COB 204 Exam 3, COB 204 Exam 2

¡Supera tus tareas y exámenes ahora con Quizwiz!

Your manager needs to decide the salesperson that has the highest sales for the year. What information should you provide for this decision? a. A list of salespeople b. A list of all items sold c. A list of cumulative sorted sales d. A list of all the salespeople and all the items that they have sold e. A file that contains all items in inventory

A list of cumulative sorted sales

Which of the following is an example of IaaS? - Apple iCloud - Microsoft Azure - Office 365 - Amazon S3 - Google Drive

Amazon S3

Which of the following statements is TRUE of data characteristics within the context of information systems? A) Data generated should be in excess of what is required. B) Data should be relevant to the context, not necessarily to the subject. C) Freely available data is always accurate and timely. D) Larger data sets yield more accurate information. E) An appropriate relationship should exist between the cost of data and its value.

An appropriate relationship should exist between the cost of data and its value.

If an organization turns an employee's access off to the building while they are at lunch as a means of termination, this would be considered ________. A) a hostile situation B) mean C) an unfriendly termination D) enforcement of company rules E) separation termination

An unfriendly termination

________ is a concept that computer systems will become sophisticated enough that they can adapt and create their own software and hence adapt their behavior without human assistance. A) Expert systems B) Artificial Intelligence C) Knowledge management D) Business intelligence systems E) Moore's Law

Artificial Intelligence

In Figure 1, a(n) ________ symbol in the minimum position on the line symbol means that an instance of that type is mandatory. A. oval B. arrow C. bar D. crow's foot E. Cardinality

Bar

A(n) ________ is a network of activities that generate worth by transforming inputs into outputs. A) business process B) competitive strategy C) value chain D) information system E) linked investment

Business Process

Bits are grouped into 8-bit chunks called ________. - switches - strings - bytes - kilobytes - nibbles

Bytes

Amber needed to improve the efficiency of her eBay shop, so she designed a relational database. She made sure to include ____________ to figure out how many orders are associated with each customer. A. A primary key B. A foreign key C. A crow's Foot Cardinality as the maximum cardinality D. Cardinalities E. A Cardinality as the minimum cardinality

Cardinalities

Most encryption systems rely on a __________ to securely carry out confidential data communications. A) Cipher B) Personal Identification numbers C) Private Key D) CA key ring E) Password

Cipher

Which of the following reports focuses on reporting anomalies? A) Exception Report B) Cluster Report C) Classification Report D) Regular Report

Classification Report

What separates classification from cluster analysis? A) Classification is done by BI, while cluster analysis is done by human B) Cluster analysis is more powerful than classification C)Classification has an existing research question knowing what to look for and cluster does not D) Classification uses the Internet but cluster analysis does no

Classification has an existing research question knowing what to look for and cluster does not

Which unsupervised technique below identifies the patter without a prior model or research question/hypothesis? A) Classification B) Regression Analysis C) Cluster Analysis D) Statistics

Cluster Analysis

Samuel, a researcher, deduces that single women between the ages of 25 and 30, who usually live in the suburbs and make thrifty purchases, prefer a particular brand of washing machines. In this case, Samuel uses ________ to understand customer behavior. A) supervised data mining B) cluster analysis C) neural networks D) market-basket analysis E) unsupervised learning

Cluster analysis

What is the difference between cluster analysis and classification?

Cluster analysis groups data according to their similarities (that we don't know before hand) (Unsupervised learning) Classification predicts output categories based given input data (we know the data is labeled). (Supervised learning)

Which of the following is a characteristic of volatile memory? - Processor heats up during the operation. - Files are stored permanently. - Processing of data is very slow. - Contents are lost when power is off. - It should be purged at least once a year

Contents are lost when power is off

Some Web sites use __________, small files that enable an individual to access the site without having to sign in every time they visit. A) Payload B) Public Key C) Botnet D) Web bug E) Cookie

Cookie

The cost of the business process is the sum of the cost of the inputs and the ________. A) cost of the activities B) cost of the outputs C) value of the outputs D) value of the products E) cost of the products

Cost of activities

ABC Inc. wants to securely share electronic documents internally with the employees. Which of the following is the best way to implement this strategy? - create a private cloud - use an access point - create a bridge - send documents via interoffice mail - use Google docs

Create a private cloud

An example of a primary value chain activity is: A) Procurement B) Customer Service C) Human Resources D) Information Systems

Customer Service

Dr. Guo emphasized in his lectures the importance of ____ because it is the bridge between the computer side and the human side in the five-component model.

