Details of this Paper

BIS 220 Final Exam study guide (Guaranteed A+ work!)




Question;1) Two information systems that support the entire organization areA. enterprise resource planning systems and dashboardsB. transaction processing systems and office automation systemsC. enterprise resource planning systems and transaction processing systemsD. expert systems and office automation systems2) _______ is the direct use of information systems by employees in their workA. Transaction processing systemsB. End-user computingC. Decision support systemsD. Management information systems3) ______ attempt to duplicate the work of human experts by applying reasoning capabilitiesA. Expert systemsB. DashboardsC. Business intelligence systemsD. Decision support systems4) ______ issues involve who may obtain information and how much they should pay for this informationA. PrivacyB. AccessibilityC. PropertyD. Transferability5) _____ issues involve collecting, storing, and disseminating information about individuals.A. PrivacyB. AccuracyC. PropertyD. Accessibility6) Your company?s computers have been taken over by an attacker and used to attack another organization?s information systems. Your problem is which of the following?A. Poor security policies and proceduresB. Lack of due diligenceC. Downstream liabilityD. Poor service-level agreements7) You are the only person in your office to upgrade to Microsoft? Word 2010. Before you share documents with coworkers, you should do which of the following?A. Print out a backup copy of documentsB. Run the Compatibility CheckerC. Burn all documents to CDD. Create a document summary8) Which of the following is detected by the contextual spelling checker?A. Duplicate wordsB. Irregular capitalizationC. Use of their when you should use thereD. Improper use of commas and other punctuation9) If your cursor is near the bottom of a page and you want to display the next paragraph you type at the top of a new page, you should use which of the following?A. EnterB. Ctrl+PageDownC. Ctrl+EnterD. Page Layout, Breaks, Line Numbers10) Your ______ is the collection of traceable data that is captured when you use various information technologies such as credit cards or the InternetA. data profileB. data shadowC. database fileD. database record11) No alphabetic characters in a social security number field is an example ofA. data isolationB. data consistencyC. data integrityD. data redundancy12) In a database, the primary key field is used toA. specify an entityB. uniquely identify an attributeC. identify duplicated dataD. uniquely identify a record13) Search engines and metasearch engines are examples of which network application?A. CommunicationB. DiscoveryC. CollaborationD. Web services14) ______ portals coordinate content within relatively narrow organizational and partners? communitiesA. PersonalB. AffinityC. CorporateD. Commercial15) Workflow, groupware, and telepresence systems are examples of which network application?A. DiscoveryB. CollaborationC. Web servicesD. Communications16) Which type of e-commerce does an organization provide information and services to its workers?A. Business-to-employeeB. Consumer-to-businessC. Government-to-businessD. Business-to-consumer17) _______ auctions are the most common auction model for large purchases.A. ForwardB. StaticC. ReverseD. Simple18) ______ collect data from many points over an extended space.A. Bluetooth? networksB. Ultra-wideband networksC. Wireless sensor networksD. Wi-Fi networks19) Which type of satellite has the largest footprint?A. Low earth orbitB. GeostationaryC. Medium earth orbitD. Equatorial orbit20) Which of the following is the most appropriate wireless networking standard for creating personal area networks?A. Wi-FiB. Cellular radioC. MicrowaveD. Bluetooth?21) If cell D15 contains the formula =$C$5*D15, what is the D15 in the formula?A. Mixed referenceB. Absolute referenceC. Circular referenceD. Range name22) What should you do if you see a column of pound signs (###) instead of values or results of formulas?A. Increase the zoom percentageB. Delete the columnC. Adjust the row heightD. Increase the column width23) ______ feasibility determines if the project is an acceptable financial risk and if the organization can afford the expense and time needed to complete the projectA. technicalB. economicC. organizationalD. behavioral24) In the traditional systems development life cycle, usersA. have no inputB. are important only in the testing phases of the projectC. are important only in the maintenance phase of the projectD. are limited to providing information requirements25) To create a Microsoft? PowerPoint? presentation based on an installed template, click theA. File tab, and then click NewB. File tab, and then click OpenC. Insert tab, and then select Add TemplateD. Design tab, and then select New26) Which of the following demotes a bullet point from the first level to the second level in Outline view in Microsoft? PowerPoint??A. Shift+TabB. TabC. Decrease List LevelD. Ctrl+Tab27) ________ connects parts of the intranets of different organizations and allows secure communications among business partnersA. A global networkB. An intranetC. An extranetD. The Internet28) ______ is a system with universally accepted standards for storing, retrieving, formatting, and displaying information via a client/server architectureA. FTPB. World Wide WebC. NewsgroupsD. The Internet29) A process that allows users to place information in multiple, overlapping associations is calledA. AJAXB. taggingC. a WikiD. blogging30) ________ are websites that provide collections of content from all over the World Wide WebA. AggregatorsB. Social networksC. MashupsD. Really simple syndications


Paper#54888 | Written in 18-Jul-2015

Price : $37