Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

MANAGEMENT 3180 FINAL EXAM REVIEW QUESTIONS ANSWERED CORRECTLY LATEST UPDATE 2026

Beoordeling
-
Verkocht
-
Pagina's
6
Cijfer
A+
Geüpload op
13-03-2026
Geschreven in
2025/2026

MANAGEMENT 3180 FINAL EXAM REVIEW QUESTIONS ANSWERED CORRECTLY LATEST UPDATE 2026 Which of the following statements is false of information systems (IS) and managment information systems (MIS)? - Answers They are designed to produce timely, integrated, relevant, accurate, useful data for decision-making. Bob knows how to use word processors, spreadsheets, and presentation software. They also have a basic knowledge of hardware, software, and the Internet. Given this information, it can be concluded that Bob as ______ literarcy. - Answers computer Bob has basic knowledge of how to use software like word processors and spreadsheets. He cannot complete the task when asked to describe the information on the spreadsheets. What type of skills should he focus on to develop the skills to answer the questions? - Answers Information literacy Business _____ provides historical, current, and predictive views of business operations and environments and gives organizations a competitive advantage in the marketplace. - Answers intelligence Which of the following statements is true of the data component of an information system? - Answers Future data is predicted for budgets or cash flow reports Timely, relevant, and accurate information is a critical tool for managing the 4 Ms of resources. What are the 4Ms? - Answers Manpower, Machinery, Materials, Money What should the industry do if they realize the buyer power is too high? - Answers Make it difficult to switch providers In the context of Porter's Five Forces Model, which is the difference between buyer power and supplier power? - Answers Buyer power is high when customers have many choices, whereas supplier power is high when customers have fewer options An automobile manufacturer is set to launch.a well-marketed new vehicle model. This vehicle has had great views. Why would the manufacturer limit the number of models to the approved dealerships? - Answers To retain supplier power In the context of using information technologies for a competitive advantage, which statement is true f a top-line strategy? - Answers It focuses on generating new revenue by offering new products and services Which approach to set up a distributed database management system (DDMS) combines the fragmentation approach and the replication approach? - Answers allocation In a relational database model, which operation pares down a table by eliminating columns according to certain criteria? - Answers project operation _____ is a component of a data model that defines the boundaries of a database, such as maximum and minimum values allowed for a field, constraints, and access methods. - Answers Integrity rules To establish a relationship between two tables, which filed should be a foriegn key? - Answers Customer_id In a relational database mode, which operation searches data in a table and retrieves records based on certain criteria? - Answers select operation Which statement is true of data marts and data warehouses? - Answers An organization's data marts together comprise the organization's data warehouse Which is a potential benefit of telcommmuting? - Answers It enables organizations to use the best human resources in a large geographical region The CREDIT_LIMIT field must be stored with a decimal datatype and a default value between 0 and $10,000. Where would these rules/limitations be stored? - Answers data dictionary In a data warehouse ____ is the process of collection data from a variety of sources and converting it into a format that can be used in transformation processing. - Answers extraction Which statement is false of a network model? - Answers In a network model, the relationships among records form a treelike structure Which protects the contents of an HTML code? - Answers Copyright laws Organizations can benefit from patents as they can use patents: - Answers to keep competitors from entering certain market segments Which federal law is intended to protect the confidentiality of a patient's medical information and health information? - Answers HIPAA In the context of intellectual property, which is categorized as copyrighted material? - Answers Artistic works Theo makes two copies of an antivirus software package he bought and sold one of the copies to Joshua. How would Jared's actions be classified in this situation? - Answers Illegal and unethical Why are cookies considered an invasion of privacy? - Answers Cookies collect information about users without their prior consent What information can be censored if the consent is deemed offensive to a political, religious, or cultural group? - Answers Public In the contedxt of intellectual property_____ is registered, selling, or using a domain name to profit from someone else's trademark. On the other hand ____ relies on typographical errors made by Wed users when typing a Website address into a Web browser. - Answers cybersquatting, typosquatting Which statement is true of spam? - Answers It is sent in bulk using automated mailing software Which of the following statements is false of virtual organization? - Answers Virtual organizations are networks of dependent companies, suppliers, customers, and manufacturers connected via information technologies Logistics information system - Answers designed to reduce the cost of transporting material while maintaining safe and reliable delivery Personnel information system - Answers designed to choose the best job candidate Manufacturing information systems - Answers designed to increase product quality, and make better inventory decision Marketing information systems - Answers designed to analyze market share, sales, and sales personnel Distributed Database - Answers collection of multiple interconnected databases and spreads across various locations instead of a central database Distributed Database management system - Answers a centralized software system that manages distributed database in a manner as if it were all stored in a single location Data Warehouse - Answers collection of data from a variety of sources and generate business intelligence Database - Answers any collection of data organized for storage, accessibility, and retrieval, and designed to capture data Value - Answers the value that the collected data brings to the decision-making process Veracity - Answers the trustworthiness and accuracy of data Velocity - Answers the speed with which data has to be gathered and processed Variety - Answers the combination of structured data and unstructured data Which statement best describes spyware? - Answers It is software that secretly gathers information about users while they browse the Web. A company's CEO hires a new security analyst to determine why a certain employee has suddenly experienced issues with the employee's application development skills. The only thing that has changed is that the employee has recently been assigned to mentor a new employee. After further research, the