Mis 505 Week 2 Review Question

In: Computers and Technology

Submitted By shwetapatil080
Words 1104
Pages 5
MIS505: Essentials of Information Systems Programming
Due Date: Wednesday September 16 @ 11:59 PM

Complete Chapter 2 Review Questions 1-20 (20 POINTS)

1. What does a declaration provide for a variable? o a. a name o b. a data type o c. both of the above o d. none of the above

2. A variable's data type describes all of the following except __________.
a. what values the variable can hold
b. how the variable is stored in memory
c. what operations can be performed with the variable
d. the scope of the variable

3. The value stored in an uninitialized variable is __________.
a. garbage
b. null
c. compost
d. its identifier

4. The value 3 is a __________.
a. numeric variable
b. numeric constant
c. string variable
d. string constant

5. The assignment operator _________.
a. is a binary operator
b. has left-to-right associativity
c. is most often represented by a colon
d. two of the above

6. Which of the following is true about arithmetic precedence?
a. Multiplication has a higher precedence than division.
b. Operators with the lowest precedence always have left-to-right associativity.
c. Division has higher precedence than subtraction.
d. all of the above

7. Which of the following is a term used as a synonym for “module” in any programming language?
a. method
b. procedure
c. both of these
d. none of these 8. Which of the following is a reason to use modularization?
a. Modularization avoids abstraction.
b. Modularization reduces overhead.
c. Modularization allows you to more easily reuse your work.
d. Modularization eliminates the need for syntax.

9. What is the name for the process of paying attention to important properties while ignoring nonessential details?
a. abstraction
b. extraction
c. extinction
d. modularization

10. Every module has all of the following except __________.
a. a…...

Similar Documents

Lesson 2 Review Question Answers

...Review Questions - ANSWERS Name ____________________________ Answer the following questions: 1) What is a resource? People, equipment & materials necessary to complete a task 2) Why aren't resources assigned to summary tasks? Summary tasks are simply a grouping for a set of related tasks. The indiv tasks require resources but the summary task is just a compilation of those resources. 3) What is the difference between Start, Prorated and End in association with costs? Start – cost applied at the beginning of the task Prorated – cost applied as work is completed End – cost applied when the task is completed 4) Give a real-world example of the difference between a fixed cost and a cost per use? Give a real-world example of the difference between a fixed cost and a cost per use? Fixed Cost: (buy equipment) company bids $500 to clean carpet, cost of airline ticket… Cost Per Use: (rent equipment) Hourly rate on moving van, rental of shampoo machine, landing fee each time plane lands… 5) Why is a fixed cost entered with the task and not the resource? Because the cost is the same no matter how many people, hours, materials used. Not dependent upon the amount of time or number of resources it takes to complete. 6) Why is the resource cost for the Wiring Contractor $0.00? Because the installation of the wiring is a fixed contractual price of $4000 – it will not matter how many hours the contractor takes – still......

Words: 283 - Pages: 2

Acc 505 Week 2 Quiz Questions

...1. AC505 Week 2 Quiz PLEASE DOWNLOAD HERE1. 1. (TCO 2) Bubba’s Crawfish Processing Company uses a traditional overhead allocation based on direct labor hours. For the current year overhead is estimated at $2,250,000 and direct labor hours are budgeted at 415,000 hours. Actual overhead was $2,200,000 and actual direct labor hours worked were 422,000. (a) Calculate the predetermined overhead rate. (b) Calculate the overhead applied. (c) Determine the amount of overhead that is over/under applied. 2. (TCO 2) Thibodeaux Limousine Corporation is trying to determine a predetermined manufacturing overhead. Estimated overhead for the upcoming year is $776,000. Budgeted machine hours are 105,000 hours, and budgeted labor hours are 17,500 hours at a rate of $10.00 per hour. Compute the predetermined overhead rate based on: (a) Direct labor dollars (b) Direct labor hours (c) Machine hours 3. (TCO 1) List and briefly describe four of the five differences between managerial accounting and financial accounting 4. (TCO 2)The following information is available for Sappy’s Surgical Shears for the fiscal year ending December 31, 20XX. Beginning balance in Finished Goods $ 17,000 Ending balance in Finished Goods 15,200 Beginning balance in Work in Process 2,500Ending balance in Work in Process 1,836 Selling expenses 123,000 General and administrative expenses 89,000Direct material cost 54,500 Direct labor cost 66,000 Manufacturing overhead 21,400 Sales 385,000 Prepare a schedule......

