Você está na página 1de 7

En.

Atallah Alenazi

The use of information systems because of necessity is
a. survival
b. improved business practices
c. competitive advantage
d. improved flexibility

What term is used to refer to all of the computer-based information systems used by
organizations and their underlying technologies?
a. Network technology
b. Digital technology
c. Information technology
d. Productivity technology

A sales and marketing information system aids middle management employees in:
a. tracking sales.
b. planning new products and services.
c. analyzing sales performance.
d. preparing sales forecasts.


Ahmed Al-Suwaidi

1) The six important business objectives of information technology are: new products,
services, and business models; customer and supplier intimacy; improved decision-making;
competitive advantage; operational excellence, and:
A) Flexibility.
B) Survival.
C) Improved business practices.
D) Improved efficiency.


2) The value chain model:
A) Categorizes five related advantages for adding value to a firm's products or services.
B) Sees the supply chain as the primary activity for adding value.
C) Categorizes four basic strategies a firm can use to enhance its value chain.
D) Helps a firm identify points at which information technology can most effectively to enhance
its competitive position

True or False Q
3) Studies show that about half of a business firm's profits can be explained by alignment of
IT with business
TRUE



Ahmad AlAkhdhari

List two different types of information systems used and the levels of management in a
business they are used for?
The types of information systems used for different levels of management are:
Transaction processing systems (TPS)
Serve operational managers
Principal purpose is to answer routine questions and to track the flow of transactions
through the organization.
Management information systems (MIS)
Serve middle managers
Summarize and report on basic operations using data from TPS.
Decision-support systems (DSS)
Also serve middle managers
Support middle management decisions when these decisions are unique, rapidly
changing, and not specified easily in advance.
Executive support systems (ESS)
Serve senior managers
Address strategic issues and long-term trends.




Decision-support systems are also referred to as:
A) Business information systems.
B) Business intelligence systems.
C) Executive support systems.
D) Business model systems.

Which of the following types of system could be used to enable different firms to work
collaboratively on a product?
A) Intranet
B) Extranet
C) KMS
D) CRM

Which of the following is not one of the competitive forces of Porter's model?
A) Suppliers
B) External environment
C) Other competitors
D) Customers.


husam ambon

1- Critical thinking is the sustained suspension of judgment with an awarness of multiple
alternatives.
(True).

2- Using internet technology to deliver information and services to citizens, employees and
business is known as E-Government.
(True).

3- Information Technology is the interrelated components that manage information.
(False).


hashim almaimani

Fill in the blank with the correct word.
Viruses Worms
Trojan
horses
Spyware
Key
loggers
External
Level
Conceptual
Level
Internal
Level


Securing Information Systems
Viruses
Rogue software program that attaches itself to other software programs or
data files in order to be executed

Worms
Independent computer programs that copy themselves from one computer to
other computers over a network.
Trojan
horses
Software program that appears to be benign but then does something other
than expected.

Spyware
Small programs install themselves surreptitiously on computers to monitor
user Web surfing activity and serve up advertising

Key loggers
Record every keystroke on computer to steal serial numbers, passwords,
launch Internet attacks




Database and Information Systems

External Level Users' view of the database.
Conceptual Level Community view of the database
Internal Level Physical representation of the database on the computer


Atef Alharbi

1. In a relational database, a record is called a(n): (a)
a. tuple.
b. row.
c. entity.
d. field.


2. In the information age, the obligations that individuals and organizations have
concerning rights to intellectual property fall within the moral dimension of: (a)
a. property rights and obligations.
b. system quality.
c. accountability and control.
d. information rights and obligations.


Sulaiman A. Al-Fayedi

1) ________ refers to policies, procedures, and technical measures used to prevent
unauthorized access, alternation, theft, or physical damage to information systems.
A) "Security"
B) "Controls"
C) "Benchmarking"
D) "Algorithms"
Answer: A

2 ) A network that covers entire geographical regions is most commonly referred to as a(n):
A) local area network.
B) intranet.
C) peer-to-peer network.
D) wide area network.
Answer: D

3) Why should a company engage in business process reengineering?
Answer: A company should engage in BPR in order to enhance profits or sales through using
information systems.


SAMER BAJUNAID

1. Choice is among the four-step process of the problem solving model, the followings are
factors considered during the choice process EXCEPT:
A) Cost
B) Length of time needed to implement solution
C) Simplicity of the solution
D) Feasibility given resource and skills

2. " Additional hardware costs" is one of the constraints of data base management system?
True

3. Which of the following are the moral dimensions of information age?
A) Information rights and obligations
B) Property rights and obligations
C) Security
D) A & B


Ali Jelan

What is the first step you should take in managing data for a firm
A) Identify the data needed to run the business
B) Cleanse the data before importing it to any database
C) Normalize the data before importing to a database
D) Audit your data quality.

European privacy protection is ________ than in the United States
A) Much more stringent
B) Much less stringent
C) Less liable to laws
D) Less far-reaching

The value chain model classifies all company activities as either primary or support
Answer: TRUE

Transaction processing systems are most commonly encountered at the senior management
level of an organization
A nswer: FALSE


Mohammed Al saeidi

1) A one-to-one relationship between two entities is symbolized in a diagram by a line that
ends:
A) in two short marks.
B) in one short mark.
C) with a crows foot.
D) with a crows foot topped by a short mark.
Answer: A

2) ________ refers to policies, procedures, and technical measures used to prevent
unauthorized access, alternation, theft, or physical damage to information systems.
A) "Security"
B) "Controls"
C) "Benchmarking"
D) "Algorithms"
Answer: A

3) Software that organizes, manages, and processes business data, such as data concerned
with inventory, customers, and vendors, is called:
A) System software.
B) Application software.
C) Data management software.
D) Network software.
Answer: C

4) Which of the following is not a type of output device?
A) Speakers
B) Cathode ray tube
C) Ink jet printer
D) Keyboard
Answer: D

5) Software used to apply the computer to a specific task for an end user is called:
A) System software.
B) Application software.
C) Data management software.
D) Network software.
Answer: B

6) The three principal levels of hierarchies within a business organization are:
A) Management, knowledge workers, and service workers.
B) Senior management, middle management, and operational management.
C) Management, data workers, and operational management.
D) Senior management, operational management, and workers.
Answer: B



mohammad Al-Garni

1. give us Programs, Tools and Gadgets.
a) IT information technology.
b) IS information system.
c) Both of IT and IS.
d) Non of them.

2. give us Management of Businesses, Organizations and Society.
a) IS information system.
b) IT information technology.
c) Both of IT and IS.
d) Non of them.

3. is the hardware and software business uses to achieve objectives.
a) The information technology.
b) The information system.
c) The intranets.
d) The extranets.

Você também pode gostar