MIS Test 2
pdf
keyboard_arrow_up
School
University of Southern California *
*We aren’t endorsed by this school
Course
MISC
Subject
Information Systems
Date
Feb 20, 2024
Type
Pages
12
Uploaded by JusticeLyrebirdMaster376
-IaaS- is a cloud service where a cloud service provider (CSP) rents out highly scalable and automated IT
infrastructure, usually over the internet, to a small and medium business (SMBs) or individual developers. Popular
IaaS examples include Amazon EC2, Rackspace, Windows Azure, and Google Compute Engine.
-FaaS- Function-as-a-Service. kind of cloud computing service that allows developers to build, compute, run, and
manage application packages as functions without having to maintain their own infrastructure IBM Cloud Functions.
Amazon's AWS Lambda. Google Cloud Functions. Microsoft Azure Functions (open source) OpenFaaS
-SaaS- SaaS platforms involve software that is available via third-party over the Internet. Examples of popular SaaS
providers include: BigCommerce. Google Workspace, Salesforce HubSpot.Trello.Netflix. Zoom .Zendesk
-PaaS- a cloud computing platform where a third party offers the necessary software and hardware resources. PaaS
solutions cope with modern business requirements while considerably reducing costs and complexities of buying,
installing, and managing in-house hardware and software. Facebook PaaS products include AWS Elastic Beanstalk
and Google App Engine.
1. What is a challenge for cloud computing that could cause employee performance to
decrease?
a. Required Internet connectivity
2. Name a primary computing model that has shaped the collection of “Big Data”?
d. Distributed Computed
3. Which of the below uses both GIS and GPS?
d. All of the above
4. What e-business was discussed as using a data driven website in class and in the book?
a. Zappos
5. What is one of the major challenges of networking or performing business in a connected
world?
a. Security issues
6. Kassandra Young is a business manager at Weith Productions. Although she does not
have a background in technology, her job requires her to work with analytical tools to
make data-driven decisions. To make her job easier, what can she customize to display
data quickly and run custom reports?
a. Dashboard
7. Ben works at a top accounting firm in Salt Lake City and his responsibilities include
developing individual and departmental goals, and generating financial analysis across
departments and the enterprise as a whole for the executive team to review. Ben’s duties
provide value-added to his company and would be categorized occuring at the different
information __________.
c. Levels
8. Which of the following statements is true?
d. The more complete and accurate an organization wants to get its
information, the more it costs
9. What is usability
a. The system is easy to learn and efficient and satisfying to use
10. Shawn works at the local electrical company in Nampa, ID, which provides electricity to
the entire city of Boise. This area is prone to floods, high winds, and tornados. As the
lead enterprise architect on the night shift, Shawn has been asked to suggest ways the
company can protect its information MIS infrastructure. Shawn notices that the company
does not have the ability to for its systems to respond to unexpected failure or crashes and
there is not a backup system that can automatically take over without a lost of service to
Boise residents. What should Shawn recommend his company implement?
c. Fault tolerance
11. The primary purpose of a data warehouse is to _______.
c. Combine strategic information
12. Which of the below is not an example of an advantage of using a relational database?
a. Decreased information security
13. Which business application uses location information to provide a service and is designed
to give mobile users instant access to personalized local content?
d. Location-based services
14. What type of business were you tasked to organize their systems to support growth as the
newly hired CIO?
b. Soft Drink
15. What is one of the biggest pitfalls associated with real-time information
b. It continually changes
16. The Internet is a hierarchical structure linking different levels of service providers whose
millions of devices supply all the interconnections. The three levels outlined in the book
from the top down include _______.
c. National service provider (NSP), Regional service provider (RSP), and
Internet service provider (ISP)
17. What are the main methods for encrypting network traffic on the Web?
b. SSL and SHTTP
18. What question below would a company need to answer when first establishing a backup
and recovery plan?
d. All of the above
19. Which of the following represents a reason for low-quality information?
d. All of the above
20. Using __________ to mask your IP address can sometimes lead to discounted airfare.
d. VPN
21. What is asset tracking?
b. Occurs when a company places active or semi-passive RFID tags on
expensive products or assets to gather data on the items’ location with little
or no manual intervention.