security analyst notices the new employee logging into the mentor's account when the mentor is away. Which one of the following should the analyst pursue as the issue? - Answers Social engineering A security vender needs to develop a security system for a personal site that compares the length of each finger, the translucence of fingertips, and the webbing between fingers against stored data to verify a user's identity. Which biometric security measure should be implemented to accomplish this task? - Answers Hand geometry In data encryption, the HTTPs in a browser address indicates a safe HTTP connection over ____. - Answers Secure Sockets Layer _____ a more recent cryptographic protocol, ensures data security and integrity over public networks, such as the Internet. - Answers Transport Layer Security Which statement is true of symmetric encryption? - Answers It is difficult to share a key over the Internet in symmetric encryption. Which statement is true of a zero-trust security? - Answers With a zero-trust security, a user must only be given access to information that he or she needs in order to perform his or her job. Which statements are true of virtual private networks (VPN)? - Answers It is often used so that the remote users have a secure connection to an organization's network Which statement are true of asymmetric encryption? - Answers It requires a large amount of processing power In the context of data encryption ____ means the agreement between two communicating devices to ensure that both devices are who they claim to be. - Answers authentication Which statement is true regarding pharming and phishing? - Answers Pharming involved hijacking an official Web site address by hacking a Domain Name System server A student at a university has been receiving calls about issues with a bank account. To remedy the issue, the student needs to give the caller their social security number and banking information. The student wisely contacts the bank directly where it is classified as a ____ issue. - Answers vishing What kind of network can be used if a group of users wants to share an office laser printer? - Answers LAN A retail business has stores in four different countries. What kind of network can connect every store to a central database? - Answers WAN What type of network should be established to provide connectivity between various city council offices, including transit, water, and recreation? - Answers MAN Three nearby cities want to share information about common resources such as roads, water, and population demographic information. To facilitate this, they decide to create a shared network. What classification is more appropriate for this network? - Answers MAN Which of the following statements is false of a modem? - Answers All internet connection require it. Which of the following statements is false of a twisted pair cable? - Answers It cannot be used for telephone lines to carry both voice and data Which statements is/ false about Wide area network WAN) - Answers It is larger than local area network and smaller than metropolitan area network Which statement is false about mobile network? - Answers It has a strong security Which statement is false about the Internet backbone? - Answers It is the foundation network linked with fiber-optic cables that support very high attenuation. Which statement is true about a domain name? - Answers It is a unique identifier of computer or network addresses on the internet Which statement is true about Email? - Answers E-mails have many features including folders, spell checkers, and delivery notifications, etc. A truck company and a retailer are business partners. Wanting to provide the best service, the truck company wants to share the location of their trucks with the retailer. Which of the following is the best way to do that? - Answers Share the truck's location through an extranet between the two companies Which statement is false about an intranet? - Answers Companies don't allow trusted business partners to access on their intranets Which statement is true of extranets? - Answers They facilitate information exchange among business partners When information is transferred from one network to another, domain names are converted to ____ by the Domain Name System (DNS) protocol. - Answers Internet Protocol addresses Intranets are also called ____ - Answers corporate portals Financing options and school profiles are services offered by ____ Web sites and apps. - Answers real-estate In the context of extranets, which of the following is considered an inter-organizational system? - Answers Electronic funds transfer In the URL, Which part indicates the name of the document? - Answers What is the similarity between the Internet and an intranet? - Answers Both use similar languages for communication between devices on network Broadband - Answers multiple pieces of data are sent simultaneously to increase the transmission rate Narrowband - Answers a voice-grade transmission channel and only a limited amount of information can be transferred with maximum 56,000 bps Broadband - Answers a single medium can carry several channels at once Broadband - Answers an always-on connection that is synonymous with high-speed Internet access Ring topology - Answers diagnosing problems that modify the network are difficult as no host computer is required and each computer manages its own connectivity Ring topology - Answers transmission is one direction and failure of a single node disrupts entire network Bus topology - Answers it is best for handling steady traffic and easy to extend Hierarchical topology - Answers it is called a tree because it combines computers with different processing strengths in different organizational levels .int - Answers International organizations .net - Answers Backbone, regional, and commercial networks .mil - Answers U.S. military organizations .org - Answers Research an nonprofit organizations For a hyper-social organization, which is considered the most vital element of an online community? - Answers members A farmer provides berries to an online seller of jelly. To which part of the supporting activities corresponds the farmer for the jelly company? - Answers Inbound Logisitcs After launching a new smart TV, the manufacturing company hires SMS company to attend a call center where customers can solve doubts and problems with the new smart TV. What part of the value chain is SMS part of? - Answers Service A business student builds a website where other students with good grades can register. Their information will be given to students searching for tutoring. What category of business model fits the student's website? - Answers C2C Cleaning company A provides services cleaning for offices and storage places. Clients can set the locations and dates they want to be cleaned through an account on the cleaning company's website. What kind of category best fits cleaning company A? - Answers B2B Identify the e-commerce business model that brings sellers and buyers together on the Web and collects commissions on transactions between these parties. - Answers brokerage model

