INFORMATION COMPUTING TEST OUT STUDY GUIDE. PLEASE CONSULT TEXTS THAT ARE ON RESERVE IN THE LIBRARY
Management Information Systems (MIS) CONCEPTS
In designing a management information system (MIS), after defining the system's objectives, what is the next step?
Which decision is supported by a logistics information system (LIS)?
Which information system is used to manage manufacturing resources?
Which system supports sales forecasting?
In the context of using information technologies for a competitive advantage, what does a top-line strategy focuses on?
In the context of IT jobs, who must have knowledge and understanding of data warehouse anddata-mining tools?
An organized integration of hardware and software technologies, data, processes, and human elements designed to produce timely, integrated, relevant, accurate, and useful information for decision-making purposes.
An information system collects past data for performance reports and current data for operational reports. This shows that the data component of the information system has a(n)_________.
What is designed to reduce the cost of transporting materials while maintaining safe and reliable delivery?
In the context of IT jobs in the information systems field, who is responsible for database design and implementation?
A(n) _____enables communication between a video card and memory.
Beginning in the 1940s, first-generation computers used _______.
Computers and communication systems use this to represent information between computers and network systems.
Identify an advantage of a mouse over a trackball.
Where are the Clipboard's contents are typically stored? .
This allows data to be stored in multiple places to improve a system's reliability.
Define an operating system (OS)?
Explain the supervisor program of an operating system (OS)?
This consists of a series of OS and lS representing data or instructions.
Explain the goal of the Health Insurance Portability and Accountability Act (HIPAA).
In the context of information privacy, explain SPAM.
Clement applies for a home loan at Global Bank Inc. As part of the process, he provides his personal details to the banker who is responsible for sanctioning loans. The banker uses Clement's personal information to sell him insurance policies. In this scenario, the banker's action is considered what?
Albert applied for a consumer durables loan at Horizon Bank and had to provide his personal information in the loan application form. John, the banker in charge, used Albert's information to sell him a credit card issued by Horizon Bank. In this scenario, John's action is considered what?
Which is a potential drawback of telecommuting?
List reasons the cost of hiring additional employees in virtual organizations is reduced.
This involves the design, manufacture, use, and disposal of computers and servers in such a way that there is minimal impact on the environment.
What kind of computing promotes a sustainable environment and consumes the least amount of energy?
Which federal law is intended to protect data collected from children?
Explain when Spoofing happens.
In the context of computer and network security, a security system is said to possess this when it does not allow data to be corrupted or allow unauthorized changes to a corporate database.
In the context of computer and network security, this means a quick recovery in the event of a system failure or disaster.
In the context of intentional security threats, this can erase data and wreak havoc on computers and networks but do not replicate themselves.
This uses a public key known to everyone and a private key known only to the recipient.
This outlines procedures for keeping an organization operational in the event of a natural disaster or a network attack or intrusion.
When planning a comprehensive security system, the first step is designing _______ , which use a combination of hardware and software for improving reliability, a way of ensuring availability in case of a system failure.
What are the top two targets for ransomware attacks?
Before establishing a security program, what should organizations do?
List the parts of a comprehensive security plan?
What is the amount of data that can be transferred from one point to another in one second.
The _____ layer of the Open Systems Interconnection (OSI) model provides services that support users' tasks, such as file transfers, database access, and e-mail.
This is the physical link between a network and a workstation.
What is listed in a routing table?
In data communication, this refers to integrating voice, video, and data so that multimedia information can be used for decision making.
This is typically used to connect workstations and peripheral devices that are in close proximity.
This is a technique that combines the strongest features of Wired Equivalent Privacy (WEP) and Extensible Authentication Protocol (EAP) techniques and helps improve the security of wireless networks.
All client computers that try to access an access point are required to include this in all their packets.
Which term is used for unique identifiers of computer or network addresses on the Internet?
In the universal resource locator (URL) https://www.exsat.org, what is the domain name?
This is an information system that enables users to retrieve data from the Web by using keywords related to their topic of interest.
