MIS 305
Final Exam Review
1
Chapter 1 - Objectives
•
•
•
•
Why information systems are so essential in
business today.
Define an information system from both a
technical and a business perspective.
The complementary assets required for
information technology to provide value to a
business.
Identify and describe contemporary
approaches to the study of information
systems and distinguish between computer
literacy and information systems literacy.
Select One
Data shaped into meaningful form are
called
1. A databank
2. Feedback
3. Knowledge
4. Information
Select One
Data shaped into meaningful form are
called
1. A databank
2. Feedback
3. Knowledge
4. Information (page 14)
Select One
Raw facts that have not been organized
into a useful form are called
1. Information
2. Business objectives
3. Data
4. Information systems
Select One
Raw facts that have not been organized
into a useful form are called
1. Information
2. Business objectives
3. Data (page 14)
4. Information systems
Select One
Which activity of an information system
converts raw input into a meaningful
form?
1. Input
2. Processing
3. Output
4. Feedback
Select One
Which activity of an information system
converts raw input into a meaningful
form?
1. Input
2. Processing (page 15)
3. Output
4. Feedback
Sample Final Exam Questions
• Provide an overview of the six business objectives of information
systems. (page 8)
• Information systems produce the information that organizations
need to make decisions, control operations, analyze problems, and
create new products or services. Identify and describe the three
activities found in information systems. (page 15)
• Explain the difference between computer literacy and information
literacy. (page 16)
• Briefly describe how information systems influence organizations,
people, and technology. (page 17)
Chapter 2 - Objectives
•
•
•
•
Business processes and their relationship to
information systems.
Information systems supporting the major
business functions: sales and marketing,
manufacturing and production, finance and
accounting, and human resources.
The role played by systems serving the various
levels of management in a business and their
relationship to each other.
How enterprise applications and intranets
promote business process integration and
improve organizational performance.
Select One
Logically related sets of activities that
define how business tasks are performed
are called?
1. Business functions
2. Business processes
3. Strategic choices
4. Business objectives
Select One
Logically related sets of activities that
define how business tasks are performed
are called?
1. Business functions
2. Business processes (page 41)
3. Strategic choices
4. Business objectives
Select One
These systems address non-routine
decisions requiring judgment, evaluation,
and insight because there is no agreedon procedure for arriving at a solution.
1.
2.
3.
4.
Enterprise system
Supply chain management (SCM) system
Executive support systems
Knowledge management system (KMS)
Select One
These systems address non-routine
decisions requiring judgment, evaluation,
and insight because there is no agreedon procedure for arriving at a solution.
1.
2.
3.
4.
Enterprise system
Supply chain management (SCM) system
Executive support systems (page 57)
Knowledge management system (KMS)
Select One
Systems that span all functional areas
and focus on executing business
processes across the firm are called
1.
2.
3.
4.
Business functional systems
Enterprise applications
Transaction processing systems
Data management systems.
Select One
Systems that span all functional areas
and focus on executing business
processes across the firm are called
1.
2.
3.
4.
Business functional systems
Enterprise applications (page 59)
Transaction processing systems
Data management systems.
Select One
Which type of system is most often used
for analyzing data?
1.
2.
3.
4.
Transaction processing system
Management information system
Decision-support system
Executive support system
Select One
Which type of system is most often used
for analyzing data?
1.
2.
3.
4.
Transaction processing system
Management information system
Decision-support system (page 54)
Executive support system
Sample Final Exam Questions
• What are "business processes"? What purposes
do they serve in the firm? (page 42)
• Explain the difference between a management
information system and a decision-support system
as they relate to middle managers. (page 53)
• Discuss the interrelationships among TPS, MIS,
DSS, and ESS systems. (page 52-57)
• What is the function of a CRM system? (page 64)
• Businesses today are enabled by or based upon
digital networks. What is meant by e-business and
e-commerce? (page 67)
Chapter 3 - Objectives
•
•
•
Important features of organizations that
managers need to know about in order to build
and use information systems successfully.
The impact of information systems on
organizations.
How information systems help businesses use
synergies, core competencies, and networkbased strategies to achieve competitive
advantage.
