Related Topics
Take Another Quiz

MIS Test 2

63 Questions
Management Quizzes & Trivia
Questions and Answers
  • 1. 
    Bits are used for computer data because they ________________.
    • A. 

      Are small

    • B. 

      Are easy to work with

    • C. 

      Are easy to represent electronically

  • 2. 
    Bits are grouped into 8-bit chunks called ___________.
    • A. 

      Bytes

    • B. 

      Megabytes

    • C. 

      Watts

    • D. 

      Binary digits

  • 3. 
    To run a program or process data, the computer first transfers the program or data from disk to the  ____________.
    • A. 

      Data channel

    • B. 

      Basic components

    • C. 

      Main memory

    • D. 

      Software

  • 4. 
    Which of the following is nonvolatile in nature?
    • A. 

      Main memory and cache

    • B. 

      Optical and magnetic discs

  • 5. 
    Server farms are used when the _______________.
    • A. 

      Sites have a large number of users and servers are organized into a collection of servers

    • B. 

      Computer crashes

    • C. 

      Server is private

  • 6. 
    Which of the following is an example of cloud computing?
    • A. 

      Tweeting on twitter

    • B. 

      Uploading a video on youtube

    • C. 

      Accessing a video on Facebook

    • D. 

      Retrieving your mail on yahoo

  • 7. 
    Which of the following is one of the functions of an application program?
    • A. 

      Videochat on a mac

    • B. 

      Write a document or query a customer database

    • C. 

      Control a computer's resources

  • 8. 
    ________________ are commands that the CPU can process that may be specific for each processor type.
    • A. 

      Operating systems

    • B. 

      Databases

    • C. 

      Optical disks

    • D. 

      Instruction sets

  • 9. 
    When you buy an operating system for your personal computer, you are actual buying a software ____________.
    • A. 

      Disk

    • B. 

      License

    • C. 

      Drive

    • D. 

      Byte

  • 10. 
    Ronald runs both Windows 7 and Linux on his desktop computer. The process is called _________________/
    • A. 

      PC virtualization

    • B. 

      Server virtualization

    • C. 

      Site licensing

    • D. 

      Desktop virtualization

  • 11. 
    Which of the following is an example of vertical-market software?
    • A. 

      Software installed into devices such as printers

    • B. 

      Graphic programs

    • C. 

      Microsoft excel

    • D. 

      Inventory tracking software for an auto manufacturer

  • 12. 
    Which of the following statements is true of firmware?
    • A. 

      It can't be changed or upgraded

    • B. 

      It is easy to access

    • C. 

      Users do not need to load firmware into the device's memory

    • D. 

      It is more complicated than microsoft excel

  • 13. 
    Which of the following is an example of a closed source project?
    • A. 

      Facebook

    • B. 

      Microsoft office

    • C. 

      Itunes

    • D. 

      Amazon

  • 14. 
    The term "open source" means that the source code of the program is ________________.
    • A. 

      Available to the public

    • B. 

      Only available to a select few

    • C. 

      Hard to access

  • 15. 
    Which of the following is likely to be used by organizations with limited budgets?
    • A. 

      Lotus notes

    • B. 

      Linkedin

    • C. 

      Linux with Ubantu or OpenOffice clients

  • 16. 
    A ________ is equivalent to 1,024 bytes.
    • A. 

      Megabyte

    • B. 

      Kilobyte

    • C. 

      Gigabyte

  • 17. 
    The operating system employs _________ so that users can run multiple applications and files at the same time.
    • A. 

      Multiple downloading

    • B. 

      Mass processing

    • C. 

      Memory swapping

  • 18. 
    Which of the following terms refers to a collection of servers?
    • A. 

      Server farm

    • B. 

      Websites

    • C. 

      Multiple servers

  • 19. 
    A network of computers that appears to operate as an integrated whole is known as a(n) ___________.
    • A. 

      Database

    • B. 

      Byte

    • C. 

      Grid

    • D. 

      Processor

  • 20. 
    Which of the following is a program that controls the computer's resources?
    • A. 

      The application system

    • B. 

      The operating system

    • C. 

      The budgeting system

  • 21. 
    Virtualization is the process where _______________.
    • A. 

      One computer hosts the appearance of many computers

    • B. 

