Holy Family Midterm----CMIS 301---FALL 1999
Place your name at the top of the page.
Be sure to place the letter of the answer in the left margin. For True or False, place T or F
1. Powerful worldwide changes that have altered the business environment include:
A. the emergence and strengthening of the global economy.
B. the transformation of industrial economies and societies into knowledge- and information-based service economies.(1 person)
C. the transformation of the business enterprise.
D. all of the above.
D---All of the above. (Chapter 1, Number 1)
2. This type of system rests on accepted and fixed definitions of data and
procedures for collecting, storing, processing, disseminating, and using
A. informal system(1 person)
C. formal system
F. Other(1 person)
C---formal system (Chapter 1, Number 3)
3. Dimensions of information systems include:
D. all of the above.
D---All of the above. (Chapter 1, Number 4)
4. Optical disks, magnetic tapes, and the software governing the organization
of data on physical media are examples of:
A. communications technology.
B. computer software.
C. computer hardware.
D. storage technology.
D---storage technology.(Chapter 1, Number 6)
5. The particular form that information technology takes in an organization to
achieve selected goals or functions defines:
A. information architecture.
B. network topology.
C. a computer platform.
D. a network.
A---information architecture. (Chapter 1, Number 10)
6. Document imaging is an example of a(n):
A. knowledge-level system.
B. strategic-level system.
C. operational-level system.
D. management-level system.
A---knowledge-level system. (Chapter 2, Number 1)
7. Information systems that monitor the elementary activities and transactions
of the organizations are:
A. management-level systems.
B. operational-level systems.(1 person)
C. knowledge-level systems.
D. strategic-level systems.
B---operational-level systems. (Chapter 2, Number 2)
8. Summary transaction data, high-volume data, and simple models are
information inputs characteristic of a(n):
C. ESS(1 person)
D. TPS(3 persons)
B---MIS (Chapter 2, Number 4)
9. Management information systems:
A. offer users flexibility, adaptability, and a quick response.
B. operate with little or no assistance from professional programmers.(1 person)
C. have little analytical capability.
D. use sophisticated data analysis and modeling tools.(1 person)
C---have little analytical capability. (Chapter 2, Number 5)
10. The analysis of large pools of data to find patterns and rules that can be
used to guide decision making and predict future behavior defines:
B. data concatenation.
D. data warehousing.
A---datamining. (Chapter 2, Number 6)
11. A competitive strategy for developing new market niches for specialized
products or services where a business can compete in the target area better
than its competitors describes:
A. product differentiation.(2 persons)
B. focused differentiation.
C. market segmenting.(1 person)
B---focused differentiation. (Chapter 2, Number 7)
12. Based on the behavioral definition of an organization:
A. people who work in organizations develop customary ways of working.
B. people gain attachments to existing relationships.
C. people make arrangements with subordinates and superiors about how work will be done.
D. all of the above are correct.
D---all of the above are correct. (Chapter 3, Number 1)
13. All organizations develop:
A. standard operating procedures.
D. all of the above.
D---all of the above. (Chapter 3, Number 2)
14. Representatives of departments outside the information systems group for
whom applications are developed are:
A. end users.
B. information systems managers.
C. chief information users.
D. systems analysts.
A---end users. (Chapter 3, Number 4)
15. An example of an external opportunity includes:
A. the rising costs of labor or other resources.
B. a new government program.
C. the competitive actions of other organizations.(1 person)
D. the vital interests that govern matters of strategic importance to the organization.
B---a new government program. (Chapter 3, Number 5)
16. The principle stating that if an action cannot be taken repeatedly, then it is not right to be taken at any time refers to:
A. the slippery slope rule.
B. Immanuel Kantís Categorical Imperative.
C. the Utilitarian Principle.
D. the Risk Aversion Principle.
A---the slippery slope rule. (Chapter 4, Number 2)
17. A set of principles originally set forth in 1973 that governs the collection and use of information about individuals and forms the basis of most U.S. and European privacy laws is the:
