MIS 305
Final Exam Review
1
Chapter 1 - Objectives • • • •
Why information systems are so essential in business today. Define an information system from both a technical and a business perspective. The complementary assets required for information technology to provide value to a business. Identify and describe contemporary approaches to the study of information systems and distinguish between computer literacy and information systems literacy.
Select One Data shaped into meaningful form are called 1. A databank 2. 3. Knowledge 4. Information
Select One Data shaped into meaningful form are called 1. A databank 2. 3. Knowledge 4. Information (page 14)
Select One Raw facts that have not been organized into a useful form are called 1. Information 2. Business objectives 3. Data 4. Information systems
Select One Raw facts that have not been organized into a useful form are called 1. Information 2. Business objectives 3. Data (page 14) 4. Information systems
Select One Which activity of an information system converts raw input into a meaningful form? 1. Input 2. Processing 3. Output 4.
Select One Which activity of an information system converts raw input into a meaningful form? 1. Input 2. Processing (page 15) 3. Output 4.
Sample Final Exam Questions • Provide an overview of the six business objectives of information systems. (page 8) • Information systems produce the information that organizations need to make decisions, control operations, analyze problems, and create new products or services. Identify and describe the three activities found in information systems. (page 15) • Explain the difference between computer literacy and information literacy. (page 16)
• Briefly describe how information systems influence organizations, people, and technology. (page 17)
Chapter 2 - Objectives • •
•
•
Business processes and their relationship to information systems. Information systems ing the major business functions: sales and marketing, manufacturing and production, finance and ing, and human resources. The role played by systems serving the various levels of management in a business and their relationship to each other. How enterprise applications and intranets promote business process integration and improve organizational performance.
Select One Logically related sets of activities that define how business tasks are performed are called? 1. Business functions 2. Business processes 3. Strategic choices 4. Business objectives
Select One Logically related sets of activities that define how business tasks are performed are called? 1. Business functions 2. Business processes (page 41) 3. Strategic choices 4. Business objectives
Select One These systems address non-routine decisions requiring judgment, evaluation, and insight because there is no agreedon procedure for arriving at a solution. 1. 2. 3. 4.
Enterprise system Supply chain management (SCM) system Executive systems Knowledge management system (KMS)
Select One These systems address non-routine decisions requiring judgment, evaluation, and insight because there is no agreedon procedure for arriving at a solution. 1. 2. 3. 4.
Enterprise system Supply chain management (SCM) system Executive systems (page 57) Knowledge management system (KMS)
Select One Systems that span all functional areas and focus on executing business processes across the firm are called 1. 2. 3. 4.
Business functional systems Enterprise applications Transaction processing systems Data management systems.
Select One Systems that span all functional areas and focus on executing business processes across the firm are called 1. 2. 3. 4.
Business functional systems Enterprise applications (page 59) Transaction processing systems Data management systems.
Select One Which type of system is most often used for analyzing data? 1. 2. 3. 4.
Transaction processing system Management information system Decision- system Executive system
Select One Which type of system is most often used for analyzing data? 1. 2. 3. 4.
Transaction processing system Management information system Decision- system (page 54) Executive system
Sample Final Exam Questions • What are "business processes"? What purposes do they serve in the firm? (page 42) • Explain the difference between a management information system and a decision- system as they relate to middle managers. (page 53) • Discuss the interrelationships among TPS, MIS, DSS, and ESS systems. (page 52-57) • What is the function of a CRM system? (page 64) • Businesses today are enabled by or based upon digital networks. What is meant by e-business and e-commerce? (page 67)
Chapter 3 - Objectives •
• •
Important features of organizations that managers need to know about in order to build and use information systems successfully. The impact of information systems on organizations. How information systems help businesses use synergies, core competencies, and networkbased strategies to achieve competitive advantage.
