Review Quiz: MIS/AIS Concepts

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

What term refers to the processes that transform data into usable information and knowledge?

  • Knowledge system
  • Computer system
  • Information system (correct)
  • Database system

Which category of information system does a point-of-sale (POS) system, like the one used by Johnny's Lunch, fall under?

  • Decision Support System (DSS)
  • Management Information System (MIS)
  • Accounting Information System (AIS)
  • Transaction Processing System (TPS) (correct)

What term is used to describe disaster recovery and business continuity planning in IT system operations?

  • Operating Loss
  • New Segment
  • Discontinuing operations
  • Service continuity management (correct)

Which of the following is NOT a task typically required in infrastructure operations?

<p>Running recreation games (B)</p> Signup and view all the answers

What is the term used to describe a set of interrelated subsystems that work together to collect, process, store, transform, and distribute information?

<p>Information System (B)</p> Signup and view all the answers

What type of information system model enables an organization to automate and integrate its key business processes?

<p>Enterprise Resource Planning (ERP) Systems (D)</p> Signup and view all the answers

What is the term for the collection of high-level activities that ensure an organization’s information security program is adequate and operating properly?

<p>Information security management (D)</p> Signup and view all the answers

Which type of software manages the computer's processes and acts as an interface between the user, application software, and hardware?

<p>Operating system (B)</p> Signup and view all the answers

If two or more computers are connected to share information, they form a:

<p>Network (A)</p> Signup and view all the answers

What does data become?

<p>Information (B)</p> Signup and view all the answers

What is an application software primarily used for?

<p>Used for specific information processing needs like payroll and customer relationship management (C)</p> Signup and view all the answers

If a university establishes a web-based system for faculty to record grades and advise students, it is an example of:

<p>Intranet (D)</p> Signup and view all the answers

Who determines the classification level of information?

<p>The person who creates it (C)</p> Signup and view all the answers

How should you transfer sensitive business data to 3rd parties?

<p>Not at all, the transfer of sensitive business data is not allowed (D)</p> Signup and view all the answers

Which statement about using WIFI is correct?

<p>Use VPN with WIFI networks when traveling (B)</p> Signup and view all the answers

How can you verify the authenticity of a caller?

<p>Call the switchboard or desk of the company that he/she claimed to be calling from and ask to be put through (B)</p> Signup and view all the answers

Does multi-factor authentication offer improved protection?

<p>Yes, but no method provides 100% protection; one-time codes can also be phished (D)</p> Signup and view all the answers

Which model represents the traditional manual approach to recording accounting transactions?

<p>Manual Process Model (A)</p> Signup and view all the answers

Who operates the system and performs various functions in an organization?

<p>People (B)</p> Signup and view all the answers

Which system supports daily business operations with numerous documents and messages for users throughout the organization?

<p>Transaction processing system (C)</p> Signup and view all the answers

What is the correct way to protect hard copies of confidential documents?

<p>Lock them away (D)</p> Signup and view all the answers

How should you correctly deal with visitors in an organization?

<p>Pick them up at the reception and accompany them throughout their visit (B)</p> Signup and view all the answers

In urgent cases, to whom can you give your password?

<p>No one (D)</p> Signup and view all the answers

What step is not recommended in checking emails for phishing?

<p>Tagging them as spam to trigger a technical check (C)</p> Signup and view all the answers

How should you handle a negative comment about the company on a social network?

<p>Informing the company's Communications department (B)</p> Signup and view all the answers

Which social media practice can compromise a company's security?

<p>Including information about company structure and department in a private profile (D)</p> Signup and view all the answers

What is not a danger of leaving a computer screen unlocked?

<p>Immediate installation of spyware to control the computer (D)</p> Signup and view all the answers

Which of the following is a secure password?

<p>P@sswrd (A)</p> Signup and view all the answers

Flashcards are hidden until you start studying

More Like This

Use Quizgecko on...
Browser
Browser