MIS Midterm Exam 1

8
En. Atallah Alenazi The use of information systems because of necessity is a. survival b. improved business practices c. competitive advantage d. improved flexibility What term is used to refer to all of the computer-based information systems used by organizations and their underlying technologies? a. Network technology b. Digital technology c. Information technology d. Productivity technology A sales and marketing information system aids middle management employees in: a. tracking sales. b. planning new products and services. c. analyzing sales performance. d. preparing sales forecasts. Ahmed Al-Suwaidi 1) The six important business objectives of information technology are: new products, services, and business models; customer and supplier intimacy; improved decision-making; competitive advantage; operational excellence, and: A) Flexibility. B) Survival. C) Improved business practices. D) Improved efficiency. 2) The value chain model: A) Categorizes five related advantages for adding value to a firm's products or services. B) Sees the supply chain as the primary activity for adding value.

description

MIS Midterm Exam 1

Transcript of MIS Midterm Exam 1

Page 1: MIS Midterm Exam 1

En. Atallah Alenazi

The use of information systems because of necessity isa. survivalb. improved business practicesc. competitive advantaged. improved flexibility What term is used to refer to all of the computer-based information systems used by organizations and their underlying technologies?a. Network technologyb. Digital technologyc. Information technologyd. Productivity technology A sales and marketing information system aids middle management employees in:a. tracking sales.b. planning new products and services.c. analyzing sales performance.d. preparing sales forecasts.

Ahmed Al-Suwaidi

1) The six important business objectives of information technology are: new products, services, and business models; customer and supplier intimacy; improved decision-making; competitive advantage; operational excellence, and: A) Flexibility.B) Survival.C) Improved business practices.D) Improved efficiency. 2) The value chain model:A) Categorizes five related advantages for adding value to a firm's products or services.B) Sees the supply chain as the primary activity for adding value.C) Categorizes four basic strategies a firm can use to enhance its value chain.D) Helps a firm identify points at which information technology can most effectively to enhance its competitive position True or False Q 3) Studies show that about half of a business firm's profits can be explained by alignment of IT with businessTRUE

Page 2: MIS Midterm Exam 1

Ahmad AlAkhdhari

List two different types of information systems used and the levels of management in a business they are used for?

The types of information systems used for different levels of management are:

Transaction processing systems (TPS)Serve operational managersPrincipal purpose is to answer routine questions and to track the flow of transactions through the organization.

Management information systems (MIS)Serve middle managersSummarize and report on basic operations using data from TPS.

Decision-support systems (DSS)Also serve middle managersSupport middle management decisions when these decisions are unique, rapidly changing, and not specified easily in advance.

Executive support systems (ESS)Serve senior managersAddress strategic issues and long-term trends.

الحارثي رده محمد

Decision-support systems are also referred to as:A) Business information systems.B) Business intelligence systems.C) Executive support systems.D) Business model systems. Which of the following types of system could be used to enable different firms to work collaboratively on a product?A) IntranetB) ExtranetC) KMSD) CRM

Page 3: MIS Midterm Exam 1

Which of the following is not one of the competitive forces of Porter's model?A) SuppliersB) External environmentC) Other competitorsD) Customers.

husam ambon

1- Critical thinking is the sustained suspension of judgment with an awarness of multiple alternatives. (True).

2- Using internet technology to deliver information and services to citizens, employees and business is known as E-Government.(True).

3- Information Technology is the interrelated components that manage information.(False).

hashim almaimani

Fill in the blank with the correct word.

Viruses Worms Trojan horses

Spyware Key loggers

External Level

Conceptual Level

Internal Level

Securing Information Systems

VirusesRogue software program that attaches itself to other software programs or data files in order to be executed

Worms Independent computer programs that copy themselves from one computer to other computers over a network.

Trojan horses

Software program that appears to be benign but then does something other than expected.

SpywareSmall programs install themselves surreptitiously on computers to monitor user Web surfing activity and serve up advertising

Key loggersRecord every keystroke on computer to steal serial numbers, passwords, launch Internet attacks

Page 4: MIS Midterm Exam 1

Database and Information Systems

External Level Users' view of the database.Conceptual Level Community view of the databaseInternal Level Physical representation of the database on the computer

Atef Alharbi

1. In a relational database, a record is called a(n): (a)a. tuple.b. row.c. entity.d. field.

2. In the information age, the obligations that individuals and organizations haveconcerning rights to intellectual property fall within the moral dimension of: (a)a. property rights and obligations.b. system quality.c. accountability and control.d. information rights and obligations.

Sulaiman A. Al-Fayedi

1) ________ refers to policies, procedures, and technical measures used to prevent unauthorized access, alternation, theft, or physical damage to information systems. A) "Security"B) "Controls"C) "Benchmarking"D) "Algorithms"Answer: A

2 ) A network that covers entire geographical regions is most commonly referred to as a(n): A) local area network.B) intranet.C) peer-to-peer network.D) wide area network.Answer: D

3) Why should a company engage in business process reengineering?Answer: A company should engage in BPR in order to enhance profits or sales through using information systems.

SAMER BAJUNAID

Page 5: MIS Midterm Exam 1

1. Choice is among the four-step process of the problem solving model, the followings are factors considered during the choice process EXCEPT:A) CostB) Length of time needed to implement solutionC) Simplicity of the solutionD) Feasibility given resource and skills

2. " Additional hardware costs" is one of the constraints of data base management system?True

3. Which of the following are the moral dimensions of information age?A) Information rights and obligationsB) Property rights and obligationsC) SecurityD) A & B

Ali Jelan

What is the first step you should take in managing data for a firmA) Identify the data needed to run the businessB) Cleanse the data before importing it to any databaseC) Normalize the data before importing to a databaseD) Audit your data quality.

European privacy protection is ________ than in the United States A) Much more stringentB) Much less stringentC) Less liable to lawsD) Less far-reaching The value chain model classifies all company activities as either primary or supportAnswer: TRUE

Transaction processing systems are most commonly encountered at the senior management level of an organizationA nswer: FALSE

Mohammed Al saeidi

1) A one-to-one relationship between two entities is symbolized in a diagram by a line that ends:A) in two short marks.B) in one short mark.C) with a crow’s foot.

Page 6: MIS Midterm Exam 1

D) with a crow’s foot topped by a short mark.Answer: A

2) ________ refers to policies, procedures, and technical measures used to prevent unauthorized access, alternation, theft, or physical damage to information systems. A) "Security"B) "Controls"C) "Benchmarking"D) "Algorithms"Answer: A

3) Software that organizes, manages, and processes business data, such as data concerned with inventory, customers, and vendors, is called:A) System software.B) Application software.C) Data management software.D) Network software.Answer: C 4) Which of the following is not a type of output device?A) SpeakersB) Cathode ray tubeC) Ink jet printerD) KeyboardAnswer: D

5) Software used to apply the computer to a specific task for an end user is called:A) System software.B) Application software.C) Data management software.D) Network software.Answer: B

6) The three principal levels of hierarchies within a business organization are:A) Management, knowledge workers, and service workers.B) Senior management, middle management, and operational management.C) Management, data workers, and operational management.D) Senior management, operational management, and workers.Answer: B

mohammad Al-Garni

1. ………… give us Programs, Tools and Gadgets.a) IT information technology.b) IS information system.c) Both of IT and IS.

Page 7: MIS Midterm Exam 1

d) Non of them.

2. ………… give us Management of Businesses, Organizations and Society.a) IS information system.b) IT information technology.c) Both of IT and IS.d) Non of them.

3. ………… is the hardware and software business uses to achieve objectives.a) The information technology.b) The information system.c) The intranets.d) The extranets.