22. What is a benefit of network convergence?
a. Multiple devices supported by one provider
23. Which of the following agile MIS infrastructure characteristics refers to how quickly a
system can transform to support environmental changes?
c. Maintainability
24. What uses GPS tracking to track vehicles?
d. Automatic vehicle location
25. An example of VoIP is ______.
b. Skype
26. A data warehouse is a ______ collection of information, gathered from many different
_________ databases, that supports business analysis and decision-making tasks.
a. Logical, operational
27. Which characteristics support an agile MIS infrastructure?
b. Accessibility, availability, maintainability, portability, reliability, scalability,
usability
28. What is the difference between unavailable and high availability?
d. Unavailable is when the system is not operating and can’t be used, where
high availability is when a system is continuously operating at all times
29. Which term refers to the varying levels that define what a user can access, view, or
perform when operating a system?
a. Accessibility
30. Which of the following would not be considered a part of the unique characteristic of
high-quality information?
a. Is aggregate information in agreement with detailed information?
31. What was the name of the game we played in class multiple times?
d. Kahoot
32. Jessica started her own online company, which specializes in selling items for
bachelorette parties, wedding parties, and baby showers. Due to the fact that she only
operates online, her MIS infrastructure needs to be fast, efficient, and accurate ensuring
the best possible experience for her customers. Which of the below is a critical
component in Jessica’s MIS infrastructure?
d. All of the above
33. 90% of all data that exists today was created in the past _____ years.
c. 2
34. What year did the flood occur in the BAE System’s Johnson City Facility Flood?
a. 2011
35. What was the name of the company in the group activity that used wireless networks to
improve its competitive advantage?
a. Uber
36. Each year businesses lose time and money because of system crashes and failures. Which
of the following offers the best way to protect a system from crashes and failures?
d. All of the above
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
37. What is VoIP
d. VoIP offers all of the above
38. What did the Guest Lecture Student use his drone for in his business?
a. To create a full 18 Hole Virtual Tour of a Country Club
39. What charts the cost to the company of the unavailability of information and technology
and the cost to the company of recovering from a disaster over time?
c. Disaster recovery cost curve
40. Which business application is a satellite-based navigation system providing extremely
accurate position, time, and speed information?
d. Global positioning systems
41. Which of the following occurs during data cleansing
d. All of the above
42. Which of the following implies that aggregate or summary information is in agreement
with detailed information?
d. Consistency
43. A wireless WAN (WWAN) is a wide area network that uses radio signals to transmit and
receive data and can be divided into which two categories?
c. Cellular and satellite communication systems
44. What is it called when a manager has so much data and information that they cannot
make a decision?
b. Data rich, information poor
45. The information MIS infrastructure supports the day-to-day business operations and plans
for _______.
d. All of the above
46. What are the seven characteristics of an agile MIS infrastructure?
a. Accessibility, availability, maintainability, portability, reliability, scalability,
usability
47. What does a business continuity plan typically include?
b. Which systems and business processes are critical and the maximum amount
of time the company can continue to operate without functioning systems.
48. Which characteristics support a sustainable MIS infrastructure?
a. Grid computing, cloud computing, and virtualizations
49. What is a company that uses the Google Cloud Platform (GCP)?
a. Spotify
50. Professor Geiger who spoke with us in class about “Big Data” has B.S. in _______.
d. Marketing
51. ______ was a peer-to-peer file sharing Internet service that emphasized sharing digital
audio.
b. Napster
52. Which of the following represent the four primary traits that help determine the value of
information?
b. Information type, information timeliness, information quality, and
information governance
53. Why were data warehouses created?
d. All of the above
54. LANs, WANs, and MANs, all provide users with an accessible and reliable network
infrastructure. Which of the below are the most important network differentiating
dimensions?
b. Cost and performance
55. Which of the following is an example of unstructured data?
d. Email data
56. Why would a company use an Intranet?
d. All of the above
57. What is the ultimate outcome of a data warehouse?
b. Data marts
58. In class we debated net neutrality for a group exercise. Did the students that reported out
think that net neutrality was good or bad for business?
b. Good
59. Managers can use BI to answer tough business questions. Which of the following
describes the value of knowing where the business has been?
c. A historical perspective offers important variables for determining trends
and patterns
60. What are the two most prevalent types of broadband access?
d. Digital subscriber line and cable connection
1.
Which of the following is NOT a reason to study trends?
○
None of the above
2.
Which of the following is NOT a benefit of a connected world?
○
Security
3.
What has Not enabled cloud computing?
○
Distributed computing
4.
What are the four “v’s” of Big Data?
○
Volume, velocity, variety, veracity
5.
Each year businesses lose time and money because of system crashes and failures. Which of the following
does NOT offer the best way to protect a system from crashes and failures?
