Midterm BADM 2301
The Facebook and Cambridge Analytica scandal occurred in ________; the problem started in _________. a. 2016; 2010 b. 2016; 2017 c. 2018; 2010 d. 2018; 2017
2018; 2010
Q: More than ________ percent of all online content is written in English. a. 25 b. 50 c. 75 d. 90
50
Q: A(n) ________ string is known as a _______. a. 4-bit; byte b. 4-byte; bit c. 8-bit; byte d. 8-byte; bit
8-bit; byte
Q: ______ uses rows and columns to manipulate primarily numerical data. a. A spreadsheet b. Data management c. Desktop publishing d. Word processing
A Spreadsheet
______ issues involve the authenticity, fidelity, and correctness of information that is collected and processed. a. Accessibility b. Accuracy c. Privacy d. Property
Accuracy
Q: ______ causes pop-up advertisements to appear on your screen. a. Adware b. Marketware c. Spamware d. Spyware
Adware
Q: The ________ layer of TCP/IP enables client application programs to access the other layers a. Application b. Internet c. Network interface d. Transport
Application
Q: _______ software is a set of computer instructions that provides specific functionality to a user. a. Programming b. Operating system c. Systems d. Application
Application
________ is an example of efficiency. a. Automating order entry b. Increasing customer satisfaction c. Improving product quality d. Reducing employee turnover
Automating order entry
__________ is an incremental approach that focuses on reducing variation in the process outputs by searching for the root causes of the variation in the process itself or among process inputs. a. BPC b. BPI c. BPM d. BPR
BPI
Many organizations find ________ too difficult, too radical, too lengthy, and too comprehensive a. BPC b. BPI c. BPM d. BPR
BPR
Q: XYZ Inc. scanned the fingerprints of all of their employees and now uses these fingerprints to authenticate their employees and grant them access to different areas of the company's facilities. XYZ Inc. is utilizing which type of technology? a. Cookies b. Intellectual property c. Biometrics d. Malware
Biometrics
Q: _________ is an access control. a. A company gate b. Biometrics / Encryption c. A firewall d. RFID
Biometrics / Encryption
Q: Bandwidth is stated in ________ per second. a. Beeps b. Bits c. Blips d. Bytes
Bits
Q: Users access the web primarily through ________. a. Browsers b. Hyperlinks c. Hypertext d. URLs
Browsers
Q: Registers are part of the ________ and are a type of ________ storage. a. ALU; primary b. ALU; secondary c. CPU; primary d. CPU; secondary
CPU; primary
Q: ______ is/are a type of high-speed memory that enable(s) the computer to temporarily store blocks of data that are used more often. a. Cache Memory b. RAM c. Registers d. ROM
Cache Memory
Q: ________ is a cable medium. a. Coaxial b. Microwave c. Radio d. Satellite
Coaxial
Q: _______ refers to efforts by two or more entities who work together to accomplish certain tasks. a. Collaboration b. A virtual team c. A workgroup d. Workflow
Collaboration
Q: ________ provide(s) for the flow of data from external computer networks to ________ and then to computer networks. a. Communication technologies; output technologies b. Communication technologies; the CPU c. Output technologies; communication technologies d. The CPU; communication technologies
Communication technologies; the CPU
Q: _______ controls secure the movement of data across networks. a. Access b. Communications c. Physical d. Useful
Communications
_______ involves companies providing standard specifications for different consumer groups. a. Configured mass customization b. Consumer segmentation c. Mass customization d. Mass production
Consumer Segmentation
Q: A ____ is a statutory grant that provides the creators or owners or intellectual property with ownership of the property for a designated period. a. Copyright b. Patent c. Trade secret d. Trademark
Copyright
Q: ________ refers to malicious acts in which attackers use a target's computer systems to cause physical, real-world harm or severe disruption, often to carry out a political agenda. a. SCADA Attack b. Cyberterrorism c. Espionage d. Identity Theft
Cyberterrorism
Q: A(n) _________ is located between two firewalls. a. Anti-malware system b. DMZ c. ERP d. Spamware dector
DMZ
Q: _______ extends word processing software to allow production of finished, camera-ready documents, which may contain photographs, diagrams, and other images combined with text in different fonts. a. A spreadsheet b. Data management c. Desktop publishing Word processing
Desktop publishing
Q: If you have to speak into your phone to unlock it, this is an example of something the user _________. a. Does b. Has c. Is d. Knows
Does
Q: Moore's law states that microprocessor complexity would ________ approximately every 18 months. a. Double b. Triple c. Quadruple d. Quintuple
Double
Q: _______ refers to learning supported by the web; ________ refers to any learning situation in which teachers and students do not meet face to face. a. Distance learning; e-learning b. Distance learning; long-distance learning c. E-learning; distance learning d. E-learning; long-distance learning
E-learning; distance learning
Q: _______ is the largest-volume application running over the Internet. a. Chat b. E-mail c. FTP d. Voice communication
Q: _______ is a common LAN protocol. a. Ethernet b. Fiber c. Internet d. Twisted-pair
Ethernet
_______ is the third stop in the general framework for ethics. a. Act and reflect on the outcome of your decision b. Evaluate alternative actions c. Get the facts d. Make a decision and test it e. Recognize an ethical issue
Evaluate alternative actions
Q: ________ offer limited accessibility to the ________ of participating companies. a. Extranet; internets b. Extranet; intranets c. Intranets; extranets d. Intranets; internets
Extranet; intranets
The debate over CEO salaries being so much higher than other employees is an issue addressed by the ______ approach. a. common good b. deontology c. fairness d. rights e. utilitarian
Fairness
Q: Which of the following Internet services is typically NOT available in rural areas? a. Dial-up b. Fiber optic c. Satellite d. Wireless
Fiber Optic
Q: _______ cables are made of glass. a. Coaxial b. Fiber-optic c. Microwave d. Twisted-pair
Fiber-Optic
Q: A(n) _________ is a system that prevents a specific type of information from moving between untrusted networks and private networks. a. Anti-malware system b. DMZ c. ERP d. Firewall
Firewall
Q: The ________ allows users to directly control the hardware by manipulating visible objects and actions that replace complex commands. a. AS b. OS c. ERP d. GUI
GUI
Organizations use Porter's competitive forces model to design ______ strategies; they use the value chain model to identify __________ activities to make the greatest impact. a. general; general b. general; specific c. specific; general d. specific; specific
General; Specific
Q: _______ defines how messages are formulated and how their receivers interpret them. a. DSL b. HTTP c. SMTP d. TCP/IP
HTTP
Q: Your student ID is an example of something the user _________. a. Does b. Has c. Is d. Knows
Has
Q: _______ is NOT an advantage of twisted-pair wire. a. Availability b. Cost c. Easy to work with d. High bandwidth
High bandwidth
Q: Suppose you have a primary location in New York City where you main corporate servers are located. Just in case something happens in New York City, you have backup servers that are updated every minute in Chicago. This is an example of a _________ site. a. Cold b. Hot c. Medium d. Warm
Hot
Q: You open an e-mail from your friend that looks a little odd, but you figure your friend would never send you anything bad. This is _________ and is an _________ mistake. a. Human error; intentional b. Human error; unintentional c. Social engineering; intentional d. Social engineering; unintentional
Human error; unintentional
Q: 135.62.128.91 is an example of an ________ address. a. IPv2 b. IPv4 c. IPv6 d. IPv8
IPv4
Q: A(n) ________ is a company that provides Internet connections for a fee. a. ISP b. IXP c. NAP d. NSP
ISP
Q: The complexity of software has ________ over time; the potential for software bugs has ________. a. Decreased; increased b. Increased; increased c. Increased; decreased d. Decreased; decreased
Increased; increased
