MIS Multiple Choice Questions 1. Which of the following is not considered a quality of life issue: - Theft of intellectual content 2. Which of the following is generally not considered a quality of life issue when discussing information systems: - Slow systems performance. 3. Cobol- Common Business Oriented Language is an example of: - Third Generation Code 4. Which of following is probably not useful for mining data? - TPSs 5. In a simple data structure, a collection of records is called a - File 6. Which of the following is not commonly referred to as a communications protocol? - HTML 7. If you had to select a database management system for a very large company (millions of records) - Oracle 8. The W3C is responsible for which of the following standards: - HTML and XHTML 9. Which one of the following systems is used to represent data on a modern computer - Binary 10. Which of the following is not an input device - Screens 11. All computer data, be it text, voice or video is represented internally as - A binary digits 12. What type of media does your traditional phone line use in your home? - Twisted pair wire 13. Which of the following is not application software? - Google Android 14. The process of converting source code to machine/object code is known as - Compiling 15. Which of the following is not regarded as a problem with traditional data management techniques? - Inability to scale 16. Which of the following is not a recognized reason to use normalization with database tables. - Reduce the number of tables 17. The ability of telecommunications technologies help firms reduce the number of middle managers is an example of - Reduced agency costs 18. The data structure below is called a Data Structure Student ID Last Name First Name Date of Birth Faculty 829601234 Lannister Jamie 14-12-1975 Political Sciences 19. Which of the following languages would you expect to be popular on a Supercomputer - Fortran 20. According to Gordon Moore, the number of transistors in a central processing unit - Doubles every 18 months 21. The primary disadvantage of a centralized network architecture is: - It is reliant on a single point of failure. 22. What we now call the internet was once called the: - Arpanet 23. Data in a computer is passed from primary storage to the central processing unit over a: - Bus 24. In a simple data structure, a collection of files is called a - Database 25. When surfing the web you often type www.amazon.com , sta.uwi.edu, gmail.com, etc. These text strings are formally referred to as: - Domain names 26. System software is more commonly referred to as: - Operating system software 27. Even though developers can develop or adopt any communications protocols they wish, they all seem to adopt ICP and IP. Which of the following could account for this phenomena? - Metcalf’s Law 28. What technology do we need to use to allow a digital device to transmit data over an analog network? - Modems 29. If you were thinking of setting up a database for a very small business which of the following might be the best choice? - Microsoft Access 30. In modern relational database management systems, the most popular data manipulation language is often: - SQL - Structured Query Language 31. The networks at UWI and the SALCC are examples of LANs connected to each other by a - Campus area network 32. What type of media would you invest in if you had to set up a computer lab where you wanted to connect 50 laptops to a server? - Wi-Fi 33. Which of the following is not a component of modern computer hardware? - Virtual devices 34. Using the American Standard Code for Information Interchange (ASCII) the letter S is represented by how many bits? - 8 35. All computer data, be it text, voice or video is represented internally as 36. 37. 38. 39. 40. 41. 42. 43. 44. 45. 46. 47. 48. 49. - Binary digits An airline reservations system operates at which level of the organization? - Operational The term “islands of automation” refers to: - Systems that cannot share data Banks are incentivized to keep us out of their branches as far as possible. Towards this end they have introduced ATMs, online banking, and most recently, banking apps on our smartphones. What is the principal motivation for these initiatives? - Reduce transaction costs The software most of you actually use to get work done is called - Application software A collection of fields is called a - Record If you had to connect two university campuses together to facilitate video transmission of remote classes, which of the following would be the best choice? - Fiber Optic Cable What is the major advantage of Agile techniques over the SDLC? - End users get to use their systems more quickly. Electronic Mail is an example of which of the following - Office work system End user development is a strategy that has been proposed to deal with: - Development bottlenecks in the IT department Walmart’s Retail Plus System is an example of which of the following? - All of the other choices Knowledge management systems have wide applicability. But the industry in which we would expect them to have the best fit would be - Consulting Which of the following is a good reason to study information systems? a) We interact with information systems on a daily basis b) Many industries are essentially information industries c) All of the other options d) Many new services are information products e) Globalization means local companies are competing with sophisticated adversaries At which level of the organization would you expect to find an order processing system? - Operational level Before investing in a system, an organization needs to be clear on its a) Mission and Vision b) Objectives c) Strategies d) Strengths and weaknesses e) All of the displayed options 