100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Examen

Information Systems Management – C724 Pre-Assessment | 2022 UPDATE

Puntuación
-
Vendido
-
Páginas
12
Grado
A+
Subido en
04-01-2022
Escrito en
2021/2022

Information Systems Management – C724 Pre-Assessment 1. Which activity is an example of how information systems support business functions of human resource departments? a. An employee processes invoices to be paid using proprietary software. b. An employee reviews daily inventory reports using an inventory management software. c. An employee verifies a customer's credit status using a credit check software. d. An employee processes monthly payroll checks and benefits using an open-source software. 2. There are six major components of a computer-based information system, four of which are also in the information technology component. Which two components are only parts of the information system? a. Data b. Processes c. Hardware d. Networks e. People f. Software 3. A police department at a large metropolitan city implemented an information system that analyzes historical crime data, including date and locations as well as other external, environmental, and city-related data. The system then produces daily predictive reports of the major locations around the city that are likely to require additional police attention. The police department uses the reports to plan the officers' patrol routes, targeting the areas that the system predicted to have high likelihood of incidents. Which type of computer-based information system provides a competitive advantage based on the described scenario? a. A decision support system (DSS) that improves decision-making. b. A transaction processing system (TPS) that promotes product differentiation. c. A geographic information system (GIS) that helps increase market share. d. A management information system (MIS) that enhances the customer experience. 4. A police department at a large metropolitan city implemented an information system that integrates historical crime data, including date and locations to other external, environmental, and city-related data. The system then produces daily predictive reports of the major locations around the city that are likely to require additional police attention. The police department uses the reports to plan the officers' patrol routes, targeting the areas that the system predicted to have high likelihood of incidents. Which two strategies does the information system at the police department aim to accomplish? Choose 2 answers. a. Customer satisfaction. b. Operational efficiency. c. Product differentiation. d. Cost saving. e. Improving decision-making 5. Which business function is primarily the responsibility of production and operations information systems? a. Recruiting and training. b. Product pricing. c. Quality control. d. Accounts payable Information Systems Management – C724 Pre-Assessment 6. A small company that is growing quickly into a medium-sized company is facing the challenge of consolidating and storing information received from multiple sources from the ground up in order to ensure that operations run efficiently. The company needs to hire an expert who will, in addition to the above, maintain security and apply upgrades as needed. Which IT professional does the company need to hire in order to address this challenge? a. Chief technology officer. b. Computer programmer. c. Database administrator. d. Web developer. 7. A university is looking for ways to customize its courses to the unique needs of its students by creating various levels of hybrid online courses, such as 80% online for one student, whereas only 30% online for another. Which IT management challenge is addressed in this scenario? a. Achieve operational excellence. b. Develop new products and services. c. Improve decision-making. d. Develop strong relationships with suppliers. 8. A ride-sharing cab company is looking for ways to generate more business by attracting more customers, both on the supply (driver) and demand (passenger) side, via a strategy of tracking their monthly miles and offering "frequent flier" bonuses, just like airline companies have done. Which IT management challenge is addressed in this scenario? a. Attain operational efficiency. b. Promote competitive advantage. c. Improve decision making. d. Develop strong relationships with suppliers. 9. An automobile manufacturer is considering equipping the engines of its new models with the capability of detecting early symptoms of an imminent mechanical or electric failure, automatically transmitting that warning to the dealership from which the customer purchased the car, and the dealership automatically contacting the customer to schedule a repair appointment. It is facing the challenge of whether all this is technically feasible and operationally viable. Who needs to address this challenge of value creation through technology use? a. Chief technology officer. b. Database administrator. c. Web administrator. d. Chief information officer. 10. A car dealership has been receiving complaints from its customers about its inflexible repair system in which customers who drop off their cars the previous evening is not properly placed in the queue and tend to be placed behind those who drop off their cars the morning of the scheduled repair. It needs technical staff members who understand the scheduling/drop-off operation so it can determine and articulate precise customer needs to the programmers who would then build the code behind the system. What type of challenge is this? a. User requirements. b. Project risk. c. Coding. d. Security. Information Systems Management – C724 Pre-Assessment 11. An international company is facing the challenge of its software development team working on a specific application spread across the globe in 16 countries in 12 different time zones. Flying them to the same location once a week or even once a month for coordination purposes would be prohibitively expensive. Moreover, the issues that arise tend to be urgent and in need of almost immediate resolution in communication with team members in other countries. Which communication style is necessary to resolve the issues in the given scenario? a. Multichronous. b. Synchronous. c. Dyschronous. d. Asynchronous. 12. What business strategy relies heavily on efficient and secure software implementations? a. Vendor selection. b. High-quality products. c. Web sales. d. IS staff training. 13. What business function benefits from both wireless networks and cellular technologies? a. Product sales support. b. Consideration of product retirement. c. Corporate hiring standards. d. Evaluating technology trends. 14. In 1965, computers had .092 MIPS, and today's computer have about 238,000 MIPS. What business practices have taken advantage of this massive increase in computer speed? Choose 2 answers. a. Internal auditing schedule. b. Network management systems. c. Executive management hiring. d. Database management systems. 15. A marketing manager uses a desktop publishing software to create advertising brochures that will be mailed to potential customers. To which major software category does the desktop publishing software in this scenario belong? a. System software. b. Utility software. c. Simulation software. d. Application software. 16. A company needs to allow multiple computers to have access to a shared printer. Which type of computer is required to manage the print requests to a shared printer? a. A server computer. b. A supercomputer. c. A client computer. d. A laptop computer. 17. An art history professor would like to show an original oil painting from the eighteenth century on the classroom projector. The class is held in a large auditorium with more than 250 students attending. Which hardware component is required to digitize the painting? a. Sensor. b. Teleprompter. c. Document camera. d. Multicore processor. Information Systems Management – C724 Pre-Assessment 18. Which approach to systems development has a limited emphasis on the planning process and uses prototypes in lieu of predetermined specifications? a. Traditional software development life cycle. b. Joint application design. c. Computer-assisted software engineering. d. Rapid application development. 19. Which development methodology brings developers together with clients or end users in order to regularly collaborate on a solution? a. Object-oriented development. b. End-user development. c. Joint application development. d. Rapid application development. 20. A company has many separate departments that focus on different business aspects and uses data warehouse subsets to hold data specific to each individual department. The company started a new department and created a new subset. What is this new subset called? a. Data tuple. b. Secondary data. c. Primary data. d. Data mart. 21. An auto parts manufacturer is creating a new relational database to more accurately identify their customers and vendors. The manufacturer's database design team decided to use "vendorID" to link a given vendor to a specific product, as illustrated in the diagram shown. What type of attribute is "vendorID"? a. Master key in record "Product" b. Primary key in record "Vendor" c. Primary key in record "Product" d. Foreign key in record "Vendor" 22. Which database type, used frequently in early style databases but much less frequently today, contained inflexible data relationships that formed a treelike structure? a. Object-oriented database. b. Analytical database. c. Relational database. d. Hierarchical database. 23. Amanda has been asked to regularly extract and process databases from many sources into a data warehouse, which will be used by several divisions within the company. Which data type should Amanda recognize is prevented by her data warehouse design? a. Static. b. External. c. Variable. d. Historical. 24. A national publisher of newspapers wants to mine its data warehouse (including inputs from social media) to identify which of its publication’s customers believe provides reliable reporting. Which tool is used for this initiative? a. Clickstream analysis. b. Text analysis. c. Predictive analysis. d. Sentiment analysis. Information Systems Management – C724 Pre-Assessment 25. A marketing research firm is planning a study involving consumer preferences toward new coffee flavors. The company needs to analyze coffee data from the coffee manufacturer, as well as preference data from consumers in order to discover whether certain flavors are more or less popular among certain segments of the population. Which database technology would help the company conduct this research project? a. Non-relational analytical platform that can quickly process a large amount of data. b. Data reporting tool capable of generating ad hoc managerial reports. c. Business intelligence system utilizing data mining technology. d. Multi-user transactional database that integrates data from various sources. 