Words: 994 - Pages: 4

Chap 2 Review Question

...1. Management is responsible for implementing information security to protect the ability of the organization to function. They must set policy and operate the organization in a manner that complies with the laws that govern the use of technology. Technology alone cannot solve information security issues. Management must make policy choices and enforce those policies to protect the value of the organization's data. 2. Data is important to an organization because without it an organization will lose its record of transactions and/or its ability to furnish valuable deliverables to its customers. Other assets that require protection include the ability of the organization to function, the safe operation of applications, and technology assets. 3. Both general management and IT management are responsible for implementing information security. 4. The implementation of networking technology has created more risk for businesses that use information technology because business networks are now connected to the internet and other networks external to the organization. This has made it easier for people to gain unauthorized access to the organization's networks. 5. Information extortion occurs when an attacker steals information from a computer system and demands compensation for its return or for an agreement not to disclose it. For example, if a hacker gains unauthorized access to a celebrity’s computer and discovers embarrassing photos or videos of the star, he could......

Words: 1215 - Pages: 5

Chapter 2 Review Questions Solutions

...Chapter 2 Review Questions Solutions 1. Describe and compare the six sources of software. The six sources of software identified in the textbook are: (1) information technology services firms, (2) packaged software providers, (3) vendors of enterprise solution software, (4) application service providers and managed service providers, (5) open-source software, and (6) in-house development. IT services firms help companies develop custom information systems for internal use; they develop, host, and run applications for customers; or they provide other services. An IT services firm may be chosen if the system can’t be developed internally or requires customer support. Packaged software providers are companies that produce software exclusively, like Microsoft or Intuit, and are preferable if the task needing the system is generic. Vendors of enterprise solution software create a system that is composed of a series of integrated modules. Each module supports a business function, such as accounting, or human resources. ERP systems may be appropriate if a complete system is required that can cross functional boundaries. A more intense option for larger, more customizable solutions are Managed service providers who can provide more services than application service providers. ASPs and MSPs may be appropriate when instant access to an application is desired, and in the case of ASPs, when the task is generic. Open-source software is a type of software that is developed......

Words: 897 - Pages: 4

Review Questions Chapter 1 and 2

...Chapter 1 Review Questions (1.1 - 1.7) 1.1 Define the following terms: data, database, DBMS, database system, database catalog, program-data independence, user view, DBA, end user, canned transaction, deductive database system, persistent object, meta-data, and transaction-processing application. a) Data: Known facts that can be recorded and that have implicit meaning. b) Database: Collection of related data. c) DBMS: Is a collection of programs that enables users to maintain a database. d) Database system: Is a compilation of the database and complete definition of the database structure and constrains. e) Database catalog: contains information such as the structure of each file, the type and storage format of each data item, and various constraints on the data f) Program-data independence: Is the structure of data files g) User view: A view may be a subset of the database or it may contain virtual data that is derived from the database files but is not explicitly stored h) DBA: The Database Administrator or “DBA” is responsible for authorizing access to the database, coordinating and monitoring its use, and acquiring software and hardware resources as needed. i) End user: These are the people whose jobs require access to the database for querying, updating and generation reports. j) Canned transaction: These are standard types of querying and updates. k) Deductive database system: capabilities for defining deduction rules for inferencing new information......

Words: 3534 - Pages: 15

Chapter 2 Review Question

...chapter 2 1. Why is information security a management problem? What can management do that Technology cannot? Management is an information problem due to the fact that policymaking and training of securing systems from users fall into the responsibility of their role. These responsibilities can include limiting access as well as disabling certain functions that are not related to the organizations’ function. Management can set policies that may arise due to improper uses or manipulations of systems and asses the threats that are unknown due to the introduction of new hardware and software. 2. Why is data the most important asset an organization possesses? What other assets in the organization require protection? The integrity of the data is most important because it relates to the overall company operations. Securing the data from people not authorized to see or change it ensures that the correct information about the company is being generated without interference or manipulations of data. Other important assets that requires protection are the computer terminals, networking infrastructure, which need to be protected from misuse from internal and external threats whether intentional or not. 3. Which management groups are responsible for implementing information security to protect the organization’s ability to function? The responsibility relies on several management groups such as CIO, who is responsible for the overall protection of system, but the......

