Preview

Management Information System Book Self

Powerful Essays
Open Document
Open Document
6482 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Management Information System Book Self
Chapter-1- Management Information System
Self Assessment Questions
1. Information systems are composed of __________ basic components.
a) four
b) three
c) two
d) many
2. A human order taker can be bypassed when using a(n)
e) office automation system.
f) management information system.
g) transaction processing system.
h) decision support system.
3. The __________ can help you choose a product.
a) office automation system
b) management information system
c) transaction processing system
d) decision support system
4. The expert system uses a(n) __________ to select the most appropriate response.
a) inference engine
b) decision support system
c) knowledge base
d) data source
5. An intranet that is accessible by outside workers.
a) firewall
b) extranet
c) management information system
d) P2PN
6. __________ is the capability to continue as if nothing has happened, even after a major component failure.
a) redundancy
b) interoperability
c) fault tolerance
d) backup
7. Striping with parity is also known as RAID __________.
a) 0
b) 1
c) 4
d) 6
8. A storage device that is connected directly to a network is an example of __________.
a) network attached storage
b) storage area network
c) direct attached storage
d) RAID
9. A tape library will use a robotic component called a(n) __________ to change and store multiple tape cartridges.
a) RAID
b) backup device

c) redundant system
d) auto loader
10. More than one of the same component is an example of a __________ system.
a) scalable
b) redundant
c) RAID
d) back-up
11. Which of the following is (are) true of the EDP auditors?
a)
b)
c)
d)

they should have computer expertise they will be replaced by traditional auditors in the near future two of the above currently, there is a very high demand for them, particularly from firms that use personal computers 12. Controls of data communication deal with
a)
b)
c)
d)

the communication channel the computer terminals All of the above

13. A lockbox service is used for
a) depositing cash

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Unit 8 Assignment

    • 380 Words
    • 2 Pages

    c. ____________________ is a fault-tolerance technique in which one device or component duplicates the activities of another.…

    • 380 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Jst Any

    • 1244 Words
    • 5 Pages

    3) Inventions, standards, and products are examples of ________. A) information systems B) methods C) information technology D) hardware systems…

    • 1244 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Disk Redundancy

    • 709 Words
    • 3 Pages

    d. RAID Level 3 stripes data at a byte level across several drives, with parity stored on one drive. It is otherwise similar to level 4. Byte-level striping requires hardware support for efficient use (What is RAID?).…

    • 709 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Are sales (revenues) growing steadily, and, if so, at what rate? What is the cost of goods sold compared to revenues? Is it increasing or decreasing? Are the firm’s gross and net margins increasing or decreasing? Are the firm’s operating expenses increasing or decreasing? Is the firm heavily in debt? Does it have assets to pay for expenses and to finance the development of new products and information systems?…

    • 309 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Indentify how Harrah's used IT to get competitive advantage in “Diamonds in the Data Mine” by Gary Loveman.…

    • 424 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    1: How do the IT investment strategies and focus of FedEx and its main competitor UPS differ? Which Company has the better strategy? Why?…

    • 1199 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Chapter 9 Achieving Operational Excellence and Customer Intimacy Enterprise Applications 1) Companies can use configuration tables provided by the enterprise software to tailor a particular aspect of the system to the way it does business. Answer TRUE Diff 2…

    • 5288 Words
    • 14 Pages
    Satisfactory Essays
  • Good Essays

    Hardware Vocabulary Quiz

    • 448 Words
    • 2 Pages

    4. A computer that “serves” data to computers connected to a network. Can be a specially designed computer or it may look like a regular computer.…

    • 448 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Enterprise systems, customer relationship management, and supply chain management are three enterprise applications. Enterprise systems are based on a suite of integrated software modules and a common central database. Enterprise systems utilize enterprise software to support financial and accounting, human resources, manufacturing and production, and sales and marketing processes. Enterprise systems provide many benefits including an enterprise-enabled organization, improved management reporting and decision making, a unified information systems technology platform, and more efficient operations and customer-driven business processes.…

    • 869 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    The heart of the integration of information needed in MIS is a data base. A data base is…

    • 1327 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    2.What are the Technologies used by United Parcel Service? How are these technologies related to UPS’s business strategy?…

    • 358 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Inputs: The inputs include package information, customer signature, pickup, delivery, time-card data, current location (while en route), and billing and customer clearance documentation.…

    • 2580 Words
    • 11 Pages
    Powerful Essays
  • Best Essays

    In today business environment, Web 2.0 was created and became one of the accepted tools and most prominent business model for information system. As a second phase of web evolution, Web 2.0 has successfully transformed in online public commons from one-way communication (Web 1.0) to two-way communication which information is sharing for people around the world. (Laudon, Laudon, 2012) Web 2.0 has four defining features, which are interactivity, real-time user control, social participation (sharing) and user-generated content. The technologies and services behind these features include cloud computing, software mashups and widgets, blogs, RSS, wikis, social networking sites, social bookmarking and podcasts.…

    • 2643 Words
    • 11 Pages
    Best Essays
  • Good Essays

    How does the leading clothing retailer in Sri Lanka actually conduct their operations so efficiently to satisfy not only the domestic market, but also its international market? Not visible to those who visit their shopping arcades or visit their online store, there is an advanced Information Technology enabled system with professionals working tirelessly to provide their customers with a satisfying shopping experience.…

    • 3506 Words
    • 15 Pages
    Good Essays
  • Powerful Essays

    Maxis Berhad is a leading telecommunication company in Malaysia with more than 11.4 million mobile subscribers, Maxis has been providing a full suite of services on multiple platforms to fulfill the telecommunication needs of individual consumers, SMEs and large corporations in Malaysia. Other than that, Maxis Berhad is offering on postpaid services under the Maxis brand and via prepaid formast under the Hotlink. It uses the dialling prefix identifier of "012", "014" and "017". The uses of different brands are to support each other by synergy value. It helps Maxis Berhad to maintain and develop prepaid businesses while keep on maintaining their growth in postpaid field.…

    • 5289 Words
    • 15 Pages
    Powerful Essays