Final Examination Study Guide Template



BIS/320 Final Examination Study Guide

This study guide will prepare you for the Final Examination you will complete in the final week. It contains practice questions, which are related to each week’s objectives. In addition, refer to each week’s readings and your student guide as study references for the Final Examination.

Week One: Hardware and Software

Objective: Describe the functions of computer hardware components.

1. The ________ component of the IS framework provides instructions for hardware

a. data

b. software

c. procedure

d. information

Objective: Describe the functions of computer hardware components.

2. Which device listed below is an example of an output hardware device?

a. Keyboard

b. Flatbed plotter

c. CPU

d. Magnetic disk

Objective: Differentiate between types of computer software.

3. Software that provides capabilities common across all organizations and industries is known as ________ software

a. enterprise

b. market-wide

c. horizontal-market application

d. generic-application

Objective: Differentiate between types of computer software.

4. ________ is computer code as written by humans and that is understandable by humans

a. open source

b. machine code

c. source code

d. native code

Objective: Differentiate between types of computer software.

5. Application programs that require programs other than a browser on a user's computer are called

a. smart clients

b. horizontal applications

c. vertical applications

d. thick-clients

Objective: Use Microsoft® Office Word to accomplish business objectives.

6. When a single cell is selected, if you change the column width, then the column width will change

a. for the entire row

b. for that cell only

c. for the entire table

d. for all tables in the document

Objective: Use Microsoft® Office Word to accomplish business objectives.

7. If a footer is linked to a previous footer and you want to make changes to that specific footer, you must

a. unlink it

b. re-link it

c. do nothing

d. delete all footers and start over

Week Two: Databases and Data Communications

Objective: Determine how and when to use databases in business.

8. For which of the following operations do applications use DBMS?

a. Send e-mails

b. Write a software program

c. Modify data

d. Track simple data

Objective: Determine how and when to use databases in business.

9. ________ software programs assist in creating and maintaining databases

a. metadata

b. knowledge management

c. DBMS

d. database application system

Objective: Determine how and when to use databases in business.

10. Columns that are keys of a different table than the one in which they reside are known as ________ keys

a. foreign

b. aspect

c. relational

d. variable

Objective: Determine data communications needs based on business function.

11. Which of the following provides reliable internet transport?

a. HTTP

b. TCP

c. FTP

d. DSL

Objective: Determine data communications needs based on business function.

12. A ________ must be used to convert a computer's digital data to an analog, or wavy, signal

a. tunnel

b. switch

c. modem

d. router

Objective: Determine data communications needs based on business function.

13. Which protocol standard used for wired LAN connections specifies hardware characteristics, such as which wires carry which signals?

a. Intranet

b. WiMax

c. Ethernet

d. EVDO

Objective: Use Microsoft® Office Excel® to accomplish business objectives.

14. The best way to calculate the average prices for notebooks and other items on a list is to

a. type in each formula for each row

b. use a calculator and type in the final answers

c. copy and paste the formula from cell D2

d. create a new column to write new formulas

Objective: Use Microsoft® Office Excel® to accomplish business objectives.

15. The orientation settings in the Format Cells dialog box refers to

a. the orientation of data entries to the left or right of a cell

b. the orientation of data entries to the top or bottom of a cell

c. the orientation of cells in the spreadsheet

d. the angle at which data entries are displayed in a cell

Week Three: Internet and Collaboration Tools

Objective: Determine how and when to use Internet technologies in business.

16. Sales between a supplier and a retail consumer are ________ transactions

a. B2C

b. B2B

c. B2G

d. C2C

Objective: Determine how and when to use Internet technologies in business.

17. Web 2.0 companies

a. sell software licenses

b. offer their software as a product

c. provide software as a free service

d. lock down all the legal rights they can

Objective: Determine how and when to use Internet technologies in business.

18. E-commerce is the buying and selling of goods and services

a. over private and public computer networks

b. in restricted markets using cyber intermediaries

c. using intermediaries such as dealer and agents

d. that cannot be sold via traditional distribution channels

Objective: Determine collaboration tool needs based on business function.

19. Which of the following is an example of synchronous communication?

a. E-mail

b. Voice mail

c. Multiparty text chat

d. Discussion forum

Objective: Determine collaboration tool needs based on business function.

20. Which of the following is TRUE for document libraries?

a. They do not allow multiple users to edit a document simultaneously.

b. They do not offer a check-out, check-in facility.

c. They do not allow asynchronous content sharing.

d. They do not have the facility to track version histories.

Objective: Use Microsoft® Office PowerPoint® to accomplish business objectives.

21. Regarding PowerPoint®, what is the definition of a layout?

a. A common set of graphics that appear throughout a presentation

b. A pre-built format containing a set of colors, fonts, and graphics

c. The outline of your presentation

d. The way elements are arranged on a slide

Objective: Use Microsoft® Office PowerPoint® to accomplish business objectives.

22. Using a _______ is a good strategy to save time and efficiently build a presentation

a. new blank presentation

b. pre-built PowerPoint theme

c. pre-built PowerPoint slide

d. pre-built PowerPoint clip art

Week Four: Information Security

Objective: Develop methods to address information security needs.

23. ________ occur when bogus services flood a Web server

a. spoofing attacks

b. hacking attacks

c. phishing attacks

d. DOS attacks

Objective: Develop methods to address information security needs.

24. ________ is an example of a data safeguard against security threats

a. application design

b. backup and recovery

c. accountability

d. procedure design

Objective: Develop methods to address information security needs.

25. ________ use(s) personal physical characteristics such as fingerprints, facial features, and retinal scans to verify users

a. passwords

b. smart cards

c. biometric authentication

d. personal identification numbers

Objective: Develop methods to address information security needs.

26. Typically, a help-desk information system has answers to questions that only a true user would know, such as the user's birthplace, mother's maiden name, or last four digits of an important account number. This information

a. allows help-desk representatives to create new passwords for users

b. reduces the strength of the security system

c. protects the anonymity of a user

d. helps authenticate a user

Week Five: Systems Development Life Cycle

Objective: Plan methods to manage systems development in business.

27. Parallel installation is the ________ style of installation

a. most preferred

b. riskiest

c. slowest

d. least expensive

Objective: Plan methods to manage systems development in business.

28. A test plan

a. should not include the incorrect actions that users will take

b. should cause every line of program code to be executed

c. should cause only critical error messages to be displayed

d. should be constructed by PQA personnel alone

Objective: Plan methods to manage systems development in business.

29. Which of the following statements is true regarding the composition of the development team over the life of the SDLC?

a. User involvement is limited to the integrated testing and conversion phase of the SDLC.

b. During requirements definition, the team will be heavy with systems analysts.

c. During integrated testing and conversion, the team is made up of only programmers and designers.

d. During design and implementation, the team will be heavy with business users.

Objective: Plan methods to manage systems development in business.

30. Normal processing procedures for operations personnel are

a. procedures to continue operations when the system fails

b. procedures for backing up data and other resources

c. procedures for using the system to accomplish business tasks

d. procedures for starting, stopping, and running the system

Answer Key

1. b

2. b

3. c

4. c

5. d

6. b

7. a

8. c

9. c

10. a

11. b

12. c

13. c

14. c

15. d

16. a

17. c

18. a

19. c

20. a

21. d

22. b

23. d

24. b

25. c

26. d

27. c

28. b

29. b

30. d

................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download