Browse over 20 million
homework answers & study documents

Business

BIS-220-Final-Exam.docx

Type

Exam Practice

Rating

Showing Page:
1/5
BIS 220 Final Exam
1) Two information systems that support the entire organization are
A. enterprise resource planning systems and dashboards
B. transaction processing systems and office automation systems
C. enterprise resource planning systems and transaction processing systems
D. expert systems and office automation systems
2) _______ is the direct use of information systems by employees in their work
A. Transaction processing systems
B. End-user computing
C. Decision support systems
D. Management information systems
3) ______ attempt to duplicate the work of human experts by applying reasoning capabilities
A. Expert systems
B. Dashboards
C. Business intelligence systems
D. Decision support systems
4) _______ issues involve who may obtain information and how much they should pay for this
information
A. Privacy
B. Accessibility
C. Property
D. Transferability
5) _____ issues involve collecting, storing, and disseminating information about individuals.
A. Privacy
B. Accuracy
C. Property
D. Accessibility
6) Your company’s computers have been taken over by an attacker and used to attack another
organization’s information systems. Your problem is which of the following?
A. Poor security policies and procedures
B. Lack of due diligence
C. Downstream liability
D. Poor service-level agreements
7) You are the only person in your office to upgrade to Microsoft® Word 2010. Before you share
documents with coworkers, you should do which of the following?
A. Print out a backup copy of documents
B. Run the Compatibility Checker
C. Burn all documents to CD
D. Create a document summary

Sign up to view the full document!

lock_open Sign Up
8) Which of the following is detected by the contextual spelling checker?
A. Duplicate words
B. Irregular capitalization
C. Use of their when you should use there
D. Improper use of commas and other punctuation
9) If your cursor is near the bottom of a page and you want to display the next paragraph you
type at the top of a new page, you should use which of the following?
A. Enter
B. Ctrl+PageDown
C. Ctrl+Enter
D. Page Layout, Breaks, Line Numbers
10) Your ______ is the collection of traceable data that is captured when you use various
information technologies such as credit cards or the Internet
A. data profile
B. data shadow
C. database file
D. database record
11) No alphabetic characters in a social security number field is an example of
A. data isolation
B. data consistency
C. data integrity
D. data redundancy
12) In a database, the primary key field is used to
A. specify an entity
B. uniquely identify an attribute
C. identify duplicated data
D. uniquely identify a record
13) Search engines and metasearch engines are examples of which network application?
A. Communication
B. Discovery
C. Collaboration
D. Web services
14) ______ portals coordinate content within relatively narrow organizational and partners’
communities
A. Personal
B. Affinity
C. Corporate
D. Commercial

Sign up to view the full document!

lock_open Sign Up

Sign up to view the full document!

lock_open Sign Up

Unformatted Attachment Preview

BIS 220 Final Exam1) Two information systems that support the entire organization areA. enterprise resource planning systems and dashboardsB. transaction processing systems and office automation systemsC. enterprise resource planning systems and transaction processing systemsD. expert systems and office automation systems 2) _______ is the direct use of information systems by employees in their workA. Transaction processing systemsB. End-user computingC. Decision support systemsD. Management information systems 3) ______ attempt to duplicate the work of human experts by applying reasoning capabilitiesA. Expert systemsB. DashboardsC. Business intelligence systemsD. Decision support systems 4) _______ issues involve who may obtain information and how much they should pay for this informationA. PrivacyB. AccessibilityC. PropertyD. Transferability 5) _____ issues involve collecting, storing, and disseminating information about individuals.A. PrivacyB. AccuracyC. PropertyD. Accessibility 6) Your company's computers have been taken over by an attacker and used to attack another organization's information systems. Your problem is which of the following?A. Poor security policies and proceduresB. Lack of due diligenceC. Downstream liabilityD. Poor service-level agreements 7) You are the only person in your office to upgrade to Microsoft Word 2010. Before you share documents with coworkers, you should do which of the following?A. Print out ...
Purchase document to see full attachment

Anonymous
Really great stuff, couldn't ask for more. The assignment was done with remarkable detail.

Anonymous
Solid work, thanks.

Anonymous
Goes above and beyond expectations !

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4