○
Data stored on a PC
6.
Which of the following is correct in reference to a database?
○
A database can support many logical views
7.
Which characteristics support a sustainable MIS infrastructure?
○
Grid computing, cloud computing, and virtualization
8.
____ public cloud providers offer storage and compute services on a pay per use basis
○
IaaS
9.
Which of the following is a problem that has been identified with Fiat cash?
○
Inflation through governments
10.
According to Professor Geiger, what percentage of aggregated data is being analyzed?
○
.5
11.
Which business application is a satellite-based navigation system providing extremely accurate position,
time, and speed information?
○
Global Positioning Systems
12.
What is a benefit of network convergence?
○
Multiple services supported by one provider
13.
What is an example of a stablecoin?
○
JPMCoin
14.
What is one of the major challenges of networking or performing business in a connected world?
○
Security issues
15.
Which of the following agile MIS infrastructure characteristics refers to how quickly a system can transform
to support environmental changes?
○
Maintainability
16.
LANs, WANs, and MANs all provide users with an accessible and reliable network infrastructure. Which of
the below are the most important network differentiating dimensions?
○
Cost and performance
17.
A wireless WAN (WWAN) is a wide area network that uses radio signals to transmit and receive data and
can be divided into which two categories?
○
Cellular and satellite communication systems
18.
What natural disaster occured while Professor Shannon was working at BAE Systems in Johnson City?
○
Flood
19.
What is one of the biggest pitfalls associated with real-time information?
○
It continually changes
20.
What is NOT an activity using data mining?
○
Data Extraction and Transformation
21.
What type of integrity constraint does NOT allow someone to create an order for a nonexistent customer?
○
Relational integrity constraint
22.
What charts the cost to the company of the unavailability of information and technology and the cost to the
company of recovering from a disaster over time?
○
Disaster recovery cost curve
23.
If a university wanted to select a networking element category to span across the campus, which would be
the most beneficial?
○
MAN
24.
Which business application uses location information to provide a service and is designed to give mobile
users instant access to personalized local content?
○
Location-Based Services
25.
Which of the following statements is true?
○
The more complete and accurate an organization wants to get its information, the more it costs.
26.
What is a challenge for cloud computing that could cause employee performance to decrease?
○
Required Internet connectivity
27.
What does a business continuity plan typically include?
○
Which systems and business processes are critical and the maximum amount of time the company
can continue to operate without functioning systems
28.
Which of the following is NOT an advantage of database-stored information?
○
Increased data redundancy
29.
What are the three business functions an MIS infrastructure supports?
○
Supports operations, change, and the environment or sustainability
30.
What is a VPN?
○
A direct private network that creates a “private tunnel” within the Internet to connect to the
corporate server
31.
Which of the following is a secondary effect that led to the inflection point causing the digital revolution
according to Ron Welch?
○
Factories were able to mass produce computers
32.
What are the seven characteristics of an agile MIS infrastructure?
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
○
Accessibility, availability, maintainability, portability, reliability, scalability, and Usability
33.
What are the three types of clouds?
○
Private, public, hybrid
34.
What is an encryption algorithm designed to protect wireless transmission data?
○
WEP
35.
Which of the following statements is NOT correct?
○
Usability of an MIS infrastructure refers to the varying levels that allow system users to access,
view, or perform operational functions
36.
A data warehouse is a ________ collection of information, gathered from many different ________
databases, that supports business analysis activities and decision-making tasks.
○
Logical, operational
37.
Which of the following are examples of analytical information?
○
Future growth analysis, sales projections, and product statistics
38.
What is erroneous or flawed data?
○
Dirty data
39.
When discussing networking elements, which network provider describes NAPs?
○
NAPs are traffic exchange points in the routing hierarchy of the Internet that connects NSPs’
40.
What is an example of a device without edge computing?
○
Amazon blender
41.
What is NOT part of business continuity planning as discussed in class?
○
IaaS recovery
42.
What refers to how well a system can adapt to increased demands?
○
Scalability
43.
90% of all data that exists today was created in the last _____ years.
○
2
44.
Which of the following is NOT a primary trait of information?
○
Quantity
45.
What are the two most prevalent types of broadband access?
○
Digital subscriber line and cable connection
46.
What does extraction, transformation, and loading mean?
○
It is a process that extracts information from internal and external databases, transforms it using a
common set of enterprise definitions, and loads it into a data warehouse
47.
What are the primary differences between a data warehouse and a data mart?
○
Data warehouses have a more organization-wide focus, data marts have functional focus
48.
