for this Chatper
150 Verified Questions
150 Flashcards
Source URL: https://quizplus.com/quiz/18555
Sample Questions
Q1) Weaknesses of Mac OS include ____.
A) limited selection of applications
B) typically requires more tinkering
C) cryptic command-line user interface
D) all of the above
Q2) The difference between the Save and the Save As commands is that ____.
A) one is used with an existing file and one is used when a new file without a name is open
B) one is used with an existing file,and one is used when you need a new name
C) one is used with an existing file,and one is used when you want to save in a new location
D) all of the above
Q3) The combination of hardware and software that helps people and computers communicate with each other is a user ____________________.
Q4) In the accompanying figure,Music is an example of a ____.
A) drive
B) primary folder
C) secondary folder
D) file name
Q5) The operating system kernel of Mac OS X is based on ____________________.
Page 6
To view all questions and flashcards with answers, click on the resource link above.

Chapter 5: Local Area Networks
Available Study Resources on Quizplus for this Chatper
150 Verified Questions
150 Flashcards
Source URL: https://quizplus.com/quiz/18556
Sample Questions
Q1) A packet always travels from the source directly to the destination,never traveling through intermediate routing devices.
A)True
B)False
Q2) ____________________ switching essentially establishes a private link between one telephone and another for the duration of a call.
Q3) If networked,____ can be accessed by an authorized LAN user.
A) scanners
B) high-capacity storage devices
C) photo printers
D) all of the above
Q4) A protocol known as ____ is designed to automatically distribute IP addresses.
A) DHCP
B) packet switching
C) CSMA/CD
D) a piconet
Q5) ____________________ resources like hardware,software,and data are made available for authorized network users to access.
Q6) A(n)____________________ is the name of a wireless network.
Page 7
To view all questions and flashcards with answers, click on the resource link above.

Chapter 6: The Internet
Available Study Resources on Quizplus for this Chatper
149 Verified Questions
149 Flashcards
Source URL: https://quizplus.com/quiz/18557
Sample Questions
Q1) An Ethernet-compatible network standard designated as IEEE 802.16 is ____.
A) WiFi
B) WiLAN
C) WiMAX
D) WiMAN
Q2) Explain the difference between portable Internet access and mobile Internet access.
Q3) Non-routable IP address
A)anonymous FTP
B)private IP address
C)symmetric Internet connection
D)static IP address
E)Ping
F)routable IP address
G)asymmetric Internet connection
H)VPN
I)NAP
J)dynamic IP address
K)Internet backbone
L)fixed wireless Internet service
To view all questions and flashcards with answers, click on the resource link above.
Page 8

Chapter 7: The Web and E-mail
Available Study Resources on Quizplus for this Chatper
150 Verified Questions
150 Flashcards
Source URL: https://quizplus.com/quiz/18558
Sample Questions
Q1) Maintains no record of previous interactions
A)pharming
B)spam
C)HTTP
D)cookie
E)phishing
F)Web server
G)XHTML
H)socket
I)B2C
J)anonymous proxy service
K)stateless protocol
L)browser
Q2) HTTP is a protocol that works with TCP/IP to get Web resources to your desktop.
A)True
B)False
Q3) ____________________ is typically used to describe business transactions that are conducted over a computer network.
Q4) What are the advantages of local e-mail?
Q5) PayPal is an example of a(n)____________________ payment service.
To view all questions and flashcards with answers, click on the resource link above. Page 9

Chapter 8: Digital Media
Available Study Resources on Quizplus for this Chatper
150 Verified Questions
150 Flashcards
Source URL: https://quizplus.com/quiz/18559
Sample Questions
Q1) ____ is a digital rights management technology designed to encrypt and control the use of content stored on DVDs.
A) DeCSS
B) AACS
C) CSS
D) Revocation
Q2) ____ preprocesses an image by tweaking the colors in adjoining pixels so that they are the same color whenever possible.
A) BMP
B) PCX
C) JPEG
D) TIFF
Q3) ____ requires Windows Media Player 9 or above.
A) MP3
B) WMA
C) AAC
D) WAV
Q4) A bitmap graphic is divided into a grid of individually colored
Q5) You can select a portion of a bitmap graphic by ____________________ it.
Page 10
To view all questions and flashcards with answers, click on the resource link above.

Chapter 9: The Computer Industry: History,Careers,and Ethics
Available Study Resources on Quizplus for this Chatper
150 Verified Questions
150 Flashcards
Source URL: https://quizplus.com/quiz/18560
Sample Questions
Q1) The ____ Act makes it a criminal offense to knowingly access a computer without authorization.
A) Homeland Security
B) Electronic Communications Privacy
C) USA Patriot
D) Computer Fraud and Abuse
Q2) A calculator that implements instructions autonomously is a(n)____.
A) slide rule
B) abacus
C) mechanical calculator
D) algorithm
Q3) A person who designs,codes,and tests computer programs is a ____.
A) computer specialist
B) computer programmer
C) computer analyst
D) computer technician
Q4) Computer hardware and software are sold through outlets called marketing
To view all questions and flashcards with answers, click on the resource link above. Page 11
Q5) The sharp rise in the stock value of the dot-com industry is called the dot-com

Chapter 10: Information Systems Analysis and Design
Available Study Resources on Quizplus for this Chatper
150 Verified Questions
150 Flashcards
Source URL: https://quizplus.com/quiz/18561
Sample Questions
Q1) An information system must support the needs of people who engage in many different organizational activities.
A)True
B)False
Q2) Software testing might reveal ____ (errors)in the software,which must be corrected by the software developer.
A) blings
B) bumps
C) blips
D) bugs
Q3) With current ____ technologies,corporations have no way to lock down their branding elements.
A) HTTP
B) FTP
C) URI
D) UML
Q4) Describe in detail the following three common threats to data stored on corporate information systems: Natural disasters,Power outages,and Equipment failures.
Q5) EIS stands for ____________________.
To view all questions and flashcards with answers, click on the resource link above. Page 12
Chapter 11: Databases
Available Study Resources on Quizplus for this Chatper
150 Verified Questions
150 Flashcards
Source URL: https://quizplus.com/quiz/18562
Sample Questions
Q1) ____ can block unauthorized users and limit activities of authorized users.
A) Activity controls
B) Access controls
C) Monitoring controls
D) Keystroke controls
Q2) ____ is the SQL command used to introduce a brand-new database or table.
A) BUILD
B) NEW
C) CREATE
D) START
Q3) A(n)____________________ key is a field that contains data unique to a record.
Q4) To provide a quality database interface,a designer might ____.
A) arrange fields in a logical order
B) minimize on-screen instructions to save space
C) position entry areas randomly
D) use only one type of control on the interface
Q5) In the accompanying figure,the relationship shown in the bottom row is a many-to-many relationship.
A)True
B)False

Page 13
To view all questions and flashcards with answers, click on the resource link above.

Chapter 12: Computer Programming
Available Study Resources on Quizplus for this Chatper
150 Verified Questions
150 Flashcards
Source URL: https://quizplus.com/quiz/18563
Sample Questions
Q1) Signed certificates assure users that the original software is free of viruses and bugs.
A)True
B)False
Q2) In the threat model STRIDE,the E stands for ____ or modifying user rights to gain access to data.
A) elevation of service
B) edification
C) elevation of privilege
D) electrification
Q3) A hierarchical diagram of potential attacks against a system is an attack
Q4) The first widely used,standardized procedural computer language was ____.
A) BASIC
B) C
C) Fortran
D) C++
Q5) A software program that identifies its source and carries a digital certificate attesting to its authenticity is code identified as being ____________________.
To view all questions and flashcards with answers, click on the resource link above. Page 14