CSIS 100 Midterm Exam / 100% correct

profileindigo11
 (Not rated)
 (Not rated)
Chat

IMPORTANT: AFTER PURCHASE, LOG IN TO YOUR ACCOUNT AND SCROLL DOWN BELOW THIS PAGE TO DOWNLOAD FILES WITH ANSWERS.

  1. Important functions of the chief information officer include
  2. One of the primary advantages of a relational database is that it allows tables to be linked to reduce data redundancy and allow data to be organized more logically.
  3. According to Lewin and Schein's 3-stage model of organizational change, which of the following tasks would be found in the 'unfreezing' stage?
  4. The need for additional data storage capacity is one of the factors driving the growth in data centers.
  5. Suppose you wish to run two different operating systems on one computer, you can accomplish it by using _______.
  6. An operating system with _____ capabilities allows a user to run more than one program concurrently.
  7. A _____ is a simple database program whose records have no relationship to one another.
  8. To develop software you need all these except  ​________.
  9. Providing value to a _____ is the primary goal of any organization. 
  10. _____ is the term used to describe enormous and complex data collections that traditional data management software, hardware, and analysis processes are incapable of handling.
  11. ​Which of the following is NOT a task typically associated with the systems analyst role?
  12. On a modern home computer, one can set up accounts for many users and be able to control what resources a user may access. 
  13. A(n) _____ is a field or set of fields in a record that uniquely identifies the record.
  14. If "color" is an attribute, then "green" is a data item.
  15. Data modeling usually involves setting a specific business goal and then analyzing the data and information needed to reach that goal.​
  16. Businesses and organizations that manage a local area network (LAN) connect to the Internet via a Web browser.
  17. The area covered by one or more interconnected wireless access points is commonly called a(n) _____.
  18. There are Web-based productivity software suites that require no installation on the computer.
  19. Most operating systems support virtual memory which allocates space on the hard disk to supplement the immediate, functional memory capacity of RAM.
  20. The role of a systems analyst is narrowly defined and seldom involves communications with others.
  21. While information systems were once primarily used to automate manual processes, they have transformed the nature of work and the shape of organizations themselves.
  22. Solid state storage devices (SSDs) store data in hard disk drives or optical media rather than memory chips.
  23. You cannot boot a computer from ____________.
  24. At Coast-to-Coast Moving and Van Lines, Ryan is responsible for managing the flow of the company's data, from initial acquisition of new data to deletion of old, outdated data. Ryan is involved in ___________.
  25. All of the following are potential drawbacks to outsourcing EXCEPT:
  26. A command-based user interface employs icons and menus that people use to send commands to the computer system.
  27. The _____ is the heart of the operating system and controls its most critical processes.
  28. Which of the following is a markup language for defining the visual design of a Web page or group of pages?
  29. ​In most large organizations, the IS department is divided into the following functions __________.
  30. Like other programs, Java software can run only on specific types of computers.
  31. New cars come with an onboard computer that controls anti-lock brakes, air bag deployment, fuel injection, etc.  The software is known as ____.
  32. Suppose a business wishes to move away from hosting its own applications, the recommended solution is to use ______.
  33. _____ is an approach that starts by investigating the general data and information needs of an organization at the strategic level and then examines more specific data and information needs for the functional areas and departments within the organization.
  34. Disk mirroring is a method of storing data that generates extra bits of data from existing data, allowing the system to create a "reconstruction map" so that if a hard drive fails, it can rebuild lost data.
  35. The diffusion of innovation theory can be useful in planning the rollout of a new information system.  ​
  36. 3D printing is ________.
  37. A software suite is a collection of programs packaged together as a bundle and typically includes a word processor, spreadsheet program, graphics program, and more.
  38. One of the advantages of off-the-shelf software is that ________________.
  39. Over time, disruptive innovation tends to become less attractive to users in a new market.
  40. Haley's employer has asked her to review tens of thousands of social media posts about their company's products and compile this data into a database.​ In terms of the characteristics of big data, Haley is dealing with ________.
  41. ​According to the diffusion innovation theory, _____ are the risk takers, always the first to try new products and ideas.
  42. Reengineering and continuous improvement have the same definition.
  43. Your friend has a Mac that runs OS X.  If she needs to run a Windows app on it, she can set it to run Windows also.
  44. The Internet Corporation for Assigned Names and Numbers (ICANN) uses companies called _____ to handle the business of registering domain names.
  45. ​In a large IS organization, the professional who is responsible for maintaining the security and integrity of the organization's systems and data is__________.
  46. _____ consists of server and client software, the Hypertext Transfer Protocol (HTTP), standards, and markup languages that combine to deliver information and services over the Internet.
  47. A liquid crystal display (LCD) functions by exciting organic compounds with electric current to produce bright and sharp images. 
  48. Software as a Service (SaaS) refers to the use of computing resources, including software and data storage, on the Internet rather than local computers.
  49. In a Hypertext Markup Language (HTML), the markers are codes that tell the browser how to format the text or graphics that will be displayed.
  50. A type of memory whose contents are not lost if the power is turned off or interrupted is said to be _____.
  51. It is possible to restrict access to data depending on the database user's privileges.
  52. Two sets of fields can have a common primary key.
  53. A _____ satellite system employs many satellites that are spaced so that, from any point on the Earth at any time, at least one satellite is on a line of sight, each in an orbit at an altitude of less than 1,000 miles.
  54. When making hardware decisions, the overriding considerations of a business should be technology cost and currency.
  55. There is no way a manufacturing firm would implement an Internet of Things because the risk of hacking is far too high.
    • 4 years ago
    CSIS 100 Midterm Exam / 100% correct
    NOT RATED

    Purchase the answer to view it

    blurred-text
    • attachment
      CSIS100MidtermExam.docx.docx