BIS 219 Final Exam (Set-05) - 31307

Solution Posted by
Solution Detail
Price: $20.00
  • From: Business,
  • Posted on: Sun 17 Nov, 2013
  • Request id: None
  • Purchased: 0 time(s)
  • Average Rating: No rating
Request Description

1. _______________ are self-contained, self-describing business and consumer modular applications, delivered over the Internet, that users can select and combine through almost any device, ranging from personal computers to mobile phones. 

a) XML  

b) Web Services

c) Object Services

d) Information Services

e) HTML

 

 

2. The most traditional model of client server computing uses the _______________ to act as a database server providing data for analysis done by the PC clients using spreadsheets, database management systems, and application software.

a) personal computer 

b) mainframe

c) mini computer

d) super computer

e) micro computer

 

 

3. The _______________ part of the supply chain includes the activities of a manufacturing company with its first-tier suppliers (which can be manufacturers and/or assemblers) and their connection to their second-tier suppliers. 

a) downstream

b) midstream

c) upstream

d) internal

e) none of the above

 

 

4. The part of the supply chain which is mainly concerned with production management, manufacturing, and inventory control is:

a) downstream.

b) midstream.

c) upstream.

d) internal.

e) cross stream.

 

 

5. _______________ is the high-level map or plan of the information requirements of an organization, which is used to guide current operations andplan future ones.  

a) Information infrastructure

b) Conceptual data model

c) Logical data model

d) Information technology architecture

e) Tele-Info architecture

 

 

6. _______________ includes the system hardware, development software, networks and communications facilities, databases, and information systems personnel. 

a) Physical data model

b) Information infrastructure

c) Systems architecture

d) Information architecture

e) Logical data model

 

 

7. A _______________ handles the day-to-day, routine, repetitive tasks that are essential to the operation of the organization.  Activities supported include the monitoring, collection, storage, processing and dissemination of the organization’s basic business transactions.

a. transaction processing system

b. management information system

c. knowledge management system

d. office automation system

 

 

8. _______________ was the dominant computing architecture until the mid-1980s. Very few organizations use this type of architecture exclusively today due to its inflexibility and poor price-to-performance ratio.

a) Mainframe computing environment

b) PC computing environment

c) Client/Server computing environment

d) Distributed computing environment

e) Network

 

 

9. In a ____________computing environment, processing work is divided between two or more computers. The participating computers can be all mainframes, all PCs, or as in most cases, a combination of the two types. They can be in one location or in several.

a) Mainframe 

b) PC 

c) Hybrid 

d) Distributed 

e) Network

 

 

10. Technically, what distinguishes the Internet is its use of a set of protocols called: 

a) TCP/IP.

b) MCP/IR.

c) PCP/IP.

d) TKP/IR.

e) TCP/ITP.

 

 

11. The purpose of the _______________ architecture is to maximize the use of computer resources. It provides a way for different computing devices to work together, each doing the job for which it is best suited.

a) mainframe computing

b) client/server computing

c) PC computing

d) centralized computing

e) network computing

 

 

 

12. A well-known grid-computing project is the _______________ project. In this project, PC users worldwide donate unused processor cycles to help the search for signs of extraterrestrial life by analyzing signals coming from outer space.

a) BETI project

b) RETI project

c) SETI @ Home project 

d) CETI @ Home project

e) JETI project

 

 

13. _______________ architecture is the basis of file sharing over the Web and the basis on which companies such as Napster, Kazaa, and Gnutella operate.

a) Mainframe computing

b) P2P

c) B2B

d) P2C

e) G2G

 

 

14. A _______________ provides periodic information about such topics as operational efficiency, effectiveness and productivity by extracting information from databases and processing it according to the needs of the user.

a. transaction processing system

b. management information system

c. executive information system

d. office automation system

e. management system

 

 

15. Which of the following is the most accurate definition of an extranet?

a. It allows remote users to securely connect over the Internet or via private networks to the enterprise’s main intranet. 

b. It allows remote users to securely connect over the Internet to the enterprise’s main intranet. 

c. It allows remote users to securely connect via private networks to the enterprise’s main intranet. 

d. It allows remote users to connect via private networks to the enterprise’s main intranet. 

e) It allows remote users to securely connect via private networks to the Internet.

 

 

16. Which of the following statements about Legacy systems is NOT true?

a. Legacy systems are usually transaction processing systems. 

b. Legacy systems are usually housed in a secure location. 

c. Legacy systems are usually pure mainframe systems or distributed systems in which the mainframe plays the major role.

d. Interfacing newer systems with legacy systems is so complicated that it is entirely avoided during systems integration efforts. 

e) Legacy Systems are those with which a company has great affinity.

 

 

17. The function of corporate portals is often described as “_______________,” since they support decisions central to particular goals of the enterprise.

a) casting 

b) broadcasting

c) corecasting

d) webcasting

e) webtransmit

 

 

18. Which of the following statements is NOT true about the changing role and structure of the IS department (ISD)?

a) The role of ISD is changing from purely technical to more managerial and strategic.

b) The ISD is creating business alliances with vendors and IS departments in other organizations.  

c) The ISD is educating the IS staff about business and educating non-IS managers about information technology (IT).

d) The ISD is becoming more centralized for better coordination and control.

e) The ISD is in control.

 

 

19. Which of the following statements is NOT true about the utility computing concept?

a) The vision behind utility computing is to have computing resources flow like electricity from virtual utilities around the globe.

b) Preparing for this era of utility computing, IBM is moving aggressively into the application services provider area.

c) Some experts believe that all software will become a service and be sold as a utility one day.

d) The utility computing concept works equally well for all types of applications.

e) Distributed computing concept is best.

