100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

Park University IS 205/ IS205DLAF1A2025 Managing Information Systems; Unit 4: Midterm Exam_ Answered Latest Fall 2025/26.

Rating
-
Sold
-
Pages
14
Grade
A
Uploaded on
08-11-2025
Written in
2025/2026

Unit 4: Midterm Exam: IS205DLAF1A2025 Managing Information Systems Unit 4: Midterm Exam Due Sep 7 at 11:59pm Points 150 Questions 50 Available after Sep 1 at 12am Time Limit 120 Minutes Instructions Attempt History Attempt Time Score LATEST Attempt 1 32 minutes 138 out of 150  Correct answers are hidden. Score for this quiz: 138 out of 150 Submitted Sep 7 at 2:11pm This attempt took 32 minutes.  Question 1 3 / 3 pts Data manipulation language DBMS Data access language Data definition language Database language  Question 2 3 / 3 pts Application, Hardware, Internet, and Network Interface The midterm exam consists of 50 questions spanning chapters 1 through 8. Each question is worth three points. You have two hours (120 minutes) to complete this midterm exam. Only one attempt is allowed. (Advice: Be alert for the key words "not", "except" and "best" in the questions.) Which of the following is a specialized language that programmers use to add and change data in the database? What are the four layers of the TCP/IP reference model? 9/29/25, 5:26 PM Unit 4: Midterm Exam: IS205DLAF1A2025 Managing Information Systems Application, Transport, Internet, and Network Interface Physical, Application, Transport, and Network Interface Software, Hardware, Network Interface, Internet  Question 3 3 / 3 pts com books none; there is no second-level domain in this name on  Question 4 3 / 3 pts System quality Accountability and control Quality of life Property rights and obligations Family and home  Question 5 3 / 3 pts Senior management Operational management Middle management Production workers Knowledge workers  Question 6 3 / 3 pts Sales and manufacturing In the domain name "", which element is the second-level domain? The obligations that individuals and organizations have regarding the preservation of existing values and institutions fall within which of the following moral dimensions of the information age? Which of the following makes long-range strategic decisions about products and services as well as ensures financial performance of the firm? Maintaining the organization's financial records is a central purpose of which main business function? 9/29/25, 5:26 PM Unit 4: Midterm Exam: IS205DLAF1A2025 Managing Information Systems Manufacturing and accounting Finance and sales Human resources  Question 7 3 / 3 pts root domain. third-level domain. uniform resource locator. child domain. IP address. Incorrect  Question 8 0 / 3 pts engineering, utilization management, and computer science. computer science, engineering, and networking. operations research, management science, and computer science. management science, computer science, and engineering. economics, sociology, and psychology.  Question 9 3 / 3 pts An extranet The Internet The World Wide Web Verizon An intranet  Question 10 3 / 3 pts Together, a protocol prefix, a domain name, a directory path, and a document name, are called a(n): Disciplines that contribute to the technical approach to information systems include: Which of the following is a global network that uses universal standards to connect millions of different networks around the world? Networking and telecommunications technologies, along with computer hardware, software, data management technology, and the people required to run and manage them, constitute an organization's: 9/29/25, 5:26 PM Unit 4: Midterm Exam: IS205DLAF1A2025 Managing Information Systems networked environment. data management environment. information system. culture.  Question 11 3 / 3 pts provides secure, encrypted communications using Telnet. is a proprietary networking service technology developed by individual corporations. is an encrypted private network configured within a public network. is more expensive than a dedicated network. is an Internet-based service for delivering voice communications.  Question 12 3 / 3 pts preventing client computers from accepting cookies. email encryption. anonymous surfing. anonymous email. data use policies.  Question 13 3 / 3 pts Privacy Protection Act Gramm-Leach-Bliley Act HIPAA Freedom of Information Act COPPA  Question 14 3 / 3 pts A VPN: All of the following are technical solutions to protecting user privacy except: Which of the following U.S. laws gives patients access to personal medical records and the right to authorize how this information can be used or disclosed? A(n) ________ signal is a discrete, binary waveform that transmits data coded into two discrete states: 1-bits and 0-bits. 9/29/25, 5:26 PM Unit 4: Midterm Exam: IS205DLAF1A2025 Managing Information Systems modulated analog digital T1  Question 15 3 / 3 pts Optical Analog Laser Digital RFID  Question 16 3 / 3 pts ERP, SCM, DSS, and CRM. SCM, CRM, DSS, and KMS. SCM, CRM, ESS, and KMSs. ERP, SCM, CRM, and KMS. TPS, MIS, DSS, and ESS.  