________ is an example of effectiveness. a. Automating order entry b. Increasing customer satisfaction c. Reducing production time by one day d. Using RFID to track products
Increasing customer satisfaction
The IS function has become __________ strategic within organizations, so a growing number of CIOs are coming from __________. a. decreasingly; within the IS department b. decreasingly; other business units c. increasingly; within the IS department d. increasingly; other business units
Increasingly; other business units
Q: _______ occur(s) when an attacker either threatens to steal, or actually steals, information from a company and then demands payment for not carrying out a particular act. a. Alien Software b. Espionage c. Information Extortion d. SCADA Attacks
Information Extortion
Car and technology companies are currently competing over who can offer the first self-driving car. This is an example of a(n) ____________ strategy. a. cost leader b. customer oriented c. differentiation d. innovation e. operational effectiveness
Innovation
Q: Speech-recognition software is a(n) ________ technology. a. OS b. Input c. GUI d. Output
Input
Q: _______ accept(s) data and instructions and convert(s) them to a form that the computer can understand. a. Input technologies b. Primary storage c. Output technologies d. The CPU
Input Technologies
An/The ________ is a network of networks. a. Externet b. Extranet c. Internet d. Intranet
Internet
Q: The ________ functions as a transport mechanism; the ________ is an application. a. Internet; intranet b. Internet; World Wide Web c. World Wide Web; Internet World Wide Web; Intranet
Internet; World Wide Web
You decide to specialize in marketing for your first career. You take an entry-level position at XYZ Corp. This means you are a __________ a. clerical worker b. knowledge worker c. lower-level worker d. middle manager
Knowledge Worker
Q: Typing in your password to access a system is an example of something the user _________. a. Does b. Has c. Is d. Knows
Knows
Q: A network that is restricted to a single building is a ________. a. LAN b. MAN c. PAN d. WAN
LAN
Q: NICs allow devices to physically connect to the _______'s communications medium. a. LAN b. MAN c. PAN d. WAN
LAN
_______ is a legal concept that gives individuals the right to recover the damages done to them by other individuals, organizations, or systems. a. Accountability b. Answerability c. Liability d. Responsibility
Liability
Q: _____ are relatively large computers used in large enterprises for extensive computing applications that are accessed by thousands of users. a. Mainframes b. Microcomputers c. Microprocessors d. Supercomputers
Mainframes
________ is the current strategy for many manufacturers where a company produces a large quantity of items but customizes them to match the needs and preferences of individual customers. a. Configured mass customization b. Consumer segmentation c. Mass Customization d. Mass production
Mass Customization
Q: _______ are the smallest and least expensive category or general-purpose computers. a. Mainframes b. Microcomputers c. Microprocessors d. Supercomputers
Microcomputers
Q: Which of the following is NOT a trend in hardware? a. Faster b. More expensive c. More powerful d. Smaller
More expensive
Q: Which of the following is NOT an OS? a. Apple Mac OS X b. Google Chrome c. Linux d. Mozilla Firefox
Mozilla Firefox
Q: ________ is an operating model under which ISPs must allow customers equal access to content and applications, regardless of the source or nature of the content. a. Internet access equality b. Internet access neutrality c. Network equality d. Network neutrality
Network Neutrality
Q: The ________ provides an interface between the user and the hardware. a. AS b. ERP c. OS d. NUI
OS
Q: The ________ concept refers to a group of computing products that work together. a. Open systems b. Piracy block c. Anti-bug d. Open source
Open Systems
Q: _______ present(s) data and information in a form people can understand. a. Communication technologies b. Input technologies c. Primary storage d. Output technologies
Output technologies
Q: A(n) ________ is a group of programs with integrated functions that has been developed by a vendor and is available for purchase in a prepackaged form. a. GUI b. Open System c. OS d. Package
Package
Q: _______ allows users to maintain checkbooks, track investments, monitor credit cards, and bank and pay bills electronically. a. Communications b. Personal finance c. Personal information management d. Web authoring
Personal Finance
Q: Sarah received an email that claimed to be from her bank. The email asked her to provide her password. Sarah later found out that the email was not from her bank and that she had given sensitive information to someone who gained access to her accounts. This is an example of a ____________. a. Phishing attack b. Worm c. Trojan horse d. Denial of service attack
Phishing Attack
Q: Suppose your university automatically logs you off of a university computer after 15 minutes of disuse. This is an example of a(n) _________ control. a. Access b. Communication c. Physical d. Useful
Physical
Q: You purchased a copy of Microsoft Office and give a copy to a friend so he/she doesn't have to buy it too. This is _________ and is _________. a. Piracy; legal b. Piracy; illegal c. Social engineering; legal d. Social engineering; illegal
Piracy;Illegal
Q: _______ temporarily store(s) data and program instructions during processing. a. Input technologies b. Primary storage c. Secondary storage d. The CPU
Primary Storage
Q: Intellectual property is NOT protected under _________ laws. a. Copyright b. Patent c. Privacy d. Trade secret
Privacy
Q: ________ is an advantage of telecommuting. a. Connection b. Productivity c. Promotion Time d. Visibility
Productivity
Q: The developer keeps the source code private with ________ software. a. Open b. Open source c. Pirated d. Proprietary
Proprietary
Q: Your computer crashes in the middle of you writing a term paper. You lose the paper because you had not saved a copy yet. You lost your paper because it was in ________. a. Binary form b. RAM c. ROM d. The CPU
RAM
_________ is the first step in the general framework for ethics. a. Act and reflect on the outcome of your decision b. Evaluate alternative actions c. Get the facts d. Make a decision and test it e. Recognize an ethical issue
Recognize an ethical issue
Q: ________ store(s) data and program instructions for future use. a. Primary storage b. Output technologies c. Secondary storage d. The CPU
Secondary Storage
Q: ________ is an attack in which the perpetrator uses social skills to trick or manipulate legitimate employees into providing confidential company information such as passwords. a. Espionage b. Malware c. Profiling d. Social engineering
Social Engineering
Q: A(n) ________ guides the user through computer applications by using cartoon-like characters, graphics, animation, and voice commands. a. Application interface b. GUI c. OS d. Social Interface
Social Interface
Q: _________ is pestware that users your computer as a launch pad for unsolicited e-mail, usually advertising for products and services. a. Adware b. Marketware c. Spamware d. Spyware
Spamware
Q: ____ collects personal information about users without their consent. a. Adware b. Marketware c. Spamware d. Spyware
Spyware
Q: Which of the following is the correct order for the class of computers from most powerful to least powerful? a. Supercomputers, mainframe computers, microcomputers, laptop/notebook computers, tablet computers, wearable computers b. Supercomputers, mainframe computers, microcomputers, tablet computers, laptop/notebook computers, wearable computers c. Supercomputers, microcomputers, mainframe computers, laptop/notebook computers, tablet computers, wearable computers d. Supercomputers, microcomputers, mainframe computers, tablet computers, laptop/notebook computers, wearable computers
Supercomputers, mainframe computers, microcomputers, laptop/notebook computers, tablet computers, wearable computers
Managing information systems in modern organizations is difficult and complex task. Which of the following factors does NOT contribute to this? a. Both end users and IT employees have responsibility for systems b. Business people are customers of the IT department c. If technology is not working, many firms cannot function. d. Technology is getting cheaper to acquire, operate, and maintain.