26. A fast food restaurant chain is in the process of adding more restaurants in an overseas market. One of the requirements is to have a reliable and scalable database technology that allows the local restaurants, as well as the corporate office, data access regardless of the platforms and locations. Which database technology supports these business data requirements? a. Online analytical processing database. b. Cloud-based database. c. Data mart. d. Data warehouse. 27. Which aspect of data governance is used to ensure that once an online payment transaction is successfully processed, the credit card information is removed from the company servers? a. Data are properly retrieved. b. Data are properly recorded. c. Data are properly destroyed. d. Data are properly stored. 28. Which aspect of data governance is used to ensure that the customer data and payment information saved in the company server are properly encrypted? a. Data are properly destroyed. b. Data are properly retrieved. c. Data are properly recorded. d. Data are properly stored. 29. A marketing manager would like to study customer behavior and how it relates to customer's purchase products from its online store. Specifically, she would like to know which website page the majority of customers spent the most time on, when and where they decided to abandon the shopping cart, and how long (on average) a customer takes to complete a sales transaction. Which database technology supports this study? a. Smart Grid service. b. Data mining. c. Clickstream analysis. d. Cloud-based database. 30. Which telecommunication protocol is used to connect devices in a wireless local area network (LAN)? a. Token ring. b. Bluetooth. c. Ethernet. d. Wi-Fi. Information Systems Management – C724 Pre-Assessment 31. Which telecommunication protocol is used to retrieve email from a mail server? a. Point-to-Point protocol (PPP). b. Post Office Protocol (POP). c. File Transfer Protocol (FTP). d. Transmission Control Protocol/Internet Protocol (TCP/IP). 32. With technology trends such as the Internet of Things (IoT), Big Data, Cloud Computing, eCommerce, and mCommerce, the Internet has become a very important and useful aspect of society. To prepare for these trends and aid in technology evolution, a necessary and critical change in telecommunications was the conversion from IPv4 to IPv6. What was the primary reason to convert to IPv6? a. To complete the conversion from analog networking to digital networking. b. To enable the Internet to operate at a higher bandwidth. c. To enable the support of Web 3.0. d. To increase the number of available IP addresses. 33. Which tactic defeats a war driver by barring access to your secured wireless network? a. Using an appropriate security solution, such as WEP or PGP b. Configuring the access point to accept only specific MAC addresses c. Configuring the access point to hide the SSID d. Regularly resetting the router password 34. A food truck wants to connect with its customers using a site that enables users and businesses to use public messages to create informed commerce. Which concept describes service to consumers and businesses in closing the feedback loop? a. Mobile e-commerce. b. Social networking. c. Smartphone app integration. d. Customer relationship management. 35. Interactions between buyers and sellers are often more effective when sellers intimately understand the needs of their customers, and when customers have more information to make important decisions. Thanks to the variety of beneficial resources, information, and services made possible by the Internet, such interactions may be highly individualized, and tailored to the buyer's purchasing capacity, and relative influence. What is another important advantage of a digital market over a traditional market, from a buyer's perspective? a. Information asymmetry. b. Less price discrimination. c. Increased search costs. d. Improved transparency. 36. Fred is an IT engineer at a small online news agency, where 35 employees carry laptops and print to the wireless printer. Recently, the company has discovered that the many Bluetooth headsets, cordless telephones, and regular usage of the breakroom microwaves are causing long-standing intermittent micro-outages at often predictable times of the day. Which solution to this problem will avoid disruption to the work environment? a. Change the wireless access points to other another frequency. b. Install traditional network wiring. c. Change to corded communications devices. d. Upgrade the wireless access point antenna shielding. Information Systems Management – C724 Pre-Assessment 37. Sasha is an IT engineer at a small online news agency, where 35 employees carry laptops and print to the wireless printer. Several wireless access points are installed in the ceiling at appropriate points throughout the office space, though they share the same Service Set Identifier (SSID). In fact, an employee can start a large download, and then carry her laptop from one end of the office space to the other without losing her connection. Which network topology configuration supports this scenario? a. Bus topology. b. Star topology. c. Mesh topology. d. Token ring topology. 38. Which two network devices boost Wi-Fi strength for wireless devices in areas of low signal quality? Choose 2 answers. a. Wireless repeater. b. Access point client. c. Wireless access point. d. Wireless bridge. 39. Broadband has enabled data, voice, and video to be combined and transmitted over one network. What is the name of the standard that allows this convergence between voice and data networks? a. Bluetooth b. VoIP c. TCP/IP d. IEEE 802.11 40. Although WPA has been a secure encryption protocol for wireless networks, it is being replaced by a standard that offers even stronger security as the latest Wi-Fi encryption protocol. What is the name of this new standard? a. WiFi-1 b. WPA2 c. WPA1 d. WPA+ 41. The traditional systems development lifecycle (SDLC) consists of six formal phases. Which phase of the SDLC involves developing the plan for capturing data and producing the output? a. System maintenance. b. System analysis. c. System design. d. System conversion. 42. A hotel experiences relatively long checkout lines on Sundays when the majority of its customers check out. Replacing the hotel's existing checkout system with an expensive state-of-the-art system has crossed the mind of top management, and yet, due to its relative monopoly in that region, the hotel's customers tend to be rather loyal. The management is wondering whether the costs involved in installing a new system would be recouped by the new system in the long run. Which type of feasibility is presented in this scenario? a. Schedule feasibility. b. Economic feasibility. c. Political feasibility. d. Technical feasibility. Information Systems Management – C724 Pre-Assessment 43. A bowling center has implemented a new expensive system in hopes of increasing its clientele. The system stores and tracks patrons' bowling performance over time and displays for them the extent to which their performance has been improving over time. However, this new system has failed to attract more patrons. During which phase of systems development is this failure discovered? a. Support. b. Evaluation. c. Analysis. d. Documentation. 44. A large hotel chain needs to develop a system that would coordinate its airport shuttle service with its customers' needs. This requires that their systems analysis staff interacts with both customers and shuttle drivers to identify and document the necessary requirements. In which role would a systems analyst assume to address this issue? a. Problem solver. b. Supporting expert. c. Change agent. d. Communicator. 45. Which tool is appropriate for use in the design phase of information systems development to specify the detailed logic of a business process in narrative form in a manner easily translatable into any programming language? a. Pseudocode. b. Work Breakdown Structure. c. Unified Modeling Language. d. Flowchart. 46. A company is exploring the possibility of a merger with another company and decides to create a system model of the merged companies. In which step of the model will the company create a functional flow diagram? a. Testing b. Architectural c. Enterprise d. Process 47. A corporation wishes to modify its current distribution system. The management team asks the information systems (IS) team to analyze the proposed distribution change. Upon approval of the proposed IS project, the IS team must choose the project implementation method. Which method allows the old system to operate while the new system is developed and tested? a. Prototyping. b. Indirect implementation. c. Parallel adoption. d. Direct implementation. 48. An organization is planning its yearly budgeting cycle. Management has requested the information systems team to validate current hardware and software performance. Which type of evaluation can the team use to perform this validation? a. Function-oriented. b. Object-oriented. c. System-oriented. d. Strategic-oriented. 49. A business requires large amounts of data that are processed into information and used to maintain a competitive advantage over their competitors. As the business grows, the data storage and processing Information Systems Management – C724 Pre-Assessment capabilities are becoming extremely challenging and costly. What external technological environment can be used to help address these issues? a. Service-oriented architecture. b. Parallel processing. c. Cloud computing. d. RAID storage. 50. A company is considering an expansion into a new target market. The company's management team develops a decision process to analyze current market strengths and to predict needs for the proposed new target market. Which benefit does the company gain by developing this target market decision process? a. The company reduces debt financing. b. The company becomes data-centric. c. Management travel is reduced. d. Management decisions are easier. 51. An online mail order company decides to create its own Customer Relationship Management (CRM) system to help management analyze customer's purchasing patterns. To be successful at managing relationships with customers, the CRM system must have access to large amounts of customer purchasing data for analysis and report generation. Which MIS tool is also useable by the company's CRM system? a. Executive support system. b. Decision support system. c. Group support system. d. Infrastructure support system. 52. A decades-old company has several hundred employees and a modern IT infrastructure. An IT security analyst has been hired to provide a layered defense structure and must take measures to ensure confidential information remains confidential. Which activities will help the IT security analyst accomplish this goal? Choose 3 answers. a. Requiring specific fields be updated only with appropriate data. b. Mandating annual information security training for all employees. c. Requiring the use of ID badges at building access points. d. Enforcing document retention and destruction policies. e. Requiring the regular acknowledgement of an acceptable use policy. f. Requiring that redundancies are added to each business-critical service component. 53. A company has issued smartphones to its employees with a policy that the devices may not be used off of the company's campus. An IT analyst has been tasked with finding a way to enforce this policy. Which solution provides a fitting solution to this problem? a. Cell phone storage lockers near building exits. b. Vigilant training and auditing procedures. c. Proximity authentication access control. d. A man trap with a metal detector. 54. Hostile or intrusive software with harmful intent can take the form of executable code and greatly damage a user's computer. Which technology can be used to minimize the chances of this happening? a. Encryption. b. Anti-malware. c. Rolling code. d. Biometrics. Information Systems Management – C724 Pre-Assessment 55. A regional manager has received an important financial document seemingly sent by a branch manager, but he doubts whether the report was actually sent by that manager. Which technology could be used to verify that the report was indeed sent by the branch manager? a. Anti-hack. b. Virtual private network. c. Digital signature. d. Firewall. 56. A corporation needs to improve its security policies and has decided to limit physical access to corporate computers. What value will the corporation realize with this policy? a. Network Protection. b. System protection. c. Always-on hardware vulnerability. d. Guard against malware. 57. A business wished to extend the use of its virus scanning software to the business' customers. This requires the business to allow customers enough access to the internal network so virus scanning software can be downloaded to a customer's computer. Which two security measures will the business have to take to ensure customer access for virus scanning downloads, yet protect internal systems from possible unauthorized access? Choose 2 answers. a. Take steps to detect any presences of malware. b. Ask each customer to sign a non-disclosure agreement. c. Reboot every router after each download has completed. d. Require a username and password for network access. 58. An investment banking corporation utilizes employee passwords as a data privacy measure to secure sensitive data. The IT security team has been tasked with ensuring the data is produced and modified in the correct way. Which data privacy goal is the IT security team tasked with accomplishing in this scenario? a. Availability. b. Confidentiality. c. Duplication. d. Integrity. 59. The information systems support team is asked to perform an analysis of corporate privacy measurers regarding a centralized relational database. The database is interconnected to several business groups via the internal data network that also supports connectivity to outside organizations. Which ethical risk is identified after a secondary analysis? a. The financial system introduces unwanted liabilities. b. The financial system requires additional storage space. c. The financial system is poorly designed and implemented. d. The financial system is unavailable to all users. 60. A corporation is using the encryption illustrated in the diagram below to protect business-sensitive information. What type of encryption is the corporation using? Image. a. Character shifting. b. Exclusive bit shifting. c. Character ordering. d. Word substitution 61. Interactive online communications, such as instant messaging, email, and video teleconferencing, have allowed managers at a large retailer to boost efficiency by enabling collaboration between geographically separate Information Systems Management – C724 Pre-Assessment employees. However, such technologically assisted interactions have led to inappropriate conduct by employees, requiring the employer to implement processes or technological controls to reduce risk and encourage professionalism, but potentially invade employee privacy. Which technological action, if used, will represent an ethical challenge for this large retailer? a. Reviewing instant message logs. b. Archiving all email. c. Filtering Internet content. d. Blocking access to video streaming sites.

Mostrar más Leer menos
Institución
Grado









Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
Grado

Información del documento

Subido en
4 de enero de 2022
Número de páginas
12
Escrito en
2021/2022
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

$15.49
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
abram23 Adams State College
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
673
Miembro desde
5 año
Número de seguidores
545
Documentos
3366
Última venta
3 días hace
QUALITY WORK OF ALL KIND OF QUIZ or EXAM WITH GUARANTEE OF AN A

Im an expert on major courses especially; psychology,Nursing, Human resource Management & Project writting.Assisting students with quality work is my first priority. I ensure scholarly standards in my documents . I assure a GOOD GRADE if you will use my work.

4.0

141 reseñas

5
78
4
25
3
16
2
3
1
19

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes