Midterm question bank 2

¡Supera tus tareas y exámenes ahora con Quizwiz!

________ occur(s) when an attacker either threatens to steal, or actually steals, information from a company and then demands payment for not carrying out a particular act. 1. SCADA attacks 2. Espionage 3. Alien software 4. Information extortion

4

________ controls restrict unauthorized individuals from using information resources. 1. Access 2. Communications 3. Physical 4. Useful

Access

A(n) ________ is located between two firewalls. 1. ERP 2. DMZ 3. anti-malware system 4.spamware detector

DMZ

________ is a remote attack requiring no user action. 1. A logic bomb 2. Virus 3. A Trojan horse 4. DoS

DoS

________ involves slicing and dicing data, drilling down in the data, and rolling up data to greater summarization. 1. Data mining 2. DSS 3. OLAP 4. OLTP

OLAP

If a hacker takes control of equipment such as power grids or nuclear power plants, this is an example of a(n) ________ attack. 1. SCADA 2. alien software 3. virus 4. espionage

SCADA

________ is a capability of dashboards that reflect the latest data available on KPIs or some other metric often in real time. 1. Trend analysis 2. Drill down 3. Status access 4. Exception reporting

Status access

________ causes pop-up advertisements to appear on your screen 1. adware 2. marketware 3. spamware 4. spyware

adware

A ________ represents the smallest unit of data a computer can process. A) field B) bit C) file D) byte

bit

Verification/testing of the proposed solution and picking an option occur in the ________ phase of the decision making. 1. choice 2. design 3. intelligence 4. implementation

choice

Which of the following has the strategy "I am better because I am different"? Question 133 options: A) Cost leader B) Operational effectiveness C) Customer oriented D) Innovation E) Differentiation

differential

________ is the result of optimizing the marketing and innovation processes.

differentiation

Normalization is a method for analyzing and reducing a relational database to its most streamlined form to ensure ________ redundancy, ________ data integrity, and optimal processing performance. 1. minimum; minimum 2. minimum; maximum 3. maximum; minimum 4. maximum; maximum

minimum; maximum

In public-key encryption, the ________ key is used for locking and the ________ key is used for unlocking. 1. public; public 2. public; private 3. private; private 4. private; public

public, private

The relational database model is based on the concept of ________-dimensional tables. A) one B) two C) three D) four

two

A data ________ is a repository of historical data that are organized by subject to support decision makers in the organization 1. store 2. shop 3. warehouse 4. mart

warehouse

Examples of ________ include sensitivity, what-if, and goal-seeking analyses. 1. data mining 2. DSS 3. OLAP 4. OLTP

DSS

________ is a capability of dashboards that are specific measures of CSFs. 1. Trend analysis 2. Status access 3. KPI 4. Exception reporting

KPI

The ________ of an information resource is the harm, loss, or damage that can result if a threat compromises that resource. 1. exposure 2. risk 3. threat 4. vulnerability

exposure

________ is a communications control 1. rfid 2. encryption 3. company gate 4. fire wall

firewall

The ________ creates links between two tables. A) Alien B) Foreign C) primary D) Secondary

foreign

________ is NOT a phase in decision making 1. choice 2. design 3. information 4. intelligence

information

Compliance with government regulations is a ________ pressure. market, societal, tech, non existent

societal

Which of the following is NOT a reason managing data is difficult? Question 90 options: 1. The amount of data is decreasing exponentially with time. 2. Data are subject to data rot. 3. Data are scattered throughout organizations. 4. Data are generated from multiple sources.

the amount of data is decreasing

Information-based industries are most susceptible to which one of Porter's five forces? Question 137 options: A) Threat of substitute products B) Bargaining power of suppliers C) Rivalry among existing firms in an industry D) Threat of entry of new competitors E) Bargaining power of customers

threat of subsitute products

Your company decides to purchase security insurance from Travelers Insurance in case your systems get hacked and employee information is stolen. This is an example of risk ________. 1. acceptance 2. avoidance 3. limitation 4. transference

transference

As a board member, you recommend hiring a new CEO to address the scandals that have been reported in the Wall Street Journal. This is a(n) ________ decision. 1. midstructured 2. semistructured 3. structured 4. unstructured

unstructured

Knowledge management is a process that helps organizations manipulate important knowledge that comprises part of the organization's memory, usually in a(n) ________ format. 1. structured 2. unstructured 3. semi structured 4. part structured

unstructured

________ is a remote attack requiring user action. 1. A logic bomb 2. Virus 3. DoS 4. A Trojan horse

virus

A ________ attack is a targeted attempt to steal sensitive information from a company, such as financial data or personal details about employees. 1. spear-phishing 2. spear-whaling 3. phishing 4. whaling

whaling

Carelessness using unmanaged devices is ________ and is an ________ mistake. 1. a human error; intentional 2. a human error; unintentional 3. social engineering; intentional 4. social engineering; unintentional

