SlideShare a Scribd company logo
1 of 7
BIS 220 Final Exam


PLEASE DOWNLOAD THE ANSWERS HERE


BIS 220 Final Exam

1) Two information systems that support the entire organization are

A. enterprise resource planning systems and dashboards

B. transaction processing systems and office automation systems

C. enterprise resource planning systems and transaction processing systems

D. expert systems and office automation systems

2) _______ is the direct use of information systems by employees in their work

A. Transaction processing systems

B. End-user computing

C. Decision support systems

D. Management information systems

3) ______ attempt to duplicate the work of human experts by applying reasoning
capabilities

A. Expert systems

B. Dashboards

C. Business intelligence systems

D. Decision support systems

4) ______ issues involve who may obtain information and how much they should
pay for this information

A. Privacy

B. Accessibility
C. Property

D. Transferability

5) _____ issues involve collecting, storing, and disseminating information about
individuals.

A. Privacy

B. Accuracy

C. Property

D. Accessibility

6) Your company’s computers have been taken over by an attacker and used to
attack another organization’s information systems. Your problem is which of the
following?

A. Poor security policies and procedures

B. Lack of due diligence

C. Downstream liability

D. Poor service-level agreements

7) You are the only person in your office to upgrade to Microsoft® Word 2010.
Before you share documents with coworkers, you should do which of the
following?

A. Print out a backup copy of documents

B. Run the Compatibility Checker

C. Burn all documents to CD

D. Create a document summary

8) Which of the following is detected by the contextual spelling checker?

A. Duplicate words

B. Irregular capitalization

C. Use of their when you should use there

D. Improper use of commas and other punctuation
9) If your cursor is near the bottom of a page and you want to display the next
paragraph you type at the top of a new page, you should use which of the
following?

A. Enter

B. Ctrl+PageDown

C. Ctrl+Enter

D. Page Layout, Breaks, Line Numbers

10) Your ______ is the collection of traceable data that is captured when you use
various information technologies such as credit cards or the Internet

A. data profile

B. data shadow

C. database file

D. database record

11) No alphabetic characters in a social security number field is an example of

A. data isolation

B. data consistency

C. data integrity

D. data redundancy

12) In a database, the primary key field is used to

A. specify an entity

B. uniquely identify an attribute

C. identify duplicated data

D. uniquely identify a record

13) Search engines and metasearch engines are examples of which network
application?

A. Communication

B. Discovery
C. Collaboration

D. Web services

14) ______ portals coordinate content within relatively narrow organizational and
partners’ communities

A. Personal

B. Affinity

C. Corporate

D. Commercial

15) Workflow, groupware, and telepresence systems are examples of which
network application?

A. Discovery

B. Collaboration

C. Web services

D. Communications

16) Which type of e-commerce does an organization provide information and
services to its workers?

A. Business-to-employee

B. Consumer-to-business

C. Government-to-business

D. Business-to-consumer

17) _______ auctions are the most common auction model for large purchases.

A. Forward

B. Static

C. Reverse

D. Simple

18) ______ collect data from many points over an extended space.
A. Bluetooth® networks

B. Ultra-wideband networks

C. Wireless sensor networks

D. Wi-Fi networks

19) Which type of satellite has the largest footprint?

A. Low earth orbit

B. Geostationary

C. Medium earth orbit

D. Equatorial orbit

20) Which of the following is the most appropriate wireless networking standard
for creating personal area networks?

A. Wi-Fi

B. Cellular radio

C. Microwave

D. Bluetooth®

21) If cell D15 contains the formula =$C$5*D15, what is the D15 in the formula?

A. Mixed reference

B. Absolute reference

C. Circular reference

D. Range name

22) What should you do if you see a column of pound signs (###) instead of
values or results of formulas?

