Final Examination Study Guide Template
BIS/320 Final Examination Study Guide
This study guide will prepare you for the Final Examination you will complete in the final week. It contains practice questions, which are related to each week’s objectives. In addition, refer to each week’s readings and your student guide as study references for the Final Examination.
Week One: Hardware and Software
Objective: Describe the functions of computer hardware components.
1. The ________ component of the IS framework provides instructions for hardware
a. data
b. software
c. procedure
d. information
Objective: Describe the functions of computer hardware components.
2. Which device listed below is an example of an output hardware device?
a. Keyboard
b. Flatbed plotter
c. CPU
d. Magnetic disk
Objective: Differentiate between types of computer software.
3. Software that provides capabilities common across all organizations and industries is known as ________ software
a. enterprise
b. market-wide
c. horizontal-market application
d. generic-application
Objective: Differentiate between types of computer software.
4. ________ is computer code as written by humans and that is understandable by humans
a. open source
b. machine code
c. source code
d. native code
Objective: Differentiate between types of computer software.
5. Application programs that require programs other than a browser on a user's computer are called
a. smart clients
b. horizontal applications
c. vertical applications
d. thick-clients
Objective: Use Microsoft® Office Word to accomplish business objectives.
6. When a single cell is selected, if you change the column width, then the column width will change
a. for the entire row
b. for that cell only
c. for the entire table
d. for all tables in the document
Objective: Use Microsoft® Office Word to accomplish business objectives.
7. If a footer is linked to a previous footer and you want to make changes to that specific footer, you must
a. unlink it
b. re-link it
c. do nothing
d. delete all footers and start over
Week Two: Databases and Data Communications
Objective: Determine how and when to use databases in business.
8. For which of the following operations do applications use DBMS?
a. Send e-mails
b. Write a software program
c. Modify data
d. Track simple data
Objective: Determine how and when to use databases in business.
9. ________ software programs assist in creating and maintaining databases
a. metadata
b. knowledge management
c. DBMS
d. database application system
Objective: Determine how and when to use databases in business.
10. Columns that are keys of a different table than the one in which they reside are known as ________ keys
a. foreign
b. aspect
c. relational
d. variable
Objective: Determine data communications needs based on business function.
11. Which of the following provides reliable internet transport?
a. HTTP
b. TCP
c. FTP
d. DSL
Objective: Determine data communications needs based on business function.
12. A ________ must be used to convert a computer's digital data to an analog, or wavy, signal
a. tunnel
b. switch
c. modem
d. router
Objective: Determine data communications needs based on business function.
13. Which protocol standard used for wired LAN connections specifies hardware characteristics, such as which wires carry which signals?
a. Intranet
b. WiMax
c. Ethernet
d. EVDO
Objective: Use Microsoft® Office Excel® to accomplish business objectives.
14. The best way to calculate the average prices for notebooks and other items on a list is to
a. type in each formula for each row
b. use a calculator and type in the final answers
c. copy and paste the formula from cell D2
d. create a new column to write new formulas
Objective: Use Microsoft® Office Excel® to accomplish business objectives.
15. The orientation settings in the Format Cells dialog box refers to
a. the orientation of data entries to the left or right of a cell
b. the orientation of data entries to the top or bottom of a cell
c. the orientation of cells in the spreadsheet
d. the angle at which data entries are displayed in a cell
Week Three: Internet and Collaboration Tools
Objective: Determine how and when to use Internet technologies in business.
16. Sales between a supplier and a retail consumer are ________ transactions
a. B2C
b. B2B
c. B2G
d. C2C
Objective: Determine how and when to use Internet technologies in business.
17. Web 2.0 companies
a. sell software licenses
b. offer their software as a product
c. provide software as a free service
d. lock down all the legal rights they can
Objective: Determine how and when to use Internet technologies in business.
18. E-commerce is the buying and selling of goods and services
a. over private and public computer networks
b. in restricted markets using cyber intermediaries
c. using intermediaries such as dealer and agents
d. that cannot be sold via traditional distribution channels
Objective: Determine collaboration tool needs based on business function.