A. Electronic Communications Policy Act.
B. Computer Matching and Privacy Protection Act.(1 person)
C. Fair Information Practices.
D. Freedom of Information Act
C---Fair Information Practices. (Chapter 4, Number 3)
18. The practice of sending unsolicited e-mail and other electronic communication is called
B---spamming. (Chapter 4, Number 5)
19. Any intellectual work or product used for a business purpose that can be
classified as belonging to that business, provided it is not based on
information in the public domain defines:
A. trade secret.
A---trade secret. (Chapter 4, Number 7)
20. According to the text, the central quality-related ethical issue of the
information age concerns:
A. the copying of software.(2 persons)
B. the point at which you should release software or services for the consumption of others.
C. the law of responsibility and accountability.(1 person)
D. the debate between information providers of all kinds who want to be relieved of liability insofar as ossible and service users who want organizations to be held responsible for providing high-quality system ervices.
B---the point at which you should release software or services for the consumption of others. (Chapter 4, Number 9)
21. An eye strain condition related to computer display screen use, with symptoms including headaches, blurred vision, and dry, irritated eyes describes:
A. computer vision syndrome.
B.repetitive stress injury.
D. carpal tunnel syndrome.
A---computer vision syndrome. (Chapter 4, Number 10)
22. A gigabyte is approximately:
A. one million bytes.
B. one thousand bytes.
C. one trillion bytes.
D. one billion bytes.
D---one billion bytes. (Chapter 5, Number 1)
23. The number of bits that can be moved at one time between the CPU, primary storage, and the other devices of a computer defines:
A. word length.
B. data bus width.
C. load capacity.
D. bit size.
B---data bus width. (Chapter 5, Number 4)
24. In client/server computing, the component that satisfies some or all of the
userís request for data and/or functionality is called the:
C. network computer.
B---server. (Chapter 5, Number 6)
25. Each of the following is a true statement about network computers except:
A. centralizing control over computing will improve worker initiative and creativity, since the workers are now free from Ďmachine management.í
B. network computers can reduce total costs of ownership because they are less expensive to purchase than
PCs with local processing and storage.
C. software programs and applications would not have to be purchased, installed, and upgraded for each
user because software would be delivered and maintained from one central point.
D. Ďthin clientí is a term that is sometimes used to refer to a network computer.(1 person)
A---centralizing control over computing will improve worker initiative and creativity, since the workers are now free from Ďmachine management. (Chapter 5, Number 7)
26. The most widely used secondary-storage medium today is:
A. magnetic tape.(1 person)
B. an optical disk.
C. a magnetic disk.
D. a cylinder.
C---a magnetic disk. (Chapter 5, Number 8)
27. Disk storage technology that boosts disk performance by packaging more than
100 smaller disk drives with a controller chip and specialized software in a
single large unit to deliver data over multiple paths simultaneously defines:
D---RAID. (Chapter 5, Number 9)
28. A credit-card-size plastic card containing embedded storage and a
A. smart card.
B. debit card.
C. intelligent card.
D. embedded card.
A---smart card. (Chapter 5, Number 10)
29. Program instructions that have been translated into machine language so that
they can be executed by the computer describes:
A. source code.(1 person)
B. object code.
C. destination code.
D. translated code.
B---object code. (Chapter 6, Number 2)
30. Windows CE:
A. is used for powerful PCs, workstations, and minicomputers; it supports multitasking, multi-user processing and networking, and is portable to different models of computer hardware.
B. is a 32-bit operating system with a streamlined graphical user interface, has multitasking and powerful
networking capabilities, and can be integrated with the information resources of the Web.
C. is a pared-down version of the Windows operating system for handheld computers and wireless communication devices.
D. is an operating system for the IBM PCs, takes advantage of the 32-bit microprocessor, and supports
multitasking and networking.
