MIS 204-Midterm Part 2-MIS Concepts

¡Supera tus tareas y exámenes ahora con Quizwiz!

One type of malware unknowingly gets installed on a computer and then listens for commands from a central controlling computer. Which of the following is that type of malware? Virus Worm Trojan Bot

bot

A good project manager need not pay attention to the needs and concerns of the users, how they actually work, and how information flows among them. TRUE FALSE

false

A management information system is an application that stores data. TRUE FALSE

false

A project manager who mitigates the risk factors of a project is one who attempts to avoid those risks altogether. TRUE FALSE

false

Cloud computing is only used for business applications. TRUE FALSE

false

Command-line interfaces typically are icon-driven interfaces. They use pictures and symbols (icons) to indicate different functions the computer can perform. To select a function, the user uses a mouse to move the cursor, then clicks on that specific icon (with a touch screen, the user simply touches the icon on the screen). TRUE FALSE

false

Commercial-off-the-Shelf Software (COTS) generally delivers all the exact needs that a company has for the software they are purchasing. TRUE FALSE

false

Knowledge management takes explicit knowledge, transforms it, and then stores it as tacit knowledge. TRUE FALSE

false

Mitigated risk factors mean that the risk factors are becoming more severe. TRUE FALSE

false

Most computers, tablets, and phones have operating systems. However, game platforms such as Xbox, PlayStation, and Wii do not have operating systems. TRUE FALSE

false

New Information Systems will always result in reduced operating costs after implementation. TRUE FALSE

false

One gigabyte equals 10,000 megabytes.

false

Public and private keys are the same in public key encryption scheme. TRUE FALSE

false

Rapid application deployment is a relatively new concept for developing systems. It is a series of development methodologies that are both iterative and incremental in nature. TRUE FALSE

false

Scope-creep occurs when the scope of the project gradually decreases over time. TRUE FALSE

false

Software are the physical components that make up the system such as the processor, physical storage (hard drive), memory (RAM), and the network card. TRUE FALSE

false

The speed of a network is determined by how many devices are connected to it. TRUE FALSE

false

The speed of a network is determined by the fastest device on the network. TRUE FALSE

false

When planning a project, it is preferable to create a schedule that is very aggressive. TRUE FALSE

false

Because of its design, when one node on the Internet goes down the traffic is able to be rerouted through other nodes on the network. In this way the Internet is designed to be both ______ and ______. Distributed; hardened Fault-tolerant; redundant Robust; redundant Compatible; flexible

fault-tolerant; redundant

A(n) _______ is a device that controls the flow of data into and out of a network, allowing sanctioned traffic and denying prohibited traffic. Web crawler Trojan Firewall Intrusion detection system

firewall

Companies that provide Internet connectivity to businesses, universities, and other organizations are called ______. Internet poviders Internet service providers Broadland connections Subscription services

internet service providers

What is "articulation work"? It is the work required to link people with the computer system It is the work you do in order to do your work It is the work you do to coordinate tasks with others It is the work you do to access resources

it is the work you do in order to do your work

A _________ implementation involves placing the new system into production to run concurrently with the existing system for a period of time. During this period, the new system is evaluated and any problems that arise are fixed before the old system is turned off. Parallel Pilot Phased direct

parallel

Which of the following adoption strategies brings components or modules of the new system online one at a time? In this scenario, each individual component is brought online and tested before the old module is retired. Direct Phased Pilot Parallel

phased

Which of the following adoption strategies involves placing the new system into production for a small group of users while the old system is left in place for the majority of users? Direct Phased Pilot Parallel

pilot

The phenomena that worker/capital output has not increased in line with the increased performance capabilities of information technology is called the: Moore's law Macroeconomics Magic bullet theory Productivity paradox

productivity paradox

Which of the following are NOT one of the four categories of "failure factors" most commonly found as a reason for IT project failures? Project sponsorship Scheduling Development process management Stakeholder management

project sponsorship

Entering a randomly generated string of numbers in addition to your username and password is an example of ______. Second factor authentication Secure transfer protocol Public key infrastructure Encryption

second factor authentication

Which of the following is NOT an important factor in determining the value of information? Accuracy Speed Timeliness Accessibility

speed

Individuals who have an interest in the outcome of a system development project are called __________________. Stakeholders Partners Users Owners

stakeholders

All of the costs associated with the design, development, testing, implementation, documentation, training, and maintenance of a software system is called the _____________________. Total cost of ownership Compliance cost Project scope Operating cost

total cost of ownership

A common form of malicious activity is to compromise a computer on the Internet and use it to deliver attacks against other machines. TRUE FALSE

