Professional Documents
Culture Documents
Click the link to the Final Examination on your student website available from the end of Week Four
through the end of Week Five.
Complete the Final Examination. You have one attempt to complete the exam, which is timed and
must be completed in 3 hours. Results are auto-graded and sent to your instructor.
Note. Final Examination questions are adapted from Introduction to Information Systems: Supporting
and transforming business and Microsoft Office 2010: Volume 1.
3) ______ attempt to duplicate the work of human experts by applying reasoning capabilities
4) ______ issues involve who may obtain information and how much they should pay for this
information
5) _____ issues involve collecting, storing, and disseminating information about individuals.
6) Your companys computers have been taken over by an attacker and used to attack another
organizations information systems. BIS/220 final exam Your problem is which of the following?
7) You are the only person in your office to upgrade to Microsoft Word 2010. BIS/220 final exam
Before you share documents with coworkers, you should do which of the following?
8) Which of the following is detected by the contextual spelling checker?
9) If your cursor is near the bottom of a page and you want to display the next paragraph you type at
the top of a new page, you should use which of the following?
10) Your ______ is the collection of traceable data that is captured when you use various information
technologies such as credit cards or the Internet
13) Search engines and meta search engines are examples of which network application?
14) ______ portals coordinate content within relatively narrow organizational and partners
communities
15) Workflow, groupware, and telepresence systems are examples of which network application?
16) Which type of e-commerce does an organization provide information and services to its workers?
17) _______ auctions are the most common auction model for large purchases.
18) ______ collect data from many points over an extended space.
19) Which type of satellite has the largest footprint?
20) Which of the following is the most appropriate wireless networking standard for creating personal
area networks?
21) If cell D15 contains the formula =$C$5*D15, what is the D15 in the formula?
22) What should you do if you see a column of pound signs (###) instead of values or results of
formulas?
23) ______ feasibility determines if the project is an acceptable financial risk and if the organization
can afford the expense and time needed to complete the project
24) In the traditional systems development life cycle, users
25) To create a Microsoft PowerPoint presentation based on an installed template, click the
26) Which of the following demotes a bullet point from the first level to the second level in Outline
view in Microsoft PowerPoint?
27) ________ connects parts of the intranets of different organizations and allows secure
communications among business partners
28) ______ is a system with universally accepted standards for storing, retrieving, formatting, and
displaying information via a client/server architecture
29) A process that allows users to place information in multiple, overlapping associations is called
30) ________ are websites that provide collections of content from all over the World Wide Web
14) Workflow, groupware, and tele-presence systems are examples of which network application?
15) Which type of e-commerce does an organization provide information and services to its workers?
16) _______ auctions are the most common auction model for large purchases.
17) ______ collect data from many points over an extended space.
18) Which of the following is the most appropriate wireless networking standard for creating personal
area networks?
19) If cell D15 contains the formula =$C$5*D15, what is the D15 in the formula?
20) What should you do if you see a column of pound signs (###) instead of values or results of
formulas?
21) ______ feasibility determines if the project is an acceptable financial risk and if the organization
can afford the expense and time needed to complete the project
22) In the traditional systems development life cycle, users
23) To create a Microsoft PowerPoint presentation based on an installed template, click the
24) Which of the following demotes a bullet point from the first level to the second level in Outline
view in Microsoft PowerPoint?
25) ________ connects parts of the intranets of different organizations and allows secure
communications among business partners
26) ______ is a system with universally accepted standards for storing, retrieving, formatting, and
displaying information via a client/server architecture
27) A process that allows users to place information in multiple, overlapping associations is called
28) ________ are websites that provide collections of content from all over the World Wide Web
29) _____ is a method for analyzing and reducing a relational database to its most streamlined form.
30) When data are normalized, fields/attributes in the table depend only on the _____.
31) _____ is a method for analyzing and reducing a relational database to its most streamlined form.
32) Key developments of the first generation of the Web were:
33) Users typically have little interaction with _____, which provide information that users receive
passively.
34). Your companys computers have been taken over by an attacker and used to attack another
organizations information systems. Your problem is which of the following?
35). A collection of related files, tables, and so on that stores data and the associations among them is
_____.
36). If Amazon uses a list of all your purchases (books bought, price paid, dates) to recommend other
books to you, then Amazon is applying its _____.
37). _____ is (are) data that have been organized to have meaning and value to a recipient.
38)______ portals are used to coordinate an organization's business information internally and
externally.
3) ______ attempt to duplicate the work of human experts by applying reasoning capabilities
4) ______ issues involve who may obtain information and how much they should pay for this
information
5) _____ issues involve collecting, storing, and disseminating information about individuals.
6) Your companys computers have been taken over by an attacker and used to attack another
organizations information systems. Your problem is which of the following?
7) You are the only person in your office to upgrade to Microsoft Word 2010. Before you share
documents with coworkers, you should do which of the following? BIS 220 Final Exam
8) Which of the following is detected by the contextual spelling checker?
9) If your cursor is near the bottom of a page and you want to display the next paragraph you type at
the top of a new page, you should use which of the following?
10) Your ______ is the collection of traceable data that is captured when you use various information
technologies such as credit cards or the Internet
13) Search engines and metasearch engines are examples of which network application?
14) ______ portals coordinate content within relatively narrow organizational and partners
communities
15) Workflow, groupware, and telepresence systems are examples of which network application?
16) Which type of e-commerce does an organization provide information and services to its workers?
BIS 220 Final Exam
17) _______ auctions are the most common auction model for large purchases.
