logo image

MIS Test 3

Tab
A_____delimiter is often the best way of separating text columns because text delimited this way can include spaces of commas within each other.
1) Space
2) Comma
3) Tab
4) Dash
Relational
Databases such as those created in Access are examples of___ databases which reduce data redundancy and increase data integrity.
1) Pivot
2) Relational
3)Linked
4)Embedded
Advance
If you are importing international data from a text file, click the____ button in Step 3 of the Text Import Wizard to specify a different character for the decimal point and thousands separator.
1) Next
2)Number
3) Advance
4) General
RTD
Once you insert the____ function into a cell, the value of the cell will display the latest value retrieved from a measuring device.
1) Schema
2) XML
3) RTD
4) Real
SQL
One way to interact with a database is with a query language. The most popular query language is____.
1) ODC
2) UDC
3) OLE
4) SQL
Rich Text
The____ formatting only option retrieves the text from a web query along with simple formatting, but not advanced formatting such as hyperlinks or complicated table structures.
1) Rich Text
2) Text
3) Default
4) Normal
Period
The following is an example of a delimiter:____.
1) #
2) $
3) Tab
4) Period
URL
To create a web query, you need to know the____ of the resource (usually a webpage) you are accessing.
1) FTP
2) URL
3) HTTP
4) HTML
Clicking
You insert a new column break in the Text Import Wizard by___ the position in the Data preview window where you want the break to appear.
1) Double-Clicking
2) Clicking
3) Triple-Clicking
4) Right-Clicking
Common
You relate table to one another by using___ field.
1) Key
2) Common
3) Indexed
4) Date
CVP
____ analysis is an important business decision-making tool because it predicts the effect of cutting overhead or raising prices on net income.
1) CVP
2) MVP
3) EVP
4) AVP
Fixed
A business must pay insurance and rent; these are example of___ expenses.
1) Fixed
2) Variable
3) Mixed
4) Transitional
Names
Before using Scenario Manager, you should assign_____ to all the input and result cells you intend to use in your scenarios.
1) Cells
2) Names
3) Ranges
4) Ranks
Row
If you orient a one-variable table so that the input values are in the first row, you would use the____ input cell option.
1) Column
2) Row
3) Values
4) Table
Variable
In Solver, changing cells are sometimes referred t as___ cells.
1) Self-Adjusting
2) Variable
3) Key
4) Constraint
Upper-Left
In two-variable tables, you must always place a reference to the result cell in the___ corner of the table at the intersection of the row values and the column values.
1) Upper-Right
2) Upper-Left
3) Lower-Right
4) Lower-Left
Variable cell, objective cell, and constraints
The three items that you must specify when using Solver are___.
1) Target cell, input value, and results
2) Target cell, variable cell, and parameters
3) Variable cell, parameters, and constraints
4) Variable cell, objective cell, and constraints
Create scenarios
To perform a what-if analysis with more than two input cells, you___.
1) Hide all references
2) Use only exchange values
3) Apply additional constraints
4) Create scenarios
Result
With Goal Seek, you specify the___ values you want.
1) Result
2) Constraint
3) Exchange
4) Index
Animation
The Media___ category appears only when a media object- either video or audio- is selected on a slide.
1) Cartoon
2) Animation
3) Transition
4) Movement
Insert
To draw a shape, click the Shapes button in the illustration group on the___ tab, click a shape in the gallery, and then click and drag the shape in the size you want.
1) File
2) Home
3) Insert
4) Design
False (Insert)
To add a sound clip to slide, you use the Audio button in the Media group on the DESIGN tab.
True or False
True
To convert a diagram to a bulleted list, after selecting the diagram, the next step is to click the Convert button on the SMARTART TOOLS DESIGN tab, in the Reset group.
True or False
Title and Content
A commonly used layout is the___ layout.
1) Blank
2) Section Header
3) Title and Content
4) Picture with Caption
Cropping
In PowerPoint terms,____ a photo means cutting out the parts you don’t want to include.
1) Snipping
2) Cropping
3) Trimming
4) Dashing
Handouts
When you print____, the presentation is printed with one or more slides on each piece of paper.
1) Full Page Slides
2) Notes Pages
3) Outline
4) Handouts
220
When you save a presentation that contains photos, PowerPoint automatically compresses the photos to a resolution of____ pixels per inch (ppi).
1) 120
2) 180
3) 220
4) 280
False
The 7 x 7 rule means you should include no more than seven words per slide.
True or False
View
To display two open presentations side by side, click the___ tab and then in the Window group, click the Arrange All button.
1) File
2) View
3) Insert
4) Review
Common Field
Which term identifies a field that appears in two separate tables and may be used to connect records in the separate tables?
1) Primary Key Field
2) Field Value
3) Foreign Key Field
4) Common Field
Field Value
The specific content of a field is referred to as the____.
1) Field Content
2) Field Value
3) Table Value
4) Column Value
Relational Database Management System
Data organized as a collection of tables creates this type of data system.
1) Database
2) Database Management System (DBMS)
3) Primary Key System
4) Relational Database Management System
4
Which of the following would be a likely reason that an import process from an Excel spreadsheet to an Access database might fall?
1) There is no relationship between tables
2) The Excel and Access caption property values to do not match
3) The data was entered incorrectly
4) The Access field names and the Excel worksheet column headings do no match
Join Line
The common field between two tables in the Relationship window is indicated by a(n)____.
1) Key Icon
2) Field Name
3) Join Line
4) Infinity Symbol
1
What is the purpose of the primary key?
1) To uniquely identify each record in a table
2) To uniquely identify each table in a database
3) To create a relationship between two tables in a database
4) To create a relationship for queries in a database
Delimited
It is important that data being imported from a text file into Access are separated by a character, such as a comma, which defines the text file as a(n)___ text file.
1) Imported
2) Readable
3) Delimited
4) External
False
Compacting a database rearranges the data and objects in a database to decrease its file size.
True or False
True
The default key for an Access database is the ID Field.
True of False
True
A single characteristic or attribute of a person, place, object, event or idea is a(n) table.
True or False
.accdb
Which of the following is the file extension used for Access 2013 database file?
1) .mdb
2) .acdbs
3) .accdb
4) .dbacc
Short Text
Which data type allows field values to contain letters, digits, and other characters?
1) Short Text
2) AutoNumber
3) Currency
4) Date/Time
Field
Each column in an Access table datasheet represents a____.
1) Query
2) Record
3) Field
4) Primary Key
Big Data
Data so voluminous that conventional computing methods are not able to efficiently process and manage it
Business Analytics (BA)
Uses data and statistical methods to gain insight into the data and provide decision makers with information they can act on
Data Dictionary
Stores definitions, such as data types for fields, default values, and validation rules for data in each field
Data Hierarchy
The structure and organization of data warehouse, used by a single department or function
Data Model
Determines how data is created, represented, organized, and maintained. It usually contains data structure, operations, and integrity rules.
Data Warehouse
A collection of data from a variety of sources used to support decision-making applications and generate business intelligence
Data-Driven Website
Acts as an interface to a database, retrieving data for users and allowing users to enter data in the database
Data-Mining Analysis
Used to discover patterns and relationships
Database
A collection of related data that is stored in a central location or in multiple locations
Database Administrator (DBA)
Found in large organizations, design and set up databases, establish security measures, develop recovery procedures, evaluate database performance, and add and fine-tune database functions
Database Management System (DBMS)
Software for creating, storing, maintaining, and accessing database files. It makes using databases more efficient
Distribution Database Management System (DDBMS)
Stores data on multiple servers throughout an organization
Extraction, Transformation, and Loading (ETL)
The processes used in a data warehouse. It includes extracting data from outside sources, transforming it to fit operational needs, and loading it into the end target (database or data warehouse)
Foreign Key
A field in a relational table that matches the primary key column of another table. It can be used to cross-reference tables
Fragmentation
Addresses how tables are divided among multiple locations. There are three variations: horizontal, vertical, and mixed.
Normalization
Improves database efficiently by eliminating redundant data and ensuring that only related data is stored in a table.
Logical View
How information appears to users and how it can be organized and retrieved.
Physical View
Involves how data is stored on and retrieved from storage media, such as hard disks, magnetic tapes, or CDs.
Primary Key
Uniquely identifies every record in a relational database. Examples include student ID numbers, account numbers, Social Security numbers, and invoice numbers.
Query by Example (QBE)
You request data from a database by constructing a statement made up of query forms. With current graphical databases, you simply click to select query forms instead of having to remember keywords, as you do with SQL. You can add AND, OR, and NOT operators to the QBE form to fine-tune the query.
Relational Model
Uses a two-dimensional table of rows and columns of data. Rows are records (also called tuples), and columns are fields (also referred to as attributes).
Structured Query Language (SQL)
