

Information Systems for Business
Midterm Exam
Course Introduction
This course explores the fundamental role of information systems in modern business environments, examining how technology supports organizational operations, decision-making, and competitive strategy. Students will learn about the components of information systems, including hardware, software, data, people, and processes, and analyze how these systems enhance efficiency, communication, and innovation within enterprises. The course covers topics such as enterprise resource planning, e-commerce, data management, cybersecurity, and emerging trends in business technology, providing practical insights into selecting, implementing, and managing information systems to achieve organizational objectives.
Recommended Textbook
Data Communications and Computer Networks A Business Users Approach 7th Edition by Curt
Available Study Resources on Quizplus
13 Chapters
1238 Verified Questions
1238 Flashcards
Source URL: https://quizplus.com/study-set/2104 Page 2


Chapter 1: Introduction to Computer Networks and Data Communications
Available Study Resources on Quizplus for this Chatper
76 Verified Questions
76 Flashcards
Source URL: https://quizplus.com/quiz/41894
Sample Questions
Q1) The session layer of the OSI model is responsible for establishing synchronization points.
A)True
B)False
Answer: True
Q2) ____ is the design, installation, and support of a network and its hardware and software.
A)Convergence
B)Voice network
C)Data network
D)Network management
Answer: D
Q3) Some people call computer terminals thick-client workstations.
A)True
B)False
Answer: False
Q4) ____________________ are personal computers or microcomputers where users reside.
Answer: Workstations
To view all questions and flashcards with answers, click on the resource link above. Page 3

Chapter 2: Fundamentals of Data and Signals
Available Study Resources on Quizplus for this Chatper
100 Verified Questions
100 Flashcards
Source URL: https://quizplus.com/quiz/41895
Sample Questions
Q1) The bandwidth of a telephone system that transmits a single voice in the range of 300 Hz to 3400 Hz is ____ Hz.
A)10
B)100
C)3100
D)3700
Answer: C
Q2) The set of all textual characters or symbols and their corresponding binary patterns is called a(n) ____________________.
Answer: data code
Q3) The Manchester encoding schemes are called ____, because the occurrence of a regular transition is similar to seconds ticking on a clock.
A)continuous-clocking
B)analog-clocking
C)discrete-clocking
D)self-clocking
Answer: D
Q4) ____________________ is the opposite of attenuation.
Answer: Amplification
To view all questions and flashcards with answers, click on the resource link above. Page 4

Chapter 3: Conducted and Wireless Media
Available Study Resources on Quizplus for this Chatper
103 Verified Questions
103 Flashcards
Source URL: https://quizplus.com/quiz/41896
Sample Questions
Q1) Category 1 twisted pair wire is not recommended for transmitting megabits of computer data.
A)True
B)False
Answer: True
Q2) Two major coaxial cable technologies exist and are distinguished by the type of signal each carries: baseband and ____________________.
Answer: broadband
Q3) ____________________ is the legal capability of a business to install a wire or cable across someone's property.
Answer: Right-of-way
Q4) Category 1 wire is susceptible to experiencing noise and signal attenuation. A)True
B)False
Answer: True
Q5) ____________________ transmission is a special form of radio transmission that uses a focused ray of light in the infrared frequency range (1012 -1014 MHz).
Answer: Infrared
To view all questions and flashcards with answers, click on the resource link above. Page 5

Chapter 4: Making Connections
Available Study Resources on Quizplus for this Chatper
79 Verified Questions
79 Flashcards
Source URL: https://quizplus.com/quiz/41897
Sample Questions
Q1) A ____ port is a connection in which eight data lines transmit an entire byte of data at one moment in time.
A)serial
B)parallel
C)DIN
D)USB
Q2) The ____ component of USB strictly specifies the exact dimensions of the interface's connectors and cabling.
A)procedural
B)functional
C)mechanical
D)electrical
Q3) An EIA-232F interface is a full-duplex connection.
A)True
B)False
Q4) To prepare a data character for an asynchronous transmission, a few extra bits of information are added to the data bits of the character to create a(n)
Q5) What are the three ways used to maintain synchronization in synchronous connections?
To view all questions and flashcards with answers, click on the resource link above. Page 6