Meer zien Lees minder
Instelling
MANAGEMENT 3180
Vak
MANAGEMENT 3180

Voorbeeld van de inhoud

MANAGEMENT 3180 FINAL EXAM REVIEW QUESTIONS ANSWERED CORRECTLY LATEST UPDATE
2026

Which of the following statements is false of information systems (IS) and managment information
systems (MIS)? - Answers They are designed to produce timely, integrated, relevant, accurate, useful
data for decision-making.
Bob knows how to use word processors, spreadsheets, and presentation software. They also have a
basic knowledge of hardware, software, and the Internet. Given this information, it can be concluded
that Bob as ______ literarcy. - Answers computer
Bob has basic knowledge of how to use software like word processors and spreadsheets. He cannot
complete the task when asked to describe the information on the spreadsheets. What type of skills
should he focus on to develop the skills to answer the questions? - Answers Information literacy
Business _____ provides historical, current, and predictive views of business operations and
environments and gives organizations a competitive advantage in the marketplace. - Answers
intelligence
Which of the following statements is true of the data component of an information system? -
Answers Future data is predicted for budgets or cash flow reports
Timely, relevant, and accurate information is a critical tool for managing the 4 Ms of resources. What
are the 4Ms? - Answers Manpower, Machinery, Materials, Money
What should the industry do if they realize the buyer power is too high? - Answers Make it difficult to
switch providers
In the context of Porter's Five Forces Model, which is the difference between buyer power and
supplier power? - Answers Buyer power is high when customers have many choices, whereas
supplier power is high when customers have fewer options
An automobile manufacturer is set to launch.a well-marketed new vehicle model. This vehicle has had
great views. Why would the manufacturer limit the number of models to the approved dealerships? -
Answers To retain supplier power
In the context of using information technologies for a competitive advantage, which statement is true
f a top-line strategy? - Answers It focuses on generating new revenue by offering new products and
services
Which approach to set up a distributed database management system (DDMS) combines the
fragmentation approach and the replication approach? - Answers allocation
In a relational database model, which operation pares down a table by eliminating columns according
to certain criteria? - Answers project operation
_____ is a component of a data model that defines the boundaries of a database, such as maximum
and minimum values allowed for a field, constraints, and access methods. - Answers Integrity rules
To establish a relationship between two tables, which filed should be a foriegn key? - Answers
Customer_id
In a relational database mode, which operation searches data in a table and retrieves records based
on certain criteria? - Answers select operation
Which statement is true of data marts and data warehouses? - Answers An organization's data marts
together comprise the organization's data warehouse
Which is a potential benefit of telcommmuting? - Answers It enables organizations to use the best
human resources in a large geographical region
The CREDIT_LIMIT field must be stored with a decimal datatype and a default value between 0 and
$10,000. Where would these rules/limitations be stored? - Answers data dictionary
In a data warehouse ____ is the process of collection data from a variety of sources and converting it
into a format that can be used in transformation processing. - Answers extraction
Which statement is false of a network model? - Answers In a network model, the relationships among
records form a treelike structure
Which protects the contents of an HTML code? - Answers Copyright laws
Organizations can benefit from patents as they can use patents: - Answers to keep competitors from
entering certain market segments
Which federal law is intended to protect the confidentiality of a patient's medical information and
health information? - Answers HIPAA
In the context of intellectual property, which is categorized as copyrighted material? - Answers
Artistic works