A standard fourth-generation query language used by many DBMS packages, such as Oracle 11g and Microsoft SQL Server. It consists of several keywords specifying actions to take.
Binding Constraint
A constraint that must be included in the Solver model, and is a limiting factor in arriving at the solution. (EX 644)
Break-Even Analysis
Another term for cost-volume-profit (CVP) analysis, a branch of financial analysis that studies the relationship between expenses, sales volume, and profitability. (EX 600)
Break-Even Point
The point where total revenue equals total expenses
Constraint
A limit that is placed on the solution to a set of possible values. (EX 631)
Cost-Volume Profit (CVP) analysis
A branch of financial analysis that studies the relationship between expenses, sales volume, and profitability; sometimes called break-even analysis. (EX 598)
Cost-Volume-Profit (CVP) Chart
A chart that graphs revenue and total expenses against sales volume; the point where the two lines cross is the break-even point. (EX 600)
Fixed Expense
An expense that must be paid regardless of sales volume. (EX 598)
Input Cell
A cell that contains a value that is used in a formula of a what-if analysis. (EX 596)
Iterative Procedure
The approach by which solver starts with an initial solutions (usually the current values from the worksheet) and uses that as a basis to calculate a new set of values to arrive at an optimal solution. (EX 642)
One-Variable Data Table
A data table used to perform several what-if analysis by specifying one input cell and several result cells. (EX 642)
Result Cell
A cell that contains the outcome of a formula involving input cells. (EX 596)
Result Value
A value in a data table that comes from a formula applied to one or more input values. (EX 596)
Scenario Manager
An Excel feature used to create as many scenarios as you want and switch between them to display the results of several what-if analyses within a worksheet. (EX 616)
Sensitivity Report
A report created by Solver that is often used in science and engineering to investigate the mathematical aspects of the Solver solutions. (EX 642)
Slack
The difference between the value in the cell and the value at the limit of the constraint. (EX 644)
Solver
An Excel add-in that searches for the optimal solution to a problem involving several variables. (EX 631)
Two-Variable Data Table
A data table used to perform several what-if analyses by specifying two input cells and one result cell. (EX 597)
Variable Cell
An input cell whose values Solver changes in order to reach a solution for the objective cell. (EX 630)
Variable Expense
An expense that changes in proportion to the volume of production. (EX 598)
Systems Development Life Cycle (SDLC)
Also known as the “waterfall model”, is a series of well-defined phases performed in sequence that serves as a framework for developing a system or project
Planning Phase
One of the most crucial phases of the SDLC model, the systems designer must define the problem the organization faces, taking care not to define symptoms rather than the underlying problem
Internal Users
Are employees who will use the system regularly, and they can offer important feedback on the system’s strengths and weaknesses.
External Users
Are not employee’s but do use the system; they include customers, contractors, suppliers, and other business partners. Although they are not normally part of the task force, their input is essential.
Joint Application Design (JAD)
Is a collective activity involving users, top management, and IT professionals. It centers on a structured workshop (called a JAD session) where users and system professionals come together to develop an application.
Feasibility Study
It analyzes a proposed solution’s feasibility and determines how best to present the solution to management. It usually has five major dimensions: economic, technical, operational, scheduling, and legal.
Economic Feasibility
Assesses a system’s costs and benefits.
Technical Feasibility
Is concerned with the technology to be used in the system. The team needs to assess whether the technology to support the new system is available or feasible to implement.
Operational Feasibility
Is the measure of how well the proposed solution will work in the organization and how internal and external customers will react to it.
Scheduling Feasibility
Is concerned with whether the new system can be completed on time.
Legal Feasibility
Is concerned with legal issues, including political repercussions and meeting the requirements of the Information Privacy Act.
Design Phase
Phase where an analysts choose the solution that is the most realistic and offers the highest payoff for the organization.
Computer-Aided Systems Engineering (CASE)
Tools automate parts of the application development process. These tools ae particularly helpful for investigation and analysis in large-scale projects because they automate parts of the design phase.
Prototyping
A small-scale version of the system is developed, but one that is large enough to illustrate the system’s benefits and allow users to offer feedback.