What is net neutrality in the most basic sense?
○
Using the internet free of discrimination
49.
Which of the following is NOT a benefit of a solid (good) MIS infrastructure?
○
Reduces disaster recovery capability
50.
What is a system weakness that can be exploited by a threat?
○
Vulnerability
51.
What is usability?
○
The system is easy to learn and efficient and satisfying to use
52.
Which of the following implies that aggregate or summary information is in agreement with detailed
information?
○
Consistency
53.
What is the primary purpose of using a data warehouse?
○
To aggregate information throughout an organization into a single repository for decision making
54.
During the BAE Systems disaster recovery initiative following the 2006 event, what is a lesson learned by
the Johnson City business?
○
Critical information should be stored in recoverable computer systems offsite
55.
The information MIS infrastructure supports the day-to-day business operations and plans for ________.
○
All of the above
56.
Cloud computing has which of the following characteristics?
○
Local systems and nearly unlimited scalability
57.
NSPs are private companies that own and maintain the worldwide backbone that supports the Internet.
Which of the below is NOT an NSP?
○
Microsoft
58.
What question below would a company need to answer when first establishing a backup and recovery plan?
○
All of the above
59.
59. What is a great example of using cluster analysis in business to create target- marketing strategies?
○
Zip code segmentation
60.
What is it called when a manager has so much data and information that they cannot make a decision?
○
Data rich, information poor
61.
Which term refers to the varying levels that define what a user can access, view, or perform when operating
a system?
○
Accessibility
62.
What was an example used in class during Professor Geiger’s presentation about data complexities of Big
Data?
○
Different ways to write a persons name
63.
Managers can use BI to answer tough business questions. Which of the following describes the value of
knowing where the business has been?
○
64.
How would you put a zettabyte into context from Professor Geiger’s presentation?
○
It would take 100 million years to download one zettabyte
1. What refers to how well a system can adapt to increased demands?
Scalability
2. What is the benefit of network convergence?
All of the above
3. Which of the following implies that aggregate or summary information is in agreement with detailed
information?
Consistency
4. What kind of time is used on mobile devices?
5. What are the three business functions an MIS infrastructure supports?
Supports operations, change, and the environment or sustainability
6. What type of integrity constraint does
NOT allow someone to create an order for a nonexistent customer?
Relational integrity constraint
7. What natural disaster occurred while Professor Shannon was working at BAE Systems in Johnson City?
Floods
8. What is an encryption algorithm designed to protect wireless transmission data?
Wired
equivalent privacy (WEP)
9. If there was ever a national disaster, a company would move to its ______ so the company could immediately
resume business.
Hot Site
10. What are the two most prevalent types of broadband access?
Digital subscriber line and cable connection
11. What is an example of a LAN?
School Area Network, City Library
12. What charts the cost to the company of the unavailability of information and technology and the cost to the
company of recovering from a disaster over time?
Disaster Recovery Cost Curve
13. What is a VPN?
Uses the internet to create the appearance of point-to-point connections
14. What is a great
example of using cluster analysis in business to create target-marketing strategies?
Zip code segmentation
15. Which characteristics support a sustainable MIS infrastructure?
Grid computing, cloud computing, virtualization
16. Jessica started her own online company, which specializes in selling items for bachelorette parties, wedding
parties, and baby showers. Due to the fact that she only operates online, her MIS infrastructure needs to be fast,
efficient, and accurate to ensure the best possible experience for her customers. Which of the below is a critical
component in Jessica’s MIS infrastructure?
All of the above
17. What are the three types of clouds?
IaaS, Saas, Paas
18. Which of the following is a benefit of a solid (good) MIS infrastructure?
All of the above
19. What is net neutrality in the most basic sense?
All data is treated equally
20. Why were data warehouses created?
All of the above (
numbers and types of operational databases increased as the business grew/ many companies
had information scattered across multiple systems with different formulas/
completing reporting requests from
numerous operational systems took days or weeks)
21. What is it called when a manager has so much data and information that they cannot make a decision?
Data-rich, information poor
22. A wireless WAN (WWAN) is a wide area network that uses radio signals to transmit and receive data and can
be divided into which two categories?
Cellular and satellite/communications systems
23. Which of the following agile MIS infrastructure characteristics refers to how quickly a system can transform to
support environmental changes?
