MIDTERM
A blended threat, phishing, and virus are all examples of a(n)_________
attack vector
Computer forensics is a discipline that combines elements of ___________ and computer science.
law
Four drivers that set the information strategy and determine information system investments include corporate strategy, technology innovations, innovative thinking, and
Business unit strategy
Choosing what data to store and where and how to store the data are two key challenges associated with big data. True or False? a. True b. False
a. True
One means of ensuring that you are interacting with a secure Web site is to look for a Web address beginning with https. True or False? a. True b. False
a. True
_______________ provide data and instructions to the computer and receive results from it. a. True b. False
a. True
A collection of instructions and commands to define and describe data and relationship in a specific database is a _______________. a. database schema b. data definition language c. data model d. data manipulation language
a. database schema
The _______________ step in the ethical decision-making process is considered the most critical. a. develop a problem statement b. identify alternatives c. choose alternative d. implement the decision
a. develop a problem statement
Genetic algorithm and linear programming belong in the _______________ general category of BI/analytics. a. optimization b. scenario analysis c. heuristics d. predictive analytics
a. optimization
Data mining and time series belong in the general category of _______________ of BI/analytics. a. predictive analytics b. heuristics c. scenario analysis d. optimization
a. predictive analytics
A collection of attributes about a specific entity is a _______________. a. record b. database c. domain d. file
a. record
In the design of a database, it is not necessary to know how long the data must be stored. True or False? a. True b. False
b. False
Safety-critical systems are easy to learn and use because they perform quickly and efficiently, they meet their users' needs, and they operate safely and reliably. True or False? a. True b. False
b. False
The use of primary keys and foreign keys make it impossible to define relationships between the data in two tables of a relational database. True or False? a. True b. False
b. False
The right to freedom of expression is one of the most important rights for free people in the United States. The _______________ was adopted to guarantee this right and others. a. Bill of Rights b. First Amendment c. Fourth Amendment d. Constitution
b. First Amendment
The primary hardware component of a computer responsible for routing data and instructions to and from the various components of a computer is the
bus
A _______________ is a large database that holds business information from many sources in the enterprise, covering all aspects of the company's processes, products, and customers. a. relational database b. data lake c. data warehouse d. NoSQL database
c. data warehouse
The two basic types of software are application software and___________ software.
system
________is a measure of the quality of big data.
veracity
The individual who is responsible for planning, designing, creating, operating, securing, monitoring, and maintaining databases is the
Database Administrator
________ provide data and instructions to the computer and receive results from it.
Input/output devices
A _______________ database enables hundreds or even thousands of servers to operate on the data, providing faster response times for queries and updates. a. NoSQL b. normalized c. SQL d. relational
a. NoSQL
An organization may require high-quality data to avoid fines and penalties for non-conformance to regulatory requirements. True or False? a. True b. False
a. True
A key difference between the U.S. and EU fair information practices is that _______________. a. although numerous laws have been implemented over time, no single overarching national data privacy policy has been developed in the United States b. U.S. federal statutes impose substantial monetary fines for data abuses by corporations c. the GDPR does not place obligations on organizations to obtain the consent of people they collect information about and to better manage this data d. in the United States, organizations found to be in violation of fair data practices are subject to fines of up to 2 percent of their global revenue
a. although numerous laws have been implemented over time, no single overarching national data privacy policy has been developed in the United States
A(n)_______is the technique used to gain unauthorized access to a device or a network.
attack vector
The growth of the Internet of Things is helping to curb the number of cyberattacks. True or False? a. True b. False
b. False
Which of the following is not a key responsibility of the data governance team? a. develop policy that specifies who is accountable for various aspects of the data b. decide which database technology should be used c. define processes for how the data is to be stored, archived, backed up, and protected from cyberattacks d. develop standards and procedures that define who is authorized to update, access, and use the data
b. decide which database technology should be used
The fact that _______________ is not a benefit that can be expected from following a professional code of ethics. a. peers of a professional can use the code for recognition or censure b. adherence to a code of ethics enhances trust and respect for professionals and their profession c. a code can provide an answer to every ethical dilemma d. a code of ethics provides an evaluation benchmark that a professional can use as a means of self-assessment
c. a code can provide an answer to every ethical dilemma
Five actions an organization must take in the event of a successful cyberattack include incident notification, protection of evidence and activity logs, incident containment, eradication, and incident
Follow-Up
The primary intent of a code of ethics is to define desired behavior. True or False? a. True b. False
a. True
Encouragement of self-service analytics almost assuredly will eliminate the risk of erroneous analysis and reporting and the problem of different analyses yielding inconsistent conclusions. True or False? a. True b. False
