🎧 New: AI-Generated Podcasts Turn your study notes into engaging audio conversations. Learn more

Review Quiz: MIS/AIS Concepts
28 Questions
1 Views

Review Quiz: MIS/AIS Concepts

Created by
@EnticingDieBrücke

Podcast Beta

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What term refers to the processes that transform data into usable information and knowledge?

  • Knowledge system
  • Computer system
  • Information system (correct)
  • Database system
  • Which category of information system does a point-of-sale (POS) system, like the one used by Johnny's Lunch, fall under?

  • Decision Support System (DSS)
  • Management Information System (MIS)
  • Accounting Information System (AIS)
  • Transaction Processing System (TPS) (correct)
  • What term is used to describe disaster recovery and business continuity planning in IT system operations?

  • Operating Loss
  • New Segment
  • Discontinuing operations
  • Service continuity management (correct)
  • Which of the following is NOT a task typically required in infrastructure operations?

    <p>Running recreation games</p> Signup and view all the answers

    What is the term used to describe a set of interrelated subsystems that work together to collect, process, store, transform, and distribute information?

    <p>Information System</p> Signup and view all the answers

    What type of information system model enables an organization to automate and integrate its key business processes?

    <p>Enterprise Resource Planning (ERP) Systems</p> Signup and view all the answers

    What is the term for the collection of high-level activities that ensure an organization’s information security program is adequate and operating properly?

    <p>Information security management</p> Signup and view all the answers

    Which type of software manages the computer's processes and acts as an interface between the user, application software, and hardware?

    <p>Operating system</p> Signup and view all the answers

    If two or more computers are connected to share information, they form a:

    <p>Network</p> Signup and view all the answers

    What does data become?

    <p>Information</p> Signup and view all the answers

    What is an application software primarily used for?

    <p>Used for specific information processing needs like payroll and customer relationship management</p> Signup and view all the answers

    If a university establishes a web-based system for faculty to record grades and advise students, it is an example of:

    <p>Intranet</p> Signup and view all the answers

    Who determines the classification level of information?

    <p>The person who creates it</p> Signup and view all the answers

    How should you transfer sensitive business data to 3rd parties?

    <p>Not at all, the transfer of sensitive business data is not allowed</p> Signup and view all the answers

    Which statement about using WIFI is correct?

    <p>Use VPN with WIFI networks when traveling</p> Signup and view all the answers

    How can you verify the authenticity of a caller?

    <p>Call the switchboard or desk of the company that he/she claimed to be calling from and ask to be put through</p> Signup and view all the answers

    Does multi-factor authentication offer improved protection?

    <p>Yes, but no method provides 100% protection; one-time codes can also be phished</p> Signup and view all the answers

    Which model represents the traditional manual approach to recording accounting transactions?

    <p>Manual Process Model</p> Signup and view all the answers

    Who operates the system and performs various functions in an organization?

    <p>People</p> Signup and view all the answers

    Which system supports daily business operations with numerous documents and messages for users throughout the organization?

    <p>Transaction processing system</p> Signup and view all the answers

    What is the correct way to protect hard copies of confidential documents?

    <p>Lock them away</p> Signup and view all the answers

    How should you correctly deal with visitors in an organization?

    <p>Pick them up at the reception and accompany them throughout their visit</p> Signup and view all the answers

    In urgent cases, to whom can you give your password?

    <p>No one</p> Signup and view all the answers

    What step is not recommended in checking emails for phishing?

    <p>Tagging them as spam to trigger a technical check</p> Signup and view all the answers

    How should you handle a negative comment about the company on a social network?

    <p>Informing the company's Communications department</p> Signup and view all the answers

    Which social media practice can compromise a company's security?

    <p>Including information about company structure and department in a private profile</p> Signup and view all the answers

    What is not a danger of leaving a computer screen unlocked?

    <p>Immediate installation of spyware to control the computer</p> Signup and view all the answers

    Which of the following is a secure password?

    <p>P@sswrd</p> Signup and view all the answers

    More Quizzes Like This

    MIS: Data Management in Operational Systems
    23 questions
    MIS Chapter 10 & 11 Flashcards
    28 questions
    MIS Flashcards Quiz
    61 questions
    MIS Chapter 2
    40 questions

    MIS Chapter 2

    ConsiderateClematis7445 avatar
    ConsiderateClematis7445
    Use Quizgecko on...
    Browser
    Browser