IS

¡Supera tus tareas y exámenes ahora con Quizwiz!

Safety-critical systems are easy to learn and use because they perform quickly and efficiently, they meet their users' needs, and they operate safely and reliably. True or False?

F

Computer forensics is a discipline that combines elements of _____ and computer science.

law

An organization that monitors, manages, and maintains computer and network security for other organizations is called a ___________ service provider.

managed security

There are _______________ steps that must be taken to perform a thorough security risk assessment. a. three b. five c. seven d. eight

D

Data governance is a subset of data management. True or False?

F

_____provide data and instructions to the computer and receive results from it.

Input/output devices

One means of ensuring that you are interacting with a secure Web site is to look for a Web address beginning with https. True or False?

T

A(n) ___________ is the technique used to gain unauthorized access to a device or a network.

Attack Vector

A blended threat, phishing, and virus are all examples of a(n)

Attack vector

The five broad categories of BI/analytics techniques include _______________. a. heuristics, predictive analytics, simulation, data mining, and linear programming b. optimization, descriptive analytics, and text and video analysis, simulation, and predictive analytics c. regression analysis, data mining, Monte Carlo simulation, optimization, and time series analysis d. predictive analysis, scenario analysis, image analysis, optimization, and regression analysis

B

When comparing off-the-shelf software to proprietary software, which of the following statements is not true: a. Off-the-shelf software might not match current work processes and data standards. b. The initial cost of the off-the-shelf software is likely greater. c. Off-the-shelf software may include features that the organization or user does not require and never uses. d. Off-the-shelf software may lack important features thus requiring future modification or customization.

B

_______________ is not a key challenge associated with big data. a. How to derive value from the relevant data b. Which format the data should be stored in c. How to identify which data needs to be protected from unauthorized access d. How to find those nuggets of data that are relevant to the decision making at hand

B

A form of cyberattack that is estimated to occur every 10 seconds against an individual in the U.S. is _______________. a. distributed denial-of-service attack b. ransomware c. data breach d. social engineering

B ransomware

A _______________ differs from a _______________ in that it provides a means to store and retrieve data that is modelled using some means other than the simple two-dimensional tabular relations. a. data mart and NoSQL database b. data mart and data warehouse c. NoSQL database and relational database d. data warehouse and data lake

C

A _______________ is a large database that holds business information from many sources in the enterprise, covering all aspects of the company's processes, products, and customers. a. relational database b. data lake c. data warehouse d. NoSQL database

C

The fact that _______________ is not a benefit that can be expected from following a professional code of ethics. a. peers of a professional can use the code for recognition or censure b. adherence to a code of ethics enhances trust and respect for professionals and their profession c. a code can provide an answer to every ethical dilemma

C

The four levels at which the CIA security triad must be implemented include _______________. a. interorganizational, enterprise, workgroup, and personal b. tier 1, tier 2, tier 3, and tier 4 c. organizational, network, application, and end user d. organization, business unit, department, individual

C

The purpose of data normalization is to _______________. a. remove any inaccurate or incomplete data from the database b. insert newer, more current data into the database c. eliminate data redundancies and ensure data dependencies make sense d. delete old, obsolete data from the database

C

Two specific BI/analytics techniques that are in the general category of descriptive analytics are _______________. a. data mining and linear programming b. scenario analysis and time series analysis c. regression analysis and visual analytics d. Monte Carlo simulation and genetic algorithm

C

Which of the following is not associated with the implementation of server virtualization? a. Lower capital costs for hardware b. Decreased energy costs to power the servers and cool the data center c. Increase in the number of software licenses that must be purchased d. Fewer personnel required to operate and support the servers.

C

_______________ are three subclasses of computers associated with the multiple-user computer. a. Smartphone, laptop, notebook, and tablet b. Thin client, desktop, nettop, and workstation c. Server, mainframe, and supercomputer d. Notebook, server, and nettop

C

A _______________ is a collection of similar entities while a(n) _______________ is a characteristic of an entity. a. domain and record b. database and key c. record and foreign key d. file and attribute

D

Which of the following is not a disadvantage of self-service analytics? a. It raises the potential for erroneous analysis. b. It can lead to analyses with inconsistent conclusions. c. It can cause over spending on unapproved data sources and analytics tools. d. It places valuable data in the hands of end users.