Select One Information technology plays a critical role in helping organizations: 1. Maintain the existing bureaucratic structure 2. Work with non-routine tasks 3. Develop better-educated employee groupings 4. Perceive environmental change.
Select One Information technology plays a critical role in helping organizations: 1. Maintain the existing bureaucratic structure 2. Work with non-routine tasks 3. Develop better-educated employee groupings 4. Perceive environmental change. (page 84)
Select One All organizations become very efficient over time because individuals in the firm develop: 1. 2. 3. 4.
Routines for producing goods and services Long lasting friendships within the firm Better-educated employee groupings Deep rooted cultures.
Select One All organizations become very efficient over time because individuals in the firm develop: 1. 2. 3. 4.
Routines for producing goods and services Long lasting friendships within the firm (page 86) Better-educated employee groupings Deep rooted cultures.
Select One Benchmarking involves: 1. Introducing new systems in stages either by functions or by organization 2. The collection of knowledge in an artificial intelligence system that is represented in the form of IF-THEN rules. 3. Setting strict standards for products, services, or activities and measuring organizational performance against those standards. 4. Selecting a hypothesis and seeking out more information until the hypothesis is either proved or disproved.
Select One Benchmarking involves: 1. Introducing new systems in stages either by functions or by organization 2. The collection of knowledge in an artificial intelligence system that is represented in the form of IF-THEN rules. 3. Setting strict standards for products, services, or activities and measuring organizational performance against those standards. (page 105) 4. Selecting a hypothesis and seeking out more information until the hypothesis is either proved or disproved.
Sample Final Exam Questions • What could for differences in the uses of information systems in different organizations? (page 83) • Discuss the concept of the reciprocal relationship that organizations have with their environments. (page 84) • According to Mintzberg's classification, list five basic kinds of organizational structures, and give an example of each. (page 89)
Chapter 4 - Objectives •
•
•
The relationships among ethical, social, and political issues that are raised by information systems. The main moral dimensions of an information society and specific principles for conduct that can be used to guide ethical decisions. The impact of contemporary information systems and the Internet on the protection of individual privacy and intellectual property.
Select One The principles and standards that guide our behavior toward other people are called
1.Ethics 2.Intellectual property 3.Copyright 4.Fair Use Doctrine
Select One The principles and standards that guide our behavior toward other people are called
1.Ethics (page 84) 2.Intellectual property 3.Copyright 4.Fair Use Doctrine
Select One What records information about you during a Web surfing sessions such as what Web sites you visited, how long you were there, what ads you looked at, and what you purchased? 1. 2. 3. 4.
Cookie Web bug Spyware profiler
Select One What records information about you during a Web surfing sessions such as what Web sites you visited, how long you were there, what ads you looked at, and what you purchased? 1. 2. 3. 4.
Cookie (page 142) Web bug Spyware profiler
Select One The current intellectual property laws: 1. Are breaking down in the information age. 2. Are sufficient in most countries. 3. Do not apply to digital materials. 4. Apply only to new digital materials.
Select One The current intellectual property laws: 1. Are breaking down in the information age. (page 145) 2. Are sufficient in most countries. 3. Do not apply to digital materials. 4. Apply only to new digital materials.
Select One Illegal acts through the use of the computer or against the computer system is called: 1. 2. 3. 4.
Hacking. Computer abuse. Computer crime. Spamming.
Select One Illegal acts through the use of the computer or against the computer system is called: 1. 2. 3. 4.
Hacking. Computer abuse. Computer crime. (page 152) Spamming.
Sample Final Exam Questions • What are Fair Information Practices? (page 140) • What is the major issue of privacy involved in using cookies? (page 144) • Define and distinguish between the intellectual property, trade secret, copyright, and patent. What is the basic premise behind them all? (page 145 – 146) • How does the rise of computer use in business threaten employment? (page 155)
Chapter 5 Chapter 5 is not on the final exam.
Chapter 6 - Objectives • • • •
Basic file organization concepts and the problems of managing data resources in a traditional file environment. The principles of a database management system and the features of a relational database. Important database design principles. Tools and technologies for providing information from databases to improve business performance and decision making.
Select One In a database, the smallest unit of data a computer can handle is a: 1. 2. 3. 4.
Record Bit Byte Field
Select One In a database, the smallest unit of data a computer can handle is a: 1. 2. 3. 4.
Record Bit (page 226) Byte Field
Select One Data redundancy occurs when: 1. Multiple reports are accessed simultaneously. 2. The programs that access the data are changed. 3. Different s enter information. 4. Fields in many different files contain the same information.
Select One Data redundancy occurs when: 1. Multiple reports are accessed simultaneously. 2. The programs that access the data are changed. 3. Different s enter information. 4. Fields in many different files contain the same information. (page 228)
Select One The data dictionary is the automated or manual file that: 1. Stores information about data elements and data characteristics. 2. Allows the creation of supplementary reports. 3. Presents the data as they would be perceived by end s. 4. Is used in conjunction with conventional thirdor fourth-generation programming languages.
Select One The data dictionary is the automated or manual file that: 1. Stores information about data elements and data characteristics. (page 234) 2. Allows the creation of supplementary reports. 3. Presents the data as they would be perceived by end s. 4. Is used in conjunction with conventional thirdor fourth-generation programming languages.
Select One This database model uses a series of logically related two-dimensional tables or files to store information: 1. 2. 3. 4.
Relational database Hierarchical database Network database Object-oriented database
Select One This database model uses a series of logically related two-dimensional tables or files to store information: 1. 2. 3. 4.
Relational database (page 230) Hierarchical database Network database Object-oriented database
Select One An entity-relationship diagram is a graphic method of presenting 1. 2. 3. 4.
Entire files and their relationships Entire records and their relationships Entities, relationships and attributes Entity classes and their rules.
Select One An entity-relationship diagram is a graphic method of presenting 1. Entire files and their relationships 2. Entire records and their relationships 3. Entities, relationships and attributes (page 236) 4. Entity classes and their rules.
Sample Final Exam Questions • What are some problems with the traditional file environment? (page 227) • Define and distinguish between the data hierarchy, data redundancy, and data istration. (Pages: 226, 228, 247) • What does a large distributed database present in of security problems? (Pages 237 -238) • List the four types of contemporary DBMS and describe a distinguishing characteristic of each one. (page 230 – 233) • What is the connection between data warehousing and data-mining? (page 239 – 242)
Chapter 7 - Objectives • •
• •
The features of telecommunications networks and key networking technologies. Alternative transmission media, types of networks, and network services. How the Internet and Internet technology work and how they communication and ebusiness. The principal technologies and standards for wireless networking, communication, and Internet access.
Select One This device is responsible for routing and managing communication on the network and coordinates network resources. 1. 2. 3. 4.
Network interface card Hub Network operating system Router
Select One This device is responsible for routing and managing communication on the network and coordinates network resources. 1. 2. 3. 4.
Network interface card Hub Network operating system (page 265) Router
Select One The formal set of rules that govern the way in which computers communicate are called 1. 2. 3. 4.
Protocols Algorithms Standards Procedures
Select One The formal set of rules that govern the way in which computers communicate are called 1. 2. 3. 4.
Protocols (page 268) Algorithms Standards Procedures
Select One A network that covers a large geographic area is most commonly referred to as a(n) 1. 2. 3. 4.
Wide area network Local area network Intranet Internetwork
Select One A network that covers a large geographic area is most commonly referred to as a(n) 1. 2. 3. 4.
Wide area network (page 272) Local area network Intranet Internetwork
Select One A star network: 1. 2.
3.
4.
Is a central switching system that handles a firm's voice and digital communications. Links all computers in a closed loop in a manner that es data in one direction from one computer to another. Links all computers and other devices to a central host computer, through which all communications must . Connects computers and peripheral devices located close to each other, often in the same building.
Select One A star network: 1. 2.
3.
4.
Is a central switching system that handles a firm's voice and digital communications. Links all computers in a closed loop in a manner that es data in one direction from one computer to another. Links all computers and other devices to a central host computer, through which all communications must . (page 272) Connects computers and peripheral devices located close to each other, often in the same building.
Sample Final Exam Questions • Define and distinguish among the following : analog signal, digital signal, and modem. (page 269) • Describe the three most common network topologies. (page 271) • How do ISDN and DSL differ? (page 275) • Describe what is meant by chat, instant messaging, and Usenet. (Page 287) • Give three examples of how businesses can use wireless technology. (page 291)
Chapter 8 - Objectives • • • •
Why information systems need special protection from destruction, error, and abuse. The business value of security and control. An organizational framework for security and control. The most important tools and technologies for safeguarding information resources.
Select One Common threats against information systems come from all of the following factors except 1. 2. 3. 4.
Technical Organizational Governmental Environmental.
Select One Common threats against information systems come from all of the following factors except 1. 2. 3. 4.
Technical Organizational Governmental (page3 316) Environmental.
Select One The single greatest cause of network security breaches is 1. 2. 3. 4.
Poor system patch management Pharming s' lack of knowledge Absence of security programs.
Select One The single greatest cause of network security breaches is 1. 2. 3. 4.
Poor system patch management Pharming s' lack of knowledge (page 327) Absence of security programs.
Select One Malware includes all of the following except 1. 2. 3. 4.
Worms Trojan horses Viruses Spoofing.
Select One Malware includes all of the following except 1. 2. 3. 4.
Worms Trojan horses Viruses Spoofing (page 319)
Sample Final Exam Questions • Discuss why information systems and networks are vulnerable to security threats. (page 316 – 319) • Discuss the system security threats employees pose. (page 327) • Describe what a risk assessment is and why it's necessary. (page 330) • Describe policies a firm should develop to help protect its information assets. (page 331 - 332) • Describe three new authentication technologies for information systems and the necessity for them. (page 336)
Chapter 9 Chapter 9 is not on the final exam.
Chapter 10 - Objectives • •
• •
The unique features of e-commerce, digital markets, and digital goods. How Internet technology has changed value propositions and business models. The various types of e-commerce and how ecommerce has changed consumer retailing and business-to-business transactions. The role of m-commerce in business and describe the most important m-commerce applications.
Select One Removing the middleman and selling directly to a consumer in a digital marketplace is called 1. 2. 3. 4.
Ubiquity Disintermediation Reintermediation Marketspace
Select One Removing the middleman and selling directly to a consumer in a digital marketplace is called 1. 2. 3. 4.
Ubiquity Disintermediation (page 397) Reintermediation Marketspace
Select One Currently, the fastest-growing type of business-to-business e-commerce is: 1. 2. 3. 4.
Electronic data interchanges Net marketplaces Private exchanges Peer-to-peer networks.
Select One Currently, the fastest-growing type of business-to-business e-commerce is: 1. 2. 3. 4.
Electronic data interchanges Net marketplaces Private exchanges (page 411) Peer-to-peer networks.
Sample Final Exam Questions • What are some unique features of ecommerce technology? (page 394) • Explain how the Internet reduces information asymmetry. (page 396) • Discuss the impact of the Internet on markets for digital goods. (page 398) • Discuss how mobile commerce services and applications can extend a business's outreach to customers. (page 413)
Chapter 11 - Objectives • • •
•
The role of knowledge management and knowledge management programs in business. The types of systems used for enterprise-wide knowledge management and demonstrate how they provide value for organizations. The major types of knowledge work systems and how they provide value for firms. The business benefits of using intelligent techniques for knowledge management.