Words: 1762 - Pages: 8

Chapter 2 Review Questions

...1. Both general management and IT management are responsible for implementing information security that protects the organization's ability to function. Management is responsible for implementing information security to protect the ability of the organization to function. They must set policy and operate the organization in a manner that complies with the laws that govern the use of technology. Technology alone cannot solve information security issues. Management must make policy choices and enforce those policies to protect the value of the organizations data. 2. Data is important to an organization because without it an organization will lose its record of transactions and/or its ability to furnish valuable deliverables to its customers. Other assets that require protection include the ability of the organization to function, the safe operation of applications, and technology assets. 3. Both general management and IT management are responsible for implementing information security. 4. The implementation of networking technology has created more risk for businesses that use information technology because business networks are now connected to the internet and other networks external to the organization. This has made it easier for people to gain unauthorized access to the organization’s networks. 5. Information extortion occurs when an attacker steals information from a computer system and demands compensation for its return or for an agreement not to......

Words: 1114 - Pages: 5

Week 2 Questions and Answers

...Week 2 Assignment Question /Answers HRM320: Employment Law Professor:  Justin Lawrence DeVry University Michael Nealy January 16, 2015 1. What do you think are some of the factors in the modern workplace that contribute to a theft of time? How can those factors be managed? * There are many factors that can contribute to theft of time in the modern day workplace, for instance should you decide to take an extended coffee break, or if you search the internet a little too long when you should be working on other projects that’s considered to be theft of company time. Should you find yourself using the company phone for personal use such as talking to family members and friends rather than staying on task with the work that is at hand then you are guilty of the offense of theft of time. You are in fact stealing the employer’s money by not managing good use of the time that you have. * Here are some way that can best manage those scenarios. Where I work there are three bells that ring that at different times that lets you know when it is break time and when to return from break. The first bell lets you know that’s it’s time for break, the second bell lets you know that you should be returning from break and finally the third bell lets you know that you should be at your workstation. Should be caught too many times not at your work station you could be disciplined. That is one way to manage your time. As for the second scenario the best way to manage the......

Words: 1121 - Pages: 5

Mis 589 All Textbook Questions (Week 1, 2, 3, 4, 5 and 6)

...MIS 589 All Textbook Questions (Week 1, 2, 3, 4, 5 and 6) Purchase here http://devrycourse.com/mis-589-all-textbook-questions-week-1-2-3-4-5-and-6 Product Description MIS 589 Week 1 Textbook Questions; Chapter 1 MIS 589 Week 2 Textbook Questions; Chapter 3 MIS 589 Week 3 Textbook Questions; Chapter 4 MIS 589 Week 4 Textbook Questions; Chapter 5 MIS 589 Week 5 Textbook Questions; Chapter 7 and 8 MIS 589 Week 6 Textbook Questions; Chapters 9 and 10 MIS 589 All Textbook Questions (Week 1, 2, 3, 4, 5 and 6) Purchase here http://devrycourse.com/mis-589-all-textbook-questions-week-1-2-3-4-5-and-6 Product Description MIS 589 Week 1 Textbook Questions; Chapter 1 MIS 589 Week 2 Textbook Questions; Chapter 3 MIS 589 Week 3 Textbook Questions; Chapter 4 MIS 589 Week 4 Textbook Questions; Chapter 5 MIS 589 Week 5 Textbook Questions; Chapter 7 and 8 MIS 589 Week 6 Textbook Questions; Chapters 9 and 10 MIS 589 All Textbook Questions (Week 1, 2, 3, 4, 5 and 6) Purchase here http://devrycourse.com/mis-589-all-textbook-questions-week-1-2-3-4-5-and-6 Product Description MIS 589 Week 1 Textbook Questions; Chapter 1 MIS 589 Week 2 Textbook Questions; Chapter 3 MIS 589 Week 3 Textbook Questions; Chapter 4 MIS 589 Week 4 Textbook Questions; Chapter 5 MIS 589 Week 5 Textbook Questions; Chapter 7 and 8 MIS 589 Week 6 Textbook Questions; Chapters 9 and 10...