18) ______ collect data from many points over an extended space.
19) Which type of satellite has the largest footprint?
20) Which of the following is the most appropriate wireless networking standard for creating personal
area networks?
21) If cell D15 contains the formula =$C$5*D15, what is the D15 in the formula?
22) What should you do if you see a column of pound signs (###) instead of values or results of
formulas?
23) ______ feasibility determines if the project is an acceptable financial risk and if the organization
can afford the expense and time needed to complete the project
24) In the traditional systems development life cycle, users
25) To create a Microsoft PowerPoint presentation based on an installed template, click the
26) Which of the following demotes a bullet point from the first level to the second level in Outline
view in Microsoft PowerPoint?
27) ________ connects parts of the intranets of different organizations and allows secure
communications among business partners
28) ______ is a system with universally accepted standards for storing, retrieving, formatting, and
displaying information via a client/server architecture
29) A process that allows users to place information in multiple, overlapping associations is called
30) ________ are websites that provide collections of content from all over the World Wide Web
31) _____ is a method for analyzing and reducing a relational database to its most streamlined form.
32) When data are normalized, fields/attributes in the table depend only on the _____.
33) _____ is a method for analyzing and reducing a relational database to its most streamlined form.
34) Key developments of the first generation of the Web were:
35) Users typically have little interaction with _____, which provide information that users receive
passively.
36). Your companys computers have been taken over by an attacker and used to attack another
organizations information systems. Your problem is which of the following?
37). A collection of related files, tables, and so on that stores data and the associations among them is
_____.
38). If Amazon uses a list of all your purchases (books bought, price paid, dates) to recommend other
books to you, then Amazon is applying its _____.
39). _____ is (are) data that have been organized to have meaning and value to a recipient.
A. data
40)______ portals are used to coordinate an organization's business information internally and
externally.
3) ______ attempt to duplicate the work of human experts by applying reasoning capabilities
A. Expert systems
B. Dashboards
C. Business intelligence systems
D. Decision support systems
4) ______ issues involve who may obtain information and how much they should pay for this
information
A. Privacy
B. Accessibility
C. Property
D. Transferability
5) _____ issues involve collecting, storing, and disseminating information about individuals.
A. Privacy
B. Accuracy
C. Property
D. Accessibility
6) Your companys computers have been taken over by an attacker and used to attack another
organizations information systems. Your problem is which of the following?
A. Poor security policies and procedures
B. Lack of due diligence
C. Downstream liability
D. Poor service-level agreements
7) You are the only person in your office to upgrade to Microsoft Word 2010. Before you share
documents with coworkers, you should do which of the following?
9) If your cursor is near the bottom of a page and you want to display the next paragraph you type at
the top of a new page, you should use which of the following?
A. Enter
B. Ctrl+PageDown
C. Ctrl+Enter
D. Page Layout, Breaks, Line Numbers
10) Your ______ is the collection of traceable data that is captured when you use various information
technologies such as credit cards or the Internet
A. data profile
B. data shadow
C. database file
D. database record
13) Search engines and metasearch engines are examples of which network application?
A. Communication
B. Discovery
C. Collaboration
D. Web services
14) ______ portals coordinate content within relatively narrow organizational and partners
communities
A. Personal
B. Affinity
C. Corporate
D. Commercial
15) Workflow, groupware, and telepresence systems are examples of which network application?
A. Discovery
B. Collaboration
C. Web services
D. Communications
16) Which type of e-commerce does an organization provide information and services to its workers?
A. Business-to-employee
B. Consumer-to-business
C. Government-to-business
D. Business-to-consumer
17) _______ auctions are the most common auction model for large purchases.
A. Forward
B. Static
C. Reverse
D. Simple
18) ______ collect data from many points over an extended space.
A. Bluetooth networks
B. Ultra-wideband networks
C. Wireless sensor networks
D. Wi-Fi networks
20) Which of the following is the most appropriate wireless networking standard for creating personal
area networks?
A. Wi-Fi
B. Cellular radio
C. Microwave
D. Bluetooth
21) If cell D15 contains the formula =$C$5*D15, what is the D15 in the formula?
A. Mixed reference
B. Absolute reference
C. Circular reference
D. Range name
22) What should you do if you see a column of pound signs (###) instead of values or results of
formulas?
23) ______ feasibility determines if the project is an bis 220 final exam acceptable financial risk and if
the organization can afford the expense and time needed to complete the project
A. technical
B. economic
C. organizational
D. behavioral
25) To create a Microsoft PowerPoint presentation based on an installed template, click the
A. File tab, and then click New
B. File tab, and then click Open
C. Insert tab, and then select Add Template
D. Design tab, and then select New
26) Which of the following demotes a bullet point from the first level to the second level in Outline
view in Microsoft PowerPoint?
A. Shift+Tab
B. Tab
C. Decrease List Level
D. Ctrl+Tab
27) ________ connects parts of the intranets of different organizations and allows secure
communications among business partners
A. A global network
B. An intranet
C. An extranet
D. The Internet
28) ______ is a system with universally accepted bis220 final exam standards for storing, retrieving,
formatting, and displaying information via a client/server architecture
A. FTP
B. World Wide Web
C. Newsgroups
D. The Internet
29) A process that allows users to place information in multiple, overlapping associations is called
A. AJAX
B. tagging
C. a Wiki
D. blogging
30) ________ are websites that provide collections of content from all over the World Wide Web
A. Aggregators
B. Social networks
C. Mashups
D. Really simple syndications