      There are a lot of graphics

    • C. 

      There is a collection of servers

  • 22. 
    Which of the following is most likely to be the last-choice alternative when deciding to acquire an application software?
    • A. 

      Software developed in-house

    • B. 

      Software developed by children

    • C. 

      Software that is unreliable

  • 23. 
    A client-server application that requires nothing more than a browser is called a _____________.
    • A. 

      Thick client

    • B. 

      Thin client

  • 24. 
    Development costs of an information system include _______________.
    • A. 

      Acquiring costs

    • B. 

      Data conversion costs

    • C. 

      Repairing costs

  • 25. 
    In a database system, a _____________ is the smallest piece of data.
    • A. 

      Bit

    • B. 

      Byte

    • C. 

      Chip

    • D. 

      Disk

  • 26. 
    Which of the following is an example of a database product?
    • A. 

      Microsoft office

    • B. 

      Ubuntu

    • C. 

      Linux

  • 27. 
    Which of the following is a developmental task of a database administrator?
    • A. 

      Create and staff DBA function

    • B. 

      Form steering committee

    • C. 

      Specify requirements

    • D. 

      Validate data model

    • E. 

      Evaluate application design

    • F. 

      All of the above

  • 28. 
    A _____________ is a collection of forms, reports, queries, and programs that process a database
    • A. 

      Process application

    • B. 

      Database application

    • C. 

      Software application

  • 29. 
    A hospital is using a software to analyze treatment regimen and recovery times. The software relates to the dosages, regularity and therapeutic procedures to the time taken by patients segmented across age- and illness-groups. This software is an example of a(n) ________________.
    • A. 

      Database management system

    • B. 

      Structured query language

    • C. 

      Application program

    • D. 

      Database administration

  • 30. 
    The ____________ problem is unique in a multi-user database environment.
    • A. 

      Tracking

    • B. 

      Lost-update

    • C. 

      Multi-user

    • D. 

      Processing

  • 31. 
    Which of the following is true of N:M relationships?
    • A. 

      An advisor has at most one department

    • B. 

      More than one entity is allowed on each side of the relationship

    • C. 

      One department can have many advisors

  • 32. 
    A byte is a _____________.
    • A. 

      Computer chip

    • B. 

      Character of data

    • C. 

      Database

  • 33. 
    A ___________ is a column or group of columns that identifies a unique row in a table.
    • A. 

      Grid

    • B. 

      Key

    • C. 

      Entity

  • 34. 
    Metadata are _____________.
    • A. 

      Data that describe data

    • B. 

      Database applications

    • C. 

      Collections of bits

  • 35. 
    Which of the following is a program used to create, process, and administer a database?
    • A. 

      A database management system (DBMS)

    • B. 

      A structured query language

    • C. 

      An application program

  • 36. 
    SQL is a(n) ________________.
    • A. 

      Query language

    • B. 

      Browser

    • C. 

      Identifier

  • 37. 
    DBMS products are broadly classified into _______________.
    • A. 

      Two broad categories: unified and separate

    • B. 

      Two broad categories: enterprise and personal

  • 38. 
    Entities have ______ that describe the characteristics of the entity.
    • A. 

      Attributes

    • B. 

      Identifiers

    • C. 

      Data models

  • 39. 
    Each entity has a unique attribute called ______________.
    • A. 

      Crow's feet

    • B. 

      Identifier

    • C. 

      Model

  • 40. 
    Minimum cardinalities are
    • A. 

      Minimum requirements on the number of entities

    • B. 

      Minimum requirements on the number of attributes

    • C. 

      Minimum requirement on the number of identifiers

  • 41. 
    _____________ is the process of converting a data model into tables, relationships, and data contraits.
    • A. 

      Normalization

    • B. 

      Database design

    • C. 

      Multi-user processing

  • 42. 
    __________ is the process of converting a poorly structured table into two or more well-structured tables.
    • A. 

      Identifying

    • B. 

      Normalization

  • 43. 
    Every table in a normalized database has a ______________.
    • A. 

      Server

    • B. 

      Single theme

    • C. 

      Source code

    • D. 

      Client

  • 44. 
    Which of the following statements is true about UTP cables?
    • A. 

