Expert systems and office automation systems

1) Two information systems that support the entire organizationare

A. enterprise resource planning systems and dashboards

B. transaction processing systems and office automation systems

C. enterprise resource planning systems and transaction processingsystems

D. expert systems and office automation systems

2) _______ is the direct use of information systems by employees intheir work

A. Transaction processing systems

B. End-user computing

C. Decision support systems

D. Management information systems

3) ______ attempt to duplicate the work of human experts byapplying reasoning capabilities

A. Expert systems

B. Dashboards

C. Business intelligence systems

D. Decision support systems

4) ______ issues involve who may obtain information and how muchthey should pay for this information

A. Privacy

B. Accessibility

C. Property

D. Transferability

5) _____ issues involve collecting, storing, and disseminatinginformation about individuals.

A. Privacy

B. Accuracy

C. Property

D. Accessibility

6) Your company’s computers have been taken over by an attacker andused to attack another organization’s information systems. Yourproblem is which of the following?

A. Poor security policies and procedures

B. Lack of due diligence

C. Downstream liability

D. Poor service-level agreements

7) You are the only person in your office to upgrade to Microsoft®Word 2010. Before you share documents with coworkers, you should dowhich of the following?

A. Print out a backup copy of documents

B. Run the Compatibility Checker

C. Burn all documents to CD

D. Create a document summary

8) Which of the following is detected by the contextual spellingchecker?

A. Duplicate words

B. Irregular capitalization

C. Use of their when you should use there

D. Improper use of commas and other punctuation

9) If your cursor is near the bottom of a page and you want todisplay the next paragraph you type at the top of a new page, youshould use which of the following?

A. Enter

B. Ctrl+PageDown

C. Ctrl+Enter

D. Page Layout, Breaks, Line Numbers

10) Your ______ is the collection of traceable data that iscaptured when you use various information technologies such ascredit cards or the Internet

A. data profile

B. data shadow

C. database file

D. database record

11) No alphabetic characters in a social security number field isan example of

A. data isolation

B. data consistency

C. data integrity

D. data redundancy

12) In a database, the primary key field is used to

A. specify an entity

B. uniquely identify an attribute

C. identify duplicated data

D. uniquely identify a record

13) Search engines and metasearch engines are examples of whichnetwork application?

Posted in Uncategorized