SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
MIS: Management Information Systems
Start Test
Study First
Subject
:
business-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A method of storing data that generates extra bits of data from existing data - allowing the system to create a 'reconstruction map' so that if a hard drive fails - the system can rebuild lost data.
procedures
RAID (Redundant Array of Independent Disks)
architecture or configuration
RAM (Random Access Memory)
2. Temporary memory that is constantly changing while the computer is on.
data
RAM (Random Access Memory)
architecture or configuration
data modeling key considerations
3. Helps the user carry out a variety of tasks.
spplication software
manipulating data
phases of performance measurement
technology infusion
4. Hand-held - Portable (Laptop - Notebook - Tablet) - Thin Client - Desktop - Workstation - Servers - Mainframes - Supercomputers
RAID (Redundant Array of Independent Disks)
types of computers
ROM Read-Only Memory)
value of information
5. The most important element in most CBIS; includes those who manage - run - program - and maintain the system
computer
people
monitors
procedures
6. A subset of a data warehouse
people
systems software operating systems
data mart
two parts of a table
7. Computer equipment used to perform input - processing - and output activities
hardware (output)
hardware
information system
specification
8. Includes the strategies - policies - methods and rules for using the CBIS; procedures for operations - maintenance - security
value of information
procedures
field
database heirarchy (from biggest to smallest)
9. Collection of fields and group of related records
people
table
selecting a DBMS
database
10. The role of the database administrator (DBA) is to plan - design - create - operate - secure - monitor - and maintain databases
kilobyte (KB)
hardware (output)
DBA (database administration)
Database Management Systems
11. Laser - Ink-jet - Dot Matrix
printers
kegabyte (MB)
database
primary key in the main table
12. It is directly linked to how it helps deciison makers achieve their organization's goals
value of information
knowledge management
manipulating data
competitive intelligience
13. A formal collection of people and other resources established to accomplish a set of goals
organization
organizational culture
byte
people
14. Investigation - Analysis - Design - Implementation - Maintenance & review IADIM
systems development stages
data modeling key considerations
two parts of a table
value of information
15. Specifies the factors that can lead to higher acceptance and usage of technology in an organization
business Intelligience
systems development stages
DBA (database administration)
technology acceptance model TAM
16. Monitors - Printers - Plotters - Speakers
systems development stages
RAID (Redundant Array of Independent Disks)
data
hardware (output)
17. An organized collection of facts and information - typically consisting of two or more related data files
character level formats
foreign key in the related table
value of information
database
18. A database that collects business information from many sources in the enterprise - covering all aspects of the company's processes - products - and customers.
RAM (Random Access Memory)
data warehouse
hardware (output)
database heirarchy (from biggest to smallest)
19. A significant and (ideally) long-term benefit to a company over its competition
microprocessor/CPU
database
competitive advantage
competitive intelligience
20. Cost reduction and productivity - competitive advantage - and performance based management
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
21. Sequential Access:The retrieval method in which data must be accessed in the order in which it is stored. (tape drives) - Direct Access: The retrieval method in which data can be retrieved without the need to read and discard other data.
factors that lead firms to seek competitive advantage
ROM Read-Only Memory)
storage access methods
database heirarchy (from biggest to smallest)
22. The activity of creating new business systems or modifying existing business systems using internal or external resources
input devices
systems development
database
hardware
23. The extent to which technology permeates an area or department
kegabyte (MB)
technology infusion
system software
computer system
24. Software that allows users to explore data from a number of different perspectives. Top-down approach.
data mart
Online Analytical Processing (OLAP)
stages in the use of 'IS'
people
25. A group of programs that manipulate the database and provide an interface between the database and its users and other application programs.
Database Management Systems
database
character level formats
phases of performance measurement
26. A set of interrelated components that collect - manipulate - store - and disseminate data and information and provide feedback to meet an objective (THIS PROCESS COULD BE MANUAL OR COMPUTERIZED)
byte
microprocessor (CPU) and the memory
business Intelligience
information system
27. Perform common computer hardware functions - Provide a user interface - Manage system memory - Manage processing tasks - Provide networking capability - Control access to system resources - Manage files
field
systems software operating systems
systems development stages
Online Analytical Processing (OLAP)
28. Permanent storage location for a set of instructions the computer uses.
ROM Read-Only Memory)
technology acceptance model TAM
computer
technology infusion
29. Content:What data should be collected and at what cost? - Access: What data should be provided to which users and when? - Logical structure: How should data be arranged so it makes sense to a given user? - Physical organization: Where should data be
manipulating data
technology acceptance model TAM
technology infusion
data modeling key considerations
30. A measure of how widely technology is spread throughout an organization
two parts of a table
technology diffusion
RAM (Random Access Memory)
input devices
31. A series of activities that includes inbound logistics - warehouse & storage - production - finished product storage - outboun logistics - marketing & sales - and customer service
value chain
database
people
telecommunications
32. Field value must be unique - field value is required
data warehouse
primary key in the main table
value chain
spplication software
33. The design of the computer (what the computer consists of)
architecture or configuration
telecommunications
systems software operating systems
software
34. A continuous process involving the legal and ethical collection of information about competitors - its analysis - and controlled dissemination of information to decision makers
Database Management Systems
two parts of a table
kegabyte (MB)
competitive intelligience
35. Eight bits is a byte. Each byte represents a unique character.
byte
SAN (Storage Area Networks)
database
Roles - Functions - and careers in 'IS'
36. Gathering enough of the right information in a timely manner and usable form and analyzing it to have a positive impact on business strategy - tactics - or operations
database
SAN (Storage Area Networks)
terabyte (TB)
business Intelligience
37. Input devices - Output devices - Processing hardware - Storage devices
organization
information system
monitors
hardware (types)
38. Selecting: data manipulation that eliminates rows according to certain criteria - Projecting: data manipulation that eliminates columns in a table - Joining: data manipulation that combines two or more tables
software
manipulating data
phases of performance measurement
document level formats
39. Computer programs that govern the operation of the computer
data
software
Online Analytical Processing (OLAP)
storage access methods
40. Database - files - records - fields - character
record
system software
database heirarchy (from biggest to smallest)
DBA (database administration)
41. A device that accepts input - Processes data - Stores data - Produces output
microprocessor (CPU) and the memory
computer
knowledge management
data
42. Used to evaluate the contributions (value & cost) of the IS
gigabyte (GB)
database
primary key in the main table
Performance
43. What are the two most important components of personal computer hardware?
microprocessor (CPU) and the memory
people
data
table
44. Major understandings and assumptions of a business or other organization
record
specification
organizational culture
counterintelligience
45. Executive management - Operationss - Systems Development - Support
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
46. Rivalry among existing competitors - threats of new entrants - threat of substitute produts and services - bargaining power of customers - bargaining power of suppliers (cost efficiency is generally not a motive for seeking competitive advantage)
factors that lead firms to seek competitive advantage
two parts of a table
field
RAM (Random Access Memory)
47. Field value is not necessarily unique - field value is required
foreign key in the related table
primary key in the main table
manipulating data
competitive advantage
48. How organizations plan for - implement - and handle change
two parts of a table
organizational change
knowledge management
database heirarchy (from biggest to smallest)
49. Collection of related tables and other objects
software
stages in the use of 'IS'
database
information system
50. Helps the computer carry out it s basic operating tasks.
system software
counterintelligience
primary key in the main table
Roles - Functions - and careers in 'IS'