b. False
__________ properties of SQL databases help ensure the integrity of data in the database.
ACID
One of the driving reasons behind the need for data management is to manage risk associated with the misstatement of financial data. True or False? a. True b. False
a. True
There is a concern by some people who belong to a particular ethnic, religious, or social group that surveillance data collected by the government could be used to identify and target them and their associates. True or False? a. True b. False
a. True
While there are three key components that must be in place for an organization to get real value from its BI and analytics efforts, the one that is first and foremost is the existence of a solid data management program. True or False? a. True b. False
a. True
Which of the following is not a function of the database management system _______________? a. database data normalization and data cleansing b. database backup c. database recovery d. database security
a. database data normalization and data cleansing
Two potential benefits of obtaining a certification in an IS subject area are: a. new career possibilities and a potential increase in salary b. automatic pay increase and promotion c. movement from a technical career ladder to a management career ladder and salary increase d. receipt of certificate of certification which never expires and more rapid career advancement
a. new career possibilities and a potential increase in salary
A database and a database management system are the same thing. True or False? a. True b. False
b. False
Acting in an ethical manner and acting in a legal manner will always lead to the same actions. True or False? a. True b. False
b. False
Data governance is a subset of data management. True or False? a. True b. False
b. False
The builders of safety-critical systems must determine when they have completed sufficient testing and sign off their approval to release the product. This is typically an easy and straight-forward decision. True or False? a. True b. False
b. False
The operating system plays no role in controlling access to system resources to provide a high level of security against unauthorized access to the users' data and programs as well as record who is using the system and for how long. True or False? a. True b. False
b. False
The _______________ component of the Hadoop environment is composed of a Procedure that performs filtering and sorting and a method that performs a summary operation. a. ETL b. Map/Reduce program c. JobTracker d. Hadoop Distributed File System
b. Map/Reduce program
When comparing off-the-shelf software to proprietary software, which of the following statements is not true: a. Off-the-shelf software might not match current work processes and data standards. b. The initial cost of the off-the-shelf software is likely greater. c. Off-the-shelf software may include features that the organization or user does not require and never uses. d. Off-the-shelf software may lack important features thus requiring future modification or customization.
b. The initial cost of the off-the-shelf software is likely greater.
_______________ is not a key challenge associated with big data. a. How to derive value from the relevant data b. Which format the data should be stored in c. How to identify which data needs to be protected from unauthorized access d. How to find those nuggets of data that are relevant to the decision making at hand
b. Which format the data should be stored in
Three ways IS organization can be perceived by the rest of the organization that influence IS strategy are _______________. a. flexible, resourceful, and forward-looking b. cost center, business partner, and game changer c. cost-effective, innovative, and creative d. reliable, simple, and timely
b. cost center, business partner, and game changer
The primary advantage associated with the use of an in-memory database to process big data is that _______________. a. it is much cheaper than secondary storage b. it provides access to data at rates much faster than storing data on some form of secondary storage c. it enables the storage of much larger amounts of data d. it enables the use of Hadoop procedures to process the data
b. it provides access to data at rates much faster than storing data on some form of secondary storage
The five broad categories of BI/analytics techniques include _______________. a. heuristics, predictive analytics, simulation, data mining, and linear programming b. optimization, descriptive analytics, and text and video analysis, simulation, and predictive analytics c. regression analysis, data mining, Monte Carlo simulation, optimization, and time series analysis d. predictive analysis, scenario analysis, image analysis, optimization, and regression analysis
b. optimization, descriptive analytics, and text and video analysis, simulation, and predictive analytics
A form of cyberattack that is estimated to occur every 10 seconds against an individual in the U.S. is _______________. a. distributed denial-of-service attack b. ransomware c. data breach d. social engineering
b. ransomware
Managers of the business functions most affected by a new information system have a key responsibility to ensure that a. only the most current and most advanced technology is employed b. the people, processes, and human structure components are fully addressed c. competitors cannot use a similar information system to gain a competitive advantage d. resources are deployed only against enterprise and interorganizational information systems
b. the people, processes, and human structure components are fully addressed
Which of the following is not associated with the implementation of server virtualization? a. Lower capital costs for hardware b. Decreased energy costs to power the servers and cool the data center c. Increase in the number of software licenses that must be purchased d. Fewer personnel required to operate and support the servers.
c. Increase in the number of software licenses that must be purchased
_______________ is a model used to introduce new systems into the workplace in a manner that lowers stress, encourages teamwork, and increases the probability of a successful implementation. a. Strategic planning b. Porter's Five forces model c. Leavitt's Diamond d. Strategic competitive advantage
c. Leavitt's Diamond
A _______________ differs from a _______________ in that it provides a means to store and retrieve data that is modelled using some means other than the simple two-dimensional tabular relations. a. data mart and NoSQL database b. data mart and data warehouse c. NoSQL database and relational database d. data warehouse and data lake
c. NoSQL database and relational database
_______________ is not a benefit of promoting a work environment in which employees are encouraged to act ethically. a. The organization will find it easier to recruit and retain top job candidates. b. Employees will act in a consistent manner so that stakeholders can know what to expect of the organization. c. The employees' tendency to act in a manner that seems ethical to them will be suppressed and instead they will act in a manner that will protect them from punishment. d. The value of its stock and how consumers regard its products and services will be improved.
c. The employees' tendency to act in a manner that seems ethical to them will be suppressed and instead they will act in a manner that will protect them from punishment.
An individual who combines strong business acumen, a deep understanding of analytics, and a healthy appreciation of the limitations of their data, tools, and techniques to deliver real improvements in decision making is a(n) _______________. a. systems analyst b. database administrator c. data scientist d. data steward
c. data scientist
The purpose of data normalization is to _______________. a. remove any inaccurate or incomplete data from the database b. insert newer, more current data into the database c. eliminate data redundancies and ensure data dependencies make sense d. delete old, obsolete data from the database
c. eliminate data redundancies and ensure data dependencies make sense
The process of building software for safety-critical systems takes much longer and is much more expensive because _______________. a. they are usually being built for the government and there is much red tape and delays b. they usually involve either aircraft or automobiles and must meet additional imposed by the National Transportation and Safety Board c. extreme measures must be taken to identify and remove defects starting at the very earliest stages of software development d. the software must be written in machine or assembly programming languages which are extremely tedious and time consuming to use
c. extreme measures must be taken to identify and remove defects starting at the very earliest stages of software development
Two specific BI/analytics techniques that are in the general category of descriptive analytics are _______________. a. data mining and linear programming b. scenario analysis and time series analysis c. regression analysis and visual analytics d. Monte Carlo simulation and genetic algorithm
c. regression analysis and visual analytics
A data center designed to have an expected annual downtime of less than 30 minutes and able to handle a power outage of up to four days is a tier _______________ data center. a. 1 b. 2 c. 3 d. 4
d. 4
Which of the following statements about any website that caters to children is not true? a. It must offer comprehensive privacy policies. b. It must notify parents or guardians about its data collection practices. c. It must receive parental consent before collecting any personal information from children under 13 years of age. d. It must request birth date and a confirming social security number.
d. It must request birth date and a confirming social security number.
Which of the following is not a disadvantage of self-service analytics? a. It raises the potential for erroneous analysis. b. It can lead to analyses with inconsistent conclusions. c. It can cause over spending on unapproved data sources and analytics tools. d. It places valuable data in the hands of end users
d. It places valuable data in the hands of end users
_______________ is a form of software that is distributed, typically for free, with the source code studied, changed, and improved solely by the original developers. a. Software as a Service b. Licensed software c. A software suite d. Open-source software
d. Open-source software
_______________ is a software design approach based on the use of discrete pieces of software (modules) to provide specific functions (such as displaying a customer's bill statement) as services to other applications. a. Server virtualization b. Multiprocessing c. Grid computing d. Service-oriented architecture
d. Service-oriented architecture
A federal law that focuses on unlawful access to stored communications to obtain, alter, or prevent authorized access to a wire or electronic communication while it is in electronic storage. a. Computer Fraud and Abuse Act b. Fraud and Related Activity in Connection with Access Devices Statute c. Identity Theft and Assumption Deterrence Act d. Stored Wire and Electronic Communications and Transactional Records Access Statute
d. Stored Wire and Electronic Communications and Transactional Records Access Statute
A_______________ Act was written to protect children from pornography on the Internet but was ruled unconstitutional. a. The Telecommunications b. Section 230 of the Communications Decency c. Much of the Communications Decency d. The Children's Internet Protection
d. The Children's Internet Protection
Which of the following is not a true statement about the software as a service model. a. SaaS applications are available from any computer or any device—anytime, anywhere. b. There are no software patches for customers to download or install. c. The cost associated with upgrades and new releases are lower than the traditional model. d. The SaaS subscriber must manage service levels and availability, so there may be a need to add hardware, software, or communications capacity as the number of users increases.
d. The SaaS subscriber must manage service levels and availability, so there may be a need to add hardware, software, or communications capacity as the number of users increases.
Which of the following is not an advantage associated with database-as-a-service (DaaS)? a. It eliminates the installation, maintenance, and monitoring of in-house databases. b. It reduces hardware, software, and staffing related costs. c. The service provider can allocate more or less database storage capacity based on an individual customer's changing needs. d. The customer has complete responsibility for database security access and database backup.
d. The customer has complete responsibility for database security access and database backup.