Technology is getting cheaper to acquire, operate, and maintain
Q: ________ manipulate(s) the data and control(s) the tasks performed by the other components. a. Communication technologies b. Input technologies c. Output technologies d. The CPU
The CPU
Q: ________ performs the actual computation or "number crunching" inside any computer. a. A bit b. The ALU c. The Control Unit d. The CPU
The CPU
Q: A(n) _________ to an information resource is any danger to which a system may be exposed. a. Exposure b. Risk c. Threat d. Vulnerability
Threat
Q: If you shift your risk by using other means to compensate for the loss like purchasing insurance, you have implemented a risk _________ strategy. a. Acceptance b. Avoidance c. Limitation d. Transference
Transference
Q: _______ cables are made of copper. a. Fiber-optic b. Microwave c. Radio d. Twisted-pair
Twisted-pair
Q: _______ is a private network that uses a public network to connect users. a. DoS b. ERP c. RFID d. VPN
VPN
Q: ______ reality is a term that refers to information technologies that use software to provide a realistic, three-dimensional, computer-generated environment that replicates sight, touch, hearing, and in some cases, smell. a. Augmented b. Computer c. Virtual d. Wearable
Virtual
Q:____ is a remote attack requiring user action. a. DoS b. A logic bomb c. A Trojan horse d. Virus
Virus
Q: _______ is an example of a human data-entry technology. a. A barcode scanner b. An optical mark reader c. A point-of-sale terminal d. Voice recognition
Voice Recognition
Q: A network between Mars and the Earth would be a ________. a. LAN b. MAN c. PAN d. WAN
WAN
Q: ________ allows users to design websites and publish them on the web. a. Communications b. Personal finance c. Personal information management d. Web authoring
Web authoring
Which of the following is an accessibility issue? a. How can we ensure that the information will be processed properly and presented accurately to users? b. How should we handle illegally copying copyrighted software? c. What information about oneself should an individual be required to reveal to others? d. What information does a person or an organization have a right to obtain, under what conditions, and with what safeguards?
What information does a person or an organization have a right to obtain, under what conditions, and with what safeguards?
Q: _______ allows users to manipulate primarily text with many writing and editing features. a. A spreadsheet b. Data management c. Desktop publishing d. Word processing
Word Processing
Q: _______ is the movement of information as it progresses through the sequence of steps that make up an organization's work procedures. a. Collaboration b. A virtual team c. A workgroup d. Workflow
Workflow
The IT _________ are/is the IT platform. a. components b. infrastructure c. personnel d. services
components
Your professor hand you a paper with the number 75 on it. This is _______. a. data b. information c. knowledge d. widsom
data
Which of the following is in the current order starting with the most elementary? a. data, information, knowledge b. data, knowledge, information c. information, data, knowledge d. information, knowledge, data
data, information, knowledge
Q: The price of hardware has ________ over time; the price of software has ________ over time. a. Increased; increased b. Decreased; decreased c. Increased; decreased Decreased; increased
decreased; increased
The correct order of the BPI phases is _______. a. analyze, control, define, measure, improve b. analyze, define, control, improve, measure c. define, analyze, measure, control, improve d. define, measure, analyze, improve, control
define, measure, analyze, improve, control
The NBA's use of virtual reality indicates they are using Porter's ________ strategy for competitive advantage. a. cost leadership b. differentiation c. innovation d. operational effectiveness
differentiation
Supplier power is high when buyers have ________ choices from whom to buy and low when buyers have ________ choices a. few; few b. few; many c. many; few d. many; many
few; many
If there are many alternatives to an organization's products or services, then the threat of substitution is _______; if there are few alternatives, then the threat is _____. a. high; high b. high; low c. low; high d. low; low
high; low
_______ industries experience the greatest threat from substitutes. a. information-based b. manufacturing c. product-based d. retail
information-based
_________ is organized and processed to convey understanding, experience, accumulated learning, and expertise as it applies to a current business problem. a. data b. information c. knowledge d. wisdom
knowledge
The internet makes customers _______ powerful; this is a _________ pressure a. less; market b. less; societal c. more; market d. more; societal
more; market
When you go through the checkout line at your local grocery store, this is a(n) ________ that could be processed by a(n) ______________. a. analysis; APS b. analysis; TPS c. transaction; APS d. transaction; TPS
transaction; TPS
The issues that came up in the Quizlet/Texas Christian University cheating scandal in 2018 highlighted the need for______. a. more Web-based study tools to be available to students of all socioeconomic backgrounds. b. universities to adapt to the changing nature of technology as it pertains to the ways in which students are learning c. widespread reform in terms of Internet access on college campuses d. colleges to revise their Codes of Conduct to eliminate the ambiguity in students using opensource study tools
universities to adapt to the changing nature of technology as it pertains to the ways in which students are learning