Explain Voice over Internet Protocol (VoIP)?
Explain virtual medicine on the Internet.
Name a type of interorganizational system?
A _____ is a journal or newsletter that is updated frequently and intended for the general public.
Define Extensible Markup Language (XML)?
In the context of an organization's information system, what is the external users role?
In the design phase of the systems development life cycle (SDLC), what design is an overview of the system and does not include hardware or software choices.
In conversion of the implementation phase of the systems development life cycle (SDLC), as each module of a new system is converted, is the corresponding part of an old system retired?
Describe an approach for developing information systems that increase the risk of leaking confidential information to competitors.
This is a philosophy and a software and system development methodology that focuses on the development, use, and reuse of small, self-contained blocks of codes to meet the software needs of an organization.
This is a tool used in the structured systems analysis and design (SSAD) model for data analysis.
The systems development life cycle (SDLC) is also known as this.
During the maintenance phase of the software development life cycle, the information system is what?
During the maintenance phase of the software development life cycle, the maintenance team takes steps to _____.
In the context of application software providers {ASPs), what is also known as on-demand software?
What is an advantage of application service providers (ASPs)?
Describe a cave automatic virtual environment
Platform as a service (PaaS) services are hosted in the cloud and accessed by clients through their ______.
In a ____ cloud, a participating organization purchases and maintains the software and infrastructure itself.
In which environment is a user is totally immersed in the virtual reality (VR) world?
Quantum units of information deploy the properties of entanglement and _____ to offer exponentially greater computing power.
Compared with a large-scale integrated multi-purpose computer, a quantum computer is a ____ computer.
According to security experts, it could take at least _____ to get quantum-proof encryption developed and deployed on a mass scale.
Which is an example of a video-sharing site?
This is skill in using productivity software, such as word processors, spreadsheets, database management systems, and presentation software.
In the context of computer literacy and information literacy, which statement is true of knowledge workers?
Office 2019:
Microsoft Word
Insert a citation using a new source.
Use the Word Count.
Update a bibliography.
Embed an object from another application.
Insert a chart.
Microsoft Excel
Enter a number as text.
Create a formula using the SUM function.
Create a formula using arithmetic operators.
Create a formula using the MIN function.
Use the keyboard to enter a formula that uses a function.
Apply the Currency number format.
Apply a chart style.
Use Flash Fill.
Change the number of displayed decimal places.
Create a New conditional formatting rule.
Hide a column.
Enter a series of values using AutoFill.
Create a formula using the IF function.
Use the Format Painter.
Edit placeholder text in a chart element. Excel
Change a chart type.
Unfreeze columns and rows.
Add a total row to a table.
Create a formula using a worksheet reference.
Insert a table.
Sort a table based on a custom sort order.
Insert a PivotTable.
Change the layout of a PivotTable.
Insert a PivotChart.
Filter data in a PivotTable using a Slicer.
Microsoft Access
Create a table in Table Datasheet view.
Set a field's data type in Table Datasheet view.
Rename a field in Table Datasheet view.
Add a field to a table in Table Datasheet view.
Add a caption to a field in Table Datasheet view.
Enter a record into a table.
Set a table's primary key in Design view.
Add a field to a table in Table Design view.
Compact and repair a database.
Rename a database object.
Create and run a Parameter query.
Add criteria using AND to a query in Query Design view.
Create a multi-table query in Query Design view.
Create a calculated field in a query using Zoom.
Add a Total row in Datasheet view.
Create a Navigation form.
Add a Header/Footer section to a report in Design view.
Add totals to a report column in Report Layout view.
Move a control in Report Layout view.
Create a report using the Report tool.
Create a form using the Form Wizard.
Add a title to a form in Design view.
Add a field to a form in Form Layout view.
Add a field to a report in Design view.
Create a form with a subform using the Form Wizard.
Microsoft PowerPoint
Create a multilevel list.
Insert a picture from a file.
Insert an object using a content placeholder.
Change the animation duration.
Run a slide show.