Information Systems Midterm Question Bank

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the following sets of characteristics specifically apply to relational databases?

A relational database organizes data in tables composed of records or objects (the rows), and fields (the columns) & Data tables in a relational database are linked by the fields they have in common.

Internet

Controls the movement of packets throughout the network

What security measures are commonly used at the perimeter level of database security?

Firewalls & VPNs

There are four key features of Web 2.0. One key feature allows users to collectively determine the classification of information. For example, tagging of websites, images, videos, and links. This key feature is called:

Folksonomy

The most efficient way to implement an effective business intelligence (BI) system is to:

Get buy-in from the users (typically first line employees, supervisors, and junior management).

In the early 20th century, Henry __ developed a horizontal bar chart that could be used to visualize a project schedule. Today, his chart is the most widely used tool in project management.

Gnatt

Network Access Layer

Handles the physical parts of sending and receiving data. Data can be sent via wireless networks, Ethernet cable, network interface cards (NIC), etc.

Which function of the NIST Cybersecurity Framework involves an organization gaining deeper understanding of cybersecurity management in the context of their business needs and resources?

Identify (ID) function

Jim, an HR director, does not want to change business management systems, even though it brings several advantages and falls within his department budget. What are two reasons why Jim might not want to make the change?

Jim believes the change will create employee stress as they are required to adapt to a new system. & Jim believes changing to the new system will cause a decrease in productivity, at least in the short-term.

Which of the following is not considered an entity in a university database?

Lecture Times

Which statement best summarizes the primary advantages of performing a data quality audit?

The audit recommends ways the organization can improve its data quality and reduce costs through increasing data consistency.

Application

The group of applications that require network communication and are used by people to facilitate communication. These include email and messaging applications

Why are prepared statements and parameterized queries effective against SQL injection attacks?

They prevent attackers from altering query intent even if they insert SQL commands.

What is the goal of the planning phase of the plan-protect-respond cycle?

Understand the steps needed to design effective information security architecture.

Which of the following is a key focus of maintaining data quality in database management?

Utilizing SMART data quality metrics

In which of the following scenarios is denormalization beneficial?

Where data retrieval speed is prioritized & In data warehousing scenarios

Sara, an executive with McMurtry Management, has decided that her organization needs to update its business management system. What three questions should she consider prior to choosing a system?

Where will the new system be housed? Is the change worth the expense and impact on employee morale? How will the new system interact with existing systems?

Decision-making information system

Works with a limited number of inputs and unknowns to provide managers with a statistical analysis of likely outcomes

Common methods to connect a LAN to the Internet include which of the following?

fiber optic, coaxial cables, and ethernet cables

To control how information is entered into a database, programmers and database administrators create ___ to help ensure data integrity.

forms

In cybersecurity, the probable maximum loss (PML) is used to______

help determine spending needed to adequately secure an organization's IT infrastructure

The goal of the NIST Cybersecurity Framework Protect (PR) function is to ______.

help protect an organization's IT infrastructure from security breaches by offering guidelines on IT infrastructure protection

The first stage of the project management (PM) process, in which project objectives are identified and feasibility studies are conducted is the ___ phase.

initiation

Which best practices help prevent SQL injection attacks?

input validation, prepared statements/parameterized queries, and frequent testing

Which of the following are advantages of using NoSQL databases?

Ability to handle large data sets, Support for both structured and unstructured data, & Optimized for querying data from emerging digital platforms

Ayala has decided to implement a new business management system. What are two advantages of hosting on-premises?

Any changes deemed necessary can be implemented extremely quickly & It can be configured to meet the unique needs of the organization.

Management information systems because they can be used to communicate, coordinate, and monitor business activities, can be indispensable when it comes to using ___.

Business processes

Which of the following is prohibited by the Computer Fraud and Abuse Act?

Cyber blackmail & Intentionally destroying a computer

Which of the following is an example of a tool that could be used to ensure data integrity?

Data are regularly backed up. & Data correction codes are used to ensure the data retrieved are the same as when it was stored.

What characteristics do entities in a database typically have?

Define people or objects that store data & Often are represented by nouns

Why might a company choose a NoSQL database over a relational database?

Demand for rapid querying of large volumes of data & Requirement for scalability across distributed systems

Which of the following is a task that data administration would be responsible for?

Determining that two-factor identification must be used to access data that the company has determined to be confidential, Deciding that the organization will begin collecting and storing users' locations upon the release of the next generation software for its mobile app, & Defining policies stating that employees may not share data with people who are not employees of the organization.

