Practicequestions IM
Practicequestions IM
Chapter 1
Chapter 2
1. Write your own description of what the term information systems hardware means.
a. Answers will vary, but should say something about information systems hardware consisting of the physical
parts of computing devices that can actually be touched.
2. What is the impact of Moore’s Law on the various hardware components described in this chapter?
a. The student should pick one of the components and discuss the impact of the fact that computing doubles in
speed every two years. Most devices are getting smaller, faster, cheaper, and this should be indicated in the
answer.
3. Write a summary of one of the items linked to in the “Integrated Computing” section.
a. The student should write a summary of one of the linked articles.
4. Explain why the personal computer is now considered a commodity.
a. The PC has become a commodity in the sense that there is very little differentiation between computers, and
the primary factor that controls their sale is their price.
5. The CPU can also be thought of as the _____________ of the computer.
a. brain
6. List the following in increasing order (slowest to fastest): megahertz, kilohertz, gigahertz.
a. kilohertz, megahertz, gigahertz
7. What is the bus of a computer?
a. The bus is the electrical connection between different computer components.
8. Name two differences between RAM and a hard disk.
a. RAM is volatile; the hard disk is non-volatile. Data access in RAM is faster than on the hard disk.
9. What are the advantages of solid-state drives over hard disks?
a. The main advantage is speed: an SSD has much faster data-access speeds than a traditional hard disk.
10. How heavy was the first commercially successful portable computer?
a. The Compaq PC was 28 pounds.
Chapter 3
1. Come up with your own definition of software. Explain the key terms in your definition.
a. A variety of answers are possible, but should be similar to the definition in the text: Software is the set of
instructions that tell the hardware what to do. Software is created through the process of programming.
2. What are the functions of the operating system?
a. The operating system manages the hardware resources of the computer, provides the user-interface
components, and provides a platform for software developers to write applications.
3. Which of the following are operating systems and which are applications: Microsoft Excel, Google Chrome,
iTunes, Windows, Android, Angry Birds.
a. Microsoft Excel (application), Google Chrome (application), iTunes (application), WIndows (operating
system), Android (operating system), Angry Birds (application)
4. What is your favorite software application? What tasks does it help you accomplish?
a. Students will have various answers to this question. They should pick an application, not an operating
system. They should be able to list at least one thing that it helps them accomplish.
5. What is a “killer” app? What was the killer app for the PC?
a. A killer app is application software that is so useful that people will purchase the hardware just so they can
run it. The killer app for the PC was the spreadsheet (Visicalc).
6. How would you categorize the software that runs on mobile devices? Break down these apps into at least
three basic categories and give an example of each.
a. There are various ways to answer this question. Students should identify that there are mobile operating
systems and mobile apps. Most likely, students will break down mobile apps into multiple categories: games,
GPS, reading, communication, etc.
7. Explain what an ERP system does.
a. An ERP (enterprise resource planning) system is a software application with a centralized database that is
implemented across the entire organization.
8. What is open-source software? How does it differ from closed-source software? Give an example of each.
a. Open-source software is software that makes the source code available for anyone to copy and use. It is free
to download, copy, and distribute. Closed-source software does not make the source code available and
generally is not free to download, copy, and distribute. There are many examples of both, such as: Firefox (open
source), Linux (open source), iTunes (closed source), Microsoft Office (closed source).
9. What does a software license grant?
a. Software licenses are not all the same, but generally they grant the user the right to use the software on a
limited basis. The terms of the license dictate users’ rights in detail.
10. How did the Y2K (year 2000) problem affect the sales of ERP systems?
a. Organizations purchased ERP software to replace their older systems in order to avoid any problems with the
year 2000 in their software.
Chapter 4
a. A relational database is one in which data is organized into one or more tables. Each table has a set of fields,
which define the nature of the data stored in the table. A record is one instance of a set of fields in a table. All
the tables are related by one or more fields in common.
5. When would using a personal DBMS make sense?
a. When working on a smaller database for personal use, or when disconnected from the network.
6. What is the difference between a spreadsheet and a database? List three differences between them.
a. A database is generally more powerful and complex than a spreadsheet, with the ability to handle multiple
types of data and link them together. Some differences: A database has defined field types, a spreadsheet does
not. A database uses a standardized query language (such as SQL), a spreadsheet does not. A database can
hold much larger amounts of data than a spreadsheet.
