MIS chapter 1 quiz
In 2000, operating a basic internet application cost businesses approximately ________ per month. In mid-2016, operating the same application in Amazon's cloud cost approximately ________ per month.
$150,000 $1,000
Current U.S. laws award patents for ________ years and copyright protection for ________ years.
20; life+70
More than ________ percent of American adults only have dial-up Internet access; this ________ a form of broadband Internet access.
30; is not
Porter's competitive forces model identifies ________ major forces that can endanger or enhance a company's position in a given industry.
5
________ causes pop-up advertisements to appear on your screen.
Adware
________ is an incremental approach that focuses on reducing variation in the process outputs by searching for the root causes of the variation in the process itself or among process inputs.
BPI
Many organizations find ________ too difficult, too radical, too lengthy, and too comprehensive.
BPR
________ uses a "clean sheet" perspective.
BPR
XYZ Inc. scanned the fingerprints of all of their employees and now uses these fingerprints to authenticate their employees and grant them access to different areas of the company's facilities. XYZ Inc. is utilizing which type of technology?
Biometrics
________ discovered a unique cryptographic key that triggered an unlock command for Onity hotel locks; ________ used computer code to rob hotel guests around the United States.
Brocious; cashatt
CHAPTER 2
Chapter 2
CHAPTER 3
Chapter 3
CHAPTER 4
Chapter 4
The MIT Technology Review refers to 18-22 year olds as Homo__________
Conexus
________ is a consultative function of the MIS department.
Creating business alliances with business partners
Dyn is a cloud-based internet performance management company that provides DNS services for internet websites. It was attacked with ________ in 2016.
DDoS
Hackers would use a botnet to perform a ________.
DDos
________ support(s) all managers of the organization by providing rapid access to timely information and direct access to structured information in the form of reports.
Dashboards
________ attempt(s) to duplicate work of human experts by applying reasoning capabilities, knowledge, and expertise within a specific domain.
ES
_____________ is NOT a problem caused by computers.
Ergonomics
________ occurs when an unauthorized individual attempts to gain illegal access to organizational information.
Espionage
Which of the following is a property issue?
How much should companies charge for permitting access to information in their databases? What information about individuals should be kept in databases, and how secure is the information there? Under what circumstances can one use proprietary databases? How can we ensure that errors in databases, data transmissions, and data processing are accidental and not intentional?
Which of the following is a property issue?
How should we handle illegally copying copyrighted software?
The ________ manages all systems throughout the organization and the day-to-day operations of the entire IS organization.
IS director
IT services, IT personnel, and IT components make up the organization's
IT infrastructure
________ is an example of effectiveness.
Increasing customer satisfaction
________ is a societal pressure.
Protection against terrorist attacks
Which of the following is NOT a benefit of IT?
Quantity of leisure time
A(n) ________ supports the monitoring, collection, storage, and processing of data from the organization's basic business transactions, each of which generates data
TPS (transaction processing systems)
What does recent data from the U.S. Census Bureau indicate about consumer habits?
The majority of shopping takes place offline, in brick-and-mortar stores.
Amazon is entering the freight forwarding business.
True
________ made Uber's first self-driving cars that arrived in Pennsylvania in 2016
Volvo
IBM developed ________ to answer questions on the quiz show Jeopardy!
Watson
________ is an IT system that uses natural language processing and machine learning to reveal insights from large amounts of data. It has transformed many industries including healthcare and customer service.
Watson
You get a new smartphone and throw your old one away without erasing all your data. This is ________ and is an ________ mistake.
a human error; unintentional
If you accept the potential risk, continue operating with no controls, and absorb any damages that occur, you have adopted a risk ________ strategy.
acceptance
Suppose you only study two hours for your next test. You fail the test and tell the teacher that he or she obviously did a really terrible job teaching the material. This means you aren't accepting ________ for your actions.
accountability
You can check your credit report annually for free through TransUnion, Equifax, and Experian. This allows you to catch signs of identity theft early and note any problems in your credit reports. This is an example of an ethical issue that falls into the category of ________.
accuracy
________ issues involve the authenticity, fidelity, and correctness of information that is collected and processed.
accuracy
________ uses machine learning to analyze passenger behavior and provide personalized recommendations.
carnival Corporation
A ________ site provides only rudimentary services and facilities.
cold
Obamacare was created to address the ________ approach.
common good
The IT ________ are/is the IT platform.
components
________ involves companies providing standard specifications for different consumer groups.
consumer segmentation
In the ________ phase of BPI, the BPI team establishes process metrics and monitors the improved process after the solution has been implemented to ensure the process performance remains stable.
control
Which of the following is in the current order starting with the most elementary?
data, information, knowledge
When you map out how your business currently processes customer orders to figure out how to reduce delivery time, this is part of the ________ phase of BPI.
define
________ is the result of optimizing the marketing and innovation processes.
differentiation
The goal of whaling is to trick a(n) ________ into revealing personal or corporate data.
executive
Photo tagging is a type of _________ technology.
facial recognition
The debate over CEO salaries being so much higher than other employees is an issue addressed by the ________ approach.
fairness
According to Facebook executives, the Facebook and Cambridge Analytica scandal occurred because hackers got access to the database by stealing key passwords from users.
false
As anticipated by Aadhaar's opponents, the Supreme Court found that Aadhaar violates privacy rights.
false
Data and information are synonyms
false
You check your credit report annually to ensure your identity hasn't been stolen. This is an example of a property issue.
false
Winemakers have turned to drones to combat ________.
global warming
American companies can easily do business with Chinese companies. This is phenomenon is called ________.
globalization
Your student ID is an example of something the user ________.
has
As teams have begun utilizing available technologies to help steal signs, challenge calls, and in general, assist in various aspects of the game, MLB ________.
has to adapt rules and regulations, such as limiting access to live game broadcast and not replay footage
Online advertising has caused newspapers to ________ subscription prices and ________ advertising rates.
increase, decrease
The IS function has become ________ strategic within organizations, so a growing number of CIOs are coming from ________.
increasingly; other business units
________ are materials, services, and information that flow through and are transformed as a result of process activities.
inputs
Biometrics is an example of something the user ________.
is
You decide to specialize in marketing for your first career. You take an entry-level position as XYZ Corp. This means you are a ________.
knowledge worker
________ are professional employees such as financial and marketing analysts, engineers, lawyers, and accountants.
knowledge workers
Ransomware negatively affected the city of Atlanta in many ways. Which vulnerability was the main cause of the problems?
lack of management support
Suppose you slip in the hallway and break your arm. You sue the school for not properly marking the wet spot that caused you to slip. This is an example of ________.
liability
Buyer power is high when buyers have ________ choices from whom to buy and low when buyers have ________ choices.
many; few
Supplier power is high when buyers have ________ choices from whom to buy and low when buyers have ________ choices.
many; few
________ is the current strategy for many manufacturers where a company produces a large quantity of items but customizes them to match the needs and preferences of individual customers.
mass customization
In the ________ phase of BPI, the BPI team identifies relevant process metrics and collects data to understand how the metrics evolve over time.
measure
Europeans and privacy advocates prefer the ________ model of informed consent.
opt in
Companies prefer the ________ model of informed consent.
opt out
The ________ model of informed consent permits the company to collect personal information until the customer specifically requests that the data not be collected.
opt-out
Sarah received an email that claimed to be from her bank. The email asked her to provide her password. Sarah later found out that the email was not from her bank and that she had given sensitive information to someone who gained access to her accounts. This is an example of a ________.
phishing attack
________ controls prevent unauthorized individuals from gaining access to a company's facilities.
physical
Cambridge Analytica's data collection of Facebook users has been used to impact and affect which area the most?
politics
The best-known framework for analyzing competitiveness is ________'s competitive forces model.
porter
Intellectual property is NOT protected under ________ laws.
privacy
Freightos allows shippers to ___________
receive bids from freight forwarders
________ are people and equipment that perform process activities.
resources
The pursuit of the "American dream" and our ability to choose our religious orientation is a reflection of the ________ approach.
rights
________ is a deliberate act that involves defacing an organization's website, potentially damaging the organization's image and causing its customers to lose faith.
sabbotage
Procurement processes are NOT completed by ________
sales
________ is an attack in which the perpetrator uses social skills to trick or manipulate legitimate employees into providing confidential company information such as passwords.
social engineering
Some are concerned that the use of Aadhaar's information will further impede ________.
social mobility
________ is pestware that users your computer as a launch pad for unsolicited e-mail, usually advertising for products and services.
spamware
A(n) ________ interfaces between users and programmers and determines information requirements and technical specifications for new applications.
systems analyst
The BYOD phenomenon is a ________ pressure.
technology
One of the major roadblocks for installation of broadband fiber-optic lines in rural areas is ________.
that streamlined FCC rules for installation only apply to Internet Service Providers and telephone and cable companies, and not county agencies, making the process more convoluted and lengthy
Auditing ________ the computer means auditors check inputs, outputs, and processing.
through
Your company decides to purchase security insurance from Travelers Insurance in case your systems get hacked and employee information is stolen. This is an example of risk ________.
transference
Business executives often know little about IT, and IT executives understand the technology but may not understand the real needs of the business.
true
Privacy advocates are not questioning whether Axon's software will transform the legal and lethal limits of policing but how it will change policing and who will profit the most from these changes.
true
The IT components make up the IT platform
true
The internet makes customers more powerful.
true
privacy rights apply to individuals, groups, and institutions
true
Cybercrime is typically nonviolent but lucrative.
truthful
Cyberterrorism is typically carried out by individuals or groups whereas cyberwarfare is carried out by nation states or nonstate actors such as terrorists.
truthful
IT security is the business of everyone in an organization.
truthful
One thing that the popularity of open source and online studying resources has uncovered is that what learning looks like in many areas of study has drastically changed.
truthful
Minimizing the organization's carbon footprint and otherwise striving for "green IT" is an example of a ________ approach.
utiliarian
The ________ approach states that an ethical action is the one that provides the most good or does the least harm.
utilitarian