Words: 255 - Pages: 2

Mis 589 All Textbook Questions (Week 1, 2, 3, 4, 5 and 6)

...MIS 589 All Textbook Questions (Week 1, 2, 3, 4, 5 and 6) Purchase here http://chosecourses.com/mis-589-all-textbook-questions-week-1-2-3-4-5-and-6 Product Description MIS 589 Week 1 Textbook Questions; Chapter 1 MIS 589 Week 2 Textbook Questions; Chapter 3 MIS 589 Week 3 Textbook Questions; Chapter 4 MIS 589 Week 4 Textbook Questions; Chapter 5 MIS 589 Week 5 Textbook Questions; Chapter 7 and 8 MIS 589 Week 6 Textbook Questions; Chapters 9 and 10 MIS 589 All Textbook Questions (Week 1, 2, 3, 4, 5 and 6) Purchase here http://chosecourses.com/mis-589-all-textbook-questions-week-1-2-3-4-5-and-6 Product Description MIS 589 Week 1 Textbook Questions; Chapter 1 MIS 589 Week 2 Textbook Questions; Chapter 3 MIS 589 Week 3 Textbook Questions; Chapter 4 MIS 589 Week 4 Textbook Questions; Chapter 5 MIS 589 Week 5 Textbook Questions; Chapter 7 and 8 MIS 589 Week 6 Textbook Questions; Chapters 9 and 10 MIS 589 All Textbook Questions (Week 1, 2, 3, 4, 5 and 6) Purchase here http://chosecourses.com/mis-589-all-textbook-questions-week-1-2-3-4-5-and-6 Product Description MIS 589 Week 1 Textbook Questions; Chapter 1 MIS 589 Week 2 Textbook Questions; Chapter 3 MIS 589 Week 3 Textbook Questions; Chapter 4 MIS 589 Week 4 Textbook Questions; Chapter 5 MIS 589 Week 5 Textbook Questions; Chapter 7 and 8 MIS 589 Week 6 Textbook Questions; Chapters 9 and 10 MIS 589 All Textbook Questions (Week 1, 2, 3, 4, 5 and 6)......

Words: 425 - Pages: 2

Week 2 Chapter 3 & 4 Review Questions

...Week 2 Problems/Exercises: Chapters 3 & 4 Michael LaBarge DeVry University Chapter 3 2. List and describe the common skills and activities of a project manager. Which skill do you think is most important? Why? Common skills of a project manager include: interpersonal skills, leadership skills and technical skills. Interpersonal skills include the skills needed to effectively communicate with others what needs to be done and the process that should be taken to get it done. Leadership skills are important because as the project manager is in charge of the project, they must be able to successfully lead their team from initiation to completion of the project as efficiently as possible. Technical skills are the skills needed to understand all aspects of the system that is to be created or modified and what it takes to make that happen. Common activities of a project manager include: leadership, management, customer relations, technical problem solving, conflict management, team management and risk and change management. I believe that the most important skill that a project manager must possess is leadership. I think that with the right team, the PM can get assistance on the interpersonal and technical aspects of the project. However without the proper leadership, even the best team will ultimately fail, or at least have many difficulties. Also, many of the activities that a project manager must do are leader/management based. 4. Describe the activities performed......

Words: 766 - Pages: 4

Chapter 2 Review Question

...Applications in Info Security Chapter 4 Review Questions: 1)It might depend on the risk, although all risks should be addressed. The conditions that an organization might have is if they don't have a risk management plan or if they don't have the money to identify and mitigate the risk 2) 3)Alignment is important because it can align organizational goals with ICT works. The benefits to an organization as a whole is that it can align security processes with business goals. 4)Evaluation is important because it can determine if your team is achieving the objectives and this is usually done through gathering data and then analyzing it. Organizations benefit by collecting quantitative data because it can be used to evaluate the options and implications of a decision. 5)A contract is an agreement between a customer and a supplier, while the RFP is technically a bid solicitation. 6)Typically a subcontractor role is to perform specific tasks given by a general contractor. They can be controlled by the supplier to follow the right procedures that are given in the contract. 7)The problem resolution is important because it involves two parties in agreeing that all problems are identified, analyzed, managed, and controlled to resolution. 8)There are two types of reviews: Formal Reviews Informal Reviews In a formal review, the ICT is presented to a team or to an individual before the actual review. In the other hand the informal review allows the producer to......

Words: 334 - Pages: 2

Acct 505 Full Week 2

...ACCT 505 FULL WEEK 2 To purchase this visit following link: http://www.activitymode.com/product/acct-505-full-week-2/ Contact us at: SUPPORT@ACTIVITYMODE.COM ACCT 505 FULL WEEK 2 ACCT 505 Full Week 2 ACCT 505 Week 2 Chaper 3 Systems Design – Job-Order Costing ACCT 505 Week 2 DQ 1 Job Order and Process Costing Systems ACCT 505 Week 2 DQ 2 Research and Application ACCT 505 Week 2 Quiz Activity mode aims to provide quality study notes and tutorials to the students of ACCT 505 Full Week 2 in order to ace their studies. ACCT 505 FULL WEEK 2 To purchase this visit following link: http://www.activitymode.com/product/acct-505-full-week-2/ Contact us at: SUPPORT@ACTIVITYMODE.COM ACCT 505 FULL WEEK 2 ACCT 505 Full Week 2 ACCT 505 Week 2 Chaper 3 Systems Design – Job-Order Costing ACCT 505 Week 2 DQ 1 Job Order and Process Costing Systems ACCT 505 Week 2 DQ 2 Research and Application ACCT 505 Week 2 Quiz Activity mode aims to provide quality study notes and tutorials to the students of ACCT 505 Full Week 2 in order to ace their studies. ACCT 505 FULL WEEK 2 To purchase this visit following link: http://www.activitymode.com/product/acct-505-full-week-2/ Contact us at: SUPPORT@ACTIVITYMODE.COM ACCT 505 FULL WEEK 2 ACCT 505 Full Week 2 ACCT 505 Week 2 Chaper 3 Systems Design – Job-Order Costing ACCT 505 Week 2 DQ 1 Job Order and Process Costing Systems ACCT 505 Week 2 DQ 2 Research and Application ACCT 505 Week 2 Quiz Activity mode aims to provide...

Words: 595 - Pages: 3

Chapter 2 Review Questions

...Chapter 2 Review Questions 1. Why is information security a management problem? What can management do that technology cannot? Managing information security has more to do with policy and enforcement rather than technology. Management must address information security in terms of business impact and the cost. 2. Why is data the most important asset an organization possesses? What other assets in the organization require protect? Data in an organization represents its transaction records and its ability to deliver to its customer. Without this the organization would not be able to carry out day to day work. 3. Which management groups are responsible for implementing information security to protect the organization’s ability to function? Both management and IT management are responsible for implementing security to protect an organizations ability to function. 4. Has the implementation of networking technology created more or less risk for businesses that use information technology? Why? Networking is usually considered to have created more risk for businesses that use information security. The reason is that potential attackers have reader access to the information system. 5. What is information extortion? Describe how such an attack can cause losses, using an example not found in the text Information extortion is the act of an attacker or trusted insider who steals information from a computer system and demand compensation for its return or for an......

Words: 1152 - Pages: 5

Chapter 2 Review Questions

...Chapter 1 PLD Review questions Multiple choice 1. A program is a set of instructions that a computer follows to perform a task. 2. The physical devices that a computer is made of are referred to as Hardware. 3. The part of a computer that runs programs is called the CPU. 4. Today, CPUS are small chips known as Microprocessors. 5. The computer stores a program while the program is running, as well as the data that the program is working with, in Main memory. 6. This is a volatile type of memory that is used only for temporary storage while a program is running. A. RAM 7. A type of memory that can hold data for long periods of time—even when there is no power to the computer—is called Secondary storage. 8. A component that collects data from people or other devices and sends it to the computer is called an input device. 9. A video display is a(n)output device. 10. A byte is enough memory to store a letter of the alphabet or a small number. 11. A byte is made up of eight bits. 12. In a binary numbering system, all numeric values are written as sequences of 0s and 1s. 13. A bit that is turned off represents the following value: 0 14. A set of 128 numeric codes that represent the English letters, various punctuation marks, and other characters is ASCII. 15. An extensive encoding scheme that can represent the characters of many of the languages in the world is Unicode. 16. Negative......

Words: 727 - Pages: 3