C724 Information Systems Management – Pre- Assessment



C724 Information Systems Management Pre-Assessment

  1. Which activity is an example of how information systems support business functions of human resource departments?
  2. There are six major components of a computer-based information system.
  3. Which are also in the information technology component. Which two components are only parts of the information system?
  4. A police department at a large metropolitan city implemented an information system that analyzes historical crime data.
  5. So, including date and locations as well as other external, environmental, and city-related data.
  6. The system then produces daily predictive reports of the major locations around the city that are likely to require additional police attention.
  7. The police department uses the reports to plan the officers’ patrol routes, targeting the areas that the system predicted to have high likelihood of incidents.
  8. Which type of computer-based information system provides a competitive advantage based on the described scenario?
  9. A police department at a large metropolitan city implemented an information system that integrates historical crime data.
  10. So, including date and locations to other external, environmental, and city-related data.
  11. The system then produces daily predictive reports of the major locations around the city that are likely to require additional police attention.
  12. The police department uses the reports to plan the officers’ patrol routes, targeting the areas that the system predicted to have high likelihood of incidents.
  13. Which two strategies does the information system at the police department aim to accomplish?Choose 2 answers.
  14. Which business function is primarily the responsibility of production and operations information systems?
  15. A small company that is growing quickly into a medium-sized company is facing the challenge of consolidating and storing information received from multiple sources from the ground up in order to ensure that operations run efficiently.
  16. The company needs to hire an expert who will, in addition to the above, maintain security and apply upgrades as needed.
  17. Which IT professional does the company need to hire in order to address this challenge?
  18. A university is looking for ways to customize its courses to the unique needs of its students by creating various levels of hybrid online courses.
  19. So such as 80% online for one student, whereas only 30% online for another.
  20. Which IT management challenge is addressed in this scenario?
  21. A ride-sharing cab company is looking for ways to generate more business by attracting more customers.
  22. Because both on the supply (driver) and demand (passenger) side, via a strategy of tracking their monthly miles and offering “frequent flier” bonuses, just like airline companies have done.
  23. Which IT management challenge is addressed in this scenario?
  24. An automobile manufacturer is considering equipping the engines of its new models with the capability of detecting early symptoms of an imminent mechanical or electric failure, automatically transmitting that warning to the dealership.
  25. Which the customer purchased the car, and the dealership automatically contacting the customer to schedule a repair appointment.
  26. It is facing the challenge of whether all this is technically feasible and operationally viable.
  27. Who needs to address this challenge of value creation through technology use?
  28. A car dealership has been receiving complaints from its customers about its inflexible repair system in which customers who drop off their cars
  29. The previous evening is not properly placed in the queue and tend to be placed behind those who drop off their cars the morning of the scheduled repair.
  30. It needs technical staff members who understand the scheduling/drop-off operation so it can determine and articulate precise customer needs to the programmers who would then build the code behind the system. What type of challenge is this?
  31. An international company is facing the challenge of its software development team working on a specific application spread across the globe in 16 countries in 12 different time zones.
  32. Flying them to the same location once a week or even once a month for coordination purposes would be prohibitively expensive. Moreover, the issues that arise tend to be urgent and in need of almost immediate resolution in communication with team members in other countries.Which communication style is necessary to resolve the issues in the given scenario?
  33. What business strategy relies heavily on efficient and secure software implementations?
  34. What business function benefits from both wireless networks and cellular technologies?
  35. In 1965, computers had .092 MIPS, and today’s computer have about 238,000 MIPS.What business practices have taken advantage of this massive increase in computer speed?Choose 2 answers. (c724 information system)
  36. A marketing manager uses a desktop publishing software to create advertising brochures that will be mailed to potential customers.To which major software category does the desktop publishing software in this scenario belong?
  37. A company needs to allow multiple computers to have access to a shared printer.
  38. Which type of computer is required to manage the print requests to a shared printer?
  39. An art history professor would like to show an original oil painting from the eighteenth century on the classroom projector.
  40. The class is held in a large auditorium with more than 250 students attending.Which hardware component is required to digitize the painting?
  41. Which approach to systems development has a limited emphasis on the planning process and uses prototypes in lieu of predetermined specifications? (c724 information system)
  42. Which development methodology brings developers together with clients or end users in order to regularly collaborate on a solution?
  43. A company has many separate departments that focus on different business aspects and uses data warehouse subsets to hold data specific to each individual department.
  44. The company started a new department and created a new subset.What is this new subset called?
  45. An auto parts manufacturer is creating a new relational database to more accurately identify their customers and vendors.
  46. The manufacturer’s database design team decided to use “vendorID” to link a given vendor to a specific product, as illustrated in the diagram shown.
  47. What type of attribute is “vendorID”? (c724 information system)
  48. Which database type, used frequently in early style databases but much less frequently.
  49. So, today contained inflexible data relationships that formed a treelike structure?
  50. Amanda has been asked to regularly extract and process databases from many sources into a data warehouse, which will be used by several divisions within the company.
  51. Which data type should Amanda recognize is prevented by her data warehouse design?
  52. A national publisher of newspapers wants to mine its data warehouse (including inputs from social media) to identify.
  53. Which of its publication’s customers believe provides reliable reporting.Which tool is used for this initiative?
  54. A marketing research firm is planning a study involving consumer preferences toward new coffee flavors.
  55. The company needs to analyze coffee data from the coffee manufacturer, as well as preference data from consumers in order to discover whether certain flavors are more or less popular among certain segments of the population.
  56. Which database technology would help the company conduct this research project?
  57. A fast food restaurant chain is in the process of adding more restaurants in an overseas market.
  58. One of the requirements is to have a reliable and scalable database technology that allows the local restaurants, as well as the corporate office, data access regardless of the platforms and locations.
  59. Which database technology supports these business data requirements?
  60. So, Which aspect of data governance is used to ensure that once an online payment transaction is successfully processed, the credit card information is removed from the company servers?
  61. Which aspect of data governance is used to ensure that the customer data and payment information saved in the company server are properly encrypted?
  62. A marketing manager would like to study customer behavior and how it relates to customer’s purchase products from its online store.
  63. Specifically, she would like to know which website page the majority of customers spent the most time on, when and where they decided to abandon the shopping cart, and how long (on average) a customer takes to complete a sales transaction.
  64. Which database technology supports this study?
  65. So, Which telecommunication protocol is used to connect devices in a wireless local area network (LAN)?
  66. Which telecommunication protocol is used to retrieve email from a mail server?
  67. With technology trends such as the Internet of Things (IoT), Big Data, Cloud Computing, eCommerce, and mCommerce, the Internet has become a very important and useful aspect of society.
  68. To prepare for these trends and aid in technology evolution, a necessary and critical change in telecommunications was the conversion from IPv4 to IPv6.What was the primary reason to convert to IPv6?
  69. Which tactic defeats a war driver by barring access to your secured wireless network?
  70. A food truck wants to connect with its customers using a site that enables users and businesses to use public messages to create informed commerce.
  71. Which concept describes service to consumers and businesses in closing the feedback loop?
  72. Interactions between buyers and sellers are often more effective when sellers intimately understand the needs of their customers, and when customers have more information to make important decisions.
  73. Thanks to the variety of beneficial resources, information, and services made possible by the Internet, such interactions may be highly individualized, and tailored to the buyer’s purchasing capacity, and relative influence.
  74. What is another important advantage of a digital market over a traditional market, from a buyer’s perspective?
  75. Fred is an IT engineer at a small online news agency, where 35 employees carry laptops and print to the wireless printer.
  76. Recently, the company has discovered that the many Bluetooth headsets, cordless telephones, and regular usage of the breakroom microwaves are causing long-standing intermittent micro-outages at often predictable times of the day.
  77. Which solution to this problem will avoid disruption to the work environment?
  78. Sasha is an IT engineer at a small online news agency, where 35 employees carry laptops and print to the wireless printer.
  79. Several wireless access points are installed in the ceiling at appropriate points throughout the office space, though they share the same Service Set Identifier (SSID).
  80. In fact, an employee can start a large download, and then carry her laptop from one end of the office space to the other without losing her connection. Which network topology configuration supports this scenario?
  81. Which two network devices boost Wi-Fi strength for wireless devices in areas of low signal quality?Choose 2 answers.
  82. Broadband has enabled data, voice, and video to be combined and transmitted over one network. What is the name of the standard that allows this convergence between voice and data networks?
  83. Although WPA has been a secure encryption protocol for wireless networks, it is being replaced by a standard that offers even stronger security as the latest Wi-Fi encryption protocol. What is the name of this new standard?
  84. The traditional systems development lifecycle (SDLC) consists of six formal phases.
  85. Which phase of the SDLC involves developing the plan for capturing data and producing the output? (c724 information system)
  86. A hotel experiences relatively long checkout lines on Sundays when the majority of its customers check out.
  87. Replacing the hotel’s existing checkout system with an expensive state-of-the-art system has crossed the mind of top management, and yet, due to its relative monopoly in that region, the hotel’s customers tend to be rather loyal.
  88. The management is wondering whether the costs involved in installing a new system would be recouped by the new system in the long run. Which type of feasibility is presented in this scenario? 
  89. A bowling center has implemented a new expensive system in hopes of increasing its clientele. The system stores and tracks patrons’ bowling performance over time and displays for them the extent to which their performance has been improving over time.
  90. However, this new system has failed to attract more patrons.During which phase of systems development is this failure discovered?
  91. A large hotel chain needs to develop a system that would coordinate its airport shuttle service with its customers’ needs. This requires that their systems analysis staff interacts with both customers and shuttle drivers to identify and document the necessary requirements.In which role would a systems analyst assume to address this issue? (c724 information system)
  92. Which tool is appropriate for use in the design phase of information systems development to specify the detailed logic of a business.
  93. The process in narrative form in a manner easily translatable into any programming language? 
  94. A company is exploring the possibility of a merger with another company and decides to create a system model of the merged companies.
  95. In which step of the model will the company create a functional flow diagram?
  96. A corporation wishes to modify its current distribution system. The management team asks the information systems (IS) team to analyze the proposed distribution change.
  97. Upon approval of the proposed IS project, the IS team must choose the project implementation method. Which method allows the old system to operate while the new system is developed and tested?
  98. An organization is planning its yearly budgeting cycle. Management has requested the information systems team to validate current hardware and software performance.
  99. Which type of evaluation can the team use to perform this validation? (c724 information system)
  100. A business requires large amounts of data that are processed into information and used to maintain a competitive advantage over their competitors.
  101. As the business grows, the data storage and processing capabilities are becoming extremely challenging and costly. What external technological environment can be used to help address these issues?
  102. A company is considering an expansion into a new target market.
  103. The company’s management team develops a decision process to analyze current market strengths and to predict needs for the proposed new target market.
  104. Which benefit does the company gain by developing this target market decision process? (c724 information system)
  105. An online mail order company decides to create its own Customer Relationship Management (CRM) system to help management analyze customer’s purchasing patterns.
  106. To be successful at managing relationships with customers, the CRM system must have access to large amounts of customer purchasing data for analysis and report generation.
  107. Which MIS tool is also useable by the company’s CRM system?
  108. A decades-old company has several hundred employees and a modern IT infrastructure.
  109. An IT security analyst has been hired to provide a layered defense structure and must take measures to ensure confidential information remains confidential.
  110. Which activities will help the IT security analyst accomplish this goal?Choose 3 answers.
  111. A company has issued smartphones to its employees with a policy that the devices may not be used off of the company’s campus.
  112. An IT analyst has been tasked with finding a way to enforce this policy.Which solution provides a fitting solution to this problem?