Proof-Of-Concept Prototype
Shows users how a particular task that was not technically feasible can be done.
Selling Prototype
Is used to sell a proposed system to users or management by showing some of its features.
Implementation Phase
The solution is transferred from paper to action, and the team configured the system and procures components for it.
Parallel Conversion
The old and new systems run simultaneously for a short time to ensure the new systems works correctly
Request for Proposal (RFP)
Is a written document with detailed specifications that used to request bids for equipment, supplies, or services from vendors
Request for Information (RFI)
Is a screening document for gathering vendor information and narrowing the list of potential vendors. It can help manage the selection of vendors by focusing on the project requirements that are crucial to selecting vendors.
Insourcing
Happens where an organization’s team develops the system internally
Nonrepudiation
Is a method for binding all the parties to a contract.
Spam
Is an unsolicited e-mal sent for advertising purposes
Cookies
Are small text files with unique ID tags that are embedded in a Web browser and saved on the user’s hard drive
Log Files
Are generated by Web server software, record a user’s actions on a Web site.
Cybersquatting
Is registering, selling, or using a domain name to profit from someone else’s trademark
Record
A collection of fields about a specific object is a(n)____.
1) Attribute
2) File
3) Record
4) Primary Key
Files
A database is a collection of integrated and related___.
1) Fields
2) Files
3) Records
4) Attributes
Attribute
As long as the tables in a relational database share one common____, the tables can be linked to provide useful information and reports.
1) Primary Key
2) File
3) Characteristic
4) Attribute
Shared Data and Information Resources
The DBMS organizes the data independently of the application programs, so the application is not affected by the location or type of data. This is an exampled of____.
1) Improved Data Integrity
2) Shared Data and Information Resources
3) Data and Program Independence
4) Better Overall Protection of the Data
Bit
The smallest piece of data used by a computer is the____.
1) Terrabyte
2) Field
3) Character
4) Bit
True
A collection of fields about a specific object is a record.
True or False
False
A database provides one of many points of management and control over data resources.
True or False
False
An attribute is a general class of people, places, or things for which data is collected, stored, and maintained.
True or False
False
Business intelligence turns data into useful information that then is kept closely guarded to avoid this information from falling into the hands of the wrong employees.
True or False
True
Data centers are approaching the point of automation, where they can run and manage themselves while being monitored remotely in a “lights out” environment.
True or False
False
Due to their size, databases must be stored on mainframe computers or other large, powerful computers.
True or False
True
One of the primary advantages of a relational database is that is allows table to be linked to reduce dat redundancy and allow data to be organized more logically.
True or False
False
The Database Administrator decides the contents of the database with little or not input from the users of the database.
True or False
True
A DBMS serves as an interface between an application program and the database
True or False
True
The raw data necessary to make sound business decisions is stored in a variety of locations and formats.
True or False
False
The relational model describes data using a standard tabular format; all data elements are placed in three-dimensional tables called relations, which are the logical equivalent of files.
True or False
True
Today, most organizations use the database approach to data management, where multiple information systems share a pool of related data.
True or False
Data correction
____ involves reentering data that was not typed or scanned correctly.
1) Data editing
2) Data correction
3) Data manipulation
4) Data collection
Increase the accuracy of order processing and order fulfillment
Conversion to an e-commerce or m-commerce system enables an organization to___.
1) More easily implement ERP systems
2) Increase the accuracy of order processing and order fulfillment
3) Increase the prices of its goods and services
4) All of the above
Disintermediation
The elimination of intermediate organizations between the producer and the consumer is called___.
1) Disintermediation
2) Social Networking
3) Market Segmentation
4) None of the above
Scope
The number and types of data items that must be loaded into a new ERP system depend on the___ of the ERP implementation.
1) Scope
2) Schedule
3) Cost
4) None of the above
False
Although conversion to an e-commerce or m-commerce system enables organizations to reduce the cost of business, it seldom results in increased accuracy of order processing and order fulfillment.
True or False
True
