Filters
Question type

Study Flashcards

Which of the following is a valid guideline for maintaining good password etiquette?


A) Write down your password in an accessible location.
B) Never ask someone else for their password.
C) Give your password to your coworkers if you anticipate that they may need it in your absence.
D) Share your password with the IT staff in your organization.

E) All of the above
F) None of the above

Correct Answer

verifed

verified

B

Vera wants to create a password.Which of the following is the strongest password that she can use?


A) Vera@123
B) Vera@Vera
C) NewYork56$
D) NOOCSmyPw$42

E) B) and D)
F) All of the above

Correct Answer

verifed

verified

D

Which of the following types of skills is most likely be outsourced to the lowest bidder?


A) ability to experiment
B) accounting skills
C) ability to collaborate
D) abstract reasoning skills

E) All of the above
F) None of the above

Correct Answer

verifed

verified

Why do businesses develop information systems? Also, point out some of the wrong reasons businesses sometimes cite for developing information systems.

Correct Answer

verifed

verified

Information systems exist to help people...

View Answer

It is generally more difficult to make changes to the ________ of an information system than to the databases itself.


A) software
B) hardware
C) programs
D) procedures

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

Changing databases causes more organizational destruction than changing working procedures.

A) True
B) False

Correct Answer

verifed

verified

The ________ component in the five-component model of information systems is considered a bridge that connects the computer side and the human side.


A) software
B) procedure
C) data
D) hardware

E) A) and C)
F) C) and D)

Correct Answer

verifed

verified

Discuss the common definitions of information.

Correct Answer

verifed

verified

Probably the most common definition of i...

View Answer

Abstract reasoning is the ability to ________.


A) work with others when performing tasks
B) make and manipulate models
C) act quickly on a problem
D) analyze and perform routine tasks

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

Which of the following is an example of computer hardware?


A) a computer monitor
B) a browser
C) a spreadsheet
D) a user manual

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

Information technology is an assembly of hardware, software, data, procedures, and people that produces information.

A) True
B) False

Correct Answer

verifed

verified

Information is worth its cost when an appropriate relationship exists between the cost of information and its value.

A) True
B) False

Correct Answer

verifed

verified

The term 'management information systems' refers to the management and use of information systems that help businesses achieve their strategies.

A) True
B) False

Correct Answer

verifed

verified

Because of Moore's Law, the cost of data communications and data storage is essentially zero.

A) True
B) False

Correct Answer

verifed

verified

Drother Sports Inc.is a sports equipment provider that markets its products through a chain of retail outlets in three states.As part of its expansion strategy, the company decides to open outlets in six more states and decides to revise its existing business processes.According to the five-component model of information systems, which of the following processes will be the least disruptive to the organization?


A) collecting demographic data from the new markets
B) developing new CRM software for the existing and new outlets
C) moving existing employees and hiring new employees
D) buying and installing new computers in the new outlets

E) All of the above
F) B) and C)

Correct Answer

verifed

verified

As the IT manager of your organization, you need to use a coworker's account to access some information.In keeping with password etiquette, how would you go about getting his password?


A) You ask the coworker to type in the password where required, while you look away.
B) You explain the urgency of the situation and ask the coworker to send you the password through email.
C) You submit a formal letter to your coworker's manager, explaining the situation and requesting that the password be sent to you.
D) You try out various combinations to see if you can guess your coworker's password.

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

Which of the following components in the five-component model of information systems is considered an actor?


A) software
B) hardware
C) data
D) procedure

E) All of the above
F) A) and D)

Correct Answer

verifed

verified

Good information must be ________.


A) inexpensive
B) relevant
C) widely available
D) voluminous

E) B) and D)
F) C) and D)

Correct Answer

verifed

verified

Which of the following components constitute the computer side of information systems?


A) software and data
B) data and hardware
C) people and procedures
D) hardware and software

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

D

Which of the following is considered information rather than mere data?


A) a list of property prices in a neighborhood
B) the return on investment of an advertising campaign
C) the total number of students in a school
D) the price of a company's shares on a given day

E) C) and D)
F) None of the above

Correct Answer

verifed

verified

Showing 1 - 20 of 120

Related Exams

Show Answer