A. Increase the zoom percentage

B. Delete the column

C. Adjust the row height

D. Increase the column width
23) ______ feasibility determines if the project is an acceptable financial risk and
if the organization can afford the expense and time needed to complete the
project

A. technical

B. economic

C. organizational

D. behavioral

24) In the traditional systems development life cycle, users

A. have no input

B. are important only in the testing phases of the project

C. are important only in the maintenance phase of the project

D. are limited to providing information requirements

25) To create a Microsoft® PowerPoint® presentation based on an installed
template, click the

A. File tab, and then click New

B. File tab, and then click Open

C. Insert tab, and then select Add Template

D. Design tab, and then select New

26) Which of the following demotes a bullet point from the first level to the second
level in Outline view in Microsoft® PowerPoint®?

A. Shift+Tab

B. Tab

C. Decrease List Level

D. Ctrl+Tab

27) ________ connects parts of the intranets of different organizations and allows
secure communications among business partners

A. A global network
B. An intranet

C. An extranet

D. The Internet

28) ______ is a system with universally accepted standards for storing, retrieving,
formatting, and displaying information via a client/server architecture

A. FTP

B. World Wide Web

C. Newsgroups

D. The Internet

29) A process that allows users to place information in multiple, overlapping
associations is called

A. AJAX

B. tagging

C. a Wiki

D. blogging

30) ________ are websites that provide collections of content from all over the
World Wide Web

A. Aggregators

B. Social networks

C. Mashups

D. Reallysimplesyndications

More Related Content

Similar to Bis 220 final exam

BIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 versionBIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 versionlorinerba
 
BIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 versionBIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 versiontrishaavenell
 
BIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 versionBIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 versionlorinerba
 
BIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 versionBIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 versionlorinerba
 
BIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 versionBIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 versionlorinerba
 
BIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 versionBIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 versionzacherynicoloro
 
BIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 versionBIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 versionlorinerba
 
BIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 versionBIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 versionzacherynicoloro
 
BIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 versionBIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 versionzacherynicoloro
 
BIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 versionBIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 versionzacherynicoloro
 
BIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 versionBIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 versionzacherynicoloro
 
BIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 versionBIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 versionzacherynicoloro
 
BIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 versionBIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 versionzacherynicoloro
 
BIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 versionBIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 versionlorinerba
 
BIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 versionBIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 versionlorinerba
 
BIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 versionBIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 versionzacherynicoloro
 
BIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 versionBIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 versionzacherynicoloro
 

Similar to Bis 220 final exam (20)

BIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 versionBIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 version
 
BIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 versionBIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 version
 
BIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 versionBIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 version
 
BIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 versionBIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 version
 
BIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 versionBIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 version
 
BIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 versionBIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 version
 
BIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 versionBIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 version
 
BIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 versionBIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 version
 
BIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 versionBIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 version
 
BIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 versionBIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 version
 
BIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 versionBIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 version
 
BIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 versionBIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 version
 
BIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 versionBIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 version
 
BIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 versionBIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 version
 
BIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 versionBIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 version
 
BIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 versionBIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 version
 
BIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 versionBIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 version
 
BIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 versionBIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 version
 
BIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 versionBIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 version
 
BIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 versionBIS 220 Final Exam 2015 version
BIS 220 Final Exam 2015 version
 

