INFO 360 tests 1-3

Description

Quiz on INFO 360 tests 1-3 , created by stevensae on 10/12/2015.
stevensae
Quiz by stevensae, updated more than 1 year ago
stevensae
Created by stevensae almost 9 years ago
49
1

Resource summary

Question 1

Question
The three activities in an information system that produce the information organizations use to control operations are:
Answer
  • Information retrieval, research, and analysis.
  • Input, output, and feedback.
  • Input, processing, and output.
  • Data analysis, processing, and feedback.

Question 2

Question
Output:
Answer
  • Is feedback that has been processed to create meaningful information.
  • Is information that is returned to appropriate members of the organization to help them evaluate the input stage.
  • Transfers raw data to the people who will use it or to the activities for which it will be used.
  • Transfers processed information to the people who will use it or to the activities for which it will be used.

Question 3

Question
Converting raw data into a more meaningful form is called:
Answer
  • Capturing
  • Processing
  • Organizing
  • Feeback

Question 4

Question
A hierarchy:
Answer
  • Results in a clear-cut division of labor.
  • Is composed primarily of experts trained for different functions.
  • Is a pyramid structure of rising authority and responsibility.
  • Is used primarily in large organizations to define job roles.

Question 5

Question
The field that deals with behavioral issues, as well as technical issues surrounding the development, use, and impact of information systems used by managers and employees in the firm, is called:
Answer
  • Information systems literacy.
  • Information systems architecture.
  • Management information systems.
  • Information technology infrastructure.

Question 6

Question
All of the following can be considered managerial responsibilities except:
Answer
  • Making action plans to solve organizational problems.
  • Creating new products and services.
  • Designing new information systems
  • Allocating human resources to coordinate the work to be done

Question 7

Question
Data management technology consists of:
Answer
  • The physical hardware and media used by an organization for storing data.
  • The detailed, preprogrammed instructions that control and coordinate the computer hardware components in an information system.
  • The software governing the organization of data on physical storage media.
  • The hardware and software used to transfer data.

Question 8

Question
Promoting the organization's products or services is a responsibility of the ________ function.
Answer
  • Finance and accounting
  • Human resources
  • Manufacturing and production
  • Sales and marketing

Question 9

Question
Checking for product quality is an activity associated with the ______ function.
Answer
  • Finance and accounting
  • Human resources
  • Manufacturing and production
  • Sales and marketing

Question 10

Question
That assist with paperwork at all levels of the firm are called:
Answer
  • Data workers.
  • Knowledge workers.
  • Operational management.
  • Service workers.

Question 11

Question
The three principal levels of hierarchies within a business organization are:
Answer
  • Management, knowledge workers, and service workers.
  • Senior management, middle management, and operational management.
  • Management, data workers, and operational management.
  • Senior management, operational management, and workers.

Question 12

Question
Engineers and architects are examples of:
Answer
  • Senior management.
  • Production workers.
  • Knowledge workers.
  • Middle management.

Question 13

Question
Which type of system would you use to change a production schedule if a key supplier was late in delivering goods?
Answer
  • ESS
  • TPS
  • MIS
  • DSS

Question 14

Question
________ is the ability to offer individually tailored products or services using the same production resources as bulk production.
Answer
  • Mass customization
  • Size customization
  • Personalization
  • Demand customization

Question 15

Question
A substitute product of most concern for a cable TV distributor is:
Answer
  • Satellite TV.
  • Broadcast TV.
  • Satellite radio.
  • The Internet.

Question 16

Question
When the output of some units can be used as inputs to other units, or if two organizations pool markets and expertise that result in lower costs and generate profits, it is often referred to as creating:
Answer
  • Value webs.
  • Value chains.
  • Synergies.
  • Core competencies.

Question 17

Question
The iPad can be seen as a disruptive technology for the ___________ industry.
Answer
  • Publishing
  • Music
  • Software
  • Travel

Question 18

Question
A ___________ is an activity at which a firm excels as a world-class leader.
Answer
  • Best practice
  • Competitive advantage
  • Primary activity
  • Core competency

Question 19

Question
Which of the following can force a business and its competitors to compete on price alone?
Answer
  • High product differentiation
  • Poor process efficiency
  • Demand control
  • Transparent marketplace

Question 20

Question
In the information age, the obligations that individuals and organizations have regarding the preservation of existing values and institutions fall within the moral dimension of:
Answer
  • Family and home.
  • Property rights and obligations
  • System quality.
  • Quality of life.

Question 21

Question
Accepting the potential costs, duties, and obligations for the decisions you make is referred to as:
Answer
  • Responsibility
  • Accountability
  • Liability
  • Due process

Question 22

Question
The practice in law-governed societies in which laws are known and understood, and there is an ability to appeal to higher authorities to ensure that the laws are applied correctly is called:
Answer
  • Liability
  • Due process
  • The courts of appeal
  • Accountability

Question 23

Question
Which of the five moral dimensions of the information age do the central business activities of Choice Point raise?
Answer
  • Property rights and obligations
  • System quality
  • Accountability and control
  • Information rights and obligations

Question 24

Question
All of the following are current key technology trends raising ethical issues except:
Answer
  • Data storage improvements.
  • Data analysis advancements.
  • Increase in multimedia quality
  • Increase in use of mobile devices

Question 25

Question
Types of information gathered by Web site tracking tools include all of the following except:
Answer
  • Health concerns
  • Birthplace
  • Income
  • Purchases

Question 26

Question
An extranet is a private intranet extended to authorized users outside the organization.
Answer
  • True
  • False

Question 27

Question
Information systems literacy describes the behavioral approach to information systems, while computer literacy describes the technical approach.
Answer
  • True
  • False

Question 28

Question
Developing a new product, fulfilling an order, or hiring a new employee are all examples of business processes.
Answer
  • True
  • False

Question 29

Question
Business processes are those logically related tasks for accomplishing tasks that have been formally encoded by an organization.
Answer
  • True
  • False

Question 30

Question
As a result of new public laws, accountants are beginning to perform more technical duties, such as auditing systems and networks.
Answer
  • True
  • False

Question 31

Question
A network requires at least three computers and a shared resource.
Answer
  • True
  • False

Question 32

Question
Senior management is responsible for directing the day-to-day activities of the business.
Answer
  • True
  • False

Question 33

Question
Transaction processing systems are most commonly encountered at the senior management level of an organization.
Answer
  • True
  • False

Question 34

Question
Transaction processing systems are the basic business systems that serve the operational level of the organization.
Answer
  • True
  • False

Question 35

Question
Most MISs use sophisticated mathematical models or statistical techniques.
Answer
  • True
  • False

Question 36

Question
ESSs are designed to incorporate data about external events, but they also draw summarized information from internal MIS and DSS.
Answer
  • True
  • False

Question 37

Question
ESSs are designed primarily to solve specific problems.
Answer
  • True
  • False

Question 38

Question
A firm can be said to have competitive advantage when it has higher stock market valuations than its competitors.
Answer
  • True
  • False

Question 39

Question
A primary challenge in BPM is employee resistance.
Answer
  • True
  • False

Question 40

Question
A transparent marketplace means that there is high product differentiation.
Answer
  • True
  • False

Question 41

Question
The greatest barrier to changing business processes is, ironically, management itself.
Answer
  • True
  • False

Question 42

Question
BPM is considered concluded when the new processes are both implemented and accepted.
Answer
  • True
  • False

Question 43

Question
In the value chain model, primary activities are most directly related to the production and distribution of the firm's products and services that create value for the customer.
Answer
  • True
  • False

Question 44

Question
Advances in data storage have made routine violation of individual privacy more difficult.
Answer
  • True
  • False

Question 45

Question
Professionals take on special rights and obligations because of their special claims to knowledge, wisdom, and respect.
Answer
  • True
  • False

Question 46

Question
Even in today's legal climate, there is little incentive for firms to cooperate with prosecutors investigating financial crimes at their firm.
Answer
  • True
  • False

Question 47

Question
Most Internet businesses do very little to protect the privacy of their customers.
Answer
  • True
  • False

Question 48

Question
Copyright is the legal protection afforded intellectual property, such as a song, book, or video game.
Answer
  • True
  • False

Question 49

Question
Spyware is software that comes hidden in downloaded applications and can track your online movements.
Answer
  • True
  • False

Question 50

Question
Most American and European privacy law is based on a set of five principles called COPPA.
Answer
  • True
  • False

Question 51

Question
Software used to apply the computer to a specific task for an end user is called:
Answer
  • system software.
  • application software.
  • data management software.
  • network software.