true

A debit card is a simplistic form of two-factor authentication. TRUE FALSE

true

A firewall can restrict traffic from a specific application. TRUE FALSE

true

A firm that purchases a commercial-off-the-shelf (COTS) information system benefits in getting a standardized system without having to absorb development costs but risks getting a system that does not align with the firm's businesses processes and existing technologies. TRUE FALSE

true

According to Nicholas Carr, information systems do not provide a sustainable competitive for three reasons. One of the three reasons is because information systems are substitutable. TRUE FALSE

true

As Amdahl's Law indicates, the slowest component on a network determines the network speed. TRUE FALSE

true

Before developing an information system, the company should distinguish between needs and wants that the new system should address. TRUE FALSE

true

Business and technology roles are slowly beginning to overlap. TRUE FALSE

true

Data, in and of itself, does not convey information. TRUE FALSE

true

Enterprise Resource Planning (ERP) systems are designed to integrate and manage all of the different business units that comprise an organization such as human resources, accounting, manufacturing, finance, and supply-chain management. TRUE FALSE

true

Firms that build their own information systems have more control over its features, performance capabilities, costs, and design. TRUE FALSE

true

Firms that build their own information systems risk building a system that may be incompatible with other systems developed outside the firm. TRUE FALSE

true

Getting buy-in from top management or having a senior manager act as a project champion are two ways of effectively managing stakeholders. TRUE FALSE

true

Google Docs is an example of a cloud application. TRUE FALSE

true

Hackers use encryption to hide their activities. TRUE FALSE

true

Having access to the right information at the right time can often mean the difference between success and failure. TRUE FALSE

true

Implementing information systems MAY produce a sustainable competitive advantage when done in conjunction with other organizational changes, such as pricing power, barriers to entry, or product differentiation. TRUE FALSE

true

Information technology and information systems are, by nature, part of a company's infrastructure. Thus, they are difficult to exploit for competitive advantage. TRUE FALSE

true

Information that is inaccurate causes organizations to draw incorrect conclusions. TRUE FALSE

true

Knowledge management systems (KM) are used by organizations to capture and exploit the expertise of their employees. TRUE FALSE

true

Moore's law predicts that computing power will double every 18 months. TRUE FALSE

true

One of the original key objectives of the of the early Internet was to allow incompatible subnetworks to communicate. TRUE FALSE

true

Operating systems are complex suites of programs that tell the computer how to operate. TRUE FALSE

true

Organizations develop or buy information systems to help ensure that their management personnel have access to accurate and timely information. TRUE FALSE

true

Some estimates indicate that almost one in every three Information and Systems Technology projects fail altogether. TRUE FALSE

true

The human element is typically the weakest element in any security setup. TRUE FALSE

true

The predecessor to the internet was called ARPANET. TRUE FALSE

true

Top top-level domain originally indicated the type of entity that hosted the website. Top level domains include .com, .edu, and .org. TRUE FALSE

true

When a VPN is established, a virtual tunnel is created between the client computer and the private network that is encrypted. TRUE FALSE

true

When stakeholders are poorly managed, they react in ways that hamper the ability to bring the project to a successful conclusion. TRUE FALSE

true

With regards to new technologies, Nicholas Carr says that a company should focus on vulnerabilities, not opportunities. TRUE FALSE

true

You can filter results from the LionSearch tool by whether or not they are available online. TRUE FALSE

true

Which of the following is TRUE about LionSearch? You cannot search for music Search results are limited to digital holdings You must know a title or the author before you begin your search You can search records for ISBN, language, DOI, for example.

you can search records for ISBN, language, DOI, for example

The law that states a network's speed is determined by its slowest component is called ______ Law. Moore's Amdahl's The last mile Metcalf's

Amdahl's

Which executive in an organization is responsible for protecting the data within a company as an asset of the firm? Chief security officer (CSO) Chief technology officer (CTO) Chief information officer (CIO) Chief data officer (CDO)

Chief data officer (CDO)

The executive in an organization that would be responsible for aligning the company's technology infrastructure with its goals. Chief security officer (CSO) Chief technology officer (CTO) Chief information officer (CIO) Chief data officer (CDO)

Chief information officer (CIO)

Which executive in an organization is responsible for the physical security within a firm? Chief security officer (CSO) Chief technology officer (CTO) Chief information officer (CIO) Chief data officer (CDO)

Chief security officer (CSO)


Conjuntos de estudio relacionados

CIW Practice Exam (Incomplete Version)

View Set

Failed test questions (chairside and dental sciences)

View Set

Ch 35: Assessment of Immune Function

View Set

AP World History: Chapters 2-4 Test

View Set