This paper circulates around the core theme of 1) Two information systems that support the entire organization are together with its essential aspects. It has been reviewed and purchased by the majority of students thus, this paper is rated 4.8 out of 5 points by the students. In addition to this, the price of this paper commences from £ 99. To get this paper written from the scratch, order this assignment now. 100% confidential, 100% plagiarism-free.
DOWNLOAD
ANSWERS
BIS 220 Final Exam
1) Two
information systems that support the entire organization are
2) _______ is
the direct use of information systems by employees in their work
3) ______
attempt to duplicate the work of human experts by applying reasoning
capabilities
4) ______
issues involve who may obtain information and how much they should pay for this
information
5) _____
issues involve collecting, storing, and disseminating information about
individuals.
6) Your
company’s computers have been taken over by an attacker and used to attack
another organization’s information systems. Your problem is which of the
following?
7) You are
the only person in your office to upgrade to Microsoft® Word 2010. Before you
share documents with coworkers, you should do which of the following?
8) Which of
the following is detected by the contextual spelling checker?
9) If your
cursor is near the bottom of a page and you want to display the next paragraph
you type at the top of a new page, you should use which of the following?
10) Your
______ is the collection of traceable data that is captured when you use
various information technologies such as credit cards or the Internet
11) No
alphabetic characters in a social security number field is an example of
12) In a
database, the primary key field is used to
13) Search
engines and metasearch engines are examples of which network application?
14) ______
portals coordinate content within relatively narrow organizational and
partners’ communities
15) Workflow,
groupware, and telepresence systems are examples of which network application?
16) Which
type of e-commerce does an organization provide information and services to its
workers?
17) _______
auctions are the most common auction model for large purchases.
18) ______
collect data from many points over an extended space.
19) Which
type of satellite has the largest footprint?
20) Which of
the following is the most appropriate wireless networking standard for creating
personal area networks?
21) If cell
D15 contains the formula =$C$5*D15, what is the D15 in the formula?
22) What
should you do if you see a column of pound signs (###) instead of values or
results of formulas?
23) ______
feasibility determines if the project is an acceptable financial risk and if
the organization can afford the expense and time needed to complete the project
24) In the
traditional systems development life cycle, users
25) To create
a Microsoft® PowerPoint® presentation based on an
installed template, click the
26) Which of
the following demotes a bullet point from the first level to the second level
in Outline view in Microsoft® PowerPoint®?
27) ________
connects parts of the intranets of different organizations and allows secure
communications among business partners
28) ______ is
a system with universally accepted standards for storing, retrieving,
formatting, and displaying information via a client/server architecture
29) A process
that allows users to place information in multiple, overlapping associations is
called
30) ________
are websites that provide collections of content from all over the World Wide
Web
31) _____ is a
method for analyzing and reducing a relational database to its most streamlined
form.
32) When data are
normalized, fields/attributes in the table depend only on the _____.
33) _____ is a
method for analyzing and reducing a relational database to its most streamlined
form.
34) Key
developments of the first generation of the Web were:
35) Users
typically have little interaction with _____, which provide information that
users receive passively.
36). Your
company’s computers have been taken over by an attacker and used to attack
another organization’s information systems. Your problem is which of the
following?
37). A collection
of related files, tables, and so on that stores data and the associations among
them is _____.
38). If Amazon
uses a list of all your purchases (books bought, price paid, dates) to
recommend other books to you, then Amazon is applying its _____.
39). _____ is
(are) data that have been organized to have meaning and value to a recipient.
40)______ portals
are used to coordinate an organization`s business information internally and
externally.
1) Two
information systems that support the entire organization are
A. enterprise
resource planning systems and dashboards
B. transaction
processing systems and office automation systems
C. enterprise
resource planning systems and transaction processing systems
D. expert systems
and office automation systems
2) _______
is the direct use of information systems by employees in their work
A. Transaction
processing systems
B. End-user
computing
C. Decision
support systems
D. Management
information systems
3) ______
attempt to duplicate the work of human experts by applying reasoning
capabilities
A. Expert systems
B. Dashboards
C. Business
intelligence systems
D. Decision
support systems
4) ______
issues involve who may obtain information and how much they should pay for this
information
A. Privacy
B. Accessibility
C. Property
D. Transferability
5) _____
issues involve collecting, storing, and disseminating information about
individuals.
A. Privacy
B. Accuracy
C. Property
D. Accessibility
6) Your
company’s computers have been taken over by an attacker and used to attack
another organization’s information systems. Your problem is which of the
following?
A. Poor security
policies and procedures
B. Lack of due
diligence
C. Downstream
liability
D. Poor service-level
agreements
7) You are
the only person in your office to upgrade to Microsoft® Word 2010. Before you
share documents with coworkers, you should do which of the following?