An electronic exchange enables competitors and suppliers to buy nd sell goods, trade market information, and run back-office applications.
True or False
False
Capturing and gathering all data necessary to complete the processing of transactions is called data input.
True or False
True
Digital certificates verify both purchaser and supplier identities in an e-commerce transaction.
True or False
False
Only the largest of the Fortune 500 organizations can afford or justify the expense of implementing an ERP system.
True or False
False
Supply chain management software automates and integrates the functions of sales, marketing, and service in an organization.
True or False
False
The B2B market is considerably smaller than the B2C market although it is growing more rapidly.
True or False
False
The hand-held devices used for m-commerce have few, if any, limitations that complicate their use.
True or False
False
The length of the sales process for typical B2B sale is much faster tan for the typical C2C sale.
True or False
Schedule Feasibility
____ determines whether the project can be completed in a reasonable amount of time.
1) Economic Feasibility
2) Legal Feasibility
3) Operational Feasibility
4) Schedule Feasibility
Prototyping
___ takes an iterative approach to the systems development process.
1) Rapid Application Development
2) Prototyping
3) Traditional Systems Development
4) None of the above
Systems Analyst
A professional who specializes in analyzing and designing business systems is called a(n)___.
1) Programmer
2) Stakeholder
3) End User
4) Systems Analyst
Systems analysis
During the___ phase of the systems development life cycle, people attempt to answer the questions “What must the information system do to solve the problem?”
1) Systems Investigation
2) Systems Implementation
3) Systems Design
4) Systems Analysis
Agile Development
The___ system development approach requires cooperation and frequent face-to-face meetings with all project participants as they modify, refine, and test how the system meets users’ needs and what its capabilities are.
1) Prototyping
2) Agile Development
3) Extreme Programming
4) None of the above
Testing
The first of the systems implementation tasks is____.
1) User Acceptance
2) Site Preparation
3) Testing
4) Hardware Acquisition
A prioritized list of system requirements
The primary outcome of the systems analysis phase is___.
1) A prioritized list of system requirements
2) Data models needed to build the new system
3) Case diagrams to be used in a system design
4) Identify sources of data for the new system
Installation
The process of physically placing the computer equipment on the site and making it operational is called___.
1) Site Preparation
2) User Acceptance
3) Installation
4) Start-Up
Systems Implementation
The training of end users is an important task in the___ phase of a systems development project.
1) System Design
2) Systems Maintenance and Review
3) Systems Implementation
4) None of the above
True
A parallel start-up involves running the new system for one group of users while the rest of the users still run the old system.
True or False
True
Each generation of a prototype is a refinement of the previous generation based on user feedback.
True or False
False
Getting users and stakeholders involved in systems development is not critical to the success of a systems development effort.
True or False
True
In general, continuous improvement projects have a higher degree of success than reengineering projects.
True or False
True
In general, smaller projects have a higher probability of success than larger projects.
True
Information systems planning transforms organizational goals outlined in the strategic plan into specific system development activities.
True or False
False
Proper planning can guarantee that projects will not fall behind schedule, go over budget, or not meet expectations.
True or False
False
System users and system stakeholders are essentially the same set of people.
True or False
True
The use of virtual servers can help save energy and space.
True or False

Need essay sample on "MIS Test 3"? We will write a custom essay sample specifically for you for only $ 13.90/page

Can’t wait to take that assignment burden offyour shoulders?

Let us know what it is and we will show you how it can be done!
×
Sorry, but copying text is forbidden on this website. If you need this or any other sample, please register

Already on Businessays? Login here

No, thanks. I prefer suffering on my own
Sorry, but copying text is forbidden on this website. If you need this or any other sample register now and get a free access to all papers, carefully proofread and edited by our experts.
Sign in / Sign up
No, thanks. I prefer suffering on my own
Not quite the topic you need?
We would be happy to write it
Join and witness the magic
Service Open At All Times
|
Complete Buyer Protection
|
Plagiarism-Free Writing

Emily from Businessays

Hi there, would you like to get such a paper? How about receiving a customized one? Check it out https://goo.gl/chNgQy

We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy