0% found this document useful (0 votes)
28 views6 pages

Drives, Ipads, and Flash Drives... Etc. Boot Program, Manages All The Other Programs in A Computer

The document defines several key terms related to information systems including data, hardware, operating systems, software, information systems, users, artificial intelligence, and how businesses use information systems. It also discusses inputs, outputs, feedback, and components of an information system.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
28 views6 pages

Drives, Ipads, and Flash Drives... Etc. Boot Program, Manages All The Other Programs in A Computer

The document defines several key terms related to information systems including data, hardware, operating systems, software, information systems, users, artificial intelligence, and how businesses use information systems. It also discusses inputs, outputs, feedback, and components of an information system.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

Data: A collection of facts, that is intangible.

Hardware: The physical components of the technology. Computers, keyboards, disk


drives, iPads, and flash drives... etc.
Operating System: The program that, after being initially loaded into the computer by a
boot program, manages all the other programs in a computer.
Software: A set of instructions that tells the hardware what to do, it is not tangible.:
Information System (IS): The study of complementary networks of hardware and
software that people and organizations use to collect, filter, and process, create, and
distribute data.
User: The person who uses and operates a computer or other machine

Artificial intelligence (AI): Computer system takes on characteristics of human


intelligence.
Businesses: Information system feedback can help organizations achieve their
goals, increase revenues and reduce costs
3/ Inputs: -Activity of gathering and capturing raw data
-Processing mechanisms: Converting data into useful outputs
-Outputs: Production of useful information, usually in the form of documents and
reports
Feedback: Information from the system that is used to make changes to input or
processing activities
-Think of this in a way that we have an idea that gets inputted into our info systems
and then we send that idea out into the world, waiting for its feedback to see if the
product is good.̣( Components of a system)
Computer literacy:Knowledge of hardware, software, databases and
telecommunications and the ways they function
Data: Raw facts. Process of data gets transferred into information after being
inputted.
Database: Organized collection of facts and information, typically consisting of two
or more related data files.
Which of the following is a set of interrelated components that collect, manipulate,
store, and disseminate data and information and provide a feedback mechanism to
meet an objective?
a. data
b. information system
c. Knowledge
d. Organization
________ is a collection of facts organized so that they had additional value beyond
the value of the facts themselves?
Statistics
Which of the following is the awareness and understanding of a set of information
and the ways the information can be made useful to support a specific task or reach
a decision?
a. information
b. statistics
c. knowledge
d. database
A clothing store chain tracks the sale of each product at each location. Managers
use this information to calculate the organizations profits, to track inventory needs,
and to determine which styles and fabrics are the most popular among its
customers. This is an example of quality information that is______?
a. relevant
b. flexible
c. economical
d. verifiable
Which of the following is a series of a ctivites than an organization performs to
transform inputs into outputs in such a way that the value of the input is increased?
a. Value chain
b. supply chain
c. SCM
d. process chain
Which of the following theories explains how a new idea or product gains
acceptance and spreads through a specific population or subset of an organization?
a. contingency theory
b. diffusion of innovation theory
c. two-factor theory
d. Public choice theory
_____ are responsible for running and Maintaining information system equipment
and also for scheduling, hardware maintenance, and preparing input and output
a. system operators
b. data-entry operators
c. local area network operators
d. web operators
Which professional in the operations group sets up and manages the network
hardware, software, and security processes?
a. LAN Administrator
b. System operator
c. Data center manager
d. IS security analysts
In most large organizations, the IS department is divided into the following functions
a. operations, development, and support
b. operations and development
c. systems, operations, and development
d. operations and support

The role of the ________ is to employ an IS department's equipment and personnel to


help the organization attain its goal
CIO (Chief Information Officer)
Which of the following is software used to help protect personal data and screen
objectionable Internet content?
a. filtering software
b. screening software
c. antivirus software
d. web software
_______ is an act, directed at Web sites catering to children, that requires site owners
to post comprehensive privacy policies and to obtain parental consent before they
collect any personal information from children under 13 years of age
a. Health Insurance Portability and Accountability Act
b. Gramm-Leach Bliley Act
c. Fair and Accurate Credit Transactions Act of 2003
d. Children's Online Privacy Protection Act (COPPA)
______ involves publishing an intentionally false written statement that is damaging
to a person's or an organizations reputation
a. Phishing
b. Slander
c. Vishing
d. Libel
Which of the following makes it difficult for decision makers, within a business, to
collaborate and share information?
a. information systems
b. data systems
c. smartphones
d. unintegrated information systems
Which of the following is a series of electronic pulses produced at a predetermined
rate that affects machine cycle time?
a. Clock Speed
b. gigahertz
c. fetch
d. bus
________ rapidly provides data and instructions to the processor (CPU)
a. bus
b. main memory
c. input/output device
d. processor

________ is the use of a collection of computers, often owned by many people or


different organizations, to work in a coordinated manner to solve a common problem
a. cloud computing
b. parallel computing
c. grid computing
d. web computing
A type of memory whose contents are lost if the power is turned off is said to be
________.
a. nonvolatile
b. volatile
c. inaccessible
d. nonadjacent
A _______ is a low cost, centrally managed computer with no internal or external
attached drives for data storage with limited capabilities
a. nettop computer
b.cloud computer
c. thin client
d. workstation
We have an expert-written solution to this problem!
The ethical imperative that "care must be taken when recycling or destroying
electronic devices to avoid contaminating the environment" is associated
with________.
Green Computer
One of the advantages of off-the shelf software is that ___________.
a. an organization does not have to pay for features that are not required and never
used
b. the software always matches current work processes and data standards
c. the initial cost is lower because the software firm can spread the
development costs over many customers
d. the software contain important features, thus elimination the need for future
modification and customization
__________ is an open-source operating system whose source code is freely
available to everyone
a. Linux
b. Mac OS X
c. Chrome
d. Unix
We have an expert-written solution to this problem!
All of the following are examples of activities performed by an operating system
EXCEPT _______.
a. allowing a user to manage system memory
b. allowing a user to control common computer hardware functions
c. allowing a user to manage files
d. allowing a user to do word processing

You might also like