Multiple Choice Questions:



Similar documents
contents CHAPTER 1 CHAPTER 2 Strategic Decision Making 32 Information Systems in Business 1 Opening Case: Revving Up Sales at Harley-Davidson 33

Electronic Commerce. Chapter Overview

CHAPTER 13: ELECTRONIC COMMERCE AND E-BUSINESS

E-Business, E-Commerce

Community Development and Training Centre Semester IT 245 Management Information Systems

Tutorial Letter Semester 1/2016 FEEDBACK TUTORIAL LETTER, ACCOUNTING INFORMATION SYSTEMS (AIS822S) Assignment 1 Solutions and Comments.

E-Commerce and E-Business

Case-study: SwissAir. The Internet Business. Case-study: SwissAir. Case-study: SwissAir. Summary. Summary

Module 6. e-business and e- Commerce

ELECTRONIC COMMERCE SYSTEMS

E Commerce INTRODUCTION LEARNING OUTCOMES

Ecommerce. E-commerce Defined. E-commerce Developments and Themes 2006

i. Definition ii. Primary Activities iii. Support Activities iv. Information Systems role in value chain analysis

HOW TO PROTECT YOUR DATA

BCS IT User Syllabus IT Security for Users Level 2. Version 1.0

Chapter 11 Manage Computing Securely, Safely and Ethically. Discovering Computers Your Interactive Guide to the Digital World

Chapter 7 Information System Security and Control

Internet Part 2. CS/MIS Department

E-BUSINESS THREATS AND SOLUTIONS

Chapter 11 E-Commerce

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

Infocomm Sec rity is incomplete without U Be aware,

Spyware. Michael Glenn Technology Management 2004 Qwest Communications International Inc.

Outline. Introduction to E-commerce. Why is e-commerce? [Awad] What is e-commerce? Session 1. Yan Wang E-commerce.

Introduction to Information System

Chapter 10 Objectives. Chapter 10 E-Commerce: A Revolution in the Way We Do Business. What Is E-Commerce? What Is E-Commerce? What Is E-Commerce?

e-commerce Models. Let us look at each of them in detail. Business-to-Business (B2B) Model

IJMIE Volume 2, Issue 5 ISSN:

Information Systems Perspective 1. An Introduction to Information Systems in Organizations 2

How to Search the Internet

OCR LEVEL 3 CAMBRIDGE TECHNICAL

CHAPTER 11: COMPUTERS AT WORK, SCHOOL, AND HOME

Evaluate the Usability of Security Audits in Electronic Commerce

E Commerce BCom. III Sem Multiple Choice Questions

Introduction to E-Commerce

ecommerce in the Customer Empowerment Era 03/04/2014 Sameer S Paradkar

Brainloop Cloud Security

Common Cyber Threats. Common cyber threats include:

Service Level Program for Ariba cloud Services. Service Accessibility Warranty Security Miscellaneous

E-Commerce and E-Business

HE WAR AGAINST BEING AN INTERMEDIARY FOR ANOTHER ATTACK

E-commerce refers to paperless exchange of business information using following ways.

Cyber Security Best Practices. 1. Introduction What is cyber security and why is it important?

E-Commerce Fundamentals Sukaina Al-Nasrawi Associate IT Officer ICT Division

T141 Computer Systems Technician MTCU Code Program Learning Outcomes

Certified Information Systems Auditor (CISA)

Mobile Cloud Computing In Business

1. Which segment do ebay, Amazon.com, and LandsEnd.com belong? 2. Which segment focuses on consumers dealing with each other?

Concepts in Enterprise Resource Planning

Chapter 11: E-Commerce

Customer Awareness for Security and Fraud Prevention

E-Business, E-Commerce, and Information Systems

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines

ELECTRONIC COMMERCE OBJECTIVE QUESTIONS

E-Commerce: Digital Markets, Digital Goods

Desktop and Laptop Security Policy

Session: Business Systems Topic: E-Commerce. Daniel Chang. CGS 2100 Micro Applications for Business & Economics. Lecture

Norton Personal Firewall for Macintosh

E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications

Information Technology Acceptable Use Policies and Procedures

BTEC First Diploma for IT. Scheme of Work for Computer Systems unit 3 (10 credit unit)

Montgomery College Course Designator/Course Number: CS 110 Course Title: Computer Literacy

1) A complete SCM solution includes customers, service providers and partners. Answer: TRUE Diff: 2 Page Ref: 304

SAMPLE EXAMINATION PAPER SAMPLE ANSWERS

ACS Final Exam Topic Outline. Functional Area Information Systems. V. Enterprise Information Systems

WICKSoft Mobile Documents for the BlackBerry Security white paper mobile document access for the Enterprise

Introduction to Information Technology

CHAPTER 10: COMPUTER SECURITY AND RISKS

ADDENDUM TO THE BLACKBERRY SOLUTION LICENSE AGREEMENT FOR BLACKBERRY BUSINESS CLOUD SERVICES FOR MICROSOFT OFFICE 365 ( the ADDENDUM )

9. Information Assurance and Security, Protecting Information Resources. Janeela Maraj. Tutorial 9 21/11/2014 INFO 1500

IT Security in Process Automation - Top Ten

BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO

CORE CONCEPTS OF. Thirteenth Edition. Mark G. Simkin, PhD. Professor Department of Information Systems University of Nevada

ZIMBABWE SCHOOL EXAMINATIONS COUNCIL. COMPUTER STUDIES 7014/01 PAPER 1 Multiple Choice SPECIMEN PAPER

Christchurch Polytechnic Institute of Technology Information Systems Acquisition, Development and Maintenance Security Standard

Cisco on Cisco Best Practice Security Practices for Online Collaboration and Social Media

Remote-Access VPNs: Business Productivity, Deployment, and Security Considerations

COMPUTER, INTERNET, & USE POLICY

PCI PA - DSS. Point BKX Implementation Guide. Version Atos Xenta, Atos Xenteo and Atos Yomani using the Point BKX Payment Core

Security aspects of e-tailing. Chapter 7

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design

COUNSEL S CHAMBERS LIMITED

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003

The Ministry of Information & Communication Technology MICT

Willem Wiechers 3 rd March 2015

ICS 544 E-Commerce Technologies

Eighth Edition. New York University. Jane P. Laucfon. Azimuth Information PEARSON. Prentice Hall. Upper Saddle River, New Jersey 07458

Outline Introduction to Internet, Intranet and Extranet. What is an Intranet? by Awad. Basic Intranet-enabling Technology [Awad, chapter 4]

Data risks and Technology Trends. Stephen Reyes Saltmarsh, Cleaveland & Gund

Information Systems for Business Operations

This tutorial takes adopts a simple and practical approach to explain the governing principles of e-commerce.

Analysis of Relationship between Supply Chain Management and E-Commerce

St. Johns River State College

PCI PA - DSS. Point ipos Implementation Guide. Version VeriFone Vx820 using the Point ipos Payment Core

2. ecommerce Business Models and Concepts. Alexander Nikov. Teaching Objectives. Video: How to use Twitter for business.

EMPLOYEE COMPUTER USE POLICY

Cybersecurity: A Growing Concern for All Businesses. RLI Design Professionals Design Professionals Learning Event DPLE 160 October 7, 2015

Transcription:

0

Multiple Choice Questions: 1. What is the difference between information technology (IT) and a management information system (MIS)? A) IT is a type of MIS B) MIS is a type of IT C) IT and MIS are the same D) IT is hardware and MIS is software 2. What is a manager s primary use of a MIS? A) to facilitate problem solving and decision making B) to facilitate quality control C) to monitor inventory D) to evaluate productivity 3. Which of the following identifies the input and output of a MIS? A) input = information; output = decisions B) input = information; output = data C) input = data; output =decisions D) input = data; output = information 4. An automated teller machine (ATM) is an example of which type of MIS? A) expert system B) operations information system C) transaction processing system D) decision support system 5. Which component of a computer system is responsible for executing software instructions? A) input device B) operating system C) central processing unit D) primary storage 1

6. Which of the following networks is the most secure? A) intranet B) extranet C) cloud D) wireless 7. Which software application would be best to use to perform and analyze calculations on production data? A) accounting B) presentation C) database D) spreadsheet 8. What type of e-commerce occurs when WalMart buys merchandise from a supplier over the Internet? A) B2C B) C2C C) C2B D) B2B 9. Which of the following threatens information security? A) authentication B) encryption C) viruses D) cookies 10. Which of the following would best protect a business against unethical computer use? A) information privacy policy B) computer use policy C) email policy D) internet use policy 2

11. Which of the following best defines a set of methods or techniques for acquiring, organizing, storing, manipulating, and transmitting information? A) management information system (MIS) B) information technology C) data mining D) decision support system 12. Which of the following best describes the type of system that gathers, organizes, and summarizes data in a form that is valuable to managers? A) transaction processing system B) expert system C) decision support system D) operations information system 13. Which of the following best describes a private, company wide network, closed to public access? A) intranet B) extranet C) virtual private network D) cloud computing 14. Which of the following best describes a semiprivate network that uses Internet technology and allows more than one company to access the same information? A) intranet B) extranet C) virtual private network D) cloud computing 15. Which of the following best describes a network in which a company s data and applications are stored at offsite data centers that are accessed over the Internet? A) intranet B) extranet C) virtual private network D) cloud computing 3