Question 17 3 / 3 pts FTP Instant messaging Newsgroups Telnet Email  Question 18 3 / 3 pts display data in graphs. Which signal types are represented by a continuous waveform? The four major types of enterprise applications are: Which of the following Internet services enables logging on to one computer system and doing work on another? DBMSs typically include report generating tools in order to: 9/29/25, 5:26 PM Unit 4: Midterm Exam: IS205DLAF1A2025 Managing Information Systems retrieve and display data. display data in a more structured and polished format than would be possible just by querying. analyze the database's performance.  Question 19 3 / 3 pts e-commerce. e-government. e-business. an extranet. an intranet.  Question 20 3 / 3 pts Every business can be seen as a collection of business processes. Business processes can be either a source of competitive strength or a liability. The performance of a business firm typically is not related to its business processes. A business process may involve a unique way in which work, information, and knowledge are coordinated within an organization. Analyzing business processes can enable you to achieve a clear understanding of how a business actually works.  Question 21 3 / 3 pts Focusing on market niche Strengthening supplier intimacy Product differentiation Strengthening customer intimacy Low-cost leadership  Question 22 3 / 3 pts Using the Internet to buy or sell goods is called: Which of the following is not a true statement with respect to business processes? ________ is a competitive strategy for creating brand loyalty by developing new and unique products and services that are not easily duplicated by competitors. Which of the following is not an example of a computer used as a target of crime? 9/29/25, 5:26 PM Unit 4: Midterm Exam: IS205DLAF1A2025 Managing Information Systems Accessing a computer system without authority Breaching the confidentiality of protected computerized data Threatening to cause damage to a protected computer Knowingly accessing a protected computer to commit fraud  Question 23 3 / 3 pts It provides users with an integrated view of the data. It allows administrators to manage data more effectively. It enables the ability to use relational databases. It enables firms to create and verify transactions on a network very rapidly. It prevents data from being altered retroactively.  Question 24 3 / 3 pts On-demand self service Measured service Reduced elasticity Ubiquitous network access Location-independent resource pooling  Question 25 3 / 3 pts MIS TPS KMS An extranet CRM  Question 26 3 / 3 pts Which of the following is not one of the benefits of a blockchain database? Which of the following is not one of the characteristics of cloud computing, as defined by the U.S. National Institute of Standards and Technology? Which of the following systems would you use to consolidate the relevant knowledge and experience in the firm and make it available to improve business processes and management decision making? 9/29/25, 5:26 PM Unit 4: Midterm Exam: IS205DLAF1A2025 Managing Information Systems Competitive advantage Survival Operational excellence Improved decision making  Question 27 3 / 3 pts DSS TPS KMS MIS SCM  Question 28 3 / 3 pts HTTP DNS FTP HTML URL  Question 29 3 / 3 pts CRM, to maintain easily accessible customer records to minimize the time spent looking for client data MIS, to produce reports on the firm's operations TPS, to help manage all daily activities and transactions A firm that invests in an information system because it is a necessity of doing business does so because it is seeking to achieve which of the following business objectives? Which of the following systems is especially suited to situations in which the procedure for arriving at a solution may not be fully predefined in advance? Web browser software requests web pages from the Internet using which of the following protocols? You have been hired by BizCom to help it improve its business processes and financial performance. BizCom is a business communications consulting firm that services many clients in different industries throughout the United States. BizCom provides customized written recommendations about how to best use a client's existing resources to improve the client's internal communications. The company has approximately 50 consultants, all of whom are located in its central headquarters in Alexandria, Virginia. Which of the following would you recommend that BizCom install? 9/29/25, 5:26 PM Unit 4: Midterm Exam: IS205DLAF1A2025 Managing Information Systems minimize the amount of paperwork needed KMS, to minimize redundant work on similar clients  Question 30 3 / 3 pts phishing. a zero-day vulnerability. snooping. social engineering. sniffing.  Question 31 3 / 3 pts spoofing. cyberwarfare. pharming. phishing. cybervandalism.  Question 32 3 / 3 pts Improved quality Improved customer service Improved innovation Improved financial performance Improved compliance with government regulations  Question 33 3 / 3 pts Paying creditors Hiring employees When a hacker discovers a security hole in software that is unknown to the software's creator, it is an example of: The intentional defacement or destruction of a website is called: Which of the following is not a business benefit of collaboration? Which of the following is an example of a cross-functional business process? 