Data

The Gramm-Leach-Bliley (GLB) Act protects consumer data stored by many financial institutions EXCEPT for _____. A) JP Morgan Chase B) Wells Fargo C) Department of Treasury D) Citigroup

Department of Treasury

A sales report that is current at the time the user accessed it on a Web server is an example of a(n) ________. A) static report B) dynamic or exception report C) expert system D) hybrid market report E) temporal report

Dynamic or exception report

The term ________ means that the computing resources leased can be increased or decreased dynamically in a short span of time and that organizations pay for just the resources that they use. - portable - pooled - programmatic - elastic - incremental

Elastic

Which size of main memory is the largest? - kilobyte - gigabyte - exabyte - terabyte - petabyte

Exabyte

When querying a database built based on the ERD shown in Figure 2, you want the output that showshow many students there are for one major. Which of the following clauses should be added to the query to produce the desired output? SELECT MajorCode, COUNT(SID) FROM Student__________ ; A. WHERE SID IS NOT NULL B. GROUP BY MajorCode C. AS "Total Number of Students" D. ORDER BY SIDE. ORDER BY MajorCode

GROUP BY MajorCode

Sally has been working really hard lately and asks her manager for a raise. Her manager tells her that she is already the highest paid employee on the floor. Sally doesn't believe her manager, and illegally accesses the employee database to look at salary data. Sally's act can be termed as ________. A) pretexting B) phishing C) hacking D) spoofing E) skimming

Hacking

Which of the following is considered a computer crime? A) accidental deletion of important records B) poorly written programs resulting in information loss C) loss of data as a result of flooding D) hacking of information systems E) failure to correctly back up customer data

Hacking of information systems

One of the support activities in a value chain is: A) Outbound logistics B) Inbound logistics C) Hiring employees D) Manufacturing products

Hiring Employees

Jason attempts to hack into a banking site to steal customer information. He finds the security of the Web site lacking and is able to access the site with ease. Jason is arrested the next day and charged with computer crime. The banking site was able to track Jason's IP address because he had unknowingly attacked a ________. A) botnet B) hot site C) honeypot D) Web beacon E) Trojan horse

Honeypot

Many companies create ________, which are false targets for computer criminals to attack. A) honeypots B) operational procedures C) backups of company data D) security checkpoints E) hacker centers

Honeypots

The information system components of people and procedures are protected primarily with: A) Payloads B) Firewalls C) Port scanners D) Human safeguards E) Technical safeguards

Human Safeguards

Machine learning is an important tool for Artificial Intelligence to_____. A) Increase data capacity B) Enhance data security C) Improve data quality D) Identify and reveal hidden patterns among data

Identify and reveal hidden patterns among data

A retail company sells agricultural produce and consumer products. The company procures materials from farmers and local producers. This process is an example of ________. A) outbound logistics B) inbound logistics C) operational management D) internal marketing E) customer service

Inbound Logistics

Porter's five forces model is used to assess ________. A) industry structure B) market share C) internal competition D) life cycles of products E) future product demand

Industry Structure

Which of the following companies produce CPU chips? - Microsoft - Apple - Amazon - Intel - TikTok

Intel

Streamtech, a manufacturer of automobiles, recently received a patent for an unmanned search boat. By doing this, Streamtech has ________. A) created an entry barrier B) introduced product differentiation C) locked in its suppliers D) reduced the cost of operations E) established an alliance

Introduced product differentiation

Which of the following statements is TRUE about the Secure Sockets Layer (SSL)? A) It uses asymmetric encryption exclusively. B) It is used to send sensitive data such as credit card numbers. C) It uses one set of encryption keys for multiple sessions. D) It is a stronger version of https. E) It is used in wireless encryption suites

It is used to send sensitive data such as credit card numbers

Which of the following statements is TRUE about biometric identification? A) It involves the use of a personal identification number (PIN) for authentication. B) It provides weak authentication. C) It is a relatively inexpensive mode of authentication. D) It often faces resistance from users for its invasive nature. E) It will decline in usage in the future.