. a human error; unintentional

Each characteristic or quality of a particular entity is called a(n) ________. Question 86 options: 1. instance 2. record 3. field 4. attribute

attribute

udith works from home. In order to access her corporate email and other computer systems she logs into a virtual private network (VPN). The VPN is an example of ________. Question 99 options: 1. a passphrase 2. a communications control 3. a digital certificate 4. an audit

communications control

________ is the result of optimizing operations and supplier processes. differentiation, cost, productivity, quality

cost reduction

________ refers to malicious acts in which attackers use a target's computer systems to cause physical, real-world harm or severe disruption, often to carry out a political agenda. 1. espionage 2. cyberterrorism 3. identity theft 4. scads attack

cyberterrorism

Suppose your university automatically logs you off of a university computer after 15 minutes of disuse. This is an example of a(n) ________ control 1. access 2. communication 3. physical 4. useful

physical

Targeted marketing relies on ________ analytical information. 1. predictive 2. descriptive 3. prescriptive 4. useful

predictive

You would use optimization or simulation for ________ analytics. 1. useful 2. predictive 3. descriptive 4. prescriptiv

prescriptive

______ integrates disparate BPI initiatives to ensure consistent strategy execution. Question 146 options: A) BPM B) BPC C) BPS D) BPR

BPM

Which of the following is TRUE? Question 84 options: 1. Big Data becomes less useful over time since data changes too frequently for a system to maintain. 2. Big Data predictions come from teaching computers to think like humans. 3. Big Data systems perform well because they contain huge amounts of data on which to base their predictions. 4. Big Data is so large and complex that it must be managed by using a traditional DBMS.

Big Data systems perform well because they contain huge amounts of data on which to base their predictions.

Which of the following is NOT an example of excellent alignment? Question 149 options: A) Organizations view IT as an engine of innovation that continually transforms the business, often creating new revenue streams. B) Organizations create a vibrant and inclusive company culture. C) Organizations allow IT employees to develop overarching goals for the business. D) Organizations view their internal and external customers and their customer service function as supremely important. E) Organizations ensure that IT employees understand how the company makes or loses money. F) Organizations rotate business and IT professionals across departments and job functions.

Organizations allow IT employees to develop overarching goals for the business.

If you accept the potential risk, continue operating with no controls, and absorb any damages that occur, you have adopted a risk ________ strategy. 1. acceptance 2. avoidance 3. limitation 4. transference

acceptance

A ________ relationship exists when two entities are associated. A) unary B) binary C) solitary D) ternary

binary

________ is a technology pressure. Question 132 options: A) Globalization B) Protection against terrorist attacks C) Information overload D) Reducing the digital divide

terrorist

The ________ provide(s) information on each attribute and why the attribute is needed in the database, who uses it, and how it should be updated. 1. business rules 2. cardinality 3. modality 4. data dictionary

data dictionary

________ can perform two basic operations: 1) identifying previously unknown patters and 2) predicting trends and behaviors. 1. Data mining 2. DSS 3. OLAP 4. OLTP

data mining

Data reduction is the conversion of raw ________ into a smaller amount of more useful ________. 1. data; knowledge 2. information; data 3. data; information 4. information; knowledge

data; information

Suppose you work for XYZ Corporation. You know you can contribute 6% of your salary to a 401K and the company will match that 100% after 6 years of service because it is in the employee handbook. This is an example of ________. A) explicit information B) explicit knowledge C) tacit information D) tacit knowledge

explicit knowledge

A ________ site is a fully configured computer facility with all of the company's services, communication links, and physical plant operations. 1. cold 2. hot 3. medium 4. warm

hot

________ is an example of a CSF. 1. Selling 10% more widgets 2. Improving customer satisfaction 3. Providing a 2% cost-of-living salary increase 4. Adding a new location in Mexico

improving customer sasfication

Competitive advantage for an organization manifests itself as all of the following EXCEPT ________. Question 145 options: A) higher quality B) lower costs C) increased time to market D) increased speed E) increased profits

increased time to market

Databases maximize ________; this means ________. 1. independence; applications and data are not linked to each other, so all applications are able to access the same data 2. independence; applications cannot access data associated with other applications 3. isolation; applications cannot access data associated with other applications 4. isolation; applications and data are not linked to each other, so all applications are able to access the same data

independence; applications and data are not linked to each other, so all applications are able to access the same data