19. Which of the following is an example of synchronous communication?
a. E-mail
b. Voice mail
c. Multiparty text chat
d. Discussion forum
Objective: Determine collaboration tool needs based on business function.
20. Which of the following is TRUE for document libraries?
a. They do not allow multiple users to edit a document simultaneously.
b. They do not offer a check-out, check-in facility.
c. They do not allow asynchronous content sharing.
d. They do not have the facility to track version histories.
Objective: Use Microsoft® Office PowerPoint® to accomplish business objectives.
21. Regarding PowerPoint®, what is the definition of a layout?
a. A common set of graphics that appear throughout a presentation
b. A pre-built format containing a set of colors, fonts, and graphics
c. The outline of your presentation
d. The way elements are arranged on a slide
Objective: Use Microsoft® Office PowerPoint® to accomplish business objectives.
22. Using a _______ is a good strategy to save time and efficiently build a presentation
a. new blank presentation
b. pre-built PowerPoint theme
c. pre-built PowerPoint slide
d. pre-built PowerPoint clip art
Week Four: Information Security
Objective: Develop methods to address information security needs.
23. ________ occur when bogus services flood a Web server
a. spoofing attacks
b. hacking attacks
c. phishing attacks
d. DOS attacks
Objective: Develop methods to address information security needs.
24. ________ is an example of a data safeguard against security threats
a. application design
b. backup and recovery
c. accountability
d. procedure design
Objective: Develop methods to address information security needs.
25. ________ use(s) personal physical characteristics such as fingerprints, facial features, and retinal scans to verify users
a. passwords
b. smart cards
c. biometric authentication
d. personal identification numbers
Objective: Develop methods to address information security needs.
26. Typically, a help-desk information system has answers to questions that only a true user would know, such as the user's birthplace, mother's maiden name, or last four digits of an important account number. This information
a. allows help-desk representatives to create new passwords for users
b. reduces the strength of the security system
c. protects the anonymity of a user
d. helps authenticate a user
Week Five: Systems Development Life Cycle
Objective: Plan methods to manage systems development in business.
27. Parallel installation is the ________ style of installation
a. most preferred
b. riskiest
c. slowest
d. least expensive
Objective: Plan methods to manage systems development in business.
28. A test plan
a. should not include the incorrect actions that users will take
b. should cause every line of program code to be executed
c. should cause only critical error messages to be displayed
d. should be constructed by PQA personnel alone
Objective: Plan methods to manage systems development in business.
29. Which of the following statements is true regarding the composition of the development team over the life of the SDLC?
a. User involvement is limited to the integrated testing and conversion phase of the SDLC.
b. During requirements definition, the team will be heavy with systems analysts.
c. During integrated testing and conversion, the team is made up of only programmers and designers.
d. During design and implementation, the team will be heavy with business users.
Objective: Plan methods to manage systems development in business.
30. Normal processing procedures for operations personnel are
a. procedures to continue operations when the system fails
b. procedures for backing up data and other resources
c. procedures for using the system to accomplish business tasks
d. procedures for starting, stopping, and running the system
Answer Key
1. b
2. b
3. c
4. c
5. d
6. b
7. a
8. c
9. c
10. a
11. b
12. c
13. c
14. c
15. d
16. a
17. c
18. a
19. c
20. a
21. d
22. b
23. d
24. b
25. c
26. d
27. c
28. b
29. b
30. d
................
................
In order to avoid copyright disputes, this page is only a partial summary.
To fulfill the demand for quickly locating and searching documents.
It is intelligent file search solution for home and business.
Related searches
- photosynthesis study guide answers
- genesis study guide pdf
- 6th grade science study guide pdf
- biology 101 study guide printable
- ftce study guide pdf
- study guide for philosophy 101
- photosynthesis study guide quizlet
- science ged study guide 2019
- clep college composition study guide pdf
- study guide for photosynthesis pdf
- ged practice study guide pdf
- personal finance study guide pdf