Question 52

Question
Legacy systems are still in use today because:
Answer
  • they can only be run on the older mainframe computers.
  • they are too expensive to redesign.
  • many integrate well using new Web services technologies.
  • they contain valuable data that would be lost during redesign.

Question 53

Question
_________ describes the practices and technologies used minimize the environmental effects of manufacturing and managing computing devices.
Answer
  • Capacity planning
  • Cloud computing
  • Green computing
  • Autonomic computing

Question 54

Question
An industry-wide effort to develop systems that can configure, optimize, tune, and heal themselves when broken, and protect themselves from outside intruders and self-destruction is called:
Answer
  • grid computing.
  • utility computing.
  • cloud computing.
  • autonomic computing.

Question 55

Question
Microsoft Word is an example of:
Answer
  • open-source software.
  • word-processing software.
  • software productivity suite.
  • data management software.

Question 56

Question
Microsoft Excel is an example of:
Answer
  • data management software.
  • spreadsheet software.
  • presentation graphics.
  • word processing software.

Question 57

Question
An example of a pre-digital database is a:
Answer
  • library's card-catalog.
  • cash register receipt.
  • doctor's office invoice.
  • list of sales totals on a spreadsheet.

Question 58

Question
Which of the following best illustrates the relationship between entities and attributes?
Answer
  • The entity CUSTOMER with the attribute PRODUCT
  • The entity CUSTOMER with the attribute ADDRESS
  • The entity PRODUCT with the attribute PURCHASE
  • The entity PRODUCT with the attribute CUSTOMER

Question 59

Question
In a relational database, a record is also called a(n):
Answer
  • tuple
  • row
  • entity
  • field

Question 60

Question
A field identified in a record as holding the unique identifier for that record is called the:
Answer
  • primary key.
  • key field.
  • primary field.
  • foreign key.

Question 61

Question
Which of the following would you use to find out which Web sites with content related to database design were the most often linked to by other Web sites?
Answer
  • Web usage mining
  • Web server mining
  • Web structure mining
  • Web content mining

Question 62

Question
Which of the following is not a typical feature of DBMS?
Answer
  • Data manipulation language
  • Report generation tools
  • Data dictionary
  • Query wizard tool

Question 63

Question
A ______________ is special software that routes and manages communications on the network and coordinates networks resources.
Answer
  • switch
  • firewall
  • server
  • network operating system/NOS

Question 64

Question
Which of the following statements is not true about search engines?
Answer
  • They are arguably the Internet's "killer app."
  • They have solved the problem of how users instantly find information on the Internet
  • They are monetized almost exclusively by search engine marketing.
  • There are hundreds of search engines vying for user attention, with no clear leader having yet emerged.

Question 65

Question
Which of the following is an example of the "visual Web"?
Answer
  • Twitter
  • Blogger
  • Pinterest
  • Facebook

Question 66

Question
A LAN would be used to connect all of the following except:
Answer
  • all of the computers in a large building.
  • all of the devices within a 10-meter area.
  • all of the computers in a city.
  • all of the computers in a small office.

Question 67

Question
What is the primary difference between 3G and 4G cellular systems?
Answer
  • 4G systems are digital.
  • 4G systems have greater transmission speeds.
  • 3G systems are unable to handle Web browsing.
  • 3G systems have poor security.

Question 68

Question
__________ integrate(s) disparate channels for voice communications, data communications, instant messaging, e-mail, and electronic conferencing into a single experience.
Answer
  • Wireless networks
  • Intranets
  • Virtual private networks
  • Unified communications

Question 69

Question
Evil twins are:
Answer
  • Trojan horses that appears to the user to be a legitimate commercial software application.
  • e-mail messages that mimic the e-mail messages of a legitimate business.
  • fraudulent Web sites that mimic a legitimate business's Web site.
  • bogus wireless network access points that look legitimate to users.

Question 70

Question
You have been hired as a security consultant for a law firm. Which of the following constitutes the greatest source of security threats to the firm?
Answer
  • Wireless network
  • Employees
  • Authentication procedures
  • Lack of data encryption

Question 71

Question
Tricking employees to reveal their passwords by pretending to be a legitimate member of a company is called:
Answer
  • sniffing
  • social engineering
  • phishing
  • pharming

Question 72

Question
Which of the following is a type of ambient data?
Answer
  • Computer log containing recent system errors
  • A file deleted from a hard disk
  • A file that contains an application's user settings
  • A set of raw data from an environmental sensor

Question 73

Question
Computer forensics tasks include all of the following except:
Answer
  • presenting collected evidence in a court of law.
  • securely storing recovered electronic data
  • collecting physical evidence on the computer
  • finding significant information in a large volume of electronic data

Question 74

Question
The development and use of methods to make computer systems resume their activities more quickly after mishaps is called:
Answer
  • high-availability computing
  • recovery-oriented computing
  • fault-tolerant computing
  • disaster-recovery planning

Question 75

Question
Most antivirus software is effective against:
Answer
  • only those viruses active on the Internet and through e-mail
  • any virus.
  • any virus except those in wireless communications applications
  • only those viruses already known when the software is written

Question 76

Question
Systems integration means ensuring the legacy systems work with new elements of the infrastructure.
Answer
  • True
  • False

Question 77

Question
Using an online storage service such as DropBox is a type of virtualization.
Answer
  • True
  • False

Question 78

Question
SaaS providers deliver and provide Web-based, remote access to storage.
Answer
  • True
  • False

Question 79

Question
One of the main benefits of moving to mobile business computing platforms is the dramatically lower costs of hardware.
Answer
  • True
  • False

Question 80

Question
Total cost of ownership components include costs for downtime, training, and support.
Answer
  • True
  • False

Question 81

Question
The collection of Web services that are used to build a firm's software systems constitutes what is known as a service-oriented architecture.
Answer
  • True
  • False

Question 82

Question
Web mining is the discovery of useful patterns on the Web.
Answer
  • True
  • False

Question 83

Question
Every record in a file should contain at least one key field.
Answer
  • True
  • False

Question 84

Question
OLAP is a key tool of BI.
Answer
  • True
  • False

Question 85

Question
Data cleansing is the same process as data scrubbing
Answer
  • True
  • False

Question 86

Question
The two key services of Hadoop are HDFS and in-memory computing
Answer
  • True
  • False

Question 87

Question
DBMS simplify how end users work with databases by separating the logical and physical views of the data.
Answer
  • True
  • False

Question 88

Question
To create a computer network, you must have at least two computers.
Answer
  • True
  • False

Question 89

Question
Circuit switching makes much more efficient use of the communications capacity of a network than does packet switching.
Answer
  • True
  • False

Question 90

Question
Mobile search makes up approximately 10% of all Internet searches
Answer
  • True
  • False

Question 91

Question
Two computers using TCP/IP can communicate even if they are based on different hardware and software platforms.
Answer
  • True
  • False

Question 92

Question
VoIP technology delivers voice information in digital form using packet switching.
Answer
  • True
  • False

Question 93

Question
In a large company today, you will often find an infrastructure that includes hundreds of small LANs linked to each other as well as to corporate-wide networks.
Answer
  • True
  • False

Question 94

Question
In a client/server network, a network server provides every connected client with an address so it can be found by others on the network.
Answer
  • True
  • False

Question 95

Question
The term cracker is used to identify a hacker whose specialty is breaking open security systems
Answer
  • True
  • False

Question 96

Question
The term cracker is used to identify a hacker whose specialty is breaking open security systems
Answer
  • True
  • False

Question 97

Question
One form of spoofing involves forging the return address on an e-mail so that the e-mail message appears to come from someone other than the sender.
Answer
  • True
  • False

Question 98

Question
The distributed nature of cloud computing makes it somewhat easier to track unauthorized access.
Answer
  • True
  • False

Question 99

Question
Zero defects cannot be achieved in larger software programs because fully testing programs that contain thousands of choices and millions of paths would require thousands of years.
Answer
  • True
  • False

Question 100

Question
SSL is a protocol used to establish a secure connection between two computers.
Answer
  • True
  • False

Question 101

Question
Enterprise software is built around thousands of predefined business processes that reflect:
Answer
  • the firm's organization.
  • industry goals.
  • best practices.
  • cutting edge workflow analyses

Question 102

Question
Which of the following is not true about enterprise systems?
Answer
  • Enterprise systems help firms respond rapidly to customer requests for information or products.
  • Enterprise system data have standardized definitions and formats that are accepted by the entire organization.
  • Enterprise software is expressly built to allow companies to mimic their unique business practices.
  • Enterprise software includes analytical tools to evaluate overall organizational performance.

Question 103

Question
When tailoring a particular aspect of a system to the way a company does business, enterprise software can provide the company with:
Answer
  • configuration tables
  • Web services
  • data dictionaries
  • middleware

Question 104

Question
In order to achieve maximum benefit from an enterprise software package, a business:
Answer
  • customizes the software to match all of its business processes
  • uses only the processes in the software that match its own processes
  • changes the way it works to match the software's business processes
  • selects only the software that best matches its existing business processes.

Question 105

Question
A company's suppliers, supplier's suppliers, and the processes for managing relationships with them is the:
Answer
  • supplier's internal supply chain
  • external supply chain
  • upstream portion of the supply chain
  • downstream portion of the supply chain

Question 106

Question
Why is overstocking warehouses not an effective solution for a problem of low availability?
Answer
  • It does not speed product time to market
  • It is an inefficient use of raw materials
  • It increases sales costs
  • It increases inventory costs

Question 107

Question
Which of the following is not one of the unique features of e-commerce technology
Answer
  • Information density
  • Transparency
  • Richness
  • Social technology

Question 108

Question
The integration of video, audio, and text marketing messages into a single marketing message and consumer experience describes which dimension of e-commerce technology?
Answer
  • Ubiquity
  • Personalization/customization
  • Richness
  • Interactivity

Question 109

Question
Selling products and services directly to individual consumers via the Internet best describes
Answer
  • B2B e-commerce
  • C2C e-commerce
  • M-commerce
  • B2C e-commerce

Question 110

Question
Transaction brokers
Answer
  • generate revenue from advertising or from directing buyers to sel
  • save users money and time by processing online sales transactions.
  • provide a digital environment where buyers and sellers can establish prices for products
  • sell physical products directly to consumers or individual businesses.

Question 111

Question
EDI is:
Answer
  • the use of Internet technologies for electronic data transactions
  • the exchange between two organizations of standard transactions through a network
  • electronic data invoicing
  • electronic delivery infrastructure

Question 112

Question
Goods that are involved in the actual production process are referred to as:
Answer
  • raw materials
  • direct goods.
  • purchasing goods
  • indirect goods

Question 113

Question
Where there is no well-understood or agreed-on procedure for making a decision, it is said to be
Answer
  • undocumented
  • unstructured
  • documented
  • semistructured

Question 114

Question
The type of decision that can be made by following a definite procedure is called a(n) ___________ decision.
Answer
  • structured
  • unstructured
  • semistructured
  • procedural

Question 115

Question
Simon's four different stages in decision making are, in order from first to last
Answer
  • identification, choice, design, and implementation
  • identification, design, choice, and finalization
  • intelligence, choice, design, and implementation
  • intelligence, design, choice, and implementation.

Question 116

Question
Which dimension of quality means that a decision faithfully reflects the concerns and interests of affected parties?
Answer
  • Due process
  • Justice
  • Fairness
  • Coherence

Question 117

Question
All of the following are analytic functionalities that BI systems deliver except:
Answer
  • user interface
  • ad hoc queries
  • dashboards
  • production reports

Question 118

Question
Why is the balanced scorecard method said to be "balanced"?
Answer
  • It uses measurable dimensions for assessing performance
  • It measures performance of more than just financial systems
  • It assesses both the internally focused and externally focused business processes
  • It measures performance along all major divisions of a firm, from production and manufacturing to human resources.

Question 119

Question
"Hidden costs," such as _________ costs, can easily undercut anticipated benefits from outsourcing.
Answer
  • vendor selection
  • hardware
  • software
  • employee salary

Question 120

Question
The primary tool for representing a system's component processes and the flow of data between them is the:
Answer
  • data dictionary
  • process specifications diagram
  • user documentation
  • data flow diagram

Question 121

Question
You would expect to find all of the following in an information systems plan except
Answer
  • key business processes
  • budget requirements
  • portfolio analysis
  • milestones and planning

Question 122

Question
__________ is a method for deciding among alternative systems based on a system of ratings for selected objectives.
Answer
  • A scoring model
  • A scorecard
  • Portfolio analysis
  • Risk analysis

