Question
Note: Each question may have more than ONE choice as correct answers. e.g. answer: A, C, D. 1 mark will be deducted for wrong choice(s)
Note: Each question may have more than ONE choice as correct answers. e.g. answer: A, C, D. 1 mark will be deducted for wrong choice(s) for each question.
1) Which of the following is NOT the benefits of using Information Systems?
A. Information System outages can cause shutdowns of transportation services in Hong Kong.
B. The Internet distributes information to millions of people across the world so that people can get updated news instantly.
C. Managers of the supermarket can get more information about the purchase patterns and preferences of their customers.
D. People can use the Internet to distribute illegal copies of movies, software, songs and articles instantly.
E. None of the above.
2) Regarding Data Flow Diagram (DFD), which of the following statement is/are TRUE?
A. Data flows must be an input or output of a Process Box. Physical flows are sometimes represented by a dotted line.
B. Data Flow diagram (DFD) is a type of diagram that represents the sequences of a process or workflow.
C. External entities (people, place or organizations) are sources or destinations of data that are lying outside the context of the system.
D. Data stores can hold permanent, temporary, historical or extract data. Files receive inputs and outputs only from Processes, NOT from Externals or other Files.
E. None of the above.
3) Which of the following about operational system characteristic is/are TRUE?
A. Reports from operational systems are often used to compare the performance of one period to another period, and give useful feedbacks.
B. Operational systems produce periodic reports as output, e.g. weekly, daily and monthly reports.
C. Output information is very detailed, e.g. paychecks have details on the worksheet of each employees gross and net pay.
D. Transactions are frequent, repetitive and in high quantities.
E. None of the above.
4) Which of the following is/are the report(s) produced from tactical systems.
A. Drill down report and Summary report
B. Exception report and ad-hoc report
C. 3-year sales forecasts report
D. Key-indicator report
E. None of the above.
5) Which of the following is/are the most common organizational business information system(s)?
A. decision support systems
B. transaction processing systems
C. electronic commerce systems
D. management information systems
E. None of the above.
6) Which of the following statement is/are FALSE?
A. The events of breaking the security mechanism of a computer network are called hacking. The person who hacks is called a hacker.
B. Besides hacking, we also use the term "routing" to describe those activities that may cause damages to computers and networks, or cause some kinds of loss to a user.
C. Spyware is a software which can collect users information (e.g. internet surfing habits, personal information, bank account, etc.), and send to another entity without their consent.
D. Denial of Service (DoS) is an attempt to make an online service unavailable by overwhelming it with traffic from multiple sources, so that the server cannot handle normal users requests.
E. None of the above.
7) To prevent malware attacks, what type of software should be installed on a personal computer?
A. printer driver
B. communication software
8) Which of the following statement is/are FALSE?
A. For an infected computer, firewall can scan viruses and other malware, then remove them, or quarantine the infected files.
B. Biometric devices use human intrinsic characteristics to authenticate users. There are two main types of biometric authentication: physiological and behavioral.
C. Personal information can be protected through decryption, to decrypt is to scramble and convert the original data or information into an unintelligible and meaningless form.
D. E-banking on the internet is an example of batch processing.
E. None of the above.
9) Which of the following is/are NOT the advantage(s) of e-commerce?
A. Buying and selling 24 hours per day, and 7 days per week.
B. There is the possibility of credit card number theft.
C. No need of physical company set-ups.
D. Easy to start and manage a business.
E. None of the above.
10) Which of the following is/are the characteristic(s) of decision support system?
A. The output information from decision support system is very detailed. E.g. paychecks have details on the worksheet of each employees gross and net pay.
B. Most of the inputs into DSS are from sources external to the firm. Information such as investment opportunities, rates of borrowed capital, census data, economic conditions must be obtained from databases outside the firm.
C. The input data into decision support system is usually highly subjective (personal opinions based on experiences) and their accuracy may be a suspect.
D. The output information from decision support system is for future events rather than descriptive of past events.
E. None of the above.
C. antivirus software
D. operating system
E. None of the above.
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started