It often faces resistance from users for its invasive nature

LAN stands for _______________. - Local Area Netzone - Local Access Node - Local Access Network - Local Area Network - Local Area Node

Local Area Network

Make Time for You, Inc. provides therapeutic massage therapy services via mobile spa which enables them to provide those services at the time and place most convenient to their clientele. Which of the following is most likely the reason the owners of Make Time for You, Inc. chose this business model? A) Reducing cost B) Locking in customers C) Raising barriers for new entrants D) Software

Locking in customers

One disadvantage of entering into a Cloud-based service agreement is: - significant development effort - loss of control over data location - increased management requirements - ongoing support costs

Loss of control over data location

A company develops and patents a unique reusable rocket transportation technology allowing man travel to the moon, and is totally safe. This situation is characterized by ________. A) low threat of substitutions B) high bargaining power of suppliers C) low bargaining power of customers D) low threat of new entrants

Low threat of substitutions

A mining company develops a new processing technique using only light, 3-D printed drills and patents the process. This situation is characterized by ________. A) low threat of substitutions B) high bargaining power of customers C) high threat of new entrants D) low bargaining power of suppliers E) low threat of new entrants

Low threat of substitutions

________ is the extraction of knowledge from data based on algorithms created from training data. A) Machine learning B) Historical analysis C) Simulation D) Computer analysis E) Processing data

Machine Learning

Jerry wants to use ________ so that he can add his own application on top of the hosted platform. - Apple iCloud - Amazon S3 - Microsoft Azure - Office 365 - Skype

Microsoft Azure

Compared to in-house hosting, cloud-based hosting ________ - requires significant development effort - provides greater control over the location of data - provides better visibility of security and disaster preparedness capabilities - minimizes the risk of investing in technology that will soon become obsolete - requires a significant amount of capital

Minimizes the risk of investing in technology that will soon become obsolete.

Virtualization is the process by which ________. - one physical computer hosts many different virtual computers within it - a single operating system is licensed for multiple computers - a single server is used to host the operations of a workstation - a single operating system is shared by multiple users

One physical computer hosts many different virtual computers within it

Which of the following devices is an example of a storage hardware device? - barcode scanner - central processing unit - optical disk - random access memory - the system bus

Optical Disk

Layla runs a startup that makes custom engraved floor tiles. Her business is growing rapidly, and she needs a cloud vendor to provide her with an operating system and a database management system. In this scenario, which of the following services will the vendor provide? - e-cloud - PaaS - IaaS - SaaS - Website hosting

PaaS

A ________ is the basic form of data exchange in TCP/IP networks. - packet - kilobyte - gigabyte - megabyte - zettabyte

Packet

A person claiming to be from central IT called Chris and asked him to participate in a password reset audit. The person had Chris change his password to the word "123456", and then again to a secret passphrase only Chris knew. Later that day Chris noticed odd system behavior, and then the system crashed. Chris was a victim of ________. A) hacking B) usurping C) sniffing D) pretexting E) appropriating

Pretexting

Machine learning is focused on predicting accurate outcomes based on ________ data. A) previously known training B) current C) future D) questionable E) a complete set of

Previously known training

Leon follows a set of instructions to create a custom Web site for a team assignment in his MIS course. The set of instructions Leon followed are an example of the ________ component of an information system.

Procedure

Carlos owns a small business and is striving to keep his organization running smoothly while remaining profitable in a highly competitive market. He chooses to use process implementation to give his company a competitive pricing edge over others. Which of the following principles is he most likely to implement? A) Enhancing service B) Differentiate products C) Create a new product D) Reducing cost

Reducing Cost

Which of the following is an example of a supervised data mining technique? A) cluster analysis B) market-basket analysis C) regression analysis D) click streaming E) metadata matching

Regression Analysis

Mari requested data from the IS department, but when she received the file it included thousands of records that don't matter. Based on this scenario, which of the following data characteristics is missing from the data Mari received? a. Accurate b. Timely c. Relevant d. Just sufficient e. Worth its cost

