2026
Which of the following statements is false of information systems (IS) and managment information
systems (MIS)? - Answers They are designed to produce timely, integrated, relevant, accurate, useful
data for decision-making.
Bob knows how to use word processors, spreadsheets, and presentation software. They also have a
basic knowledge of hardware, software, and the Internet. Given this information, it can be concluded
that Bob as ______ literarcy. - Answers computer
Bob has basic knowledge of how to use software like word processors and spreadsheets. He cannot
complete the task when asked to describe the information on the spreadsheets. What type of skills
should he focus on to develop the skills to answer the questions? - Answers Information literacy
Business _____ provides historical, current, and predictive views of business operations and
environments and gives organizations a competitive advantage in the marketplace. - Answers
intelligence
Which of the following statements is true of the data component of an information system? -
Answers Future data is predicted for budgets or cash flow reports
Timely, relevant, and accurate information is a critical tool for managing the 4 Ms of resources. What
are the 4Ms? - Answers Manpower, Machinery, Materials, Money
What should the industry do if they realize the buyer power is too high? - Answers Make it difficult to
switch providers
In the context of Porter's Five Forces Model, which is the difference between buyer power and
supplier power? - Answers Buyer power is high when customers have many choices, whereas
supplier power is high when customers have fewer options
An automobile manufacturer is set to launch.a well-marketed new vehicle model. This vehicle has had
great views. Why would the manufacturer limit the number of models to the approved dealerships? -
Answers To retain supplier power
In the context of using information technologies for a competitive advantage, which statement is true
f a top-line strategy? - Answers It focuses on generating new revenue by offering new products and
services
Which approach to set up a distributed database management system (DDMS) combines the
fragmentation approach and the replication approach? - Answers allocation
In a relational database model, which operation pares down a table by eliminating columns according
to certain criteria? - Answers project operation
_____ is a component of a data model that defines the boundaries of a database, such as maximum
and minimum values allowed for a field, constraints, and access methods. - Answers Integrity rules
To establish a relationship between two tables, which filed should be a foriegn key? - Answers
Customer_id
In a relational database mode, which operation searches data in a table and retrieves records based
on certain criteria? - Answers select operation
Which statement is true of data marts and data warehouses? - Answers An organization's data marts
together comprise the organization's data warehouse
Which is a potential benefit of telcommmuting? - Answers It enables organizations to use the best
human resources in a large geographical region
The CREDIT_LIMIT field must be stored with a decimal datatype and a default value between 0 and
$10,000. Where would these rules/limitations be stored? - Answers data dictionary
In a data warehouse ____ is the process of collection data from a variety of sources and converting it
into a format that can be used in transformation processing. - Answers extraction
Which statement is false of a network model? - Answers In a network model, the relationships among
records form a treelike structure
Which protects the contents of an HTML code? - Answers Copyright laws
Organizations can benefit from patents as they can use patents: - Answers to keep competitors from
entering certain market segments
Which federal law is intended to protect the confidentiality of a patient's medical information and
health information? - Answers HIPAA
In the context of intellectual property, which is categorized as copyrighted material? - Answers
Artistic works
, Theo makes two copies of an antivirus software package he bought and sold one of the copies to
Joshua. How would Jared's actions be classified in this situation? - Answers Illegal and unethical
Why are cookies considered an invasion of privacy? - Answers Cookies collect information about
users without their prior consent
What information can be censored if the consent is deemed offensive to a political, religious, or
cultural group? - Answers Public
In the contedxt of intellectual property_____ is registered, selling, or using a domain name to profit
from someone else's trademark. On the other hand ____ relies on typographical errors made by Wed
users when typing a Website address into a Web browser. - Answers cybersquatting, typosquatting
Which statement is true of spam? - Answers It is sent in bulk using automated mailing software
Which of the following statements is false of virtual organization? - Answers Virtual organizations are
networks of dependent companies, suppliers, customers, and manufacturers connected via
information technologies
Logistics information system - Answers designed to reduce the cost of transporting material while
maintaining safe and reliable delivery
Personnel information system - Answers designed to choose the best job candidate
Manufacturing information systems - Answers designed to increase product quality, and make better
inventory decision
Marketing information systems - Answers designed to analyze market share, sales, and sales
personnel
Distributed Database - Answers collection of multiple interconnected databases and spreads across
various locations instead of a central database
Distributed Database management system - Answers a centralized software system that manages
distributed database in a manner as if it were all stored in a single location
Data Warehouse - Answers collection of data from a variety of sources and generate business
intelligence
Database - Answers any collection of data organized for storage, accessibility, and retrieval, and
designed to capture data
Value - Answers the value that the collected data brings to the decision-making process
Veracity - Answers the trustworthiness and accuracy of data
Velocity - Answers the speed with which data has to be gathered and processed
Variety - Answers the combination of structured data and unstructured data
Which statement best describes spyware? - Answers It is software that secretly gathers information
about users while they browse the Web.
A company's CEO hires a new security analyst to determine why a certain employee has suddenly
experienced issues with the employee's application development skills. The only thing that has
changed is that the employee has recently been assigned to mentor a new employee. After further
research, the security analyst notices the new employee logging into the mentor's account when the
mentor is away. Which one of the following should the analyst pursue as the issue? - Answers Social
engineering
A security vender needs to develop a security system for a personal site that compares the length of
each finger, the translucence of fingertips, and the webbing between fingers against stored data to
verify a user's identity. Which biometric security measure should be implemented to accomplish this
task? - Answers Hand geometry
In data encryption, the HTTPs in a browser address indicates a safe HTTP connection over ____. -
Answers Secure Sockets Layer
_____ a more recent cryptographic protocol, ensures data security and integrity over public networks,
such as the Internet. - Answers Transport Layer Security
Which statement is true of symmetric encryption? - Answers It is difficult to share a key over the
Internet in symmetric encryption.
Which statement is true of a zero-trust security? - Answers With a zero-trust security, a user must
only be given access to information that he or she needs in order to perform his or her job.
Which statements are true of virtual private networks (VPN)? - Answers It is often used so that the
remote users have a secure connection to an organization's network
Which statement are true of asymmetric encryption? - Answers It requires a large amount of
processing power