There are _______________ steps that must be taken to perform a thorough security risk assessment. a. three b. five c. seven d. eight
d. eight
A _______________ is a collection of similar entities while a(n) _______________ is a characteristic of an entity. a. domain and record b. database and key c. record and foreign key d. file and attribute
d. file and attribute
Which of the following is not a benefit associated with creating a strategic plan? a. provides a framework to guide decision making b. ensures effective use is made of the organization's resources c. enables the organization to be proactive d. guarantees that only the most current technology solutions will be employed
d. guarantees that only the most current technology solutions will be employed
One of the consequences of a successful cyberattack that can lead to monetary penalties for organizations that fail to comply with data protection regulations is _______________. a. business disruption b. expulsion from industry sponsored organizations c. recovery cost d. legal consequences
d. legal consequences
A(n) _________is a person, place, or thing (object) for which data is collected, stored, and maintained.
entity
The goal of the __________ step of the ETL process is to take the source data from all the various sources and convert it into a single format suitable for processing.
extract
Programming languages are commonly used to perform data analysis and build application software, system software, embedded systems, Web sites, and
games
Three subject areas where federal statutes have been implemented to protect the personal data of U.S. citizens include financial data, children's personal data, and ____________information.
health
An organization that monitors, manages, and maintains computer and network security for other organizations is called a _______________ service provider.
managed security
The class of computer used to support workgroups from a small department of two or three workers to large organizations with tens of thousands of employees and millions of customers is the
multiple-user computer
Spreadsheet, word processor, and graphics presentation software are used in the sphere of influence.
single-user
The three primary types of end user license agreements are individual/multiuser, network/multiuser, and
single-user
A _______________ is a class of computer used by people on the move to run personal productivity software, access the Internet, read and prepare email and instant messages, play games, listen to music, access corporate applications and databases, and enter data at the point of contact. a. single-user nonportable computer b. single-user portable computer c. multiple-user computer d. notebook computer
single-user portable computer
The fact that big data comes in many formats and may be structured or unstructured is an indicator of its
variety
Four information system types based on their sphere of influence include interorganizational, personal, enterprise, and
workgroup
is a class of software used to meet organization-wide business needs and typically shares data with other enterprise applications used within the organization.
Enterprise
Which of the following are non-technical skills not commonly associated with an effective Information system worker? a. ability to meet deadlines and solve unexpected challenges b. ability to work in a static, boring environment where there is little change c. good communication skills d. effective leadership skills
b. ability to work in a static, boring environment where there is little change
The four levels at which the CIA security triad must be implemented include _______________. a. interorganizational, enterprise, workgroup, and personal b. tier 1, tier 2, tier 3, and tier 4 c. organizational, network, application, and end user d. organization, business unit, department, individual
c. organizational, network, application, and end user
The perpetrator most likely to be the cause of a cyberattack is the _______________. a. cybercriminal b. malicious insider c. hacktivist d. careless insider
d. careless insider
The primary difference between business intelligence and analytics is that _______________. a. BI is used to analyze historical data to tell what happened or is happening right now in your business while analytics employs algorithms to determine relationships among data to develop predictions of what will happen in the future. b. analytics employs techniques like optimization, predictive analysis, and simulation while BI employs descriptive analysis and text and visual analysis. c. a data scientist is required to properly employ analytics while an end user working with a database administrator can employ BI. d. organizations used to employ BI but now are moving to greater use of analytics.
a. BI is used to analyze historical data to tell what happened or is happening right now in your business while analytics employs algorithms to determine relationships among data to develop predictions of what will happen in the future.
The NSA is required to obtain permission from the Foreign Intelligence Surveillance Court (FISC) to access the telephone metadata records of U.S. citizens, which are now held by telecommunication companies rather than by the government. True or False? a. True b. False
a. True
The contemporary view of information systems is that they are often so intimately involved in an organization's value chain that they are part of the process itself. True or False? a. True b. False
a. True
Each user should conduct a security self-assessment test. True or False? a. True b. False
b. False
_______________ is not a specific goal of green computing. a. Reducing the use of hazardous material b. Lowering power-related costs c. Combating global climate change d. Enabling the safe disposal and/or recycling of IT products
c. Combating global climate change
The process of detecting and then correcting or deleting incomplete, incorrect, inaccurate, or irrelevant records that reside in a database is called _______________. a. data normalization b. data concurrency control c. data management d. data cleansing
d. data cleansing
A key difference between grid computing, multiprocessing, and parallel processing is that _______________. a. parallel processing is only employed with supercomputers b. grid computing is only employed with supercomputers c. multiprocessing only applies to server computers d. grid computing relies on a community of computers acting together
d. grid computing relies on a community of computers acting together
_______________ are three subclasses of computers associated with the multiple-user computer. a. Smartphone, laptop, notebook, and tablet b. Thin client, desktop, nettop, and workstation c. Server, mainframe, and supercomputer d. Notebook, server, and nettop
Server, mainframe, and supercomputer