100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

Management information systems practise exam oefententamen Q&A

Rating
-
Sold
1
Pages
6
Grade
9-10
Uploaded on
09-01-2023
Written in
2022/2023

Management information systems Q&A oefententamen

Institution
Course









Whoops! We can’t load your doc right now. Try again or contact support.

Connected book

Written for

Institution
Study
Course

Document information

Uploaded on
January 9, 2023
Number of pages
6
Written in
2022/2023
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

MULTIPLE CHOICE. Choose the one alternative that best completes the statement or
answers the question.

Management Information Systems, Managing the digital firm, 13th edition - Laudon & Laudon

1) Which type of infrastructure services provides voice and video connectivity to
employees, customers, and suppliers?
A) VoIP
B) networking
C) telecommunications
D) telephone

2) A client computer networked to a server computer, with processing split between the
two types of machines, is called a(n)
A) multi-tiered client/server architecture.
B) service-oriented architecture.
C) on-demand architecture.
D) two-tiered client/server architecture.

3) Interpretations of Moore's law assert that
A) computing power doubles every 18 months.
B) data storage costs decrease by 50% every 18 months.
C) transistors decrease in size 50% every two years.
D) none of the above.

4) Which model can be used to analyze the direct and indirect costs to help firms
determine the actual cost of specific technology implementations?
A) total cost of ownership
B) cost-benefit analysis
C) breakeven point
D) return on investment

5) A DBMS reduces data redundancy and inconsistency by
A) enforcing referential integrity.
B) minimizing isolated files with repeated data.
C) utilizing a data dictionary.
D) uncoupling program and data.

6) The confusion created by ________ makes it difficult for companies to create customer
relationship management, supply chain management, or enterprise systems that
integrate data from different sources.
A) data independence
B) batch processing
C) online processing
D) data redundancy




Exam-EFM2& EHM2 - cover page format, Apr 2015

, 7) The data dictionary serves as an important data management tool by
A) creating an inventory of the data elements contained in the database.
B) presenting data as end users or business specialists would perceive them.
C) maintaining data in updated form.
D) assigning attributes to the data.

8) Which common database challenge is illustrated by a person receiving multiple copies
of an L.L. Bean catalog, each addressed to a slightly different variation of his or her full
name?
A) data redundancy
B) data inconsistency
C) data normalization
D) data accuracy

9) The telephone system is an example of a ________ network.
A) packet-switched
B) wireless
C) peer-to-peer
D) circuit-switched

10) A network that covers entire geographical regions is most commonly referred to as a(n)
A) peer-to-peer network.
B) local area network.
C) intranet.
D) wide area network.

11) A VPN
A) is an Internet-based service for delivering voice communications.
B) provides secure, encrypted communications using Telnet.
C) is an encrypted private network configured within a public network.
D) is more expensive than a dedicated network.

12) Bandwidth is the
A) number of cycles per second that can be sent through a medium.
B) difference between the highest and lowest frequencies that can be accommodated on a
single channel.
C) total number of bytes that can be sent through a medium per second.
D) number of frequencies that can be broadcast through a medium.

13) ________ refers to all of the methods, policies, and organizational procedures that
ensure the safety of the organization's assets, the accuracy and reliability of its
accounting records, and operational adherence to management standards.
A) "Controls"
B) "Legacy systems"
C) "Vulnerabilities"
D) "SSID standards"

14) Sniffing is a security challenge that is most likely to occur in which of the following points
of a corporate network?
A) internal corporate back-end system
B) client computer
C) communications lines
D) corporate servers


Exam-EFM2& EHM2 - cover page format, Apr 2015
$9.58
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
luukfontein

Also available in package deal

Get to know the seller

Seller avatar
luukfontein Breda University of Applied Sciences
Follow You need to be logged in order to follow users or courses
Sold
8
Member since
2 year
Number of followers
4
Documents
5
Last sold
1 month ago

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions