Fill This Form To Receive Instant Help

Help in Homework
trustpilot ratings
google ratings


Homework answers / question archive / Shanghai University - MANAGEMENT 6 INFO 530 Exam 1 (Midterm)   Directions: Write your answers to the exam on the answer sheet that was provided with the exam

Shanghai University - MANAGEMENT 6 INFO 530 Exam 1 (Midterm)   Directions: Write your answers to the exam on the answer sheet that was provided with the exam

Business

Shanghai University - MANAGEMENT 6

INFO 530 Exam 1 (Midterm)

 

Directions: Write your answers to the exam on the answer sheet that was provided with the exam.  Identify the letter of the choice that best completes the statement or answers the question, or write True / False where appropriate. When completed please send the answer sheet by the due date and time to the email address provided in the Exam 1 Information.

 

MULTIPLE CHOICE.  Please choose the one alternative that best completes the statement or answers the question.  Each question is worth 1 point. 

 

  1. The value of information is directly linked to how it helps decision makers achieve their organization’s _____.

 

a. profits

c. cost reduction initiatives

b. goals

d. quality improvement measures

 

 

  1. In information systems, _____ is used to make changes to input or processing activities.

 

a. forecasting

c. output

b. feedback

d. processing

 

 

  1. _____ consists of computer equipment used to perform input, processing, and output activities.

 

a. Information technology

c. Telecommunications

b. Technology infrastructure

d. Hardware

 

 

  1. _____ consists of computer programs that govern the operation of the computer.

 

a. Hardware

c. Applications

b. Software

d. Telecommunications

 

 

  1. _____ is (are) considered to be the most important element in a computer-based information system.

 

a. Hardware

c. Procedures

b. Software

d. People

 

 

 

  1. People using commercially available software are usually asked to read and agree to a(n) _____

 

    1. copyright agreement          c. end-user license agreement
    2. privacy statement   d. purchase order

 

 

  1. One advantage of proprietary software versus off-the-shelf software is that _____

 

    1. being involved in the development             c. the software is likely to meet the offers control over the results         basic business needs that are common across organizations
    2. the initial cost is lower         d. the software is likely to be of high quality because many customer firms have tested the software and helped identify its bugs

 

 

  1. The DBMS organizes the data independently of the application program, so the application is not affected by the location or type of data.  This is an example of _____.

 

    1. improved data integrity       c. data and program independence
    2. shared data and information           d. better overall protection of the data resources

 

 

  1. As long as the tables in a relational database share one common _____, the tables can be linked to provide useful information and reports.

 

    1. primary key            c. characteristic
    2. file   d. attribute

 

 

  1. The _____ is a description that involves “telling” the DBMS the logical and physical structure of the data and the relationships among the data for each user.

 

    1. entity relationship diagram c. data model
    2. schema       d. data manipulation language

 

 

  1. _____ is a standardized data manipulation language developed in the 1970s that allows programmers to use one powerful language and use it on a variety of systems.

 

    1. Query by example c. DML
    2. Access        d. SQL

 

 

  1. Someone responsible for planning, designing, creating, operating, securing, monitoring, and maintaining databases is called a(n) _____

 

    1. data administrator   c. data owner
    2. data analyst            d. database administrator

 

 

  1. The _____ is a device that converts a signal from binary or analog form into a signal of another form.

 

    1. transmission media             c. multiplexer
    2. modem       d. switch

 

 

  1. The area covered by one or more interconnected wireless access points is commonly called a(n) _____.

 

    1. reception area         c. coverage zone
    2. hot spot       d. access area

 

 

  1. _____ is a wireless telecommunications technology brand owned by an alliance of 300 technology companies that is popping up at airports, coffee shops, college campuses, libraries, and restaurant.

 

    1. Wi-MAX      c. Sci-FI
    2. Wi-FI           d. UWB

 

 

  1. _____ is a network protocol that enables traffic to be routed among all the networks connected to the Internet.

 

a. ISO seven layer model

c. IP

b. TCP

d. Wi-Fi

 

 

  1. Data is broken into _____ to be transmitted over the Internet

 

a. bits

c. bytes

b. messages

d. packets

 

  1. Conversion to an e-commerce or m-commerce system enables an organization to _____.

 

    1. more easily implement ERP systems c. increase the prices of its goods and services
    2. increase the accuracy of order      d. all of the above processing and order fulfillment

 

 

  1. Authentication technologies are used by many organizations to _____.

 

    1. verify the accuracy of their product           c. confirm the URL of their suppliers’ descriptions and prices          Web sites
    2. verify the ship to address of their   d. confirm the identity of the user

online customers         requesting access to information or

assets

 

 

  1. The first stage in the problem solving process during which one identifies and defines potential problems or opportunities is the _____ stage.

 

    1. design         c. intelligence
    2. choice         d. monitoring

 

 

  1. During the _____ stage of the problem solving process, you develop alternative solutions to the problem and evaluate their feasibility.

 

    1. intelligence c. choice
    2. implementation       d. design

 

 

  1. The ability to _____ is a characteristic of a MIS system.

 

    1. provide reports with fixed and        c. use internal data stored in the standard formats    computer system
    2. allow users to develop custom       d. all of the above reports

 

 

  1. The focus of a DSS is on decision-making _____ when faced with unstructured or semi-structured business problems.

 

    1. accuracy     c. effectiveness
    2. efficiency    d. timeliness

 

 

  1. One characteristic of a structured problem is that _____.

 

    1. it is straightforward, requiring known          c. the data might be difficult to facts and relationships         manipulate or obtain
    2. the relationships among the pieces of d. the decision maker might not know data are not always clear            the information requirements of the decision in advance

 

  1. The ____ stores all relevant information, data, rules, cases, and relationships that the expert system uses.

 

    1. data warehouse      c. inference engine
    2. inference engine     d. knowledge base

 

 

  1. In an expert system, the ____ is the component that delivers the expert advice.

 

    1. explanation facility c. user interface
    2. knowledge acquisition facility         d. inference engine

 

 

  1. The ____ allows the expert system user to understand how the system arrived at its results.

 

    1. inference engine     c. knowledge base
    2. explanation facility d. knowledge acquisition facility

 

 

  1. ____ has the potential to superimpose digital data over real photos so that GPS maps can be combined with real pictures of stores and streets to help you locate your position.

 

    1. Immersive virtual reality     c. Telepresence
    2. Augmented reality d. Location reality

 

 

  1. Most companies have implemented stringent policies on the acquisition of computer systems and equipment requiring

 

    1. a formal justification statement before c. use of preferred vendors for all computer equipment is purchased   acquisitions
    2. definition of standard computing    d. all of the above platforms

 

 

pur-new-sol

Purchase A New Answer

Custom new solution created by our subject matter experts

GET A QUOTE

Answer Preview

1)

Answer: b . goals

Information is a collection of facts and figures that are organized and processed such that they have added value to the raw facts. It allows the decision maker of an organization to achieve their goal.

2)

Answer: b . feedback

  • Feedback is referred to as an event that occurs when the result of a system is utilized as the input back into the system as a component of a chain of cause and effect.
  • This tends to alter the variables in the system, therefore resulting in different output and hence different feedback.

3)

Answer: d . Hardware

The hardware refers to any physical part of the computer system which consists of a circuit board or other electronics. There are some input and output devices that perform input and output operations.

4)

Answer: b . Software

  • A software consists a collection of programs which gives instructions to the computer about how to conduct the operations.
  • A software is classified into 2 categories- 1.System software 2. Application software
  • A system software controls the internal functioning of a computer

5)

Answer: d . People

People are the important element that is required to operate the computer based information system. They can create the computer software, use it and choose how it can be applied. The computer systems would not be able to run without the people.

9)

Answer: c . end-user license agreement

10)

Answer: a .

  • Proprietary software is software that is owned by an individual or a company, usually the one that develops it.
  • There are almost always great restrictions on its use, and its source code is kept secret and no access is given to the end users.

11)

Answer: c .

Data independence allows the same data to be used at multiple places. It is the best

approach for keeping data hidden in a program.

 

This is of two types: Logical data

12)

Answer: d . attribute

Primary key is the attribute of any table to uniquely identified the data from table. In a relational database primary key is used to mapping. On the first table it is known as primary key but on the other table it is known as foreign key.

14)

Answer: d .

SQL also know as structured query language is developed for managing the data,

specially in the relational database (RDBMS).

It consist of simple English commands to manipulate the data such as drop and alter

15)

Answer: d .

Database administrator

  • It is also called a DBA whose job is to store and manage data in the database.
  • A DBA has to perform implementation, design, and maintenance of the database

16)

Answer: b .

Modem

  • It is a network hardware device that modulates one or more carrier wave signals to produce a signal that can be transmitted easily and decoded to reproduce the original digital data.

17)

Answer: b .

A hotspot is defined as a zone that provides internet or VPN access using a wireless node. Suppose, if someone wants to have internet access in an isolated location and has a laptop then he/she can get connected to the internet by using the local hotspot.

18)

Answer: b .

Wifi is defined as a technology that provides access to the internet with the help of the radio waves. Also, there is a brand by the name 'wifi' that uses a logo on the products to indicate its approval to the product's security, interoperability etcetera.

19)

Answer: c .

Internet Protocol can be described as a protocol that allows transfer of packets from one network to another. The address of the source and the destination of the data packet that needs to be transferred is written on the header of the packet which is encapsulated by the internet protocol.

20)

Answer: d . packets

Description:

  • It is a collection of the data which can be used for a communication.
  • Each packet contains a part of the user message while travelling.
  • They provide the efficiency in the data transmission.

21)

Answer: b .

Performing business projects electronically over a computer is the new technology which helped in maximizing the accuracy of order processing in bulk. This process includes batch creation, then credit/debit card payment, shipping label creation and printing order.

22)

Answer: d .

Authentication is the method of recognizing the identity of the user by comparing its credential with the credentials in the authorized user database. Access to the secure information is granted if the credentials match with the credential in the database.

23)

Answer: c .

Intelligence stage is the first stage where all the problems are first recognized and described. This stage is followed by the design stage and choice stage where the solutions of these problems are found and a particular action is taken.

24)

Answer: d .

In decision making of problem-solving process, first is intelligence stage in which we recognized the possible problem and its opportunity. Then in design stage, we produce alternative solutions and find how they can be achieved. And then comes the choice stage where we choose an action.

25)

Answer: d .

MIS

  • It stands for management information system that is used for making a report in a well format.
  • It helps in making decisions in an organization.

26)

Answer: c .

  • DSS helps business in decision-making models. DSS supports operation, management and many more which help people to take decision quickly and accurately.
  • Unstructured or the semi-structured business problems can be solved by DSS using effective resources and

27)

Answer: c .

In the structure problem the goal is clearly defined. Hence some time it will create a problem to manipulate as well as obtained the data.

28)

nswer: d .

Knowledge base

  • It is used by a knowledge based system for solving complex problems.
  • It is one of the primary parts of an expert system.

29)

nswer: d .

Knowledge base

  • It is used by a knowledge based system for solving complex problems.
  • It is one of the primary parts of an expert system.

30)

Answer: b .

All of the options given above, are part of a knowledge based expert system. Among these components, explanation facility, which is a subsystem, explains the steps which were taken to reach the result.

31)

Answer: b .

Augmented reality is the interaction between real-world environment and computer-induced information. Primarily it combines a person's perception of the real world with the digital world. In GPS, it adds different spots on our smartphone's screen.

32)

Answer: d .

According to NITA-U (national information and technology authority -uganda) the company should see following thing before buying computer products for the organization.

  • should made a proper analysis and verification about the product .