A. Print out a
backup copy of documents
B. Run the
Compatibility Checker
C. Burn all
documents to CD
D. Create a
document summary
8) Which
of the following is detected by the contextual spelling checker?
A. Duplicate words
B. Irregular
capitalization
C. Use of their
when you should use there
D. Improper use of
commas and other punctuation
9) If your
cursor is near the bottom of a page and you want to display the next paragraph
you type at the top of a new page, you should use which of the following?
A. Enter
B. Ctrl+PageDown
C. Ctrl+Enter
D. Page Layout,
Breaks, Line Numbers
10) Your ______
is the collection of traceable data that is captured when you use various
information technologies such as credit cards or the Internet
A. data profile
B. data shadow
C. database file
D. database record
11) No
alphabetic characters in a social security number field is an example of
A. data isolation
B. data
consistency
C. data integrity
D. data redundancy
12) In a
database, the primary key field is used to
A. specify an
entity
B. uniquely
identify an attribute
C. identify
duplicated data
D. uniquely identify
a record
13) Search
engines and meta search engines are examples of which network application?
A. Communication
B. Discovery
C. Collaboration
D. Web services
14) ______
portals coordinate content within relatively narrow organizational and partners’
communities
A. Personal
B. Affinity
C. Corporate
D. Commercial
15) Workflow,
groupware, and tele-presence systems are examples of which network application?
A. Discovery
B. Collaboration
C. Web services
D. Communications
16) Which
type of e-commerce does an organization provide information and services to its
workers?
A.
Business-to-employee
B.
Consumer-to-business
C.
Government-to-business
D.
Business-to-consumer
17) _______
auctions are the most common auction model for large purchases.
A. Forward
B. Static
C. Reverse
D. Simple
18) ______
collect data from many points over an extended space.
A. Bluetooth®
networks
B. Ultra-wideband
networks
C. Wireless sensor
networks
D. Wi-Fi networks
19) Which
type of satellite has the largest footprint?
A. Low earth orbit
B. Geostationary
C. Medium earth
orbit
D. Equatorial
orbit
20) Which
of the following is the most appropriate wireless networking standard for
creating personal area networks?
A. Wi-Fi
B. Cellular radio
C. Microwave
D. Bluetooth®
21) If
cell D15 contains the formula =$C$5*D15, what is the D15 in the formula?
A. Mixed reference
B. Absolute
reference
C. Circular
reference
D. Range name
22) What
should you do if you see a column of pound signs (###) instead of values or
results of formulas?
A. Increase the
zoom percentage
B. Delete the
column
C. Adjust the row
height
D. Increase the
column width
23) ______
feasibility determines if the project is an bis 220 final exam acceptable
financial risk and if the organization can afford the expense and time needed
to complete the project
A. technical
B. economic
C. organizational
D. behavioral
24) In the
traditional systems development life cycle, users
A. have no input
B. are important
only in the testing phases of the project
C. are important
only in the maintenance phase of the project
D. are limited to
providing information requirements
25) To
create a Microsoft® PowerPoint® presentation based on an
installed template, click the
A. File tab, and
then click New
B. File tab, and
then click Open
C. Insert tab, and
then select Add Template
D. Design tab, and
then select New
26) Which
of the following demotes a bullet point from the first level to the second
level in Outline view in Microsoft® PowerPoint®?
A. Shift+Tab
B. Tab
C. Decrease List
Level
D. Ctrl+Tab
27) ________
connects parts of the intranets of different organizations and allows secure
communications among business partners
A. A global
network
B. An intranet
C. An extranet
D. The Internet
28) ______
is a system with universally accepted bis220 final exam standards for storing,
retrieving, formatting, and displaying information via a client/server
architecture
A. FTP
B. World Wide Web
C. Newsgroups
D. The Internet
29) A
process that allows users to place information in multiple, overlapping
associations is called
A. AJAX
B. tagging
C. a Wiki
D. blogging
30) ________
are websites that provide collections of content from all over the World Wide
Web
A. Aggregators
B. Social networks
C. Mashups
D. Really simple
syndications
EXTRA QUESTIONS
31) _____ is a
method for analyzing and reducing a relational database to its most streamlined
form.
32) When data are
normalized, fields/attributes in the table depend only on the _____.
33) _____ is a
method for analyzing and reducing a relational database to its most streamlined
form.
34) Key
developments of the first generation of the Web were:
35) Users
typically have little interaction with _____, which provide information that
users receive passively.
36). Your
company’s computers have been taken over by an attacker and used to attack
another organization’s information systems. Your problem is which of the
following?
37). A collection
of related files, tables, and so on that stores data and the associations among
them is _____.
38). If Amazon
uses a list of all your purchases (books bought, price paid, dates) to
recommend other books to you, then Amazon is applying its _____.
39). _____ is
(are) data that have been organized to have meaning and value to a recipient.
40)______ portals
are used to coordinate an organization`s business information internally and
externally.