2018 B1T3 MIS101 Assignment: True/False and Multiple Choice Questions
VerifiedAdded on 2023/05/28
|9
|1399
|298
Homework Assignment
AI Summary
This assignment, designed for the MIS101 course, presents a comprehensive assessment of key concepts covered in the first four weeks of the curriculum. It includes two main sections: Part I consists of ten true/false questions, requiring students to justify their answers, thereby demonstrating their understanding of core principles. Part II comprises ten multiple-choice questions, designed to test the students' grasp of specific details and their ability to differentiate between related concepts. The questions span a range of topics, including information granularity, system architecture, e-commerce models, and technological concepts like SEO, fuzzy logic, and denial-of-service attacks. The student has provided answers to all questions, demonstrating their understanding of the material, as well as an ability to apply the concepts learned to specific scenarios. The assignment provides a solid foundation for further learning and exam preparation, and is a useful resource for students studying Management Information Systems.

2018 B1T3
MIS101 Management Information System Assignment
Instruction:
This assignment covers the learning materials from Week 1 to Week 4
Answer all questions
Students are required to make use of the internet and textbook to find relevant
open source information that can provide factual and convincing answers to all
the questions listed.
Total mark for this Individual Assignment is 40%.
By completing your lab work satisfactorily, you will enhance your understanding
and help yourself to prepare for your final examination.
You are not allowed to copy your colleagues’ works.
The assignment must be submitted before 11:55 pm 2rd December 2018.
Student Name:
Student Number:
Date of submission:
MIS101 Management Information System Assignment
Instruction:
This assignment covers the learning materials from Week 1 to Week 4
Answer all questions
Students are required to make use of the internet and textbook to find relevant
open source information that can provide factual and convincing answers to all
the questions listed.
Total mark for this Individual Assignment is 40%.
By completing your lab work satisfactorily, you will enhance your understanding
and help yourself to prepare for your final examination.
You are not allowed to copy your colleagues’ works.
The assignment must be submitted before 11:55 pm 2rd December 2018.
Student Name:
Student Number:
Date of submission:
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser


Part I True or False (5 marks in total)
Justify the following statements whether they are right or wrong. Each question values 1 marks.
(Please write your answer in below table. There will be no mark if no answer in the table. )
No. 1 2 3 4 5 6 7 8 9 10
Answe
r
True –
This is
because
informatio
n that can
be
accessible
would be
able to
provide
the best
form of
support to
different
people.
False –
Business
informatio
n is
regarded
as
collective
informatio
n. This
informatio
n would
be based
on
customers
,
competito
rs and
internal
informatio
n.
False – The
entire set of
organisatio
nal
resources
would play
a major role
in playing
an
important
role to play
in MIS.
This would
help in
forming the
best kind of
MIS within
an
organisatio
n.
True – The
‘0’ and ‘1’
are regarded
as the Binary
Number
System in
Mathematics.
This is due to
the
straightforwa
rd
implementati
on within
digital
electronic
circuitry that
would make
use of logic
gates. This
binary
system is
False – The
Fuzzy Logic
could be
discussed as
a
mathematical
method
based on
handling of
subjective or
imprecise
information.
The basic
approach
would be to
assign values
in the range
and based on
vague or
ambiguous
information.
True-
SEO
would be
helpful for
increasing
the
visibility
of the
website
and the
likelihood
for
finding
the page
within
different
search
engine
(Giomelak
is and
Veglis
True –
SaaS is a
form of
cloud
computing
that would
offer the
users a
direct form
of access to
the cloud
based
software of
the vendor.
Users
would not
install
applications
on their
local
devices
False –
The C2B
model of
e-business
is not a
true
inversion
of the
C2C
model of
e-business
platform.
True – A
virus
could
damage
the
processor
of the
computer
(Huang et
al. 2013).
They
have the
tendency
to put
overload
on the
RAM or
CPU and
may help
in raising
the
True –
This
attack
would be
categoriz
ed with
their
explicit
attempt
by
attackers
for
preventin
g
legitimat
e users of
a service
based on
using that
service.
Justify the following statements whether they are right or wrong. Each question values 1 marks.
(Please write your answer in below table. There will be no mark if no answer in the table. )
No. 1 2 3 4 5 6 7 8 9 10
Answe
r
True –
This is
because
informatio
n that can
be
accessible
would be
able to
provide
the best
form of
support to
different
people.
False –
Business
informatio
n is
regarded
as
collective
informatio
n. This
informatio
n would
be based
on
customers
,
competito
rs and
internal
informatio
n.
False – The
entire set of
organisatio
nal
resources
would play
a major role
in playing
an
important
role to play
in MIS.
This would
help in
forming the
best kind of
MIS within
an
organisatio
n.
True – The
‘0’ and ‘1’
are regarded
as the Binary
Number
System in
Mathematics.
This is due to
the
straightforwa
rd
implementati
on within
digital
electronic
circuitry that
would make
use of logic
gates. This
binary
system is
False – The
Fuzzy Logic
could be
discussed as
a
mathematical
method
based on
handling of
subjective or
imprecise
information.
The basic
approach
would be to
assign values
in the range
and based on
vague or
ambiguous
information.
True-
SEO
would be
helpful for
increasing
the
visibility
of the
website
and the
likelihood
for
finding
the page
within
different
search
engine
(Giomelak
is and
Veglis
True –
SaaS is a
form of
cloud
computing
that would
offer the
users a
direct form
of access to
the cloud
based
software of
the vendor.
Users
would not
install
applications
on their
local
devices
False –
The C2B
model of
e-business
is not a
true
inversion
of the
C2C
model of
e-business
platform.
True – A
virus
could
damage
the
processor
of the
computer
(Huang et
al. 2013).
They
have the
tendency
to put
overload
on the
RAM or
CPU and
may help
in raising
the
True –
This
attack
would be
categoriz
ed with
their
explicit
attempt
by
attackers
for
preventin
g
legitimat
e users of
a service
based on
using that
service.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

mostly used
in all modern
computers
(L’Ecuyer et
al. 2017).
The higher
the value, the
more
prominent
would it be
to 1.
2016). (Kavis
2014).
temperatu
re of the
device.
This
might
cause
serious
harm to
the core
of the
computer
s.
in all modern
computers
(L’Ecuyer et
al. 2017).
The higher
the value, the
more
prominent
would it be
to 1.
2016). (Kavis
2014).
temperatu
re of the
device.
This
might
cause
serious
harm to
the core
of the
computer
s.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

1. Information is of no value to you if you can't access it.
2. Business intelligence refers solely to information about your competitors.
3. Management Information System mainly deals with three main organisational
resources: People, Information and Technology. They are all playing very important
roles in modern business management, people of course are the most important
component whereas information is the least important.
4. Technically speaking, computer is a machine that only accepts and understands
binary codes: 0, 1.
5. The basic approach of fuzzy logic is to assign values between 1 and 2 to vague or
ambiguous information.
6. SEO improves the visibility of a Web site through the use of tags and key terms found
by search engines.
7. Customers use only applications provided via a cloud infrastructure, which is
Software as a Service (SaaS).
8. The C2B e-commerce business model is a true inversion of the C2C e-commerce
business model.
9. A virus has the capacity to hurt the processor of a computer.
10. The objective of a denial-of-service attack is to prevent legitimate customers from
accessing the target site.
2. Business intelligence refers solely to information about your competitors.
3. Management Information System mainly deals with three main organisational
resources: People, Information and Technology. They are all playing very important
roles in modern business management, people of course are the most important
component whereas information is the least important.
4. Technically speaking, computer is a machine that only accepts and understands
binary codes: 0, 1.
5. The basic approach of fuzzy logic is to assign values between 1 and 2 to vague or
ambiguous information.
6. SEO improves the visibility of a Web site through the use of tags and key terms found
by search engines.
7. Customers use only applications provided via a cloud infrastructure, which is
Software as a Service (SaaS).
8. The C2B e-commerce business model is a true inversion of the C2C e-commerce
business model.
9. A virus has the capacity to hurt the processor of a computer.
10. The objective of a denial-of-service attack is to prevent legitimate customers from
accessing the target site.

Part II Multiple Choice (10 marks in total)
There is only one correct answer for each question. 1 marks for each question.
(Please write your answer in below table. There will be no mark if no answer in the
table.)
No. 1 2 3 4 5 6 7 8 9 10
Answer C B B C C B A A B C
1. Information granularity refers to:
A. the quantity of data within the information.
B. the quality of data within the information.
C. the frequency of data within the information.
D. the extent of detail within the information.
2. At lower organizational levels, information exhibits _____ granularity.
A. unrefined
B. fine
C. concentrated
D. coarse
3. ___ is a temporary holding area for the information you're working with as well as
the system and application software instructions that the CPU currently needs.
A. ROM
B. RAM
C. DVD
D. VCD
There is only one correct answer for each question. 1 marks for each question.
(Please write your answer in below table. There will be no mark if no answer in the
table.)
No. 1 2 3 4 5 6 7 8 9 10
Answer C B B C C B A A B C
1. Information granularity refers to:
A. the quantity of data within the information.
B. the quality of data within the information.
C. the frequency of data within the information.
D. the extent of detail within the information.
2. At lower organizational levels, information exhibits _____ granularity.
A. unrefined
B. fine
C. concentrated
D. coarse
3. ___ is a temporary holding area for the information you're working with as well as
the system and application software instructions that the CPU currently needs.
A. ROM
B. RAM
C. DVD
D. VCD
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

4. What type of technology allows you to verbally speak with someone over the
Internet
A. Wiki feeds
B. Social network
C. Ephone
D. VoIP
5. Assume that you go to a computer store to buy a desktop, the salesman shows
you one with 2.8GHz Intel Core CPU, how many calculations this CPU is able to
perform per second approximately:
A. 28 billion calculations per second
B. 2.8 billion calculations per second
C. 280 million calculations per second
D. 280*2 million calculations per second
6. Data warehouses exist to support:
A. MRP.
B. OLAP.
C. OLTP.
D. SQL.
7. _____ is the process of reinstalling the backup information in the event the
information was lost.
A. Recovery
B. Recycling
C. Retrieval
Internet
A. Wiki feeds
B. Social network
C. Ephone
D. VoIP
5. Assume that you go to a computer store to buy a desktop, the salesman shows
you one with 2.8GHz Intel Core CPU, how many calculations this CPU is able to
perform per second approximately:
A. 28 billion calculations per second
B. 2.8 billion calculations per second
C. 280 million calculations per second
D. 280*2 million calculations per second
6. Data warehouses exist to support:
A. MRP.
B. OLAP.
C. OLTP.
D. SQL.
7. _____ is the process of reinstalling the backup information in the event the
information was lost.
A. Recovery
B. Recycling
C. Retrieval
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

D. Reproduction
8. Which of the following artificial intelligence systems is capable of finding and
differentiating patterns?
A. Neural networks
B. Expert systems
C. Geographic information systems
D. Decision support systems
9. _____ is a mathematical method of handling imprecise or subjective information.
A. Decision support system
B. Fuzzy logic
C. Neural network
D. Knowledge management system
10. Which of the following is an advantage of a distributed infrastructure?
A. It allows only specific locations within an infrastructure to share information and
applications.
B. It ensures that each application is stored exclusively in one location to ensure
information security.
C. It can allocate its processing activity to a location where it can most efficiently be
done.
D. It divides an IT system into different tiers where each part performs a specific function.
8. Which of the following artificial intelligence systems is capable of finding and
differentiating patterns?
A. Neural networks
B. Expert systems
C. Geographic information systems
D. Decision support systems
9. _____ is a mathematical method of handling imprecise or subjective information.
A. Decision support system
B. Fuzzy logic
C. Neural network
D. Knowledge management system
10. Which of the following is an advantage of a distributed infrastructure?
A. It allows only specific locations within an infrastructure to share information and
applications.
B. It ensures that each application is stored exclusively in one location to ensure
information security.
C. It can allocate its processing activity to a location where it can most efficiently be
done.
D. It divides an IT system into different tiers where each part performs a specific function.

References
Giomelakis, D. and Veglis, A., 2016. Investigating search engine optimization factors in media websites:
the case of Greece. Digital Journalism, 4(3), pp.379-400.
Huang, C.Y., Lee, C.L., Wen, T.H. and Sun, C.T., 2013. A computer virus spreading model based on
resource limitations and interaction costs. Journal of Systems and Software, 86(3), pp.801-808.
Kavis, M.J., 2014. Architecting the cloud: design decisions for cloud computing service models (SaaS,
PaaS, and IaaS). John Wiley & Sons.
L’Ecuyer, P., Munger, D., Oreshkin, B. and Simard, R., 2017. Random numbers for parallel computers:
Requirements and methods, with emphasis on GPUs. Mathematics and Computers in Simulation, 135,
pp.3-17.
Giomelakis, D. and Veglis, A., 2016. Investigating search engine optimization factors in media websites:
the case of Greece. Digital Journalism, 4(3), pp.379-400.
Huang, C.Y., Lee, C.L., Wen, T.H. and Sun, C.T., 2013. A computer virus spreading model based on
resource limitations and interaction costs. Journal of Systems and Software, 86(3), pp.801-808.
Kavis, M.J., 2014. Architecting the cloud: design decisions for cloud computing service models (SaaS,
PaaS, and IaaS). John Wiley & Sons.
L’Ecuyer, P., Munger, D., Oreshkin, B. and Simard, R., 2017. Random numbers for parallel computers:
Requirements and methods, with emphasis on GPUs. Mathematics and Computers in Simulation, 135,
pp.3-17.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 9
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.