Review Quiz: MIS/AIS Concepts
28 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What term refers to the processes that transform data into usable information and knowledge?

  • Knowledge system
  • Computer system
  • Information system (correct)
  • Database system

Which category of information system does a point-of-sale (POS) system, like the one used by Johnny's Lunch, fall under?

  • Decision Support System (DSS)
  • Management Information System (MIS)
  • Accounting Information System (AIS)
  • Transaction Processing System (TPS) (correct)

What term is used to describe disaster recovery and business continuity planning in IT system operations?

  • Operating Loss
  • New Segment
  • Discontinuing operations
  • Service continuity management (correct)

Which of the following is NOT a task typically required in infrastructure operations?

<p>Running recreation games (B)</p> Signup and view all the answers

What is the term used to describe a set of interrelated subsystems that work together to collect, process, store, transform, and distribute information?

<p>Information System (B)</p> Signup and view all the answers

What type of information system model enables an organization to automate and integrate its key business processes?

<p>Enterprise Resource Planning (ERP) Systems (D)</p> Signup and view all the answers

What is the term for the collection of high-level activities that ensure an organization’s information security program is adequate and operating properly?

<p>Information security management (D)</p> Signup and view all the answers

Which type of software manages the computer's processes and acts as an interface between the user, application software, and hardware?

<p>Operating system (B)</p> Signup and view all the answers

If two or more computers are connected to share information, they form a:

<p>Network (A)</p> Signup and view all the answers

What does data become?

<p>Information (B)</p> Signup and view all the answers

What is an application software primarily used for?

<p>Used for specific information processing needs like payroll and customer relationship management (C)</p> Signup and view all the answers

If a university establishes a web-based system for faculty to record grades and advise students, it is an example of:

<p>Intranet (D)</p> Signup and view all the answers

Who determines the classification level of information?

<p>The person who creates it (C)</p> Signup and view all the answers

How should you transfer sensitive business data to 3rd parties?

<p>Not at all, the transfer of sensitive business data is not allowed (D)</p> Signup and view all the answers

Which statement about using WIFI is correct?

<p>Use VPN with WIFI networks when traveling (B)</p> Signup and view all the answers

How can you verify the authenticity of a caller?

<p>Call the switchboard or desk of the company that he/she claimed to be calling from and ask to be put through (B)</p> Signup and view all the answers

Does multi-factor authentication offer improved protection?

<p>Yes, but no method provides 100% protection; one-time codes can also be phished (D)</p> Signup and view all the answers

Which model represents the traditional manual approach to recording accounting transactions?

<p>Manual Process Model (A)</p> Signup and view all the answers

Who operates the system and performs various functions in an organization?

<p>People (B)</p> Signup and view all the answers

Which system supports daily business operations with numerous documents and messages for users throughout the organization?

<p>Transaction processing system (C)</p> Signup and view all the answers

What is the correct way to protect hard copies of confidential documents?

<p>Lock them away (D)</p> Signup and view all the answers

How should you correctly deal with visitors in an organization?

<p>Pick them up at the reception and accompany them throughout their visit (B)</p> Signup and view all the answers

In urgent cases, to whom can you give your password?

<p>No one (D)</p> Signup and view all the answers

What step is not recommended in checking emails for phishing?

<p>Tagging them as spam to trigger a technical check (C)</p> Signup and view all the answers

How should you handle a negative comment about the company on a social network?

<p>Informing the company's Communications department (B)</p> Signup and view all the answers

Which social media practice can compromise a company's security?

<p>Including information about company structure and department in a private profile (D)</p> Signup and view all the answers

What is not a danger of leaving a computer screen unlocked?

<p>Immediate installation of spyware to control the computer (D)</p> Signup and view all the answers

Which of the following is a secure password?

<p>P@sswrd (A)</p> Signup and view all the answers

More Like This

Use Quizgecko on...
Browser
Browser