Maintainability
24. Cloud computing has which of the following characteristics?
Replacing computing resources with services provided over the internet, measured service, scalability,
resource pooling, on-demand access, broad network access
25. What is a system weakness that can be exploited by a threat?
Vulnerability
26. What has enabled cloud computing?
On-demand network access (Internet)
27. The primary purpose of a data warehouse is to ____.
Combine strategic information
28. Each year businesses lose time and money because of system crashes and failures. Which of the following offers
the best way to protect a system from crashes and failures?
All of the above (
backup and recovery plans, fault
tolerance, and failover) 29. What are the seven characteristics of an agile MIS infrastructure?
Accessibility, availability, maintainability, portability, reliability, scalability, usability
30. What are the different activities using data mining?
The grocery store wants to store sales transactions to make taxes easier to file
31. Which of the following is NOT a primary trait of information?
Quantity
32. NSPs are private companies that own and maintain the worldwide backbone that supports the internet. Which of
the below is NOT an NSP?
Microsoft
33. What are the four “V’s” of Big Data?
Volume, Variety, Velocity, Veracity
34. Which business application uses location information to provide a service and is designed to give mobile users
instant access to personalized local content?
Location-based services (LBS)
What are the three business functions an MIS infrastructure supports?
Information type, information timeliness, information quality, and information governance
35. LANs, WANs, and MANs all provide users with an accessible and reliable network infrastructure. Which of the
below is the most important network differentiating dimension?
Cost and performance
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
36. Which of the following is correct in reference to a database?
A database can support many logical views
37. What is usability?
The degree to which a system is easy to learn and efficient and satisfying to use
38. Which term refers to
the varying levels that define what a user can access, view, or perform when operating a system?
Accessibility
39. What is asset tracking?
When a company places active/semi-passive RFID tags on expensive products/assets to gather data on
item locations with little to no manual intervention
40. Which of the below is NOT an example of an advantage of using a relational database?
Increase information
redundancy (: increased information quality, flexibility, security)
41. Which business application is a satellite-based navigation system providing extremely accurate position, time,
and speed information?
Global positioning systems
42. Which of the following statements is NOT correct?
43. Managers can use BI to answer tough business questions. Which of the following describes the values of
knowing where the business has been?
Historical perspective offers important variables for determining trends and patterns
44. A data warehouse is a ____ collection of information, gathered from many different _____ databases, that
supports business analysis activities and decision-making tasks.
Logical / Operational
45. What are the two main methods for encrypting network traffic on the Web?
SSL and SHTTP
46. What is one of the biggest pitfalls associated with real-time information?
It continually changes
47. What is erroneous or flawed data?
Dirty data
48. What is one of the major challenges of networking or performing business in a connected world?
Security issues
49. What question would a company need to answer when first establishing a backup and recovery plan?
What types of storage mechanisms will meet the needs of the company? How often does the
company need to back up its information?
What types of recovery systems does the company infrastructure need?
50. What are the primary differences between a data warehouse and a data mart?
Data warehouses have a more organization-wide focus, data marts have a functional focus
51. Which of the following are examples of analytical information?
Information showing which airline routes in the United States have the most sales
52. The information MIS infrastructure supports the day-to-day business operations and plans for _____.
All of the above (security breaches and theft, floods and earthquakes, malicious internet attacks)
53. Which of the following is NOT an advantage of database-stored information?
Increased information redundancy
54. Why would a company use an intranet?
All of the above (
intranets are used for business operations and management, intranets are used for communications
and collaboration, intranets are used for Web publishing
)
55. What does a business continuity plan typically include?
Which systems and business processes are critical and the maximum amount of time the company can
continue to operate without functioning systems
56. Which of the following statements is true?
The more complete and accurate an organization wants its information to be, the more it costs
57. What do extraction, transformation, and loading mean?
It is a process that extracts information from internal and external databases, transforms it using a common
set of enterprise definitions, and loads it into a data warehouse
58. Which of the below uses both GIS and GPS?
Navigation, Wireless advertising, Vehicle location
59. What is a challenge for cloud computing that could cause employee performance to decrease?
Required internet connectivity
60. Which of the following is NOT a benefit of a connected world?
Increases resource threats
61. Which of the following occurs during data cleansing?
All of the above
62. According to Professor Geiger, what percentage of aggregated data is being analyzed?
63. Which of the following is NOT a reason to study trends?
Generate ideas and identify opportunities, identify early warning signals, gain confidence, beat the
competition, understand a trend, balance strategic goals, understand the future of specific industries,
prepare for the future
64. What is AI NOT predicted to take over?
65. 90% of all data that exists today was created in the last ____ years.
Two
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help