16. What is the difference between hardware and software? A) Hardware is the set of programs and procedures used to operate a computer, while software is the physical devices associated with computing. B) Hardware is the physical devices associated with computing, while software is the set of programs and procedures used to operate a computer. C) Hardware is a set of applications that control how technology tools work together, while software is a set of applications that tell a computer how to process information. D) Hardware is a set of applications that tell a computer how to process information, while software is a set of applications that control how technology tools work together. 17. Which of the following best describes the type of system software that provides additional functionality to the operating system for a specific purpose? A) application software B) hardware C) utility software D) shareware 18. What is the difference between freeware and shareware? A) Freeware controls application software, while shareware provides additional information for application software to process. B) Shareware controls application software, while freeware provides additional information to application software to process. C) Freeware is software that is absolutely free for the taking, while shareware is copyrighted, but distributed free of charge. D) Freeware is copyrighted software that is distributed free of charge, while shareware is software that is absolutely free for the taking. 4

19. What are the four types of e-commerce transactions? A) business-to-business (B2B), business-to-consumer (B2C), manufacturer-tobusiness (M2B), and manufacturer to consumer (M2C) B) manufacturer-to-business (M2B), manufacturer-to-consumer (M2C), consumerto-business (C2B), and consumer-to-consumer (C2C) C) business-to-business (B2B), business-to-consumer (B2C), supplier-to-business (S2B), and supplier-to-consumer (S2C) D) business-to-business (B2B), business-to-consumer (B2C), consumer-to-business (C2B), and consumer-to-consumer (C2C) 20. Which of the following types of e-commerce transactions is expected to increase over the next several years due to customer s desire for greater purchasing convenience and lower prices? A) business-to-consumer (B2C) B) consumer-to-business (C2B) C) manufacturer-to-business (M2B) D) supplier-to-business (S2B) 21. Which of the following types of e-commerce transactions is ebay.com, Craigslist, and Amazon.com s marketplace an example of? A) business-to-business (B2B) B) consumer-to-consumer (C2C) C) manufacturer-to-consumer (M2C) D) supplier-to-consumer (S2C) 22. Which type of technology security relates to logins used to access a network? A) encryption B) firewall C) authentication D) identity protection 5

23. Which of the following online security threats requests personal information be returned to the sender? A) phishing B) worm C) trojan horse D) email scam 6

True/false Questions: 1. Information technology is the set of methods or techniques for acquiring, organizing, storing, manipulating, and transmitting information. 2. Management information systems (MIS) are specific forms of IT that managers utilize to generate the specific, detailed information they need to perform their roles effectively. 3. Data mining is processed data that is output for a MIS. 4. Transaction processing systems are used to obtain sales, inventory, accounting and other performance related information. 5. Decision support systems are systems that provide models that aid managers in making nonprogrammed or atypical decisions. 7

6. For information to be useful to managers it must possess four characteristics: usefulness, completeness, timeliness, and relevance. 7. A network is a system for data exchange and resource sharing by linking computers to a central database. 8. To be considered a network, there must be at least 3 or more computers linked. 9. A wide area network (WAN) is a group of computers in close proximity, such as an office building. 10. The Internet is the world s largest network. 11. One of the slowest forms of high speed Internet is wireless (LMCS). 12. An intranet is a company-wide network, closed to public access, that uses Internet-type technology. 8

13. An extranet is a private data network that creates secure connections over regular Internet lines. 14. Extranets are less secure than intranets, but more secure than public accessed networks. 15. A cloud computing network stores a company s data and applications at one or more offsite data centers that are accessed through the Internet. 16. Wireless and mobile are synonymous, in that it means technology can travel with the user who can use the technology to download software, email, and web pages. 17. VoIP is the Internet infrastructure that is used to route emails over the Internet. 18. RFID tags are electronic chips placed on goods to relay information, such as location, to electronic readers. 9

19. The primary storage or computer s main memory interprets and executes software instructions. 20. Secondary storage is removable hardware used to store data for long-term storage or portability. 21. An output device is hardware used to see, hear, or accept the results of information processing requests. 22. An input device is hardware used to send information from one location and receive it at another. 23. System software is the set of instructions that tell a computer how to process information for a specific purpose. 24. Shareware is copyrighted software that is distributed free of charge to potential customers. 10

25. E-commerce is the buying and selling of goods over the Internet. 26. A social network is an Internet site that facilitates relationships among people and businesses. 27. Encryption analyzes information entering and leaving a network and prevents transmission of information without proper markings. 28. Cyberterrorism is an extreme form of hacking. 11

Short Answer questions: 1. What are the four classifications of MIS systems? 2. Explain the differences between an intranet and extranet. 3. Explain the differences between hardware and software. 4. Describe what input, output, and communication devices are, and give examples of each. 5. What are the four types of e-commerce transactions? 6. What are the steps to minimize the threat of a computer or network virus infection? 12