Question 123

Question
A systems analysis includes a ____________ that is used to determine whether the solution is achievable from a financial, technical, and organizational standpoint.
Answer
  • test plan
  • conversion plan
  • feasibility study
  • risk analysis

Question 124

Question
The project risk will rise if the project team and the IS staff lack
Answer
  • RAD experience
  • web services
  • the required technical expertise
  • CASE tools

Question 125

Question
____________ are tangible benefits of information systems.
Answer
  • Improved asset utilization, increased organizational learning, and improved operations
  • Reduced workforce, lower outside vendor costs, and increased productivity
  • Increased productivity, reduced workforce, and increased job satisfaction
  • Lower operational costs, improved resource control, and more information

Question 126

Question
Supply chain management systems are a type of enterprise system
Answer
  • True
  • False

Question 127

Question
In a pull-based model of SCM systems, production master schedules are based on forecasts of demand for products.
Answer
  • True
  • False

Question 128

Question
Total supply chain costs in some industries approach 75 percent of the total operating budget
Answer
  • True
  • False

Question 129

Question
CRM software can help organizations identify high-value customers for preferential treatments
Answer
  • True
  • False

Question 130

Question
Enterprise systems require fundamental changes in the way the business operates.
Answer
  • True
  • False

Question 131

Question
The bullwhip effect is the distortion of information about the demand for a product as it passes from one entity to the next across the supply chain.
Answer
  • True
  • False

Question 132

Question
Rich media advertisements are a sales-oriented marketing format
Answer
  • True
  • False

Question 133

Question
An example of the content provider business model is Barnesandnoble.com, a retailer of printed books.
Answer
  • True
  • False

Question 134

Question
Ninety-six percent of all U.S. households with Internet access use a broadband connection
Answer
  • True
  • False

Question 135

Question
Automobile manufacturing is an example of a vertical market
Answer
  • True
  • False

Question 136

Question
In the free/freemium revenue model, firms offer basic services for free and charge a fee for special features.
Answer
  • True
  • False

Question 137

Question
Web personalization is used primarily as a major marketing tool
Answer
  • True
  • False

Question 138

Question
In high-velocity automated decision making, humans are eliminated from the decision chain
Answer
  • True
  • False

Question 139

Question
DSS primarily address structured problems
Answer
  • True
  • False

Question 140

Question
GDSS are designed to display data in the form of digitized maps
Answer
  • True
  • False

Question 141

Question
CBR is used in diagnostic systems in medicine
Answer
  • True
  • False

Question 142

Question
Shopping bots are a form of intelligent agent
Answer
  • True
  • False

Question 143

Question
Enterprise-wide knowledge management systems deal with structured and semistructured knowledge, while other systems are used for unstructured knowledge.
Answer
  • True
  • False

Question 144

Question
Knowledge can reside in e-mail, voice mail, graphics, and unstructured documents as well as structured documents.
Answer
  • True
  • False

Question 145

Question
Documentation reveals how well the system has met its original objectives
Answer
  • True
  • False

Question 146

Question
Gantt and PERT charts are two common formal planning tools for project managemen
Answer
  • True
  • False

Question 147

Question
More timely information is a tangible benefit of information systems
Answer
  • True
  • False

Question 148

Question
An information systems plan shows how specific information systems fit into a company's overall business plan and business strategy.
Answer
  • True
  • False

Question 149

Question
End-user-developed systems can be completed more rapidly than those developed through the conventional programming tools.
Answer
  • True
  • False

Question 150

Question
A new information system is not considered in production until conversion is complete
Answer
  • True
  • False
Show full summary Hide full summary

Similar

SAT Math Sample Questions
SAT Prep Group
BIOLOGY B1 1
x_clairey_x
Sociology- Family and Households Flashcards
Heloise Tudor
Revision Timetable
katy.lay
Biology - the digestive system
Oliviax
AQA Biology B2 Unit 2.1 - Cells Tissues and Organs
BeccaElaine
GCSE History – Social Impact of the Nazi State in 1945
Ben C
“In gaining knowledge, each area of knowledge uses a network of ways of knowing.” Discuss this statement with reference to two areas of knowledge
Julianapabab
Using GoConqr to teach science
Sarah Egan
2PR101 1. test - 2. část
Nikola Truong
General Pathoanatomy Final MCQs (301-400)- 3rd Year- PMU
Med Student