True & False Questions on Information Concepts
99 Questions
100 Views

True & False Questions on Information Concepts

Created by
@BrainiestDouglasFir

Questions and Answers

Perceived usefulness and perceived ease of use do not have any influence in determining whether someone will use an information system.

False

For a small system, site preparation can be as simple as rearranging the furniture in an office to make room for a computer.

True

Parallel start-up involves running a complete new system for one group of users while the rest of the users still run an old system.

False

One of the significant drawbacks to building a custom system is the high cost compared to off-the-shelf software.

<p>True</p> Signup and view all the answers

Monitoring is the process of analyzing systems to make sure they are operating as intended.

<p>False</p> Signup and view all the answers

It is sound advice to suggest that a business using software written in FORTRAN 77 consider switching to a new application using newer technologies, rather than modifying the current software.

<p>True</p> Signup and view all the answers

A slipstream upgrade is a minor upgrade—typically a code adjustment or minor bug fix.

<p>True</p> Signup and view all the answers

Waterfall and agile are the two types of software development processes available to organizations.

<p>False</p> Signup and view all the answers

Agile is better suited for developing larger information systems than smaller ones.

<p>False</p> Signup and view all the answers

A database, a database management system, and the application programs that use the data make up a database environment.

<p>True</p> Signup and view all the answers

A field is typically a name, number, or combination of characters that describes an aspect of a business object.

<p>True</p> Signup and view all the answers

A collection of data fields that are all related to one object, activity, or individual is called a file.

<p>False</p> Signup and view all the answers

An attribute is a general class of people, places, or things for which data is collected, stored, and maintained.

<p>False</p> Signup and view all the answers

If 'color' is an attribute, then 'green' is a data item.

<p>True</p> Signup and view all the answers

Two sets of fields can have a common primary key.

<p>False</p> Signup and view all the answers

The database approach to managing data is superior to the file-based approach.

<p>True</p> Signup and view all the answers

Today, most organizations use the traditional approach to data management, where multiple information systems share a pool of related data.

<p>False</p> Signup and view all the answers

DBMSs are used primarily for modeling data.

<p>False</p> Signup and view all the answers

A database must reflect the business processes of an organization.

<p>True</p> Signup and view all the answers

Information is simply a collection of raw facts such as an employee number or the total hours worked in a week.

<p>False</p> Signup and view all the answers

A set of random or unrelated tasks performed to achieve a definite outcome is called a process.

<p>False</p> Signup and view all the answers

The term data is used to label raw facts such as height and weight of a patient.

<p>False</p> Signup and view all the answers

Reengineering and continuous improvement have the same definition.

<p>False</p> Signup and view all the answers

A sustaining innovation is one that initially provides a lower level of performance than the marketplace has grown to accept.

<p>False</p> Signup and view all the answers

The concept of a value chain is not significant to organizations unless they manufacture products.

<p>False</p> Signup and view all the answers

Over time, disruptive innovation tends to become less attractive to users in a new market.

<p>False</p> Signup and view all the answers

Perceived usefulness and ease of use of a system influence an individual's attitude toward the system.

<p>True</p> Signup and view all the answers

The diffusion of innovation theory states that adoption of any innovation happens all at once for all members of the targeted population.

<p>False</p> Signup and view all the answers

The diffusion of innovation theory can be useful in planning the rollout of a new information system.

<p>True</p> Signup and view all the answers

The activities that lead to getting the right product into the right consumer's hands in the right quantity at the right time at the right cost are known as value chain management.

<p>False</p> Signup and view all the answers

Opportunities in information systems are available to people from different parts of the world.

<p>True</p> Signup and view all the answers

The role of a systems analyst is narrowly defined and seldom involves communications with others.

<p>False</p> Signup and view all the answers

The information systems operations group is responsible for the day-to-day running of IS hardware to process the organization's information systems workload.

<p>True</p> Signup and view all the answers

The successful implementation for change only happens when people accept the need for change and believe that it will improve factors such as productivity and/or customer satisfaction.

<p>True</p> Signup and view all the answers

"Adapting" is the second stage in Lewin's Change Model, which involves learning new work methods, behaviors, and systems.

<p>False</p> Signup and view all the answers

According to Lewin's Change Model, an organization must deliberately change old habits, learn new work methods, and accept the new work methods as parts of the job.

<p>True</p> Signup and view all the answers

Today, many organizations can function and compete effectively without computer-based information systems.