50. According to Carr investments in information technology do not confer a competitive advantage because (QUIZ 1) - Information technology is a commodity 51. An information system involves of all of the following functions except (QUIZ 1) - Planning 52. In order for large fast food retailers like KFC to coordinate production schedules with raw material procedures it can implement - Supply chain management systems 53. Which of the following is not normally considered part of the agile development framework - Extensive planning documents 54. An ERP system is found at which levels in a manufacturing organization (QUIZ 1) a) Strategic b) Knowledge c) Operational d) Management e) All the other options 55. The term SaaS stands for - Software as a service 56. A bar chart is an example of which of the following - Information 57. A prolonged shut down of an ESS can destroy an organization. Is this statement true or false? - False 58. Smartphones, tablets, and laptops are an example of information systems - False 59. A computer Aided Design system is an example if a - Knowledge Work System 60. Which of the following is not an example of an enterprise class system? - Executive Support Systems 61. Which of the following is not an information system - Desktop computer system 62. The point of sale system that we find in most grocery stores operates at what level of the organization? - Operational 63. The chief executive officer often has to wait weeks to get consolidated reports form his HR, accounting and payroll departments. This is an indicator that her company - Is suffering from islands of automation syndrome. 64. The point of sale system found in many retail stores is found at the management level of the organization. - False 65. Which of the following is an appropriate way to solve the islands of automation problem. - Create middleware 66. The Banner application that you use to register for classes, check grades, request overrides, etc. is an example of which of the following? - Information systems 67. In order to turn data into information you first need to _____ it. - Process 68. An organization that wants to create a comprehensive view of its historical operations would be well advised to create a - Database 69. In modern relational database management systems, the most popular data manipulation language is often - SQL 70. In information security, the strongest form of authentication is likely to be - a biometric reader 71. You are using a personal computer and it crashes causing you to miss an important deadline and lose a major contract. The ability to identify the specific developer of the component that caused it to crash to seek compensation is known as - Accountability 72. Which of the following is not a good justification for investing an information security programme information security programmes are inexpensive 73. Which one of the following laws best explains the network effects of accumulating additional knowledge. - Metcalf’s Law 74. Which of the following is not considered an intelligent technique. - Knowledge Networks 75. Neutral networks are best suited to: - Sifting through huge data sets looking for patterns. 76. The process of converting cipher text into clear text is called: - Decryption 77. A large computer manufacturing needs to have relatively inexperienced staff properly configure its mainframes before shipping them to customers. Which of the following systems is best suited to helping the staff perform this role effectively. - Expert Systems 78. Alice and Bob are using a public key encryption system. Bob receives a message from Alice. He needs to decrypt it using: - His private key 79. What do you need to do to copyright a book of poems that you have written: - NOTHING 80. Which of the following is generally not considered a social or ethical issue where information systems are concerned. - SYSTEMS QUALITY SYSTEMS PERFORMANCE - Quality of life 81. Bugs in software introduce vulnerabilities. Computer hackers often write viruses to ___these vulnerabilities. - Exploit 82. After spending several million on a new KM system, the managers are dissatisfied with its poor utilization. Which of the following is probably not a cause for this problem? - excess content 83. Siri, Google Now and Cortana are examples of - Intelligent Agents 84. Which of the following is the most important element of the Tesco systems? - Tesco’s employees 85. The phase that immediately follows the development phase in the SDLC is - Testing 86. A barcode is an example of which of the following 87. Which step immediately precedes development in the SDLC? - Conceptual design 88. The systems development process ends when the system is implemented. Is this statement true or false? - False 89. UWI’s decision to let Microsoft run the email systems for all 50,000 students is an example of (QUIZ 1) - SaaS 90. Off all the components of an information system, which is the most important when thinking about developing a competitive advantage. - People 91. A smart phone represents which of the following? - Information Technology 92. Which of the following are not considered in developing strategy? - Three-month production quotas 93. A manufacturing company that is converting to a new enterprise resource planning system would probably use a _____ conversion strategy - Phased approach 94. The decision to develop a system in house or to license a fully developed system depends on which of the following: a) The external environment b) Corporate strategy c) All of the other listed options d) Organizational culture e) Resources and capabilities 95. Which of the following is not an appropriate end user development tool? - Assembly Language 96. How might a company trying to become the low cost producer in an industry use information systems investments - It could invest in a SCM to reduce inventory and streamline coordination with suppliers. 97. For an investment to confer a competitive advantage it has to be in something that is - Scarce 98. The key feature of pilot conversions is that (QUIZ 1) - New systems are introduced in one business unit at a time. 99. A Computer Aided Design (CAD) is found at the executive level of the organization. Is this statement true or false? - False 100. Which of the following is the best example of tacit knowledge - A loan officer who has a gut feel as to the likelihood that you will not repay your loan 101. Companies routinely monitor employee email traffic during the work day. Which of the following social issues best represents this phenomenon. - privacy and control 102. In context of social and ethical issues in the information Age, the acronym FIP stands for: - Fair Information Practices 103. Which of the following types of systems is capable of “learning” and autonomous operation. - Neutral Networks 104. In the United States, copyright law prevents others from copying the work of a private author for after the death of the author. - 70 105. In what phase of the knowledge management value chain would expect to find artificial intelligence being used? - Discovery. 106. Kant's categorical Imperative states that - if an action is not right for everyone to take it is not right for anyone 107. An organization has an unimportant information asset and the risk to that asset has been assessed as low. The appropriate security strategy is probably to - ignore threats to the asset. 108. A company that uses an opt in policy when collecting your email address is probably using informed consent. - True 109. A feasibility report is an example of ___knowledge - Explicit 110. The inspiration for genetic algorithms comes from - The theory of evolution 111. As a security control, backups primarily address ____ issues. - Availability 112. A database has been changed in a way that it is no longer accurate. This is an example of - An integrity violation 113. The primary motivation for research into artificial intelligence is to - Build systems that can learn 114. Which of the following is not considered an intelligent techniques. - Knowledge networks 115. Which of the following household items most closely represents the functions of transistors found in modern CPUs like those produced by intel - Lightswitch 116. Which of the following is not a recognized reason to use normalization with database tables. - Reduce the number of tables 117. If you needed to design a telecommunications network for maximum reliability which of the following network typologies would you use? - Mesh 118. In UWIs Student Master File, your ID number is known as a - Primary key 119. How many BITS are needed to represent the following course code MGMT2006 - 64 120. Which of the following devices best represents the concepts of convergence in telecommunications? - Smartphones 121. If you were assigned to manage the development of a mission critical system for your firm, which methodology would you choose? - Systems Development Life Cycle 122. A firm using its ERP to develop a production schedule for the next week is an example of which of the following? - Tactics 123. In order to determine our best customers and provide outstanding support for them we should consider - a customer relationship management system 124. In order for an airline to efficiently roster the correct planes, flight and cabin crew for the hundreds of flights it schedules each day it needs to implement - a decision support system 125. Michael Porter lists five forces that act as inducements to strategic planning and thus to investments in information system. They are (QUIZ 1) - Rivalry among existing competitors, threat of new entrants, threat of substitute products, bargaining powers of buyers, and bargaining powers of suppliers. 126. Which of the following is not a transaction processing system - decision support 127. Programming normally occurs at what stage of the SDLC? - development 128. Which of the following classes of workers least likely to use a knowledge management system in their day to day duties? - factory workers 129. Which of the following is not an output device - sensors 130. Code that looks like - 010101010 011 011 0001 01010 100- is known as - first generation code 131. The primary reason for choosing binary to represent data inside a computer is - binary represents electrical signals easily 132. The correct formula for Metcalf’s Law where N is the number of users is - N^2 133. The National Weather Service needs to do a better job of atmospheric forecasting and have decided to upgrade their computing infrastructure. Which of the following is the most appropriate for weather forecasting? - Supercomputer 134. SETI and BitTorrent can be best described as examples of: - peer to peer networks 135. Systems software is more commonly referred to as - operating system software 136. What telecommunications media is used to connect the Caribbean islands to one another? - fiber optics 137. The last step of the SDLC is normally: (QUIZ 1) - Maintenance 138. A smartphone represents which of the following: a) information systems b) information c) all of the above d) data e) information technology 139. The video on TESCO is a good example of which of the - an information system 140. A digital dashboard which shows the status of all an organization’s key performance indicators as well as news about the external environment is an example of a: - executive support systems 141. At this point in time there are two versions of caribbean MIS running. the old version and the new version (which you are using as you read this). This is an example of which type of conversion strategy: - parallel 142. Which is often seen as the implementation methodology with the most risks: - direct cut over 143. What’s another term for RAM is - primary storage 144. two dimensional - logical view 145. the process of sifting through huge amounts of data in order to find previously unknown trends, patterns, and associations is known as: - data mining 146. A bar code is an example of which of the following. - data. 147. Which of the following are not considered in developing strategy? - Three month production quotas. 148. When discussing databases we normally present them as a collection of two dimensional tables. This method of presentation is often called the: - logical view 149. Hackers are attacking your firewall and a breach is imminent. Your last line of defense from a confidentiality violation is - encryption 150. What is the best way for an organization to protect the availability of its data from a variety of security threats? - Implement backups 151. A company that uses an opt in policy when collecting your email address is probably using informed consent. - True 152. Which one of the following is not a characteristic of knowledge? - it is subject to the laws of diminishing returns 153. Which of the following ethical frameworks speaks most directly to people who download pirated movies from the Internet. - The No Free Lunch Rule 154. What is the appropriate security strategy to protect an asset where the risk of a CIA issue is high and the impact is also high? - Prevent 155. Which of the following is not a social and ethical issue? - database capacity 156. As an information security control, firewalls primarily address ______ issues. - confidentiality 157. A Knowledge Management System that is available to all the consultants in a consulting firm is an example of an ______________ system. - enterprise knowledge management 158. Which of the following cause the most harm to the confidentiality, integrity and availability of an organization's information assets. - employees 159. In the United States, copyright law prevents others from copying the work of a private author for ______ years after the death of the author. - 70 160. Which of the following is not a strong argument supporting a request for additional information security funding. - increasing return on investments 161. The term Digital Divide refers to which of the following concepts? - Some communities have access to more technology tools than others, placing members of the less endowed at social and economic disadvantages. 162. The primary purpose of a Knowledge Network System is to - to make it easy to find experts in the organization 163. The principle of Fair Information Practices states: - organizations collecting information must inform the individual about the information collected, how it will be used and give the individual access to this information. 164. A web bug is: - in invisible image on a web page that is used to track visitors to that page. 165. Which of the following is not considered an intelligent technique. - Knowledge networks. 166. A company that follows an opt out policy when collecting email addresses can be said to have asked for informed consent. - False. 167. In order for Alice to send Bob a secure message using a public key encryption system, Alice needs to encrypt the message using: - Bob’s public key. 168. In order to make the Internet easier to use by hiding/masking IP addresses from end users, engineers developed - The DNS system 169. The following number is an example of: 205.157.215.150 - IP Address 170. Of the following systems, which do you think would be the easiest to build and deploy - a case based reasoning system 171. All of the following are valid criticisms of expert systems EXCEPT - they are slow 172. A database has been changed in a way that it is no longer accurate. This is an example of - an integrity violation 173. In the context of information systems a cookie is : - a small text file that the web server stores on your computer 175. “If an action is not right to take repeatedly, it is not right to take even once.” What is the name normally applied to this principle. - Descartes’ Rule of Change 176. At what level of the organization would you expect to find an order processing system? (quiz 1) - Operational level 177. The first step in the SDLC is (quiz 1) - Opportunity Analysis 178. Which of the following is probably not useful for mining data? (quiz 2) - TPSs 179. The Internet is an example of which of the following network topologies? (quiz 2) - Mesh 180. In UWI's Student Master File, all data about you (name, date of birth, faculty, etc) is stored in a: (quiz 2) - record 181. In information security, authentication refers to (Quiz 3) - determining the identity of the person 182. A system that lets a new employee find an expert in the organization is known as an: (quiz 3) - knowledge network system 183. Jane managed to gain access to a document that she is not authorized to view. This is an example of - confidentiality 184. Which of the following is an example of a hypermedia database? - Amazon’s online catalog 185. The process of converting clear text into cipher is called - Encryption 186. Anything that can degrade the confidentiality, integrity or availability of your data is called a - triad 187. Siri, the assistant in Apple’s IoS is an example of ________ system - an Intelligent Agent 188. the following query will do what? SELECT “first-name”, “last-name” FROM “students” WHERE “faculty” = “social sciences - create a table wiirst and last names of social sciences students 189. at which phase of the knowledge management value chain are you likely to find an Intranet - Application