9/29/25, 5:26 PM Unit 4: Midterm Exam: IS205DLAF1A2025 Managing Information Systems Fulfilling a customer order Identifying customers Incorrect  Question 34 0 / 3 pts Ability to minimize isolated files with repeated data Ability to couple program and data Ability to enforce referential integrity Ability to create two-dimensional tables Use of a data dictionary  Question 35 3 / 3 pts mass customization. niche customization. micromarketing. mass marketing. micro customization. Incorrect  Question 36 0 / 3 pts Physical facilities management services to manage the facilities housing physical components IT education services that provide training to employees Operating system software services IT management services to plan and develop the infrastructure and provide project management Computing services that connect employees, customers, and suppliers into a coherent digital environment  Question 37 3 / 3 pts Which of the following enables a DBMS to reduce data redundancy and inconsistency The ability to offer individually tailored products or services using the same production resources as bulk production is known as: Which of the following is not an IT infrastructure service component? Under Mintzberg's classification of organizational structure, knowledge-based organizations fall under the category of: 9/29/25, 5:26 PM Unit 4: Midterm Exam: IS205DLAF1A2025 Managing Information Systems divisionalized bureaucracies. machine bureaucracies. adhocracies. professional bureaucracies.  Question 38 3 / 3 pts It is available in free versions downloadable from the Internet. Linux applications are embedded in cell phones, smartphones, tablet computers. and consumer electronics. Linux can be used as an operating system for mainframe computers. Linux works on all the major hardware platforms. Linux is the leading operating system for desktop systems.  Question 39 3 / 3 pts Public key encryption Private key encryption SSL/TLS Symmetric key encryption Distributed encryption  Question 40 3 / 3 pts Quantum computing devices Wearable computing devices Green computing devices Cloud computing devices Grid computing devices  Question 41 3 / 3 pts service workers. Which of the following statements about Linux is not true? In which method of encryption is a single encryption key sent to the receiver so both sender and receiver share the same key? Which of the following is a recent addition to the mobile digital platform? In a hierarchical business organization, the upper level consists of: 9/29/25, 5:26 PM Unit 4: Midterm Exam: IS205DLAF1A2025 Managing Information Systems data workers. knowledge workers. scientists.  Question 42 3 / 3 pts uses a centralized data store in the cloud. relies on peer-to-peer networks. uses a chain of digital "blocks" that contain records of transactions. uses existing banking systems to transfer funds. relies on the Internet to provide secure transactions.  Question 43 3 / 3 pts Web browsers SaaS Web services Apps Web mashups  Question 44 3 / 3 pts benchmarks. best processes. value activities. best practices. core competencies.  Question 45 3 / 3 pts Chrome OS Blockchain refers to a technology that: ________ are small, specialized software programs that run on the Internet, on a computer, or on a mobile phone or tablet and are generally delivered over the Internet. The most successful solutions or methods for achieving a business objective are called: ________ provides a standard format for data exchange, enabling web services to pass data from one process to another. 9/29/25, 5:26 PM Unit 4: Midterm Exam: IS205DLAF1A2025 Managing Information Systems XML Java HTML5  Question 46 3 / 3 pts Lack of data sharing Program-data dependence Poor security Data redundancy Lack of flexibility Incorrect  Question 47 0 / 3 pts only a single supplier. local suppliers. more suppliers. fewer suppliers. global suppliers.  Question 48 3 / 3 pts Information technology helps reduce agency costs. Information technology helps reduce internal management costs. Information technology helps firms reduce environmental scanning. Information technology helps reduce transaction costs. Information technology helps firms lower the cost of market participation.  Question 49 3 / 3 pts The fact that a traditional file system cannot respond to unanticipated information requirements in a timely fashion is an example of which of the following issues with traditional file systems? A firm can exercise greater control over its suppliers in terms of price, quality, and delivery schedules by having: Which of the following statements about information technology's impact on business firms is not true? All of the following laws apply to actions by the federal government except the: 9/29/25, 5:26 PM Unit 4: Midterm Exam: IS205DLAF1A2025 Managing Information Systems Driver's Privacy Protection Act. Computer Security Act. Freedom of Information Act. Privacy Act.  Question 50 3 / 3 pts 5G is based on the GSM standard. 5G will be able to transmit data in the gigabit range. 5G will have longer transmission delays. 5G networks have not yet been launched by Internet network providers. 5G's top data transmission rate is in the megabyte range. Quiz Score: 138 out of 150 Which of the following statements about 5G is true? 9/29/25, 5:26 PM Unit 4: Midterm Exam: IS205DLAF1A2025 Managing Information Systems

Show more Read less
Institution
Module









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Module

Document information

Uploaded on
November 8, 2025
Number of pages
14
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

9/29/25, 5:26 PM Unit 4: Midterm Exam: IS205DLAF1A2025 Managing Information Systems



Unit 4: Midterm Exam
Due Sep 7 at 11:59pm
Points 150
Questions 50
Available after Sep 1 at 12am
Time Limit 120 Minutes

Instructions
The midterm exam consists of 50 questions spanning chapters 1 through 8. Each question is worth three
points.

You have two hours (120 minutes) to complete this midterm exam. Only one attempt is allowed. (Advice:
Be alert for the key words "not", "except" and "best" in the questions.)


Attempt History
Attempt Time Score
LATEST Attempt 1 32 minutes 138 out of 150


 Correct answers are hidden.

Score for this quiz: 138 out of 150
Submitted Sep 7 at 2:11pm
This attempt took 32 minutes.

Question 1
pts
Which of the following is a specialized language that programmers use to add and change data in the
database?
Data manipulation language
DBMS
Data access language
Data definition language
Database language

Question 2
pts
What are the four layers of the TCP/IP reference model?
Application, Hardware, Internet, and Network Interface
https://canvas.park.edu/courses/86346/quizzes/669029?module_item_id=6259383 1/14

, 9/29/25, 5:26 PM Unit 4: Midterm Exam: IS205DLAF1A2025 Managing Information Systems

Physical, Application, Internet, and Network Interface
Application, Transport, Internet, and Network Interface
Physical, Application, Transport, and Network Interface
Software, Hardware, Network Interface, Internet

Question 3
pts
In the domain name "http://books.pearson.com", which element is the second-level domain?
com
books
pearson.com
none; there is no second-level domain in this name
books.pearson

Question 4
pts
The obligations that individuals and organizations have regarding the preservation of existing values and
institutions fall within which of the following moral dimensions of the information age?
System quality
Accountability and control
Quality of life
Property rights and obligations
Family and home

Question 5
pts
Which of the following makes long-range strategic decisions about products and services as well as
ensures financial performance of the firm?
Senior management
Operational management
Middle management
Production workers
Knowledge workers

Question 6
pts
Maintaining the organization's financial records is a central purpose of which main business function?
Sales and manufacturing
https://canvas.park.edu/courses/86346/quizzes/669029?module_item_id=6259383 2/14
£13.07
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached


Also available in package deal

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
melleystuvia Nightingale College
Follow You need to be logged in order to follow users or courses
Sold
83
Member since
8 months
Number of followers
4
Documents
1220
Last sold
2 days ago
Edusolutionguides.

We learn all subject preparation for the final exam. We give the online assignment and homework for all the subjects. That's why you prepare well for all the paperwork.

3.0

18 reviews

5
5
4
4
3
2
2
0
1
7

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these revision notes.

Didn't get what you expected? Choose another document

No problem! You can straightaway pick a different document that better suits what you're after.

Pay as you like, start learning straight away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and smashed it. It really can be that simple.”

Alisha Student

Frequently asked questions