Bis 220 final exam

  • 1. BIS 220 Final Exam PLEASE DOWNLOAD THE ANSWERS HERE BIS 220 Final Exam 1) Two information systems that support the entire organization are A. enterprise resource planning systems and dashboards B. transaction processing systems and office automation systems C. enterprise resource planning systems and transaction processing systems D. expert systems and office automation systems 2) _______ is the direct use of information systems by employees in their work A. Transaction processing systems B. End-user computing C. Decision support systems D. Management information systems 3) ______ attempt to duplicate the work of human experts by applying reasoning capabilities A. Expert systems B. Dashboards C. Business intelligence systems D. Decision support systems 4) ______ issues involve who may obtain information and how much they should pay for this information A. Privacy B. Accessibility
  • 2. C. Property D. Transferability 5) _____ issues involve collecting, storing, and disseminating information about individuals. A. Privacy B. Accuracy C. Property D. Accessibility 6) Your company’s computers have been taken over by an attacker and used to attack another organization’s information systems. Your problem is which of the following? A. Poor security policies and procedures B. Lack of due diligence C. Downstream liability D. Poor service-level agreements 7) You are the only person in your office to upgrade to Microsoft® Word 2010. Before you share documents with coworkers, you should do which of the following? A. Print out a backup copy of documents B. Run the Compatibility Checker C. Burn all documents to CD D. Create a document summary 8) Which of the following is detected by the contextual spelling checker? A. Duplicate words B. Irregular capitalization C. Use of their when you should use there D. Improper use of commas and other punctuation
  • 3. 9) If your cursor is near the bottom of a page and you want to display the next paragraph you type at the top of a new page, you should use which of the following? A. Enter B. Ctrl+PageDown C. Ctrl+Enter D. Page Layout, Breaks, Line Numbers 10) Your ______ is the collection of traceable data that is captured when you use various information technologies such as credit cards or the Internet A. data profile B. data shadow C. database file D. database record 11) No alphabetic characters in a social security number field is an example of A. data isolation B. data consistency C. data integrity D. data redundancy 12) In a database, the primary key field is used to A. specify an entity B. uniquely identify an attribute C. identify duplicated data D. uniquely identify a record 13) Search engines and metasearch engines are examples of which network application? A. Communication B. Discovery
  • 4. C. Collaboration D. Web services 14) ______ portals coordinate content within relatively narrow organizational and partners’ communities A. Personal B. Affinity C. Corporate D. Commercial 15) Workflow, groupware, and telepresence systems are examples of which network application? A. Discovery B. Collaboration C. Web services D. Communications 16) Which type of e-commerce does an organization provide information and services to its workers? A. Business-to-employee B. Consumer-to-business C. Government-to-business D. Business-to-consumer 17) _______ auctions are the most common auction model for large purchases. A. Forward B. Static C. Reverse D. Simple 18) ______ collect data from many points over an extended space.
  • 5. A. Bluetooth® networks B. Ultra-wideband networks C. Wireless sensor networks D. Wi-Fi networks 19) Which type of satellite has the largest footprint? A. Low earth orbit B. Geostationary C. Medium earth orbit D. Equatorial orbit 20) Which of the following is the most appropriate wireless networking standard for creating personal area networks? A. Wi-Fi B. Cellular radio C. Microwave D. Bluetooth® 21) If cell D15 contains the formula =$C$5*D15, what is the D15 in the formula? A. Mixed reference B. Absolute reference C. Circular reference D. Range name 22) What should you do if you see a column of pound signs (###) instead of values or results of formulas? A. Increase the zoom percentage B. Delete the column C. Adjust the row height D. Increase the column width
  • 6. 23) ______ feasibility determines if the project is an acceptable financial risk and if the organization can afford the expense and time needed to complete the project A. technical B. economic C. organizational D. behavioral 24) In the traditional systems development life cycle, users A. have no input B. are important only in the testing phases of the project C. are important only in the maintenance phase of the project D. are limited to providing information requirements 25) To create a Microsoft® PowerPoint® presentation based on an installed template, click the A. File tab, and then click New B. File tab, and then click Open C. Insert tab, and then select Add Template D. Design tab, and then select New 26) Which of the following demotes a bullet point from the first level to the second level in Outline view in Microsoft® PowerPoint®? A. Shift+Tab B. Tab C. Decrease List Level D. Ctrl+Tab 27) ________ connects parts of the intranets of different organizations and allows secure communications among business partners A. A global network
  • 7. B. An intranet C. An extranet D. The Internet 28) ______ is a system with universally accepted standards for storing, retrieving, formatting, and displaying information via a client/server architecture A. FTP B. World Wide Web C. Newsgroups D. The Internet 29) A process that allows users to place information in multiple, overlapping associations is called A. AJAX B. tagging C. a Wiki D. blogging 30) ________ are websites that provide collections of content from all over the World Wide Web A. Aggregators B. Social networks C. Mashups D. Reallysimplesyndications