Sample Final Exam Questions • Why can't everything be reduced to an expert system? (page 437 – 438) • Describe the two strategies normally used for an inference engine. (452) • What is an example of a knowledge work system? (page 449 - 451) • What is the difference between an expert system and a neural network? (page 452 – 457) • List at least three examples of the use of intelligent agents today. (page 460)
Chapter 12 - Objectives • • • • •
Different types of decisions and the decision-making process. How information systems the activities of managers and management decision making. How decision- systems (DSS) differ from MIS and how they provide value to the business. How executive systems (ESS) help senior managers make better decisions. The role of information systems in helping people working in a group make decisions more efficiently.
Sample Final Exam Questions • Outline three main reasons why investments in information technology do not always produce positive results. (page 478) • Compare and contrast the different capabilities of DSS and MIS systems. If you had to do without one of them, which would it be? Why? (page 480) • How is data visualization used in GIS? (page 490) • Discuss how executive systems help senior managers make better decisions. (page 494) • What are the advantages and disadvantages of the use of a GDSS for group decision making? (page 498)
Chapter 13 - Objectives • •
• •
•
How building new systems produces organizational change. The core activities in the systems development process. Alternative methods for building information systems. Alternative methodologies for modeling systems. New approaches for system-building in the digital firm era.
Sample Final Exam Questions • What is business process reengineering? (page 515 – 517) • What is workflow management and what are its benefits? (Page 516) • Describe systems development, system analysis, and system design. Identify core activities in the systems development process. ( Page 524) • What are the advantages and disadvantages of each of the four processes by which conversion to a new system may be accomplished? (page 527)
Chapter 14 - Objectives • •
• • •
The objectives of project management and why it is so essential in developing information systems. Models for selecting and evaluating information systems projects and methods for aligning IS projects with the firm’s business goals. Models for assessing the business value of information systems. The principal risk factors in information systems projects. Appropriate strategies for managing project risk and system implementation.
Select One This project management objective considers the accuracy and timeliness of information produced by the new system and ease of use. 1. Time 2. Cost 3. Quality 4. Risk
Select One This project management objective considers the accuracy and timeliness of information produced by the new system and ease of use. 1. Time 2. Cost 3. Quality (page 557) 4. Risk
Select One Information systems are considered: 1. Short-term capital investment projects. 2. As a measure of cash flow. 3. Long-term capital investment projects. 4. A means for lowering enterprise costs.
Select One Information systems are considered: 1. Short-term capital investment projects. 2. As a measure of cash flow. 3. Long-term capital investment projects. (page 565) 4. A means for lowering enterprise costs.
Select One Communications problems between end s and designers are one reason why: 1. s are driven out of the implementation process. 2. So much training is required. 3. The implementation process requires written procedures. 4. Cost overruns are so large.
Select One Communications problems between end s and designers are one reason why: 1. s are driven out of the implementation process. (page 573) 2. So much training is required. 3. The implementation process requires written procedures. 4. Cost overruns are so large.
Select One This chart shows each project task as a horizontal bar whose length is proportional to the time required to complete it. 1. 2. 3. 4.
Gantt Chart. Pert Chart. Optimization Chart. Flow Chart.
Select One This chart shows each project task as a horizontal bar whose length is proportional to the time required to complete it. 1. 2. 3. 4.
Gantt Chart. (page 575) Pert Chart. Optimization Chart. Flow Chart.
Sample Final Exam Questions • There are four pitfalls to avoid in the management of the systems development project. What are they? Which of the four do you think occurs most often? Why? (page 556) • Identify and describe the objectives of project management. As well, list and describe five major variables that project management must deal with. (page 557) • What are GANTT and PERT charts used for? What information do these charts show? (Page 578 – 579) • List and describe the three factors influencing the level of project risk. (page 572)
Chapter 15 Chapter 15 is not on the final exam.
Final Exam Details • All questions will be short essay type similar to the sample questions. • This is a closed book, closed notes exam. • You can take the entire class time to complete it. • No exam book required.