7. Describe what the term normalization means.
a. To normalize a database means to design it in a way that: 1) reduces duplication of data between tables and
2) gives the table as much flexibility as possible.
8. Why is it important to define the data type of a field when designing a relational database?
a. A data type tells the database what functions can be performed with the data. The second important reason
to define the data type is so that the proper amount of storage space is allocated for the data.
9. Name a database you interact with frequently. What would some of the field names be?
a. The student can choose any sort of system that they interact with, such as Amazon or their school’s online
systems. The fields would be the names of data being collected, such as “first name”, or “address”.
10. What is metadata?
a. Metadata is data about data. It refers to the data used to describe other data, such as the length of a song in
iTunes, which describes the music file.
11. Name three advantages of using a data warehouse.
a. The text lists the following (the student should pick at least three of these):
i. The process of developing a data warehouse forces an organization to better understand the data that it is
currently collecting and, equally important, what data is not being collected.
ii. A data warehouse provides a centralized view of all data being collected across the enterprise and provides a
means of determining data that is inconsistent.
iii. Once all data is identified as consistent, an organization can generate one version of the truth. This is
important when the company wants to report consistent statistics about itself, such as revenue or number of
employees.
iv. By having a data warehouse, snapshots of data can be taken over time. This creates a historical record of
data, which allows for an analysis of trends.
v. A data warehouse provides tools to combine data, which can provide new information and analysis.
12. What is data mining?
a. Data mining is the process of analyzing data to find previously unknown trends, patterns, and associations in
order to make decisions.
Chapter 5
1. What were the first four locations hooked up to the Internet (ARPANET)?
a. UCLA, Stanford, MIT, and the University of Utah
2. What does the term packet mean?
a. The fundamental unit of data transmitted over the Internet. Each packet has the sender’s address, the
destination address, a sequence number, and a piece of the overall message to be sent.
3. Which came first, the Internet or the World Wide Web?
a. the Internet
4. What was revolutionary about Web 2.0?
a. Anyone could post content to the web, without the need for understanding HTML or web-server technology.
5. What was the so-called killer app for the Internet?
a. electronic mail (e-mail)
6. What makes a connection a broadband connection?
a. A broadband connection is defined as one that has speeds of at least 256,000 bps.
7. What does the term VoIP mean?
a. Voice over Internet protocol – a way to have voice conversations over the Internet.
8. What is an LAN?
a. An LAN is a local network, usually operating in the same building or on the same campus.
Chapter 6
1. Briefly define each of the three members of the information security triad.
a. The three members are as follows:
i. Confidentiality: we want to be able to restrict access to those who are allowed to see given information.
ii. Integrity: the assurance that the information being accessed has not been altered and truly represents what
is intended.
iii. Availability: information can be accessed and modified by anyone authorized to do so in an appropriate
timeframe.
2. What does the term authentication mean?
a. The process of ensuring that a person is who he or she claims to be.
3. What is multi-factor authentication?
a. The use of more than one method of authentication. The methods are: something you know, something you
have, and something you are.
4. What is role-based access control?
a. With role-based access control (RBAC), instead of giving specific users access rights to an information
resource, users are assigned to roles and then those roles are assigned the access.
5. What is the purpose of encryption?
a. To keep transmitted data secret so that only those with the proper key can read it.
6. What are two good examples of a complex password?
a. There are many examples of this. Students need to provide examples of passwords that are a minimum of
eight characters, with at least one upper-case letter, one special character, and one number.
7. What is pretexting?
a. Pretexting occurs when an attacker calls a helpdesk or security administrator and pretends to be a
particular authorized user having trouble logging in. Then, by providing some personal information about the
authorized user, the attacker convinces the security person to reset the password and tell him what it is.
8. What are the components of a good backup plan?
a. Knowing what needs to be backed up, regular backups of all data, offsite storage of all backed-up data, and
a test of the restoration process.
9. What is a firewall?
a. A firewall can be either a hardware firewall or a software firewall. A hardware firewall is a device that is
connected to the network and filters the packets based on a set of rules. A software firewall runs on the
operating system and intercepts packets as they arrive to a computer.
