SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
MIS: Management Information Systems
Start Test
Study First
Subject
:
business-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Monitors - Printers - Plotters - Speakers
value chain
value of information
systems software operating systems
hardware (output)
2. Laser - Ink-jet - Dot Matrix
kilobyte (KB)
field
SAN (Storage Area Networks)
printers
3. Gathering enough of the right information in a timely manner and usable form and analyzing it to have a positive impact on business strategy - tactics - or operations
business Intelligience
data modeling key considerations
hardware
RAM (Random Access Memory)
4. How organizations plan for - implement - and handle change
organizational change
software
data warehouse
terabyte (TB)
5. The design of the computer (what the computer consists of)
architecture or configuration
systems development stages
software
business Intelligience
6. The technology that provides high-speed connections between data-storage devices and computers over a network
RAID (Redundant Array of Independent Disks)
SAN (Storage Area Networks)
input devices
microprocessor (CPU) and the memory
7. A method of storing data that generates extra bits of data from existing data - allowing the system to create a 'reconstruction map' so that if a hard drive fails - the system can rebuild lost data.
RAID (Redundant Array of Independent Disks)
foreign key in the related table
value of information
procedures
8. The technical detail about each component (how fast is the printer)
specification
byte
phases of performance measurement
two parts of a table
9. Margins - paper size - paper orientation - vertical alignment
application software examples
microprocessor (CPU) and the memory
terabyte (TB)
document level formats
10. The most important element in most CBIS; includes those who manage - run - program - and maintain the system
spplication software
database heirarchy (from biggest to smallest)
information system
people
11. Used to evaluate the contributions (value & cost) of the IS
Performance
value chain
database heirarchy (from biggest to smallest)
technology infusion
12. A measure of how widely technology is spread throughout an organization
data modeling key considerations
systems software operating systems
technology diffusion
technology acceptance model TAM
13. The instructions and data that direct the computer to accomplish the task. It can refer to a single program or a package
spplication software
information
technology acceptance model TAM
software
14. Field value must be unique - field value is required
computer
primary key in the main table
Database Management Systems
Online Analytical Processing (OLAP)
15. The activity of creating new business systems or modifying existing business systems using internal or external resources
gigabyte (GB)
RAID (Redundant Array of Independent Disks)
two parts of a table
systems development
16. Perform common computer hardware functions - Provide a user interface - Manage system memory - Manage processing tasks - Provide networking capability - Control access to system resources - Manage files
spplication software
systems software operating systems
primary key in the main table
computer
17. An organized collection of facts and information - typically consisting of two or more related data files
manipulating data
business Intelligience
technology infusion
database
18. Hand-held - Portable (Laptop - Notebook - Tablet) - Thin Client - Desktop - Workstation - Servers - Mainframes - Supercomputers
procedures
record
specification
types of computers
19. Computer programs that govern the operation of the computer
manipulating data
technology infusion
value of information
software
20. Software that allows users to explore data from a number of different perspectives. Top-down approach.
Online Analytical Processing (OLAP)
manipulating data
Roles - Functions - and careers in 'IS'
people
21. Rivalry among existing competitors - threats of new entrants - threat of substitute produts and services - bargaining power of customers - bargaining power of suppliers (cost efficiency is generally not a motive for seeking competitive advantage)
factors that lead firms to seek competitive advantage
hardware (output)
application software examples
value of information
22. One trillion bytes
types of processing
terabyte (TB)
systems development
spplication software
23. Eight bits is a byte. Each byte represents a unique character.
byte
database
hardware
systems development stages
24. Alignment - Indentations: Left - Double - First - or hanging indent - Tabs - Line Spacing
kegabyte (MB)
paragraph level format
software
database heirarchy (from biggest to smallest)
25. 1) Structure 2) Data
two parts of a table
computer system
types of computers
microprocessor/CPU
26. One thousand bytes
procedures
input devices
kilobyte (KB)
manipulating data
27. The electronic transmission of signals for communications which enables organizations to carry out their processes and tasks
ROM Read-Only Memory)
knowledge management
telecommunications
systems development stages
28. Collection of facts organized in such a way that they have value beyond the facts themselves
technology acceptance model TAM
Online Analytical Processing (OLAP)
information
foreign key in the related table
29. Major understandings and assumptions of a business or other organization
architecture or configuration
database
organizational culture
SAN (Storage Area Networks)
30. Helps the user carry out a variety of tasks.
Database Management Systems
telecommunications
hardware (types)
spplication software
31. Includes hardware (the physical components) - software (the programs or lists of instructions)
data mart
computer system
SAN (Storage Area Networks)
Roles - Functions - and careers in 'IS'
32. Investigation - Analysis - Design - Implementation - Maintenance & review IADIM
systems development stages
character level formats
technology acceptance model TAM
phases of performance measurement
33. Sequential Access:The retrieval method in which data must be accessed in the order in which it is stored. (tape drives) - Direct Access: The retrieval method in which data can be retrieved without the need to read and discard other data.
types of processing
storage access methods
architecture or configuration
computer system
34. It is directly linked to how it helps deciison makers achieve their organization's goals
byte
value of information
factors that lead firms to seek competitive advantage
monitors
35. A continuous process involving the legal and ethical collection of information about competitors - its analysis - and controlled dissemination of information to decision makers
organization
paragraph level format
specification
competitive intelligience
36. A formal collection of people and other resources established to accomplish a set of goals
people
organization
value of information
monitors
37. A significant and (ideally) long-term benefit to a company over its competition
phases of performance measurement
terabyte (TB)
competitive advantage
computer system
38. Content:What data should be collected and at what cost? - Access: What data should be provided to which users and when? - Logical structure: How should data be arranged so it makes sense to a given user? - Physical organization: Where should data be
data modeling key considerations
paragraph level format
Performance
counterintelligience
39. The extent to which technology permeates an area or department
technology infusion
Database Management Systems
application software examples
monitors
40. Selecting: data manipulation that eliminates rows according to certain criteria - Projecting: data manipulation that eliminates columns in a table - Joining: data manipulation that combines two or more tables
spplication software
value chain
manipulating data
DBA (database administration)
41. Font: Font size (point size) - Font color - Bold Italicize Underline Strikethrough Superscript/ subscript
input devices
Roles - Functions - and careers in 'IS'
character level formats
technology diffusion
42. Permanent storage location for a set of instructions the computer uses.
ROM Read-Only Memory)
computer system
kilobyte (KB)
systems development stages
43. Includes the strategies - policies - methods and rules for using the CBIS; procedures for operations - maintenance - security
procedures
data mining
ROM Read-Only Memory)
Roles - Functions - and careers in 'IS'
44. Input devices - Output devices - Processing hardware - Storage devices
counterintelligience
gigabyte (GB)
computer system
hardware (types)
45. The role of the database administrator (DBA) is to plan - design - create - operate - secure - monitor - and maintain databases
DBA (database administration)
document level formats
gigabyte (GB)
factors that lead firms to seek competitive advantage
46. What are the two most important components of personal computer hardware?
systems software operating systems
microprocessor (CPU) and the memory
SAN (Storage Area Networks)
two parts of a table
47. Collection of fields and group of related records
architecture or configuration
table
data mining
software
48. Helps the computer carry out it s basic operating tasks.
information system
software
organizational change
system software
49. Database - files - records - fields - character
database heirarchy (from biggest to smallest)
application software examples
software
Performance
50. Describes the entity; an attribute or characteristic of the entity (equals column)
systems software operating systems
microprocessor/CPU
field
types of processing