<p>False</p> Signup and view all the answers

For someone to be a good CIO, technical ability is the most important characteristic.

<p>False</p> Signup and view all the answers

One of the primary roles of a senior IS manager is to communicate with other areas of the organization to determine changing business needs.

<p>True</p> Signup and view all the answers

A feedback mechanism is an optional component of an information system.

<p>False</p> Signup and view all the answers

An organization's technology infrastructure includes all of the hardware, software, databases, networks, people, and procedures that are configured to collect, manipulate, store, and process data into information.

<p>True</p> Signup and view all the answers

Cole has just landed a job as a sales representative in a department store. Nina is teaching him the set of steps he should follow to ring up, take payment for, and bag a purchase for a customer. Cole is learning a procedure.

<p>True</p> Signup and view all the answers

RAM stands for random access memory; a form of memory that holds its contents even if the current is turned off or disrupted.

<p>False</p> Signup and view all the answers

You have lots of images on your hard drive totaling 500 million bytes. A 2 Gigabyte storage device will be adequate to store those photos.

<p>True</p> Signup and view all the answers

Massively parallel processing systems are a form of multiprocessing that speeds processing by linking hundreds or thousands of processors to operate at the same time.

<p>True</p> Signup and view all the answers

Secondary storage can store large amounts of data, instructions, and information more permanently than allowed with main memory.

<p>True</p> Signup and view all the answers

Virtual tape technology can decrease data access time, lower the total cost of ownership, and reduce the amount of floor space consumed by tape operations.

<p>True</p> Signup and view all the answers

In a typical computer configuration, secondary storage has a much larger capacity than the volatile random access memory.

<p>True</p> Signup and view all the answers

Solid state storage devices (SSDs) store data in hard disk drives or optical media rather than memory chips.

<p>False</p> Signup and view all the answers

A liquid crystal display (LCD) functions by exciting organic compounds with electric current to produce bright and sharp images.

<p>False</p> Signup and view all the answers

Bioprinting, which uses 3D printers to build human parts and organs from actual human cells, is widely considered to be unethical.

<p>False</p> Signup and view all the answers

When dealing with large multinational or global organizations, vendors often sell their software programs to the organizations but then outsource the technical support to local, third-party distributors.

<p>True</p> Signup and view all the answers

The need for additional data storage capacity is one of the factors driving the growth in data centers.

<p>True</p> Signup and view all the answers

Thin client computers are a type of portable single-user computers.

<p>False</p> Signup and view all the answers

As the difference among computer manufacturers in the areas of price and performance narrows, support for green computing is emerging as a new business strategy for these companies to distinguish themselves from the competition.

<p>True</p> Signup and view all the answers

The scope of green computing is limited to the efficient and environmentally responsible design and manufacture of all types of computers.

<p>False</p> Signup and view all the answers

Some smartphones allow you to take notes and to 'write' emails or text messages by speaking into the phone. These are examples of speech-recognition technology.

<p>True</p> Signup and view all the answers

Depending on the brand of tablet you purchase, you may be able to enter data by typing on a keyboard, writing on the screen with a stylus, or speaking into the tablet's microphone.

<p>True</p> Signup and view all the answers

An operating system is a set of programs that controls the computer hardware and acts as an interface with applications.

<p>True</p> Signup and view all the answers

The operating system converts a basic user request into the set of detailed instructions that the computer hardware requires, thus acting as an intermediary between the application and the hardware.

<p>True</p> Signup and view all the answers

The operating system's application programming interface (API) provides software developers with tools they use to build application software without needing to understand the inner workings of the operating system and hardware.

<p>True</p> Signup and view all the answers

A command-based user interface employs icons and menus that people use to send commands to the computer system.

<p>False</p> Signup and view all the answers

Most operating systems support virtual memory which allocates space on the hard disk to supplement the immediate, functional memory capacity of RAM.

<p>True</p> Signup and view all the answers

If 10 users can run programs at the same time on the same computer, it is known as multi-tasking.

<p>False</p> Signup and view all the answers

Your friend has a Mac that runs OS X. If she needs to run a Windows app on it, she can set it to run Windows also.

<p>True</p> Signup and view all the answers

Corporate executives often object to the use of open-source software because it lacks formal technical support, even though information and solutions regarding the software are usually readily available online.

<p>True</p> Signup and view all the answers

An embedded system is a computer system that is implanted in and dedicated to the control of another device.

<p>True</p> Signup and view all the answers

Utility programs help to perform maintenance, correct problems, merge and sort sets of data, keep track of computer jobs, and compress data files.

<p>True</p> Signup and view all the answers

The primary function of application software is to apply the power of the computer to enable people, workgroups, and the entire enterprise to solve problems and perform specific tasks.

<p>True</p> Signup and view all the answers

Proprietary software is mass-produced by software vendors to address needs that are common across businesses, organizations, or individuals.

<p>False</p> Signup and view all the answers

Software as a Service (SaaS) allows businesses to subscribe to web-delivered business application software by paying a monthly service charge or a per-use fee.

<p>True</p> Signup and view all the answers

Software as a Service (SaaS) refers to the use of computing resources, including software and data storage, on the Internet rather than local computers.

<p>False</p> Signup and view all the answers

A software suite is a collection of programs packaged together as a bundle and typically includes a word processor, spreadsheet program, graphics program, and more.

<p>True</p> Signup and view all the answers

If your friend, who is a small business owner, wants to computerize her business functions such as accounting, payroll, and inventory management, she would need to purchase separate software to meet each functional requirement.

<p>False</p> Signup and view all the answers

Each programming language has a set of rules, called the program code of the language.

<p>False</p> Signup and view all the answers

A single computer can be used by a single user or by multiple, simultaneous users.

<p>True</p> Signup and view all the answers

An example of a common hardware function performed by the operating system is presenting information on a monitor or printer.

<p>True</p> Signup and view all the answers

Operating systems provide a measure of security by allowing users to access to those resources they've been cleared to use as well as other users' resources if those resources are beneficial.

<p>False</p> Signup and view all the answers

Utility programs are used to perform system maintenance, such as repairing errors on a hard drive, improving system security, and optimizing sluggish system processes.

<p>True</p> Signup and view all the answers

If a large organization wants software that will benefit the entire organization—what's known as enterprise application software—the organization must develop it specifically for the business in order to get the functionality required.

<p>False</p> Signup and view all the answers

The use of virtual servers is growing rapidly because virtualization can save millions of dollars per year in capital and operating expenses.

<p>True</p> Signup and view all the answers

Software can be divided into two types: operating software and application software.

<p>False</p> Signup and view all the answers

Software that allows an individual to create a to-do list, take notes, and organize tasks in a database would be classified as having a personal sphere of influence.

<p>True</p> Signup and view all the answers

Pressure to increase profitability and improve operational efficiencies often drives organizations to implement new approaches and technology.

<p>True</p> Signup and view all the answers

The purpose of studying a system is to identify the strengths and weaknesses of the existing system and examine current inputs, outputs, processes, security and controls, and system performance.

<p>True</p> Signup and view all the answers

Joint application development (JAD) sessions with a cross-section of users and stakeholders in a project are an effective way to define system requirements.

<p>True</p> Signup and view all the answers

Security and control considerations are a negligible part of the entire system development process.

<p>False</p> Signup and view all the answers

A data flow diagram (DFD) does not provide any information about process timing.

<p>True</p> Signup and view all the answers

Feasibility analysis assesses the technical, economic, legal, operational, and schedule feasibility of a project.

<p>True</p> Signup and view all the answers

The disaster recovery plan focuses on technology recovery and identifies the people or the teams that are responsible to take action in the event of a disaster, what exactly these people will do when a disaster strikes, and the information system resources required to support critical business processes.

<p>True</p> Signup and view all the answers

All members of a system investigation team must be co-located to ensure a successful start to a project.

<p>False</p> Signup and view all the answers

Operational feasibility takes into account the need to meet certain system performance requirements that are considered important to system users and stakeholders.

<p>True</p> Signup and view all the answers

The primary outcome of systems analysis is a prioritized list of system requirements and a recommendation of how to proceed with a project.

<p>True</p> Signup and view all the answers

System testing is often done by independent testers who are not involved in developing program code.

<p>True</p> Signup and view all the answers

Even if unit testing is successful, developers cannot assume they can combine individual components into a working system without any problems.

<p>True</p> Signup and view all the answers

While discussing the preliminary feasibility of a project, your colleague insists that figures used in economic feasibility be very accurate down to the last cent. His claim is appropriate and not uncommon.

<p>False</p> Signup and view all the answers

User acceptance testing (UAT) is a critical activity that must be completed successfully before newly developed software can be rolled out to the market.

<p>True</p> Signup and view all the answers

The eventual success of any system solely depends on how users work with it.