Chapter 5: Making Connections Efficient: Multiplexing and Compression
Available Study Resources on Quizplus for this Chatper
96 Verified Questions
96 Flashcards
Source URL: https://quizplus.com/quiz/41898
Sample Questions
Q1) Presently, a medium can be divided in three basic ways: a division of ____, a division of time, and a division of transmission codes.
A)frequencies
B)amplitudes
C)wavelength
D)direction
Q2) Code division multiplexing is based upon a class of modulation techniques known as spread spectrum technology.
A)True
B)False
Q3) SONET and SDH are able to multiplex varying speed streams of data onto one fiber connection.
A)True
B)False
Q4) ____________________ is a modulation technique that involves a four-bit code in which eight phase angles have a single amplitude, and four phase angles have double amplitudes.
Q5) What are the major disadvantages of frequency division multiplexing?
Q6) How does T-1 multiplexing work?
To view all questions and flashcards with answers, click on the resource link above. Page 7

Chapter 6: Errors, Error Detection, and Error Control
Available Study Resources on Quizplus for this Chatper
75 Verified Questions
75 Flashcards
Source URL: https://quizplus.com/quiz/41899
Sample Questions
Q1) With ____ parity, the 0 or 1 added to the string produces an even number of binary 1s.
A)even B)odd
C)longitudinal D)binary
Q2) In a stop-and-wait error control system, a receiver may acknowledge multiple packets with a single ACK.
A)True
B)False
Q3) The ____________________ method typically adds 8 to 32 check bits to potentially large data packets and yields an error detection capability approaching 100 percent.
Q4) If impulse noise interferes with a digital signal, often the original digital signal cannot be recognized and recovered.
A)True
B)False
Q5) Simple parity comes in two basic forms: even parity and ____________________ parity.
Page 8
Q6) How does the cyclic redundancy checksum work?
To view all questions and flashcards with answers, click on the resource link above.

Chapter 7: Local Area Networks: Part I
Available Study Resources on Quizplus for this Chatper
99 Verified Questions
99 Flashcards
Source URL: https://quizplus.com/quiz/41900
Sample Questions
Q1) The most popular configuration for a local area network is the ____ topology.
A)ring
B)star-wired bus
C)bus
D)tree
Q2) The switch operates in place of a ____.
A)repeater
B)bridge
C)router
D)hub
Q3) ____ was a system designed for twisted pair wiring, but with only a 1-Mbps data transfer rate for 500 meters.
A)10BaseT
B)10Broad36
C)100BaseTX
D)1Base5
Q4) The ____________________ design refers to the pattern formed by the locations of the elements of the network, as it would appear if drawn on a sheet of paper.
Q5) Explain the cut-through architecture including its advantages and disadvantages.
To view all questions and flashcards with answers, click on the resource link above. Page 9

Chapter 8: Local Area Networks: Part II
Available Study Resources on Quizplus for this Chatper
113 Verified Questions
113 Flashcards
Source URL: https://quizplus.com/quiz/41901
Sample Questions
Q1) The NT ____________________ was a container object that contained users, servers, printers, and other network resources.
Q2) A ____ is a server that has no cabinet or box, but resides on a single printed circuit card.
A)peer-to-peer server
B)server appliance
C)server blade
D)print server
Q3) A network server requires at least three connections to the network in the form of a network interface card.
A)True
B)False
Q4) It is not possible to create a Windows Server network with multiple domains.
A)True
B)False
Q5) Many of the higher-power network servers support not one but multiple processors.
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above. Page 10

Chapter 9: Introduction to Metropolitan Area Networks and
Wide Area Networks
Available Study Resources on Quizplus for this Chatper
101 Verified Questions
101 Flashcards
Source URL: https://quizplus.com/quiz/41902
Sample Questions
Q1) When the network signals the transmitting station to slow down, this is called
Q2) A ____ area network is typically confined to a single building or a couple floors within one building.
A)personal
B)local
C)metropolitan
D)wide
Q3) A ____ is a legally binding, written document, that can include service parameters offered in the service, various types of service/support options, incentives if the service levels are exceeded, and penalties if service levels are not met.
A)connection admission control
B)service level agreement
C)software license agreement
D)congestion control
Q4) A network that expands into a metropolitan area and exhibits high data rates, high reliability, and low data loss is called a(n)
Q5) How is routing through a wide area network accomplished?
To view all questions and flashcards with answers, click on the resource link above. Page 11

Chapter 10: The Internet
Available Study Resources on Quizplus for this Chatper
100 Verified Questions
100 Flashcards
Source URL: https://quizplus.com/quiz/41903
Sample Questions
Q1) ____ is a client/server protocol in which e-mail is received and held for you at your Internet server.
A)Hypertext Transfer Protocol (HTTP)
B)File Transfer Protocol (FTP)
C)Domain Name Service (DNS)
D)Internet Message Access Protocol (IMAP)
Q2) The ____ is a large, distributed database of Internet addresses and domain names.
A)Uniform Resource Locator (URL)
B)Domain Name System (DNS)
C)Hypertext Transfer Protocol (HTTP)
D)Hypertext Markup Language (HTML)
Q3) ____ is the gathering and use of the browsing habits of potential and current customers, which is important data for many companies.
A)Micro-marketing
B)E-retailing
C)VoIP
D)EDI
Q4) How does the Internet Protocol work?
Q5) IP ____________________ is essentially another name for a data packet.
To view all questions and flashcards with answers, click on the resource link above. Page 12

Chapter 11: Voice and Data Delivery Networks
Available Study Resources on Quizplus for this Chatper
97 Verified Questions
97 Flashcards
Source URL: https://quizplus.com/quiz/41904
Sample Questions
Q1) When a VCC transmits user-to-network control signaling, the connection is called the _________________________.
Q2) Frame relay and ATM are losing market share to Internet services such as FTP and Telnet.
A)True
B)False
Q3) Because DSL is an always-on connection, it uses a ____ circuit instead of a switched circuit.
A)changing
B)dynamic
C)virtual
D)permanent
Q4) A real-time interactive application is one of the most demanding with respect to data transmission rate and network throughput.
A)True
B)False
Q5) How does a 56k dial-up modem work?
Q6) The ____________________ is the telephone line that leaves your house or business.
To view all questions and flashcards with answers, click on the resource link above. Page 13

Chapter 12: Network Security
Available Study Resources on Quizplus for this Chatper
100 Verified Questions
100 Flashcards
Source URL: https://quizplus.com/quiz/41905
Sample Questions
Q1) If e-mail messages have a return address of someone other than the person actually sending the e-mail, then the sender is ____.
A)e-mail bombing
B)spoofing
C)smurfing
D)firewalling
Q2) The DES algorithm works with 128-bit blocks of data.
A)True
B)False
Q3) Antivirus software with ________________________________________ runs in the background while an application that the user is executing runs in the foreground.
Q4) A proxy server sits inside a company's corporate network.
A)True
B)False
Q5) A(n) ______________________________ is either specialized software on a network or a trusted third-party organization or business that issues and manages certificates.
Q6) What are some of the standard rules for creating or changing a password?
Q7) What information does a certificate contain?
To view all questions and flashcards with answers, click on the resource link above. Page 14

Chapter 13: Network Design and Management
Available Study Resources on Quizplus for this Chatper
99 Verified Questions
99 Flashcards
Source URL: https://quizplus.com/quiz/41906
Sample Questions
Q1) Many experts feel analytical modeling is a good way to determine network capacity.
A)True
B)False
Q2) ____ involves generating system statistics under a controlled environment and then comparing those statistics against known measurements.
A)Linear projection
B)Benchmarking
C)Computer simulation
D)Analytical modeling
Q3) ____________________ is the amount of time necessary for the metropolitan area network to reconfigure itself or reroute a packet, should a given link fail.
Q4) Provide an example of capacity planning using linear projection.
Q5) ____________________ is the probability that a particular component or system will be available during a fixed time period.
Q6) Computer network technology changes at breakneck speed.
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above.
Page 15