Relevant

You are querying a database built based on the ERD shown in Figure 2. The Student table contains multiple records with same names, such as Garcia, Smith, etc., so if you wish each unique name to be listed only once in the query output, which of the following SELECT clauses should you choose? A. SELECT Name DISTINCT FROM Student; B. SELECT DISTINCT Name FROM Student; C. SELECT UNIQUE Name FROM Student; D. SELECT Name UNIQUE FROM Student; E. SELECT Name FROM Student;

SELECT DISTINCT Name FROM Student;

________ is a category of cloud hosting where vendors provide not only hardware infrastructure and an operating system but application programs and databases as well - PaaS - BaaS - SaaS - IaaS

SaaS

An OLAP report has measures and dimensions. Which of the following is an example of a dimension? A) total sales B) average sales C) sales region D) average cost E) average net sales

Sales Region

The resources that are part of a Cloud-based service agreement are described as being "pooled" which means organizations ________. - offer their services to each other free of charge, in a give-and-take arrangement - share the same physical address range - share the same physical hardware through virtualization - use the public Internet to create the appearance of a private connection - use open-source standards that enable users to modify a program's source code

Share the same physical hardware through virtualization

Network data transmissions can be intercepted by performing __________. A) Pretexting B) Sniffing C) Phishing D) Port scanning E) Spoofing

Sniffing

To enter a secure room at work, Elise proves her identity by having her retina scanned. This is an example of what type of authentication? A) Somewhere you are B) Something you have C) Something you are D) Something you know E) Some time you are

Something you are (biometrics) Note: Something you know (password) Something you have (physical ID)

The bargaining power of customers will likely be high when they purchase: A) limited edition apparel B) patented drugs C) A bit that represents on D) standardized products E) rare antique arts

Standardized Products (large volume of them)

When querying a database built based on the ERD shown in Figure 2, which of the following options should be entered into the blank to correctly complete this FROM clause? FROM Major JOIN Student ON Major.MajorCode = __________ A. Product.SaleProdID B. Student.SID C. Major.SID D. Student.MajorCode E. Student.Decl_Date

Student.MajorCode

You work in the Procurement Department, and you want to know which products are offered by each supplier. Include in the query output the Supplier company name followed by the Product name, and then ensure that the output list is alphabetic by supplier name and then by product name. SELECT ____________ . _____________, Product.ProdName FROM Supplier ____________ Product ON Supplier.SupplierID=Product. ____________ ORDER BY Supplier. ____________, Product.ProdName;

Supplier.CompanyName/JOIN/SupplierID/CompanyName

You work in the Procurement Department, and you are interested in taking a closer look at the products supplied by the two suppliers with the greatest number of product offerings. You are aware that one of the supplier names contains the pattern "Mate" and the other includes the pattern "Quesos." The query output needs to have the following attributes in this order: supplier company name, product name, the product unit price, and units in stock. List the query output alphabetically by the supplier name and then by the product name. SELECT ______________.CompanyName, Product.ProdName, Product.UnitPrice, Product.UnitsInStock FROM Supplier JOIN ____________ ____________ Supplier.SupplierID=Product.SupplierID WHERE Supplier.CompanyName ______________ "%Mate%" _______________ Supplier.CompanyName LIKE "%Quesos%" ORDER BY Supplier.CompanyName, Product.ProdName;

Supplier/Product/ON/LIKE/OR

RAC Associates is a car rental company that rents cars to tourists in the United States. The company uses tracking devices and magnetic locks to prevent car theft. These procedures are examples of ________. A) primary business processes B) core activities C) strategic activities D) supporting business processes E) premeditated activities

Supporting business processes

Which of the following is defined as the elastic leasing of pooled computer resources over the Internet? - broadband - wiki - the cloud - Bluetooth - SSD

The cloud

Competitive strategy determines all of the following except ________. A) structure of the information system B) goals and objectives C) features D) functions E) the company's PE ratio

The company's PE ratio

Caroline asks her secretary to send information on the meetings that she needs to attend next month. Her secretary, Joanne, provides her with the details immediately, but leaves out certain additional details that are irrelevant to Caroline's requirements. Which of the following statements is TRUE about this scenario? A) Joanne provided adequate and timely information, but the information was of no value to Caroline. B) The information that Caroline obtained through Joanne was not timely or worth its cost. C) The information that Joanne gave was accurate and sufficient for Caroline's purpose. D) The information that Joanne provided was partly good, as it was timely but inaccurate. E) The information that Caroline obtained through Joanne was not accurate.

The information that Joanne gave was accurate and sufficient for Caroline's purpose.

When querying a database built based on the ERD shown in Figure 2, if we know that the students are from various countries including the USA, which of the following statements about the query output will be TRUE when we run the following query? SELECT SID, Name, Country FROM Student WHERE Country = "USA"; A. The number of records in the query output will be more than as in the student table. B. The number of records in the query output will be the same as in the Student table. C. The number of records in the query output will be less than as in the Student table. D. None of the above. E. A & C are correct.

The number of records in the query output will be less than as in the Student table.

A ________ is a person or an organization that seeks to obtain or alter data or other IS assets illegally, without the owner's permission and often without the owner's knowledge. A) target B) vulnerability C) threat D) key escrow E) cipher

Threat

Which of the following characteristics is NOT important for an effective collaborator to have? A) Target B) Threat C) Key escrow D) Cipher

Threat

How do machines learn? A) By humans teaching them things B) Through experience C) By listening to the surroundings D) With repetition of the same facts E) By listening for a wake word

Through Experience

TCP stands for _______________ and IP stands for ______________. - Transaction Control Protocol/Internet Protocol - Tranfer Control Protocol/Internet Protocol - Transportation Control Protocol/Intranet Protocol - Transportation Control Protocol/Internet Protocol

Transportation Control Protocol/Internet Protocol

A ____________ is a software program that appears to be legitimate and useful but secretly steals a victim's data. A) Adware Program B) Hydra C) Spyware Program D) Worm E) Trojan Horse

Trojan Horse

Pretexting, sniffing, spoofing, and phishing are security issues considered to be examples of: A) Faulty services B) SQL injection C) Unauthorized data disclosure D) Loss of infrastructure E) Incorrect data modification

Unauthorized data disclosure

What separates unsupervised data mining from supervised data mining? A) The amount of memory needed B) The speed of data processing C) Unsupervised analysis does not create a model or hypothesis beforehand D) Supervised analysis does not create a model or hypothesis beforehand E) Unsupervised analysis develop a model prior to the analysis

Unsupervised analysis does not create a model or hypothesis beforehand

Define descriptive analysis, predictive analysis, and prescriptive analysis.

Use my example of a medical doctor going through your annual physical. Doctor analyzes your current health conditions (descriptive), he tries to foresee what your health will be in the future (predictive), and give you recommendations/solutions (e.g., consume less sugar) as the outcome prescriptive analysis to improve your well-being.

When practicing safe computing, which of the following behaviors should be avoided? A) Opening email attachments only from known sources B) Browsing only reputable Wed Sites C) Installing & updating antivirus software D) Using public unfamiliar Wi-Fi E) Updating malware definitions

Using public unfamiliar Wi-Fi

When a system requires smart cards to enter the building, this is an example of using _______________ to authenticate. A) What you know B) What you have C) Social Security number D) Private Key E) Public Key

What you have

Differentiate between unsupervised and supervised data mining.

With unsupervised data mining, analysts do not create a model or hypothesis before running the analysis. Instead, they apply a data mining application to the data and observe the results. With this method, analysts create hypotheses AFTER the analysis, in order to explain the patterns found. With supervised data mining, data miners develop a model PRIORto the analysis and apply statistical techniques to data to estimate parameters of the model.

Focused cost leadership is observed when a product has the lowest cost ________. A) within an industry segment B) across the product mix offered by a company C) across the entire industry D) among a group of competitors E) across multiple product categories

Within an industry segment

Out of the following choices, the least critical aspect of good information is: A) timeliness of data B) additional data C) data accuracy D) sufficiency of data E) relevance of data

additional data

Which of the following is considered a threat caused by human error? A) an employee inadvertently installing an old database on top of the current one B) an employee intentionally destroying data and system components C) a virus and worm writer infecting computer systems D) a hacker breaking into a system to steal for financial gain E) a tsunami floods a data center causing total data loss

an employee inadvertently installing an old database on top of the current one

In Figure 1, the __________ consist of the small vertical bar, small oval, and crow's foot symbols. A. cardinalities B. entities C. relationships D. tables E. attributes

cardinalities

Neo and Marion are on a project team together. Neo pitched his idea to Marion and she gave him some constructive criticism. Neo accepted Marion's feedback, made some changes to his idea, and then presented the revised idea to Marion and the rest of the team. Which of the following skills is being described in this scenario? a. systems thinking b. collaboration c. experimentation d. abstract reasoning

collaboration

Sandy is planning a virtual party that will be held via Zoom. She creates a list of guests to invite, limiting the number to 25 so that she will be able to see everyone on the screen at the same time. Her list of 25 guests is an example of: a) program b) data c) information d) hardware e) process

data

In Figure 1, the square symbols each represent a(n) _____. A. cardinality B. entity C. relationship D. table E. attribute

entity

Layla is purchasing a new laptop from an online vendor. Which of the following will bed is played in the address bar of his browser that will let her know that the online retailer is using the Secure Sockets Layer (SSL) protocol? A) ftp B) www C) https D) .com E) smtp

https

Tomas requests a report from HR that shows the rate employees quit over the last three months, but HR instead sends him a report that shows the salary details of new hires over the last three months. The data HR sent is missing which of the five characteristics of good information? A) inaccurate B) miscalculated C) not timely D) not relevant E) uncleaned

not relevant

In a database built based on the ERD shown in Figure 2, the logical association between Major and Student is created when the __________ of Major is posted into Student where it plays the part of a(n)__________. A. primary key, foreign key B. primary key, non-key attribute C. foreign key, primary key D. foreign key, non-key attribute

primary key, foreign key

Josephine follows the instructions that show her how to create a custom Web site for the We-Fly-Fast Company using the GoDaddy web-hosting platform. Each step in the instructions that she follows are examples of the ________ component of an information system. A) procedure B) software C) data D) hardware E) memory

procedure

Max's Floors and Decks decides to open outlets in four more states. This decision requires that they revise several of their existing business processes. According to the five-component model of information systems, which of the following processes will be the easiest (least disruptive) to change? a. changing the sales, reporting, and compensation procedures b. relocating existing employees and hiring new employees c. buying and installing new computers in the new outlets d. collecting demographic data from the new markets e. developing new customer management software for the existing and new outlets

relocating existing employees and hiring new employees

Which of the following terms refers to a very large collection of servers that a company with needs beyond those supplied by a single server may choose to maintain? - server farm - server database - firmware - parallel nodes

server farm

The secure storage and processing of credit card data is legally safeguarded by: A) a Key Escrow B) the Primary Principles C) the Gramm-Leah-Bliley (GBL) Act D) the Payment Card Industry Data Security Standard (PCI DSS) E) the Health Insurance Portability and Accountability Act (HIPAA)

the Payment Card Industry Data Security Standard (PCI DSS)

Automation is represented in the IS model as moving the work being done from: A) processing to storage B) the human side to the computer side C) the digital mode to the analog mode D) processes to procedures E) procedures to people

the human side to the computer side

All of the following should be in an incident-response plan except________. A) how employees respond to security problems B) the person who caused the incident C) who should be contacted in case of an incident D) the reports that should be created because of the incident E) how to reduce further loss

the person who caused the incident

Sam is on a team that will implement an entirely new information system at his company. When they implement the new information system, which of the following actions will be the most difficult? A) changing the structure of existing databases that reflect supplier and customer data B) upgrading the computer systems used by the retail chain C) training the employees to use and manage the new system D) writing the programs to create the software E) installing new transaction processing hardware

training the employees to use and manage the new system


Conjuntos de estudio relacionados

Chapter 10 Analysis of Insurance Contracts

View Set

Chapter 14: Health Problems of Early Childhood

View Set

Exam 3 review chp 16 and chp 17 A&P II

View Set

PRESENT SIMPLE DO DOES Vs(he, she it)

View Set