Management Information Systems

421. All of the following are examples of requirements problems, except

  1. missing requirements
  2. overlapping requirements
  3. costly requirements
  4. conflicting requirements
  5. ambiguous requirements
Correct answer: (C)
costly requirements

422. Which of the following is NOT a guideline for successfully conducting a Joint Requirements Planning (JRP) session?

  1. stay on schedule
  2. allow for ample breaks
  3. encourage user and management participation
  4. brainstorm technical alternatives to problems identified in a JRP session
  5. ensure that the scribe is able to take notes
Correct answer: (D)
brainstorm technical alternatives to problems identified in a JRP session

423. Which of the following is the first phase of the Systems Implementation phase?

  1. conduct system test
  2. build and test networks
  3. prepare conversion plan
  4. build and test databases
  5. write and test new programs
Correct answer: (A)
conduct system test

424. Remote batch processing has the following characteristic(s):

  1. Data is entered online.
  2. Data is collected in batches.
  3. Data is processed at a later time.
  4. both (a) and (b) and (c)
  5. none of the above
Correct answer: (D)
both (a) and (b) and (c)

425. The most common medium for computer outputs is:

  1. screen
  2. paper
  3. e-mail
  4. microfilm
  5. none of the above
Correct answer: (B)
paper

426. Which of the following is not a technology driver for an information system?

  1. enterprise applications
  2. object technologies
  3. knowledge asset management
  4. collaborative technologies
  5. networks and the Internet
Correct answer: (C)
knowledge asset management

427. To improve the performance of a business process, which of the following is most relevant?

  1. Input.
  2. Processing.
  3. All of the above.
  4. Control and feedback
  5. Output.
Correct answer: (D)
Control and feedback

428. What should not be part of an acceptable use policy?

  1. Allowable use of systems
  2. Legal obligations
  3. Encryption policies
  4. User responsibilities
  5. Account and password responsibilities
Correct answer: (C)
Encryption policies

429. Who are the people that actually use the system to perform or support the work to be completed?

  1. system analysts
  2. system designers
  3. system owners
  4. system builders
  5. none of the above
Correct answer: (E)
none of the above

430. Open database connectivity (OBDC) tools are an example of:

  1. layerware
  2. tool kit
  3. interfaceware
  4. middleware
  5. none of the above
Correct answer: (D)
middleware
Page 43 of 45