<p>False</p> Signup and view all the answers

Unit testing uncovers any defects in the interface between individual components of an information system.

<p>True</p> Signup and view all the answers

Study Notes

True & False Questions Overview

  • Information is not merely a collection of raw facts; it has meaning and context beyond simple data points.
  • A process consists of a structured series of tasks aimed at achieving a specific goal, rather than random tasks.
  • Data refers to raw facts and statistics, while information is data processed to provide meaning.
  • Reengineering differs from continuous improvement; the former involves profound changes, while the latter focuses on ongoing enhancement.
  • Sustaining innovations maintain performance levels and do not typically underperform compared to existing market standards.
  • The value chain concept is relevant to all organizations, not just those that manufacture products.
  • Disruptive innovations tend to gain traction over time rather than diminish in appeal within new markets.
  • Perceived usefulness and ease of use are critical in shaping user attitudes toward particular systems.

Theories and Concepts

  • The diffusion of innovation theory suggests that the adoption of innovations occurs gradually and among various segments of the population.
  • Effective planning for new information system rollouts incorporates understanding from the diffusion of innovation theory.

Operational Management

  • Value chain management involves not just logistics but encompasses the entire process of getting products to consumers.
  • Information systems opportunities are globally accessible, embracing diversity in participation.

Roles and Responsibilities

  • Systems analysts engage broadly with multiple stakeholders, not in isolation.
  • The information systems operations group is crucial for managing daily information system tasks.

Change Management

  • Successful implementation of organizational change hinges on acceptance of the necessity for change among employees.
  • Lewin's Change Model illustrates the importance of transitioning from old habits to new practices.

Technology and Storage

  • Dependence on computer-based information systems is critical for modern organizational function; many cannot persist without them.
  • The ideal characteristics for a Chief Information Officer extend beyond technical skills; leadership and strategic insight are equally important.

System Infrastructure

  • An organization’s technology infrastructure is extensive, including hardware, software, networks, and procedures that enable data management.

Testing and Implementation

  • User acceptance testing (UAT) is an essential final step before software deployment to ensure alignment with user needs.
  • System testing often involves independent testers not previously involved in the development to ensure objectivity.

System Development

  • A disaster recovery plan articulates not only technology recovery but specific responsibilities during a crisis.
  • Systems analysis culminates in a prioritized requirements list to guide project advancement effectively.

Maintenance and Upgrades

  • Monitoring systems is vital for ensuring they operate according to established benchmarks.
  • Slipstream upgrades represent minor improvements, usually focused on bug fixes or minor adjustments.

Development Methodologies

  • Numerous software development methodologies exist, with Waterfall and Agile as primary examples, serving different project sizes and complexities.
  • Agile methodologies are particularly suited to projects requiring flexibility and rapid iteration.

General Knowledge

  • Utility programs serve essential maintenance roles, troubleshooting system issues, and optimizing performance.
  • Enterprise application software can be developed to meet the needs of the entire organization, often through specialized solutions rather than generic offerings.### Database Components
  • A database environment comprises a database, a database management system (DBMS), and the application programs that utilize the data.
  • True statement about the structure and components essential for data management.

Data Fields and Files

  • A field is defined as a name, number, or character combination representing an aspect of a business object.
  • A collection of related data fields is not referred to as a file, indicating a nuanced understanding of data organization.

Attributes and Data Items

  • An attribute represents a general class of people, places, or things for data collection and storage.
  • A specific value related to an attribute, like "green" for the attribute "color," is labeled a data item, establishing a clear connection between attributes and data items.

Key Relationships

  • It is incorrect that two sets of fields can share a common primary key, highlighting the uniqueness required in database key relationships.

Data Management Approaches

  • The database approach is considered superior to file-based data management, reflecting modern practices in data organization and accessibility.
  • Most organizations do not solely use traditional methods where multiple information systems share related data, indicating a shift towards more integrated data management.

Purpose of DBMS

  • DBMSs are not primarily centered around data modeling, suggesting a broader role in data management functions.

Business Process Alignment

  • A database must align with and reflect the business processes of an organization, emphasizing the critical relationship between data architecture and operational needs.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Description

Test your understanding of key concepts related to information and data with this true or false quiz. Each statement challenges your comprehension of what comprises information and processes in a practical context. Determine whether the statements are true or false and enhance your knowledge in the subject area.

More Quizzes Like This

Use Quizgecko on...
Browser
Browser