 

 

20. Which of the following statements is MOST true about the utility computing concept?

a) A major commercial application of grid computing is Sony’s attempt to link online thousands of Sony video-game consoles.

b) A well-known grid computing project is the SETI @ Home project.

c) The grid does the computing very efficiently but at a higher cost.

d) According to this concept, unused processing cycles of all computers in a given network can be harnessed to create powerful computing capabilities.

e) The grid does the computing less efficiently but at a lower cost.

 

 

21. The _______________ describes organizational plans, visions, objectives and problems, and the information required to support them.

a) business architecture

b) client/server architecture

c) information infrastructure

d) service-oriented architecture

e) none of the above

 

 

22. A _______________ supports the monitoring, collection, storage, processing, and dissemination of the organization’s basic business transactions.

a) transaction processing system (TPS)

b) web based system (WBS)

c) enterprisewide information system (EIS)

d) decision support system

e) none of the above

 

23. _______________ architecture is a special client/server architecture that provides some additional new and useful functionalities.

a) Mainframe

b) Legacy

c) Distributed

d) Peer-to-peer

e) Client/server

 

 

24. A _______________ is a computer such as a PC attached to a network, which is used to access shared network resources. A _______________ is a machine that is attached to this same network and provides services.

a) client, client

b) client, server

c) server, client

d) server, server

e) all of the above

 

25. _______________ connect several intranets via the Internet, by adding to the Internet a security mechanism and possibly some functionalities.

a) Extranets

b) Intranets

c) Internets

d) ISP

e) ASP

 

 

26. FedEx’s business model supports _______________ hour delivery to anywhere in the world.

a) 9 – 18

b) 12 – 24

c) 24 – 48

d) 48 – 96

e) 97-110

 

 

27. _____________ is a computer program designed to support a specific task or business process (such as execute the payroll).

a) Application Program 

b) Data Items

c) Information

d) Database

e) Data warehouse

 

 

28. ________________ consists of stored data items organized for retrieval.

a) Data Base 

b) Information

c) Data Item

d) Knowledge

e) Software

 

29. __________________ are data that have been organized so that they have meaning and value to the recipient.

a) Data items

b) Information

c) Knowledge

d) Network

e) Internet

 

 

30. _________________ consists of data and/or information that have been organized and processed to convey understanding.

a) Knowledge 

b) Data Items

c) Network

d) Internet

e) Binary

 

 

31. Information systems that connect two or more organizations are called:

a) IOSs.

b) EIS .

c) TPS.

d) DDS.

e) ICP.

 

 

32. Information systems that serve several departments or the entire enterprise are called:

a) IOSs.

b) TPS.

c) DDS.

d) EIS.

e) ESS.

 

 

33. The first type of IT system that was developed in the 1980’s to improve communications with business partners was: 

a) IOS’s.

b) EIS.

c) TPS.

d) EDI.

e) ESS.

 

 

34. _____________ supports the monitoring, collection, storage, processing, and dissemination of the organizations basic business transactions.

a) TPS

b) EIS

c) EDI

d) DDS

e) ESS

 

 

35. _____________ deal with day-to-day operations of an organization.

a) Operational activities

b) Managerial activities

c) Decisional Activities

d) Organizational Activities

e) Decision Systems

 

 

36. _____________ also called tactical activities or decisions, deal in general with middle-management activities.

a) Organizational Activities

b) Managerial Activities

c) Operational Activities

d) Employee Activities

e) Director Activities

 

 

37. Which of these is not one of the 5 major components of the information infrastructure?

a) networks and communication facilities

b) databases

c) mainframe computing

d) computer hardware

e) software

 

 

38. In ___________ computing environment, processing work is divided between two or more computers. The participating computers can be all mainframes, all PCs, or as in most cases, a combination of the two types. They can be in one location or in several.

a) mainframe 

b) PC 

c) hybrid 

d) distributed 

e) Networks

 

 

39. Typical Information Systems the follow the Organizational Structure is NOT right?  “Organizational Structures are _______________.”

a) functional

b) enterprisewide

c) restructional

d) interorganizational

e) intraorganizational 

 

 

40. Which one of these is a worldwide system of computer networks that are accessible to hundreds of millions of people?

a) Internet

b) intranet

c) extranet

d) corporate portal

e) public portal

 

 

41. According to Bill Gates, _______________ computing is computing that is available, reliable, and secure as electricity, water services and telephony.

a) wireless 

b) utility 

c) grid 

d) pervasive 

e) mobile 

 

 

42. The major function of information systems in an organization in order of importance are:

a) human resources, manufacturing (operations), marketing, finance, and accounting.

b) finance, manufacturing (operations), accounting, marketing, and human resources.

c) manufacturing (operations), accounting, finance, marketing, and human resources.

d) accounting, finance, manufacturing (operations), human resources, and marketing.

e) none of the above

 

43. Which of the following would NOT be considered data?

a) grade point average    

b) letter    

c) word

d) number

e) ordinal

 

 

44. A(n) _______________ is a network of interactions and relationships over which information, service, and payment are exchanged.

a) electronic exchange

b) the enterprise web

c) electronic market

d) wireless computing

e) mobile computing

 

 

45. The type of IT system that was developed in the 1980’s to improve communications with business partners was:

a) knowledge work system.

b) executive support system.

c) electronic data interchange.

d) group support system.

e) TPS.

 

 

Solution Description

The type of IT system that was developed in the 1980&rsq

Attachments
BIS219 Final Exam 5.doc
BIS219 Final Ex...