C---is a pared-down version of the Windows operating system for handheld computers and wireless communication devices. (Chapter 6, Number 3)
31. Windows 98 is a:
A. 64-bit operating system.
B. 32-bit operating system.
C. 16-bit operating system.
D. 128-bit operating system.
B---32-bit operating system. (Chapter 6, Number 4)
32. A programming language consisting of the 1s and 0s of binary code is:
B. assembly language.
D. machine language.
D---machine language. (Chapter 6, Number 5)
33. A software package that provides two or more applications, such as word processing and spreadsheets, providing for easy transfer of data between them defines:
A. software suite.(1 person)
B. software bundle.
C. integrated package.
D. groupware(1 person)
C---integrated package. (Chapter 6, Number 7)
34. A person, place, thing, or event on which we maintain information defines:
C---entity. (Chapter 7, Number 1)
35. An example of a key field would be:
A. a personís last name.
B. a personís address.
C. a personís department.
D. a personís social security number.
D---a personís social security number (Chapter 7, Number 2).
36. The file access method that allows you to directly access records organized
sequentially using an index of key fields is called the:
A. sequential access method.(2 persons)
B. indexed sequential access method.(2 persons)
C. direct access method.
D. relational access method.
C---direct access method. (Chapter 7, Number 3)
37. The access method used in applications that require sequential processing of
large numbers of records but that occasionally require random access of individual records is the:
A. sequential access method.(2 persons)
B. indexed sequential access method.
C. direct access method.
D. relational access method.(2 persons)
B---indexed sequential access method. (Chapter 7, Number 4)
38. Assume the marketing and credit information functions of a retail chain are
collecting the same customer information; this is an example of:
A. program-data dependence.
B. lack of flexibility.
C. lack of data sharing and availability.(1 person)
D. data redundancy.
D---data redundancy. (Chapter 7, Number 5)
39. A set of rules and procedures that govern transmission between the
components of a network defines:
A. transmission architecture.
B. transmission topology.
C---protocol. (Chapter 8, Number 1)
40. A device for translating digital signals into analog signals and vice versa
A---modem. (Chapter 8, Number 2)
41. A device that enables a single communications channel to carry data transmissions from multiple sources simultaneously is a:
A. front-end processor.
D---multiplexer. (Chapter 8, Number 5)
42. A network topology in which all computers are linked by a closed loop in a
manner that passes data in one direction from one computer to another
A. ring network.
B. bus network.
C. star network.
D. hybrid network(1 person)
A---ring network. (Chapter 8, Number 6)
43. Teleconferencing with the capability of allowing participants to see each other over video screens best defines:
B. computer conferencing.
D. desktop conferencing.
C---videoconferencing. (Chapter 8, Number 10)
44. Since the turn of the century, the United States has experienced a steady
increase in the number of farm workers and blue-collar workers who are
employed in factories.
FALSE (Chapter 1, Number 4)
45. Information technology constitutes less than 60 percent of the invested
capital in service industries like finance, insurance, and real estate.
FALSE (Chapter 1, Number 5)
46. Middle managers are responsible for monitoring the firmís daily activities.
FALSE (Chapter 1, Number 7)(2 persons incorrect)
47. Electronic work flows have increased the cost of operations in many companies.
FALSE (Chapter 1, Number 8)
48. Both electronic commerce and electronic business can fundamentally change
the way business is conducted.
TRUE (Chapter 1, Number 9)
49. Transaction processing systems are the basic business systems that serve the
operational level of the organization.
TRUE (Chapter 2, Number 1)
50. Document imaging systems are a widely used type of decision support
FALSE (Chapter 2, Number 3) (1 person incorrect)
51. Management information systems (MIS) summarize and report on the basic
operations of the company.
TRUE (Chapter 2, Number 5)(2 persons incorrect)
52. Transaction processing systems (TPS) help managers make decisions that are
semi-structured, unique, or rapidly changing, and not easily specified in
FALSE (Chapter 2, Number 6)(2 persons incorrect)
53. Information technology can be used to differentiate existing products,create new products and services, raise customer and supplier switching costs, and reduce operating costs.