Select One
Information technology plays a critical
role in helping organizations:
1. Maintain the existing bureaucratic structure
2. Work with non-routine tasks
3. Develop better-educated employee
groupings
4. Perceive environmental change.
Select One
Information technology plays a critical
role in helping organizations:
1. Maintain the existing bureaucratic structure
2. Work with non-routine tasks
3. Develop better-educated employee
groupings
4. Perceive environmental change. (page 84)
Select One
All organizations become very efficient
over time because individuals in the firm
develop:
1.
2.
3.
4.
Routines for producing goods and services
Long lasting friendships within the firm
Better-educated employee groupings
Deep rooted cultures.
Select One
All organizations become very efficient
over time because individuals in the firm
develop:
1.
2.
3.
4.
Routines for producing goods and services
Long lasting friendships within the firm (page 86)
Better-educated employee groupings
Deep rooted cultures.
Select One
Benchmarking involves:
1. Introducing new systems in stages either by
functions or by organization
2. The collection of knowledge in an artificial
intelligence system that is represented in the form of
IF-THEN rules.
3. Setting strict standards for products, services, or
activities and measuring organizational performance
against those standards.
4. Selecting a hypothesis and seeking out more
information until the hypothesis is either proved or
disproved.
Select One
Benchmarking involves:
1. Introducing new systems in stages either by
functions or by organization
2. The collection of knowledge in an artificial
intelligence system that is represented in the form of
IF-THEN rules.
3. Setting strict standards for products, services, or
activities and measuring organizational performance
against those standards. (page 105)
4. Selecting a hypothesis and seeking out more
information until the hypothesis is either proved or
disproved.
Sample Final Exam Questions
• What could account for differences in the
uses of information systems in different
organizations? (page 83)
• Discuss the concept of the reciprocal
relationship that organizations have with
their environments. (page 84)
• According to Mintzberg's classification, list
five basic kinds of organizational structures,
and give an example of each. (page 89)
Chapter 4 - Objectives
•
•
•
The relationships among ethical, social, and
political issues that are raised by information
systems.
The main moral dimensions of an information
society and specific principles for conduct that
can be used to guide ethical decisions.
The impact of contemporary information
systems and the Internet on the protection of
individual privacy and intellectual property.
Select One
The principles and standards that guide
our behavior toward other people are
called
1.Ethics
2.Intellectual property
3.Copyright
4.Fair Use Doctrine
Select One
The principles and standards that guide
our behavior toward other people are
called
1.Ethics (page 84)
2.Intellectual property
3.Copyright
4.Fair Use Doctrine
Select One
What records information about you
during a Web surfing sessions such as
what Web sites you visited, how long you
were there, what ads you looked at, and
what you purchased?
1.
2.
3.
4.
Cookie
Web bug
Spyware
profiler
Select One
What records information about you
during a Web surfing sessions such as
what Web sites you visited, how long you
were there, what ads you looked at, and
what you purchased?
1.
2.
3.
4.
Cookie (page 142)
Web bug
Spyware
profiler
Select One
The current intellectual property laws:
1. Are breaking down in the information
age.
2. Are sufficient in most countries.
3. Do not apply to digital materials.
4. Apply only to new digital materials.
Select One
The current intellectual property laws:
1. Are breaking down in the information
age. (page 145)
2. Are sufficient in most countries.
3. Do not apply to digital materials.
4. Apply only to new digital materials.
Select One
Illegal acts through the use of the
computer or against the computer
system is called:
1.
2.
3.
4.
Hacking.
Computer abuse.
Computer crime.
Spamming.
Select One
Illegal acts through the use of the
computer or against the computer
system is called:
1.
2.
3.
4.
Hacking.
Computer abuse.
Computer crime. (page 152)
Spamming.
Sample Final Exam Questions
• What are Fair Information Practices? (page
140)
• What is the major issue of privacy involved
in using cookies? (page 144)
• Define and distinguish between the terms
intellectual property, trade secret, copyright,
and patent. What is the basic premise
behind them all? (page 145 – 146)
• How does the rise of computer use in
business threaten employment? (page 155)
Chapter 5
Chapter 5 is not on the final exam.
Chapter 6 - Objectives
•
•
•
•
Basic file organization concepts and the
problems of managing data resources in a
traditional file environment.
The principles of a database management
system and the features of a relational
database.
Important database design principles.
Tools and technologies for providing
information from databases to improve
business performance and decision making.
Select One
In a database, the smallest unit of data a
computer can handle is a:
1.
2.
3.
4.
Record
Bit
Byte
Field
Select One
In a database, the smallest unit of data a
computer can handle is a:
1.
2.
3.
4.
Record
Bit (page 226)
Byte
Field
Select One
Data redundancy occurs when:
1. Multiple reports are accessed
simultaneously.
2. The programs that access the data are
changed.
3. Different users enter information.
4. Fields in many different files contain the
same information.
Select One
Data redundancy occurs when:
1. Multiple reports are accessed
simultaneously.
2. The programs that access the data are
changed.
3. Different users enter information.
4. Fields in many different files contain the
same information. (page 228)
Select One
The data dictionary is the automated or manual
file that:
1. Stores information about data elements and
data characteristics.
2. Allows the creation of supplementary reports.
3. Presents the data as they would be perceived
by end users.
4. Is used in conjunction with conventional thirdor fourth-generation programming languages.
Select One
The data dictionary is the automated or manual
file that:
1. Stores information about data elements and
data characteristics. (page 234)
2. Allows the creation of supplementary reports.
3. Presents the data as they would be perceived
by end users.
4. Is used in conjunction with conventional thirdor fourth-generation programming languages.
Select One
This database model uses a series of
logically related two-dimensional tables
or files to store information:
1.
2.
3.
4.
Relational database
Hierarchical database
Network database
Object-oriented database
Select One
This database model uses a series of
logically related two-dimensional tables
or files to store information:
1.
2.
3.
4.
Relational database (page 230)
Hierarchical database
Network database
Object-oriented database
Select One
An entity-relationship diagram is a
graphic method of presenting
1.
2.
3.
4.
Entire files and their relationships
Entire records and their relationships
Entities, relationships and attributes
Entity classes and their rules.
Select One
An entity-relationship diagram is a
graphic method of presenting
1. Entire files and their relationships
2. Entire records and their relationships
3. Entities, relationships and attributes
(page 236)
4. Entity classes and their rules.
Sample Final Exam Questions
• What are some problems with the traditional file
environment? (page 227)
• Define and distinguish between the terms data
hierarchy, data redundancy, and data
administration. (Pages: 226, 228, 247)
• What does a large distributed database present in
terms of security problems? (Pages 237 -238)
• List the four types of contemporary DBMS and
describe a distinguishing characteristic of each
one. (page 230 – 233)
• What is the connection between data warehousing
and data-mining? (page 239 – 242)
Chapter 7 - Objectives
•
•
•
•
The features of telecommunications networks
and key networking technologies.
Alternative transmission media, types of
networks, and network services.
How the Internet and Internet technology work
and how they support communication and ebusiness.
The principal technologies and standards for
wireless networking, communication, and
Internet access.
Select One
This device is responsible for routing and
managing communication on the network
and coordinates network resources.
1.
2.
3.
4.
Network interface card
Hub
Network operating system
Router
Select One
This device is responsible for routing and
managing communication on the network
and coordinates network resources.
1.
2.
3.
4.
Network interface card
Hub
Network operating system (page 265)
Router
Select One
The formal set of rules that govern the
way in which computers communicate
are called
1.
2.
3.
4.
Protocols
Algorithms
Standards
Procedures
Select One
The formal set of rules that govern the
way in which computers communicate
are called
1.
2.
3.
4.
Protocols (page 268)
Algorithms
Standards
Procedures
Select One
A network that covers a large
geographic area is most commonly
referred to as a(n)
1.
2.
3.
4.
Wide area network
Local area network
Intranet
Internetwork
Select One
A network that covers a large
geographic area is most commonly
referred to as a(n)
1.
2.
3.
4.
Wide area network (page 272)
Local area network
Intranet
Internetwork
Select One
A star network:
1.
2.
3.
4.
Is a central switching system that handles a firm's
voice and digital communications.
Links all computers in a closed loop in a manner that
passes data in one direction from one computer to
another.
Links all computers and other devices to a central host
computer, through which all communications must
pass.
Connects computers and peripheral devices located
close to each other, often in the same building.
Select One
A star network:
1.
2.
3.
4.
Is a central switching system that handles a firm's
voice and digital communications.
Links all computers in a closed loop in a manner that
passes data in one direction from one computer to
another.
Links all computers and other devices to a central host
computer, through which all communications must
pass. (page 272)
Connects computers and peripheral devices located
close to each other, often in the same building.
Sample Final Exam Questions
• Define and distinguish among the following
terms: analog signal, digital signal, and
modem. (page 269)
• Describe the three most common network
topologies. (page 271)
• How do ISDN and DSL differ? (page 275)
• Describe what is meant by chat, instant
messaging, and Usenet. (Page 287)
• Give three examples of how businesses can
use wireless technology. (page 291)
Chapter 8 - Objectives
•
•
•
•
Why information systems need special
protection from destruction, error, and abuse.
The business value of security and control.
An organizational framework for security and
control.
The most important tools and technologies for
safeguarding information resources.
Select One
Common threats against information
systems come from all of the following
factors except
1.
2.
3.
4.
Technical
Organizational
Governmental
Environmental.
Select One
Common threats against information
systems come from all of the following
factors except
1.
2.
3.
4.
Technical
Organizational
Governmental (page3 316)
Environmental.
Select One
The single greatest cause of network
security breaches is
1.
2.
3.
4.
Poor system patch management
Pharming
Users' lack of knowledge
Absence of security programs.
Select One
The single greatest cause of network
security breaches is
1.
2.
3.
4.
Poor system patch management
Pharming
Users' lack of knowledge (page 327)
Absence of security programs.
Select One
Malware includes all of the following
except
1.
2.
3.
4.
Worms
Trojan horses
Viruses
Spoofing.
Select One
Malware includes all of the following
except
1.
2.
3.
4.
Worms
Trojan horses
Viruses
Spoofing (page 319)
Sample Final Exam Questions
• Discuss why information systems and networks are
vulnerable to security threats. (page 316 – 319)
• Discuss the system security threats employees
pose. (page 327)
• Describe what a risk assessment is and why it's
necessary. (page 330)
• Describe policies a firm should develop to help
protect its information assets. (page 331 - 332)
• Describe three new authentication technologies for
information systems and the necessity for them.
(page 336)
Chapter 9
Chapter 9 is not on the final exam.
Chapter 10 - Objectives
•
•
•
•
The unique features of e-commerce, digital
markets, and digital goods.
How Internet technology has changed value
propositions and business models.
The various types of e-commerce and how ecommerce has changed consumer retailing
and business-to-business transactions.
The role of m-commerce in business and
describe the most important m-commerce
applications.
Select One
Removing the middleman and selling
directly to a consumer in a digital
marketplace is called
1.
2.
3.
4.
Ubiquity
Disintermediation
Reintermediation
Marketspace
Select One
Removing the middleman and selling
directly to a consumer in a digital
marketplace is called
1.
2.
3.
4.
Ubiquity
Disintermediation (page 397)
Reintermediation
Marketspace
Select One
Currently, the fastest-growing type of
business-to-business e-commerce is:
1.
2.
3.
4.
Electronic data interchanges
Net marketplaces
Private exchanges
Peer-to-peer networks.
Select One
Currently, the fastest-growing type of
business-to-business e-commerce is:
1.
2.
3.
4.
Electronic data interchanges
Net marketplaces
Private exchanges (page 411)
Peer-to-peer networks.
Sample Final Exam Questions
• What are some unique features of ecommerce technology? (page 394)
• Explain how the Internet reduces information
asymmetry. (page 396)
• Discuss the impact of the Internet on
markets for digital goods. (page 398)
• Discuss how mobile commerce services and
applications can extend a business's
outreach to customers. (page 413)
Chapter 11 - Objectives
•
•
•
•
The role of knowledge management and
knowledge management programs in
business.
The types of systems used for enterprise-wide
knowledge management and demonstrate how
they provide value for organizations.
The major types of knowledge work systems
and how they provide value for firms.
The business benefits of using intelligent
techniques for knowledge management.
Sample Final Exam Questions
• Why can't everything be reduced to an expert
system? (page 437 – 438)
• Describe the two strategies normally used for an
inference engine. (452)
• What is an example of a knowledge work system?
(page 449 - 451)
• What is the difference between an expert system
and a neural network? (page 452 – 457)
• List at least three examples of the use of intelligent
agents today. (page 460)
Chapter 12 - Objectives
•
•
•
•
•
Different types of decisions and the decision-making
process.
How information systems support the activities of
managers and management decision making.
How decision-support systems (DSS) differ from MIS
and how they provide value to the business.
How executive support systems (ESS) help senior
managers make better decisions.
The role of information systems in helping people
working in a group make decisions more efficiently.
Sample Final Exam Questions
• Outline three main reasons why investments in
information technology do not always produce
positive results. (page 478)
• Compare and contrast the different capabilities of
DSS and MIS systems. If you had to do without
one of them, which would it be? Why? (page 480)
• How is data visualization used in GIS? (page 490)
• Discuss how executive support systems help
senior managers make better decisions. (page
494)
• What are the advantages and disadvantages of the
use of a GDSS for group decision making? (page
498)
Chapter 13 - Objectives
•
•
•
•
•
How building new systems produces
organizational change.
The core activities in the systems development
process.
Alternative methods for building information
systems.
Alternative methodologies for modeling
systems.
New approaches for system-building in the
digital firm era.
Sample Final Exam Questions
• What is business process reengineering? (page
515 – 517)
• What is workflow management and what are its
benefits? (Page 516)
• Describe systems development, system analysis,
and system design. Identify core activities in the
systems development process. ( Page 524)
• What are the advantages and disadvantages of
each of the four processes by which conversion to
a new system may be accomplished? (page 527)
Chapter 14 - Objectives
•
•
•
•
•
The objectives of project management and why it is so
essential in developing information systems.
Models for selecting and evaluating information systems
projects and methods for aligning IS projects with the
firm’s business goals.
Models for assessing the business value of information
systems.
The principal risk factors in information systems projects.
Appropriate strategies for managing project risk and
system implementation.
Select One
This project management objective
considers the accuracy and timeliness of
information produced by the new system
and ease of use.
1. Time
2. Cost
3. Quality
4. Risk
Select One
This project management objective
considers the accuracy and timeliness of
information produced by the new system
and ease of use.
1. Time
2. Cost
3. Quality (page 557)
4. Risk
Select One
Information systems are considered:
1. Short-term capital investment projects.
2. As a measure of cash flow.
3. Long-term capital investment projects.
4. A means for lowering enterprise costs.
Select One
Information systems are considered:
1. Short-term capital investment projects.
2. As a measure of cash flow.
3. Long-term capital investment projects.
(page 565)
4. A means for lowering enterprise costs.
Select One
Communications problems between end
users and designers are one reason
why:
1. Users are driven out of the implementation
process.
2. So much user training is required.
3. The implementation process requires written
procedures.
4. Cost overruns are so large.
Select One
Communications problems between end
users and designers are one reason
why:
1. Users are driven out of the implementation
process. (page 573)
2. So much user training is required.
3. The implementation process requires written
procedures.
4. Cost overruns are so large.
Select One
This chart shows each project task as a
horizontal bar whose length is
proportional to the time required to
complete it.
1.
2.
3.
4.
Gantt Chart.
Pert Chart.
Optimization Chart.
Flow Chart.
Select One
This chart shows each project task as a
horizontal bar whose length is
proportional to the time required to
complete it.
1.
2.
3.
4.
Gantt Chart. (page 575)
Pert Chart.
Optimization Chart.
Flow Chart.
Sample Final Exam Questions
• There are four pitfalls to avoid in the management
of the systems development project. What are
they? Which of the four do you think occurs most
often? Why? (page 556)
• Identify and describe the objectives of project
management. As well, list and describe five major
variables that project management must deal with.
(page 557)
• What are GANTT and PERT charts used for? What
information do these charts show? (Page 578 –
579)
• List and describe the three factors influencing the
level of project risk. (page 572)
Chapter 15
Chapter 15 is not on the final exam.
Final Exam Details
• All questions will be short essay type
similar to the sample questions.
• This is a closed book, closed notes
exam.
• You can take the entire class time to
complete it.
• No exam book required.
Descargar

Final Exam Review