  113. Hostile or intrusive software with harmful intent can take the form of executable code and greatly damage a user’s computer.
  114. Which technology can be used to minimize the chances of this happening?
  115. A regional manager has received an important financial document seemingly sent by a branch manager, but he doubts whether the report was actually sent by that manager.
  116. Which technology could be used to verify that the report was indeed sent by the branch manager?
  117. A corporation needs to improve its security policies and has decided to limit physical access to corporate computers.
  118. What value will the corporation realize with this policy? (c724 information system)
  119. A business wished to extend the use of its virus scanning software to the business’ customers. This requires the business to allow customers enough access to the internal network so virus scanning software can be downloaded to a customer’s computer.
  120. Which two security measures will the business have to take to ensure customer access for virus scanning downloads, yet protect internal systems from possible unauthorized access? Choose 2 answers.
  121. An investment banking corporation utilizes employee passwords as a data privacy measure to secure sensitive data.
  122. The IT security team has been tasked with ensuring the data is produced and modified in the correct way.
  123. Which data privacy goal is the IT security team tasked with accomplishing in this scenario?
  124. The information systems support team is asked to perform an analysis of corporate privacy measurers regarding a centralized relational database.
  125. The database is interconnected to several business groups via the internal data network that also supports connectivity to outside organizations. Which ethical risk is identified after a secondary analysis? (c724 information system)
  126. A corporation is using the encryption illustrated in the diagram below to protect business-sensitive information.
  127. What type of encryption is the corporation using?
  128. Interactive online communications, such as instant messaging, email, and video teleconferencing, have allowed managers at a large retailer to boost efficiency by enabling collaboration between geographically separate employees. However, such technologically assisted interactions have led to inappropriate conduct by employees, requiring the employer to implement processes or technological controls to reduce risk and encourage professionalism, but potentially invade employee privacy.Which technological action, if used, will represent an ethical challenge for this large retailer?
  129. Widespread use of the Internet caused disruption and quick evolution within the music industry.
  130. Responses to widespread Internet usage included technological evolutions, such as uniquely identifiable digitally tagged files, and the passage of laws that penalized file sharing.
  131. Which type of e-commerce put music industry artists, publishers, and retailers at risk of losing potential revenue due to widespread use of the Internet?
  132. Large established businesses often have networks of other businesses within their supply chains in order to maintain the flow of information and materials.
  133. Company A is an organization that hosts its own marketplace of suppliers in order to facilitate the pursuit of its own interests.Which network describes Company A’s example of e-commerce? (c724 information system)
  134. Another help facilitate business in areas without traditional infrastructure, some companies offer devices that allow businesses to accept credit cards with their tablets and cell phones.
  135. Which business model category do these companies fall in?
  136. Mary purchased a digital camera from an online store for her upcoming road trip. What is the e-commerce model of the online store?
  137. Another Company A ordered printer toner cartridges from Company B. Company B ships the products to Company A every two months.
  138. What is the e-commerce model described in this scenario?
  139. Therefore, printed catalogues are still produced and mailed by specialty retailers, for most of these retailers a customer can place an order immediately at the website instead of mailing an order form.
  140. Which specific feature of e-business enables this opportunity?
  141. Customers wish to have the capability of performing tasks anytime, anywhere.
  142. Because without being tethered to a desktop computer.
  143. Which term describes computer programs designed specifically for this purpose?
  144. Which two benefits can a business realize by using social media to connect to customers? Choose 2 answers. (c724 information system)
  145. A candidate is applying for a job at a local company. His resume listed the most recent position as a supervisor at XYZ Corp.
  146. However, his social media profile indicated the position during the same time period as a manager at XYZ Corp.
  147. Which aspect of the job candidate’s qualification can negatively affect his hiring potential?
  148. Which feature of social media websites can a job seeker use to convince prospective employers that the job seeker’s talents are real and are already valued by a number of other individuals and organizations?
  149. So, check out our latest Tutorials and Courses on HCA 430.

c724 information system