D

Which of the following is not an advantage associated with database-as-a-service (DaaS)? a. It eliminates the installation, maintenance, and monitoring of in-house databases. b. It reduces hardware, software, and staffing related costs. c. The service provider can allocate more or less database storage capacity based on an individual customer's changing needs. d. The customer has complete responsibility for database security access and database backup.

D

_______________ is a form of software that is distributed, typically for free, with the source code studied, changed, and improved solely by the original developers. a. Software as a Service b. Licensed software c. A software suite d. Open-source software

D

A data center designed to have an expected annual downtime of less than 30 minutes and able to handle a power outage of up to four days is a tier _______________ data center. a. 1 b. 2 c. 3 d. 4

D 4

The perpetrator most likely to be the cause of a cyberattack is the _______________. a. cybercriminal b. malicious insider c. hacktivist d. careless insider

D Careless insider

One of the consequences of a successful cyberattack that can lead to monetary penalties for organizations that fail to comply with data protection regulations is _______________. a. business disruption b. expulsion from industry sponsored organizations c. recovery cost d. legal consequences

D legal consequences

Encouragement of self-service analytics almost assuredly will eliminate the risk of erroneous analysis and reporting and the problem of different analyses yielding inconsistent conclusions. True or False?

F

In the design of a database, it is not necessary to know how long the data must be stored. True or False?

F

The growth of the Internet of Things is helping to curb the number of cyberattacks. True or False?

F

The use of primary keys and foreign keys make it impossible to define relationships between the data in two tables of a relational database. True or False?

F

Five actions an organization must take in the event of a successful cyberattack include incident notification, protection of evidence and activity logs, incident containment, eradication, and incident __________

Follow up

__________ is a model used to introduce new systems into the workplace in a manner that lowers stress, encourages teamwork, and increases the probability of a successful implementation.

Leavitts diamond

The NSA is required to obtain permission from the Foreign Intelligence Surveillance Court (FISC) to access the telephone metadata records of U.S. citizens, which are now held by telecommunication companies rather than by the government. True or False?

T

Four information system types based on their sphere of influence include interorganizational, personal, enterprise, and________

Workgroup

Four drivers that set the information strategy and determine information system investments include corporate strategy, technology innovations, innovative thinking, and ________

business unit strategy

The operating system plays no role in controlling access to system resources to provide a high level of security against unauthorized access to the users' data and programs as well as record who is using the system and for how long. True or False?

t

The contemporary view of information systems is that they are often so intimately involved in an organization's value chain that they are part of the process itself. True or False?

true

A collection of attributes about a specific entity is a _______________. a. record b. database c. domain d. file

A

A collection of instructions and commands to define and describe data and relationship in a specific database is a _______________. a. database schema b. data definition language c. data model d. data manipulation language

A

Data mining and time series belong in the general category of _______________ of BI/analytics. a. predictive analytics b. heuristics c. scenario analysis d. optimization

A

Genetic algorithm and linear programming belong in the _______________ general category of BI/analytics. a. optimization b. scenario analysis c. heuristics d. predictive analytics

A

The _______________ step in the ethical decision-making process is considered the most critical. a. develop a problem statement b. identify alternatives c. choose alternative d. implement the decision

A

The primary difference between business intelligence and analytics is that _______________. a. BI is used to analyze historical data to tell what happened or is happening right now in your business while analytics employs algorithms to determine relationships among data to develop predictions of what will happen in the future. b. analytics employs techniques like optimization, predictive analysis, and simulation while BI employs descriptive analysis and text and visual analysis. c. a data scientist is required to properly employ analytics while an end user working with a database administrator can employ BI.

A

_______________ database enables hundreds or even thousands of servers to operate on the data, providing faster response times for queries and updates. a. NoSQL b. normalized c. SQL d. relational

A


Conjuntos de estudio relacionados

HSF 2 (lecture) Female Reproductive

View Set

BB: Pulsations of Aorta and Abdominal Aortic Anuerysm

View Set

Academic Success, Compare and Contrast Graphic Organizers Practice- 100%

View Set

History: Empire Builders: Chaldeans

View Set

random for module 2 exam off of EAQ questions

View Set

Transformation and Gene Mutations

View Set