Deck 5: Information Systems and Technology Terminology and Concepts

Full screen (f)
exit full mode
Question
During software development which factor is most crucial?

A)people
B)process
C)product
D)project
Use Space or
up arrow
down arrow
to flip the card.
Question
Upper CASE tools are used

A)for developing dfd\s
B)for screen design
C)during all phases of system analysis and design life cycle
D)for converting structured english procedures to source code into a language such as c
Question
______________. focuses on planning, policies, and procedures regarding the use of corporate data and information.

A)cio
B)systems analyst
C)database administrator
D)system operator
Question
______________ is software programs that were developed for a general market and that can be purchased in a store.

A)proprietary software
B)off-the-shelf software
C)contract software
D)application software
Question
With the ______________ form of data processing, each transaction is processed immediately.

A)oltp
B)batch processing
C)active processing
D)automated transaction processing
Question
In any of the system ______________ resource is consider as people resources.

A)end user.
B)hardware.
C)data.
D)software.
Question
______________ information system that express a fundamental concept and activities of information systems.

A)model.
B)style.
C)standard.
D)logic.
Question
In general the information system can also describe in terms of ______________.

A)operations.
B)functions.
C)events .
D)tasks.
Question
______________ is the people who develop and operate the information systems.

A)is specialists.
B)is analyst.
C)is experts.
D)is data entry.
Question
______________ is a collection of single-application software packages in a bundle designed to work similarly so that once you learn the basics for one application, the other applications are easy to learn and use.

A)bundled software
B)software suite
C)productivity applications
D)general purpose software
Question
Information systems that support the firm in its interaction with its environment are said to be performing within the ______________.

A)workgroup sphere of influence
B)global sphere of influence
C)enterprise sphere of influence
D)individual sphere of influence
Question
The current major stage in the business use of IS is oriented towards ______________.

A)cost reduction and productivity
B)gaining competitive advantage
C)strategic advantage and costs
D)improved customer relationship management
Question
______________ is the process of converting a message into a secret code and changing the encoded message back to regular text.

A)encryption
B)fraud
C)encoding
D)cryptography
Question
Problems that are routine and have well-defined relationships are called ______________.

A)structured problems
B)programmed decisions
C)simple problems
D)heuristics
Question
The four key questions related to fairness in information use are ______________

A)cost, timing, content, and frequency
B)notice, consent, accuracy, and authorization
C)knowledge, control, notice, and consent
D)knowledge, accuracy, timing, and permission
Question
Acquiring, training and retaining good network ______________ should be a top priority.

A)data entry.
B)lab in charge.
C)administrator.
D)system tester.
Question
Primary storage device such as semiconductor memory chips are called ______________.

A)parallel
B)sequential
C)direct access
D)binary access
Question
In network the different communication are interconnected by using a communication processors called a ______________.

A)protocols.
B)gateway.
C)multiplexers.
D)router
Question
______________ is single user workstation that provide presenttion services,database services and connectivity

A)server
B)client
C)system
D)cpu
Question
FIFO stands for ______________

A)first interactive first out
B)first in first out
C)first invented first out
D)first interface first out.
Question
A ______________ is a binary event representing a signal change from positive to negative

A)bit
B)band.
C)bandwidth.
D)frequency.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/21
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 5: Information Systems and Technology Terminology and Concepts
1
During software development which factor is most crucial?

A)people
B)process
C)product
D)project
people
2
Upper CASE tools are used

A)for developing dfd\s
B)for screen design
C)during all phases of system analysis and design life cycle
D)for converting structured english procedures to source code into a language such as c
for developing dfd\s
3
______________. focuses on planning, policies, and procedures regarding the use of corporate data and information.

A)cio
B)systems analyst
C)database administrator
D)system operator
cio
4
______________ is software programs that were developed for a general market and that can be purchased in a store.

A)proprietary software
B)off-the-shelf software
C)contract software
D)application software
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
5
With the ______________ form of data processing, each transaction is processed immediately.

A)oltp
B)batch processing
C)active processing
D)automated transaction processing
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
6
In any of the system ______________ resource is consider as people resources.

A)end user.
B)hardware.
C)data.
D)software.
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
7
______________ information system that express a fundamental concept and activities of information systems.

A)model.
B)style.
C)standard.
D)logic.
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
8
In general the information system can also describe in terms of ______________.

A)operations.
B)functions.
C)events .
D)tasks.
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
9
______________ is the people who develop and operate the information systems.

A)is specialists.
B)is analyst.
C)is experts.
D)is data entry.
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
10
______________ is a collection of single-application software packages in a bundle designed to work similarly so that once you learn the basics for one application, the other applications are easy to learn and use.

A)bundled software
B)software suite
C)productivity applications
D)general purpose software
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
11
Information systems that support the firm in its interaction with its environment are said to be performing within the ______________.

A)workgroup sphere of influence
B)global sphere of influence
C)enterprise sphere of influence
D)individual sphere of influence
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
12
The current major stage in the business use of IS is oriented towards ______________.

A)cost reduction and productivity
B)gaining competitive advantage
C)strategic advantage and costs
D)improved customer relationship management
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
13
______________ is the process of converting a message into a secret code and changing the encoded message back to regular text.

A)encryption
B)fraud
C)encoding
D)cryptography
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
14
Problems that are routine and have well-defined relationships are called ______________.

A)structured problems
B)programmed decisions
C)simple problems
D)heuristics
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
15
The four key questions related to fairness in information use are ______________

A)cost, timing, content, and frequency
B)notice, consent, accuracy, and authorization
C)knowledge, control, notice, and consent
D)knowledge, accuracy, timing, and permission
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
16
Acquiring, training and retaining good network ______________ should be a top priority.

A)data entry.
B)lab in charge.
C)administrator.
D)system tester.
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
17
Primary storage device such as semiconductor memory chips are called ______________.

A)parallel
B)sequential
C)direct access
D)binary access
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
18
In network the different communication are interconnected by using a communication processors called a ______________.

A)protocols.
B)gateway.
C)multiplexers.
D)router
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
19
______________ is single user workstation that provide presenttion services,database services and connectivity

A)server
B)client
C)system
D)cpu
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
20
FIFO stands for ______________

A)first interactive first out
B)first in first out
C)first invented first out
D)first interface first out.
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
21
A ______________ is a binary event representing a signal change from positive to negative

A)bit
B)band.
C)bandwidth.
D)frequency.
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 21 flashcards in this deck.