10. What does the term physical security mean?
a. Physical security is the protection of the actual hardware and networking components that store and
transmit information resources.
Chapter 7
Chapter 8
iii. Subsume information-processing work into the real work that produces the information. Treat
geographically dispersed resources as though they were centralized.
iv. Link parallel activities instead of integrating their results.
v. Put the decision points where the work is performed, and build controls into the process.
vi. Capture information once, at the source.
9. What is business process management? What role does it play in allowing a company to differentiate itself?
a. Business process management (BPM) can be thought of as an intentional effort to plan, document,
implement, and distribute an organization’s business processes with the support of information technology. It
can play a role in differentiation through built-in reporting, and by empowering employees, enforcing best
practices, and enforcing consistency.
10. What does ISO certification signify?
a. ISO certification shows that you know what you do, do what you say, and have documented your processes.
Chapter 9
Chapter 10
i. The words used in the language: third generation languages use more English-like words than second-
generation languages.
ii. Hardware specificity: third generation languages are not specific to hardware, second-generation languages
are.
iii. Learning curve: third generation languages are easier to learn and use.
5. Why would an organization consider building its own software application if it is cheaper to buy one?
a. They may wish to build their own in order to have something that is unique (different from their
competitors), and/or something that more closely matches their business processes. They also may choose to
do this if they have more time and/or more money available to do it.
6. What is responsive design?
a. Responsive design is a method of developing websites that allows them to be viewed on many different types
of devices without losing capability or effectiveness. With a responsive website, images resize themselves based
on the size of the device’s screen, and text flows and sizes itself properly for optimal viewing.
7. What is the relationship between HTML and CSS in website design?
a. While HTML is used to define the components of a web page, cascading style sheets (CSS) are used to define
the styles of the components on a page.
8. What is the difference between the pilot implementation methodology and the parallel implementation
methodology?
a. The pilot methodology implements new software for just one group of people while the rest of the users use
the previous version of the software. The parallel implementation methodology uses both the old and the new
applications at the same time.
9. What is change management?
a. The oversight of the changes brought about in an organization.
10. What are the four different implementation methodologies?
a. direct cutover, pilot, parallel, phased
Chapter 11
a. There are two key points to choose from. One is that economic activity was, when the book was published
in 1996, being organized around the networks that the new telecommunication technologies had provided. The
other is that this new, global economic activity was different from the past, because “it is an economy with the
capacity to work as a unit in real time on a planetary scale.”
9. Which country has the highest average Internet speed? How does your country compare?
a. According to the chart in the chapter, South Korea has the highest Internet speeds. Students will need to look
up their own to compare.
10. What is the OLPC project? Has it been successful?
a. One Laptop Per Child. By most measures, it has not been a successful program.
Chapter 12
Chapter 13
1. Which countries are the biggest users of the Internet? Social media? Mobile?
a. Students will need to look outside the text for this, as it changes all the time. There are also different ways of
measurement: number of users, % of population, most active users, etc. Some good sites to use are Internet
World Stats, Kissmetrics, and the World Bank.
2. Which country had the largest Internet growth (in %) between 2008 and 2012?
a. Iran, at 205%
3. How will most people connect to the Internet in the future?
a. via mobile devices
4. What are two different applications of wearable technologies?
a. There are many answers to this question; two examples are Google Glass and Jawbone UP.
5. What are two different applications of collaborative technologies?
a. There are many answers to this; two examples are software that routes us to our destination in the shortest
amount of time, and websites that review different companies.
6. What capabilities do printable technologies have?
a. Using 3-D printers, designers can quickly test prototypes or build something as a proof of concept. Printable
technologies also make it possible to bring manufacturing to the desktop computer.
7. How will advances in wireless technologies and sensors make objects “findable”?
a. Advances in wireless technologies and sensors will allow physical objects to send and receive data about
themselves.
8. What is enhanced situational awareness?
a. Data from large numbers of sensors can give decision makers a heightened awareness of real-time events,
particularly when the sensors are used with advanced display or visualization technologies.
9. What is a nanobot?
a. A nanobot is a robot whose components are on the scale of about a nanometer.
10. What is a UAV?
a. An unmanned aerial vehicle – a small airplane or helicopter that can fly without a pilot. UAVs are run by
computer or remote control.