Which of the following has the strategy "I'm doing something new and you can't catch up"? Question 141 options: A) Cost leader B) Customer oriented C) Differentiation D) Innovation E) Operational effectiveness

innovation

________ are materials, services, and information that flow through and are transformed as a result of process activities. Question 139 options: A) Employees B) Inputs C) Outputs D) Resources

inputs

A(n) ________ of an entity refers to each row in a relational table, which is a specific, unique representation of the entity. 1. instance 2. field 3. attribute 4. record

instance

intellectual capital is another term for

knowledge

A data ________ is a central repository that stores all of an organization's data, regardless of their source or format. A) trail B) pond C) lake D) exhaust

lake

Which of the following reduces buyer power? Question 147 options: A) Internet searching B) Intermediation C) Loyalty programs D) Globalization

loyalty programs

Considering the nature of decision, acquiring and using resources efficiently in accomplishing organizational goals is ________. 1. financial planning 2. management control 3. operational control 4. strategic planning

management control

________ are a set of core data that span the enterprise information systems. A) Transaction data B) Master data C) Data governance D) Master data management

master data

In the ________ phase of BPI, the BPI team identifies relevant process metrics and collects data to understand how the metrics evolve over time 1. analysis 2. control 3. define 4. improve 5. measure

measure

In the ________ phase of BPI, the BPI team identifies relevant process metrics and collects data to understand how the metrics evolve over time. Question 138 options: A) analysis B) control C) define D) improve E) measure

measure

Databases ________ inconsistency; this means ________. 1. minimize; the same data are stored in multiple locations 2. maximize; various copies of the data do not agree 3. minimize; various copies of the data do not agree 4. maximize; the same data are stored in multiple locations

minimize; various copies of the data do not agree

Data marts and data warehouses are ________; this means they ________ be updated by users. 1. non volatile; can 2. volatile; cannot 3. non volatile; cannot 4. volatile; can

non volatile; cannot

A circle with a "chicken leg" to the entity represents the ________ cardinality symbol. 1. mandatory many 2. mandatory single 3. optional many 4. optional single

optional many

Database systems minimize ________. 1. independence 2. security 3. integrity 4. redundancy

redundancy

Laurie heads up a team creating a new process for the shipping department of her company. She worked with external consultants and wrote a process diagram. The team is now asking the VP of shipping to review the process diagram and give opinions. Laurie's team is at the ________ knowledge stage of the KMS cycle. 1. refine 2. disseminate 3. create 4. capture

refine

Each relational database table contains records (listed in ________) and attributes (listed in ________) . 1. rows; rows 2. columns; columns 3. columns; rows 4. rows; columns

rows; columns

You are a jeweler who wants to make sure you have the maximum number of diamonds for sale. You notice that the number of diamonds available drops more when the size is relevant versus when the color is relevant. By comparing these factors, you are conducting a(n) ________ analysis. 1. affinity 2. goal-seeking 3. sensitivity 4. what-if

sensitivity

________ is an attack in which the perpetrator uses social skills to trick or manipulate legitimate employees into providing confidential company information such as passwords. 1. Espionage 2. Social engineering 3. Profiling 4. Malware

social engineering

The digital divide is an issue associated with a ________ pressure. market, societal, tech, nonexistent

societal

Keystroke loggers and screen scrapers are examples of ________. 1. adware 2. marketware 3. spamware 4. spyware

spyware

________ is the most popular query language used for interacting with a database 1. tps 2. sql 3. etl 4. rfid

sql

ou are an employee in Inside Sales. This means you take calls and address customer issues like entering orders, updating orders, and providing order status reports. This is a(n) ________ task and a(n) ________ decision. 1. structured; management control 2. structured; operational control 3. unstructured; management control 4. unstructured; operational control

structured; operational control

You decide to implement a new customer loyalty program that rewards customers for shopping in your store. To accomplish this, you need to implement a data warehouse to collect data from all your physical and online stores. This is an example of ________.

support for organizational transformation

A(n) ________ interfaces between users and programmers and determines information requirements and technical specifications for new applications 1. business analyst 2. emerging technologies manager 3. systems analyst 4. system programmer

systems analyst

________ is the cumulative store of subjective or experiential learning. A) Explicit information B) Explicit knowledge C) Tacit information D) Tacit knowledge

tacit knowledge


Conjuntos de estudio relacionados

Microbiology Chapters 22 & 23 (FSCJ Mandal), Hybridized SG 4 Set [18-22]

View Set

Chapter 7 Behavior in Organizations

View Set

Chapter 3: Dwelling Load Calculation

View Set

Geography: Unit 3 (South America)

View Set

COA PSY-150 Final Exam Prep (Tests)

View Set

Raising Capital - Litton Final Exam Part 2

View Set