, Theo makes two copies of an antivirus software package he bought and sold one of the copies to
Joshua. How would Jared's actions be classified in this situation? - Answers Illegal and unethical
Why are cookies considered an invasion of privacy? - Answers Cookies collect information about
users without their prior consent
What information can be censored if the consent is deemed offensive to a political, religious, or
cultural group? - Answers Public
In the contedxt of intellectual property_____ is registered, selling, or using a domain name to profit
from someone else's trademark. On the other hand ____ relies on typographical errors made by Wed
users when typing a Website address into a Web browser. - Answers cybersquatting, typosquatting
Which statement is true of spam? - Answers It is sent in bulk using automated mailing software
Which of the following statements is false of virtual organization? - Answers Virtual organizations are
networks of dependent companies, suppliers, customers, and manufacturers connected via
information technologies
Logistics information system - Answers designed to reduce the cost of transporting material while
maintaining safe and reliable delivery
Personnel information system - Answers designed to choose the best job candidate
Manufacturing information systems - Answers designed to increase product quality, and make better
inventory decision
Marketing information systems - Answers designed to analyze market share, sales, and sales
personnel
Distributed Database - Answers collection of multiple interconnected databases and spreads across
various locations instead of a central database
Distributed Database management system - Answers a centralized software system that manages
distributed database in a manner as if it were all stored in a single location
Data Warehouse - Answers collection of data from a variety of sources and generate business
intelligence
Database - Answers any collection of data organized for storage, accessibility, and retrieval, and
designed to capture data
Value - Answers the value that the collected data brings to the decision-making process
Veracity - Answers the trustworthiness and accuracy of data
Velocity - Answers the speed with which data has to be gathered and processed
Variety - Answers the combination of structured data and unstructured data
Which statement best describes spyware? - Answers It is software that secretly gathers information
about users while they browse the Web.
A company's CEO hires a new security analyst to determine why a certain employee has suddenly
experienced issues with the employee's application development skills. The only thing that has
changed is that the employee has recently been assigned to mentor a new employee. After further
research, the security analyst notices the new employee logging into the mentor's account when the
mentor is away. Which one of the following should the analyst pursue as the issue? - Answers Social
engineering
A security vender needs to develop a security system for a personal site that compares the length of
each finger, the translucence of fingertips, and the webbing between fingers against stored data to
verify a user's identity. Which biometric security measure should be implemented to accomplish this
task? - Answers Hand geometry
In data encryption, the HTTPs in a browser address indicates a safe HTTP connection over ____. -
Answers Secure Sockets Layer
_____ a more recent cryptographic protocol, ensures data security and integrity over public networks,
such as the Internet. - Answers Transport Layer Security
Which statement is true of symmetric encryption? - Answers It is difficult to share a key over the
Internet in symmetric encryption.
Which statement is true of a zero-trust security? - Answers With a zero-trust security, a user must
only be given access to information that he or she needs in order to perform his or her job.
Which statements are true of virtual private networks (VPN)? - Answers It is often used so that the
remote users have a secure connection to an organization's network
Which statement are true of asymmetric encryption? - Answers It requires a large amount of
processing power

Geschreven voor

Instelling
MANAGEMENT 3180
Vak
MANAGEMENT 3180

Documentinformatie

Geüpload op
13 maart 2026
Aantal pagina's
6
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$11.49
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
joshuawesonga22 Liberty University
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
97
Lid sinds
1 jaar
Aantal volgers
1
Documenten
14118
Laatst verkocht
3 dagen geleden
Tutor Wes

Hi there! I'm Tutor Wes, a dedicated tutor with a passion for sharing knowledge and helping others succeed academically. All my notes are carefully organized, detailed, and easy to understand. Whether you're preparing for exams, catching up on lectures, or looking for clear summaries, you'll find useful study materials here. Let’s succeed together!

3.9

9 beoordelingen

5
4
4
1
3
3
2
1
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen