Anda di halaman 1dari 19

(CHAPTER 5-8)

MANAGEMENT INFORMATION SYSTEMS

INSTRUCTIONS TO THE CANDIDATES:

Please carefully read the following questions and circle/tick your correct answer in the answer sheet provided in this Study Guide. Give yourself time for rechecking after completion of test.

1.

Information technology and information systems raise new ethical questions for both individuals and societies because:

a. they are global in their effects. b. they are difficult for governments to regulate. c. so few people understand them. d. they create opportunities for intense social change. e. they change so quickly. 2. Many Web sites allow the Internet advertising broker DoubleClick to:

a. gather cookies from their site in return for advertisements on other sites based on the visitor profile created. b. access their sales figures. c. mine large pools of data they have collected in their business endeavors. d. place advertisements for other organizations on their Web site. e. track the activities of their visitors in exchange for revenue from

advertisements based on visitor information.

3.

The Federal Trade Commission Fair Information Practice principle of Access/Participation states that:

a. customers must be allowed to choose how their information will be used for secondary purposes other than the supporting transaction, including internal use and transfer to third parties. b. data collectors must take responsible steps to assure that consumer

information is accurate and secure from unauthorized use. c. there is a mechanism in place to enforce FIP principles. d. Web sites must disclose their information practices before collecting data. e. consumers should be able to review and contest the accuracy and

completeness of data collected about them in a timely, inexpensive process.

4.

Cookies are stored:

a. on the users hard drive. b. on the Web site. c. in a temporary file in the memory of the users computer. d. at the ISP. e. on the browser. 5. The limitation of trade secret protection is that although virtually all software programs of any complexity contain unique elements of some sort, it is difficult to prevent the ideas in the work from falling into the public domain:

a. when the courts become involved. b. when hackers are able to break into the source code. c. when the software is widely distributed. d. when a new version of the software is released. e. because there are no sanctions on copying software.

6.

In general, it is very difficult to hold software producers liable for their software products when those products are considered to be:

a. digital shareware. b. common carriers. c. services. d. non-essential systems. e. like books. 7. Information, knowledge, computers, and access to these resources through educational institutions in public libraries are inequitably distributed:

a. because of industrial competition. b. along ethnic and social class lines. c. only in the United States. d. in every country but the United States. e. because it is difficult to learn to use software.

8.

A microsecond is:

a. 1/1,000 second. b. 1/1,000,000 second. c. 1/10,000,000 second. d. 1/1,000,000,000 second. e. 1/1,000,000,000,000 second.

9.

Batch processing is a method of collecting and processing data in which transactions:

a. are accomplished by one large central computer. b. are accumulated and stored until a specified time when it is convenient or necessary to process them as a group. c. are entered directly into the computer system and processed immediately. d. are processed among multiple computers linked by communications

network. e. are technologies for transferring audio and video data to be processed as a steady and continuous stream as they are downloaded from the Web.

10. The interface component in client/server computing is:

a. the way in which the various applications connect with each other. b. a feature of thin client computing. c. necessary only if a mainframe is involved. d. how the application appears visually to the user. e. shaped by the organizations business rules.

11. Virtual storage:

a. allows many programs to share a computer systems resources at any one time through concurrent use of the CPU. b. links together two or more CPUs to work in parallel in a single computer system. c. handles programs more efficiently by breaking down the programs into

tiny sections that are ready to use memory only when needed. d. limits the size of the program in memory to 640 kB. e. is an arrangement permitting many users to be connected to a CPU simultaneously

12. FORTRAN:

a.

is a programming language developed for scientific and mathematical

applications. b. combines machine portability with tight control and efficient use of

computer resources. c. can process large data files with alphanumeric characters. d. is a programming language consisting of the ones and zeros of binary code. e. is object-oriented.

13. Software that functions as a translation layer between two disparate applications so they can work together is called:

a. integration software. b. groupware. c. extensible software. d. middleware. e. translation software. 14. A student, an order, and a book are all examples of a(n):

a. attribute. b. key field. c. field. d. entity. e. file.

15. The older logical database model that is useful for depicting many-to-many relationships is the:

a. hierarchical DBMS. b. SQL DBMS. c. relational DBMS. d. network DBMS. e. object-oriented DBMS. 16. Oracle Lite is a(n):

a. DBMS for small handheld computing devices. b. Internet DBMS. c. mainframe relational DBMS. d. DBMS for midrange computers. e. PC relational DBMS.

17. The conceptual design of the database shows the database from a(n):

a. business perspective. b. direct access perspective. c. program perspective. d. object-oriented perspective e. management perspective. 18. One advantage to a hypermedia database is that:

a. it is always stored on the Internet. b. the nodes can be accessed in any order. c. it is written in HTML. d. it is much more easily understood by outside users. e. it contains only one type of data.

19. Using object-oriented extensions to existing relational DBMS is one way to create a(n):

a. system of easily accessible reports. b. Internet warehouse. c. data mart. d. hybrid DBMS. e. structured query language. 20. Balancing the need to control mushrooming network costs and

_______________ is a central management concern.

a. technology requirements b. ensure network reliability and availability c. developmental planning d. user requirements e. Internet capabilities

21 Analog signals are used to handle voice communications and:

a. channels. b. graphics data. c. large volumes of data quickly. d. reflect variations in pitch. e. light pulses.

22. A smart phone is:

a.

small,

pen-based,

handheld

computer

with

built-in

wireless

telecommunications b. a technology that enables two-way transmission of data files cheaply and efficiently. c. a wireless phone with voice, text, and Internet capabilities. d. a technology that uses lower power, higher frequency radio waves than cellular technology and so can be used with smaller sized telephones. e. a device that transmits voice or data, using radio waves to communicate with radio antennas placed within adjacent geographic areas called cells.

23. A front-end processor is a:

a. specialized computer that supervises communications traffic between the CPU and the peripheral devices in the telecommunications system. b. device that carries the telecommunication message in analog form for

packet distribution. c. device that enables a single communications channel to carry data

transmissions from multiple sources simultaneously. d. special purpose computer dedicated to managing communications for the host computer in the network. e. telecommunications computer that collects and temporarily stores

messages from terminals for batch transmission to the host computer.

24. A LAN:

a.

is a central switching system that handles a firms voice and digital

communications. b. links all computers in a closed loop in a manner that passes data in one direction from one computer to another. c. links all computers and other devices to a central host computer, through which all communications must pass. d. connects computers and peripheral devices located close to each other, often in the same building. e. links a number of computers by a single circuit with all messages

broadcast to the entire network.

25. Instruction delivered through purely digital technology is called:

a. e-learning. b. asynchronous learning. c. distance learning. d. synchronous learning. e. electronic data interchange.

Anda mungkin juga menyukai