TRUE (Chapter 2, Number 10)
54. Organizations are social structures because they are a collection of social
TRUE (Chapter 3, Number 1)(1 person incorrect)
55. The Internet increases the accessibility, storage, and distribution of information and knowledge for organizations.
TRUE (Chapter 3, Number 5)
56. Organizational models of decision making take into account the structural and political characteristics of an organization.
TRUE (Chapter 3, Number 9)
57. Information technology has heightened ethical concerns.
TRUE (Chapter 4, Number 2)
58. Due process is a feature of political systems in which a body of law is in place that permits the individuals to recover damages done to them by other actors, systems, or organizations.
FALSE (Chapter 4, Number 3)(1 person incorrect)
59. In the United States, claims to privacy are protected primarily by the First
and Fourth Amendments.
TRUE (Chapter 4, Number 6)
60. According to the text, the central property-related ethical issue posed to individuals in the information age concerns copying software.
TRUE (Chapter 4, Number 10)
61. A binary digit is called a bit and represents either a 0 or 1.
TRUE (Chapter 5, Number 1)
62. The control unit performs the principal logic and arithmetic operations of the computer.
FALSE (Chapter 5, Number 4)(1 person incorrect)
63. A transistor is a temporary storage location in the ALU or control unit where small amounts of data and instructions reside for thousandths of a second.
FALSE (Chapter 5, Number 5)(3 persons incorrect)
64. Teraflop means that a computer can perform one trillion floating point operations per second.
TRUE (Chapter 5, Number 7)
65. The larger the word length, the greater the speed of the computer.
TRUE (Chapter 5, Number 8)(1 person incorrect)
66. Selecting appropriate software for the organization is a key management decision.
TRUE (Chapter 6, Number 1)
67. To ensure compatibility, software must be specifically designed to a specific machine.
TRUE (Chapter 6, Number 2)(2 persons incorrect)
68. An interpreter is used to translate assembly language into machine language.
FALSE (Chapter 6, Number 6)(1 person incorrect)
69. In a graphical user interface, applets are used to represent pictures, programs, and files.
FALSE (Chapter 6, Number 7)(2 persons incorrect)
70. The movement toward natural language is considered by some as the next generation in software development.
TRUE (Chapter 6, Number 8)(1 person incorrect)
71. Visual Basic is a widely used visual programming tool.
TRUE (Chapter 6, Number 9)
72. A database management system often generates political resistance within an
TRUE (Chapter 7, Number 1) (2 persons incorrect)
73. Although sequential organization stores records in physical sequence,
records can be accessed in any order.
FALSE (Chapter 7, Number 2)(2 persons incorrect)
74. Normalization is a mathematical formula used to translate a recordís key field directly into the recordís physical storage location.
FALSE (Chapter 7, Number 3)(1 person incorrect)
75. In the traditional file environment, any change in data requires a change in
all programs that access the data.
TRUE (Chapter 7, Number 5)(2 persons incorrect)
76. The most prominent data manipulation language today is Ada.
FALSE (Chapter 7, Number 6)(1 person incorrect)
77. A distributed database is one that is stored in more than one location.
TRUE (Chapter 7, Number 10)
78. Telecommunications systems can transmit text, graphic images, voice, or video information.
TRUE (Chapter 8, Number 1)
79. Signals in a telecommunications system are represented as either analog or digital signals.
TRUE (Chapter 8, Number 2)
80. The peer-to-peer architecture is used primarily in small networks.
TRUE (Chapter 8, Number 6)
Analog signal (33)
Compiler (22)(1 person incorrect)
Data dictionary (7)(2 persons incorrect)
Descartes' rule of change (35)
Digital signal (39)
Electronic data interchange(8)
Ethical "no free lunch" rule (19)(1 persons incorrect)
Executive Support Systems (ESS) (17)(1 persons incorrect)
"Garbage can" model (13)(1 persons incorrect)
Microsecond (21)(1 persons incorrect)
Multitasking (23)(1 persons incorrect)
Organizational culture (27)
Trade secret (11)