______ are cybersecurity breaches that make a computer or online service unavailable to its users.

Distributed Denial of Service (DDOS) attacks

Transport

Divides data into packets and acknowledges the packets have been received

According to the CIA triad, in which of the following examples is an organization ensuring data integrity?

During an acquisition, logistics data are securely transferred to the acquiring company's servers & Access to important data is limited so that only certain employees are able to modify that data

Tracking the performance of employees will always be a critical component of management for this reason, most firms use ___.

Employee Evaluation Software

Payscale.com, Payfactors.com, and Salary.com are examples of sites that offer ___

Employee comp management solutions

Which of the following are areas covered by state-specific cybersecurity laws?

Ensuring state and local governments are protected from cybersecurity threats, Protecting elections from cyber threats, Addressing security needs of smart devices.

Which of the following behaviors are considered insider threats according to CISA's definition?

Espionage, terrorism, and unauthorized access

What is conducted in the process optimization step of business process management?

Managers adapt (modify) the process to enhance process performance.

Predictive information system

Models trends and attempts to predict outcomes

The doubling of the number of transistors on each chip that occurs roughly every 18 months means that computer capability, and the corresponding software, also improve rapidly. This phenomenon is called ____ Law

Moore's

Why is it important for all organizations, no matter how small, to create and implement organizational information policies?

Organizational data are a critical asset; it is important to ensure its security.

What are the primary layers of database security?

Perimeter, Database, Access

The 3rd step in business process management provides managers the ability to play the "what-if" game by changing input variables (abstract) decision making. This is the ___ step

Process Execution

Database management system (DBMS)

Provides a means of storing and finding information

Which of the following statements describe the capabilities of relational database management system (RDBMS)?

RDBMS have features that support the quality and security of data. & RDBMS allow users to view, add, revise, and remove data.

Which of the following are primary goals of database normalization?

Reduce data redundancy. Maintain data consistency. Avoid anomalies during database operations.

Which of the following are methods database administrators use to optimize database performance?

Regularly updating and patching database software, Monitoring and adjusting storage parameters, & Fine-tuning queries and indexing strategies

In which function of the NIST Cybersecurity Framework does an organization's cybersecurity team take quick action to mitigate damage to systems?

Respond (RS) function

Which of the following distinguishes SQL Server from SQL?

SQL is used within SQL Server & SQL Server is an RDBMS.

What does the asterisk (*) symbol represent in an SQL query?

Selects all data that fits a criteria

When implementing a new business management system, which option provides managers with lowest initial start-up expenses.

Software-as-a-Service (SaaS) Option

Which of the elements of the CIA triad does serve in maintaining a properly functioning, error-free operating system?

availability

While there are many benefits of Cloud computing, there are also some disadvantages. One of the disadvantages is ___. This can occur because of maintenance, system/mechanical failure, natural disasters, and outside intrusions/attacks.

downtime

The software and processes that allow organizations to capitalize on the power of big data and predictive analytics is referred to as business ___ (BI).

intelligence

Today's employees expect to be able to go online and see a record of their compensation and make adjustments such as their tax withholding. Twenty years ago they would have planned to meet with their human resources department representative to make such changes. This is one example of how expectations change as advancements in business __ systems occur.

management

Electronic Communications Protection Act (ECPA)

provides protections for communications in storage and transit

Analytic platforms are designed to ______.

quickly gather and analyze specific organizational data to provide information that guides decision making

In a relational database, such as Microsoft Access, a collection of related fields in a data file is called a ___

record

The detection of errors in data sets and the correction/removal of of these mistakes to ensure an organization's data are valid is referred to as data _____ or data cleansing.

scrubbing

The primary characteristic of a relational database is that it ______.

stores and allows access to data objects that are related to one another

When employers deactivate former employees' username and passwords, they are using which tool that ensures confidentiality?

access control and authentication

Serving as the technology behind cryptocurrencies such as Bitcoin, __ provides a level playing field for all users.

blockchain

Geographically distributed network server groups that work together to deliver more efficient delivery of Internet and Web content are called __ Delivery Networks (CDN).

content

Salesforce remains one of the largest suppliers of ___ software solutions.

customer relationship management (CRM)

Nearly all BI software platforms have a(n) ___, that displays an overview of the data that is presented.

dashboard presentation


Conjuntos de estudio relacionados

The Constitution: The Supreme Law of the Land

View Set

PHYSICS 9 - CURRENT ELECTRICITY AND CIRCUITS

View Set

Nutrition Final ExamChapters 5, 6,7, 8, 10, & 11

View Set