      They are types of cables used to connected computers, printers, switches and other devices on a LAN

    • B. 

      Most LAN connections are made using UTP cables

    • C. 

      The cable consists of wires that are twisted together to improve signal quality

    • D. 

      If the connection carries a lot of traffic, the UTP cable may be replaced by optical fiber cables

    • E. 

      All of the above

  • 45. 
    A(n) is a set of rules that two communicating devices follow
    • A. 

      Source code

    • B. 

      Protocol

    • C. 

      Machine code

    • D. 

      Network

  • 46. 
    The various computers and printers on a LAN are connected to a _______________, which is a special purpose computer that receives and transmits wired traffic on the LAN.
    • A. 

      Switch

    • B. 

      Modem

    • C. 

      Protocol

    • D. 

      IP address

  • 47. 
    The hardware component that connects a printer's circuitry to the network is called a(n) _________________.
    • A. 

      SOHO

    • B. 

      NIC

    • C. 

      LAN

    • D. 

      WAN

  • 48. 
    Which of the following is true for the TCP/IP protocol architecture?
    • A. 

      The 4th layer is transport

    • B. 

      The 2nd layer is internet

    • C. 

      The 5th layer is physical

    • D. 

      The 1st layer is data link

  • 49. 
    A(n) _____________ is a piece of a message that is handled by programs that implement IP.
    • A. 

      Access point

    • B. 

      Analog signal

    • C. 

      Packet

    • D. 

      Firewall

  • 50. 
    A(n) __________ uses the internet or other internet to create the appearance of private, point to point connections.
    • A. 

      VPN

    • B. 

      Modem

    • C. 

      HTTP

    • D. 

      Data link

  • 51. 
    A _________ is a computing device that prevents unauthorized network access.
    • A. 

      Browser

    • B. 

      Web blocker

    • C. 

      Firewall

  • 52. 
    Which of the following is a function of an ISP?
    • A. 

      Provides you with a legitimate internet address

    • B. 

      Pays for the internet

    • C. 

      Serves as your gateway to the internet

    • D. 

      All of the above

  • 53. 
    The IEEE 802.3 and 802.11 protocols _______________.
    • A. 

      Operate at the bottom two layers (data link and physical)

    • B. 

      Operate at the top layer (application)

    • C. 

      Operate at the middle layers (transport and internet)

  • 54. 
    The application layer of the TCP/IP protocol architecture ________________.
    • A. 

      Enables communication among programs (programs to programs)

    • B. 

      Deals with internet routing

    • C. 

      Is a reliable internet transport

  • 55. 
    In which of the following cases is a user using the internet, but not the web?
    • A. 

      When they are using either HTTP or HTTPS

    • B. 

      When they are using SMTP or FTP

  • 56. 
    Which of the following protocols guarantees a secure transmission?
    • A. 

      HTTP

    • B. 

      SMTP

    • C. 

      HTTPS

    • D. 

      FTP

  • 57. 
    The __________________ layer of the TCP/IP protocol architecture is said to provide reliable internet transport.
    • A. 

      Transport

    • B. 

      Application

    • C. 

      Internet

    • D. 

      Data link

  • 58. 
    _______________ are programs that run on a server-tier computer and that manage HTTP traffic by sending and receiving Web pages to and from clients.
    • A. 

      Databases

    • B. 

      Applications

    • C. 

      Web servers

  • 59. 
    A(n) ______________ contains the URL of the Web page to find when the user clicks it.
    • A. 

      Hyperlink

    • B. 

      Website

    • C. 

      Database

  • 60. 
    The connection between the VPN client and the VPN server is called a(n) ___________________.
    • A. 

      Bridge

    • B. 

      Tunnel

    • C. 

      Connector

  • 61. 
    Which of the following is true about virtual private networks?
    • A. 

      Creates the appearance of a private point-to-point connection

    • B. 

      Creates the appearance of a public point-to-point connection

  • 62. 
    ________________ communications are secure, even though they are transmitted over the internet.
    • A. 

      Web

    • B. 

      Internet

    • C. 

      VPN

  • 63. 
    Packet-filtering firewalls perform all of the following except ______________.
    • A. 

      Block websites

    • B. 

      Encrypt data for transmission

    • C. 

      Secure hyperlinks