MIS Exam 3
The _________ is the scrum approach typically replaces a project manager.
scrum master
The biggest problem associated with end-user development is ________
security
Volkswagen used _________ to cheat during emissions testing.
software
Remote job entry was enabled by converting from _______.
stand-alone mainframes to mainframe and dumb terminals
You are a nice person, so you hold the door open for the person running in behind you. Since you needed to use your ID badge to open the door, the person running in behind you is __________; this is _________
tailgating; an unintentional threat to your organization
Capital One's insourcing initiative meant it had to build its reputation as a _________ company.
technology
System developers have the greatest involvement in the _________ stage of the SDLC.
testing
A(n) _________ to an information resource is any danger to which a system may be exposed.
threat
Auditing _________ the computer means auditors check inputs, outputs, and processing.
through
If you shift your risk by using other means to compensate for the loss like purchasing insurance, you have implemented a risk _________ strategy.
transference
The ________ layer of TCP/IP provides communication and packet services.
transport
A(n) _________ network is any network within your organization; a(n) _________ network is any network external to your organization.
trusted; untrusted
The _________ approach states that an ethical action is the one that provides the most good or does the least harm.
utilitarian
An information resource's _________ is the possibility that the system will be harmed by a threat.
vulnerability
Peoples State Bank decided IT _________ a core function; therefore, it decided to ________.
was not; outsource the IT function
Auditing _________ the computer means using a combination of client data, auditor software, and client and auditor hardware.
with
_______ is a two-dimensional code that can store much more information than ________
A QR code; bar codes
________ is an unauthorized access point into a wireless network.
A rogue access point
_________ issues involve the authenticity, fidelity, and correctness of information that is collected and processed.
Accuracy
_________ is the final step in the general framework for ethics.
Act and reflect on the outcome of your decision
_________ feasibility addresses the human issues of the systems development project.
Behavioral
The most current form of ransomware demands payment in the form of _________.
Bitcoins
______ is a short-range wireless network.
Bluetooth
_________ determines the point at which the cumulative dollar value of the benefits from a project equals the investment made in the project.
Breakeven analysis
________ is the most recent evolution of the modern IT infrastructure.
Cloud computing
________ is a cable medium.
Coaxial
Ashley Madison's data was first released on the _________ by ________
Dark Web; The Impact Team
________ is a disadvantage of fiber-optic cable.
Difficult to work with
_________ conversion is the least expensive.
Direct
_________ conversion is the most risky.
Direct
________ refers to learning supported by the web; ________ refers to any learning situation in which teachers and students do not meet face to face.
E-learning; distance learning
Which of the following is a problem with NextGen?
Early stakeholder input
_________ feasibility determines whether the project is an acceptable financial risk and, if so, whether the organization has the necessary time and money to successfully complete the project.
Economic
Cloud computing has the following benefit for employees:
Efficiency
Which of the following cloud computing characteristics allows organizations to share resources?
Encompasses the characteristics of grid computing
Which of the following cloud computing characteristics represents the "pay-as-you-go" concept?
Encompasses the characteristics of utility computing
_________ occurs when an unauthorized individual attempts to gain illegal access to organizational information.
Espionage
he "right to be forgotten" court order occurred in _______
Europe
According to the Chapter 3 closing case, _________ has conducted experiments on users of its website in the past; this is ________.
Facebook; legal
A legacy IT system can be easily transferred to cloud computing.
False
According to the Chapter 4 Closing Case, US governments make cybersecurity a priority.
False
Agile development ensures that the software includes every possible feature the user will require.
False
Bebbojaanland Family Park's implementation of Wi-Fi was not sustainable because it cost too much.
False
Cloud computing is the traditional way of purchasing and running your own IT infrastructure.
False
Cloud computing makes it easy to catch criminals because everything is in a centralized location that can be easily monitored.
False
Communication, control, and cost are the three benefits of outsourcing.
False
Containers were first created in 2014 and made popular by Docker, a cloud-computing service created by IBM.
False
Customers manage more than vendors in the PaaS model.
False
Customers only manage applications and data with the SaaS model.
False
Facebook is open with the public that they perform experiments on their website and always lets people know if they are part of an experiment
False
IT people are supposed to identify the system requirements in the systems analysis stage.
False
If it is unethical, it is illegal
False
Lower CASE tools automate the systems investigation, analysis, and design stages of the SDLC.
False
MANs are the largest networks.
False
Mobile computing has two major characteristics that differentiate it from other forms of computing: pervasiveness and broad reach.
False
Peoples State Bank's legacy systems were easily upgraded to engage customers online.
False
Satellite transmission systems are widely used but are being replaced by microwave data communications systems.
False
Shellcatch is only useful for large fisheries.
False
Slack is readily accepted by users of all ages.
False
Slack replaces the need for face-to-face communication.
False
State Farm, Progressive, and Allstate offer usage-based automobile insurance; these companies raise rates on drivers whose data is poor.
False
Telecommuting means you have to drive a long distance to work.
False
The Eritean Internet is highly censored (citizens can only look at certain websites).
False
The FBI did the best they could to inform the Democratic National Committee about the hackers
False
The IT steering committee is comprised of the top IT managers in an organization.
False
The latest version of teleconferencing is telepresence.
False
The main problem with Project Fi is that it is completely insecure since it uses Wi-Fi hotspots.
False
Tracking cell phones is illegal.
False
Volkswagen's "Diesel Dupe" was limited mostly to the United States.
False
XML and HTML are both markup languages used to create the look and feel of the internet.
False
You need to be particularly careful of tailgating at airport terminals.
False
_______ launched EDEN to improve the efficiency and effectiveness of its dock operations.
FedEx
_______ is a cable medium.
Fiber-optic
John Hancock issues a free _________ to monitor customer's health status.
Fitbit
Only a few ________ satellites are needed for global coverage.
GEO
________ satellites are the most expensive to build and launch.
GEO
________ is NOT an example of a data aggregator.
________ computing makes scalability easy
Grid
________ is a page-description language for specifying how text, graphics, video, and sound are placed on a web page document.
HTML
________ is the next evolution of HTML that allows pages to execute more quickly so that they resemble smartphone apps.
HTML5
_______ is an advantage of coaxial cable.
High bandwidth
135.62.128.91 is an example of an ________ address
IPv4
________ is the most commonly used IP addressing scheme.
IPv4
________ was developed because we have run out of IP addresses in the original IP addressing scheme.
IPv6
The ________ functions as a transport mechanism; the ________ is an application.
Internet; World Wide Web
Which of the following is FALSE of the Dark Web?
It is indexed by search engines.
Medium-range wireless networks are ________ technology.
LAN
A large number of ________ satellites are needed for global coverage.
LEO
Satellite telephone services are provided through ________ satellites.
LEO
________ satellites move a little relative to a point on the Earth.
MEO
_________ is the fourth step in the general framework for ethics.
Make a decision and test it
________ transmission systems are relatively inexpensive but must have unobstructed line of sight.
Microwave
________ is a short-range wireless network.
NFC
________ is designed to be embedded in mobile devices and can be used with mobile wallets. It is a _________-range wireless network technology.
NFC; short
________ is an operating model under which ISPs must allow customers equal access to content and applications, regardless of the source or nature of the content.
Network neutrality
The _________ identifies the firm's overall mission, the goals that follow from that mission, and the broad steps required to reach these goals.
Organization strategic plan
Which of the following is the correct order of networks from smallest to largest?
PAN, LAN, MAN, WAN
________ rely entirely on readers for their power, are less expensive, and can be read only up to 20 feet.
Passive RFID codes
________ is a possible solution to the ransomware problem but is not recommended by the FBI.
Pay the ransom
Which of the following cloud computing characteristics allows a dynamic assignment of computing resources based on customer demand?
Pools computing resources
_________ issues involve collecting, storing, and disseminating information about individuals.
Privacy
In April 2015, Google announced its new wireless service, ________.
Project Fi
_______ is a disadvantage of telecommuting.
Promotion time
________ cloud services may be free or offered on a pay-per-usage model.
Public
________ cloud vendors provide applications, storage, and other computing resources as services over the internet
Public
________ clouds are shared, easily accessible, multicustomer IT infrastructures that are available nonexclusively to any entity in the general public)
Public
_________ measures management's effectiveness in generating profits with its available assets by dividing the net income generated by a project by the average assets invested in the project.
ROI
________ is the first step in the general framework for ethics.
Recognize an ethical issue
________ is a set of rules that define how messages can be exchange among different network systems and applications.
SOAP
With the ________ delivery model, cloud computing vendors provide software that is specific to their customers' requirements.
SaaS
________ is the most widely used service model.
SaaS
Which of the following cloud computing characteristics addresses the business need to increase or decrease capacity when necessary (for example, retailers frequently need much more computational capacity on Black Friday)?
Scalability
_________ is an attack in which the perpetrator uses social skills to trick or manipulate legitimate employees into providing confidential company information such as passwords.
Social engineering
_________ is an unintentional threat.
Social engineering
_________ is pestware that users your computer as a launch pad for unsolicited e-mail, usually advertising for products and services.
Spamware
Which of the following is the correct order of the evolution of the modern IT infrastructure?
Stand-alone mainframes, mainframe and dumb terminals, standalone PCs, LANs, enterprise computing, cloud and mobile computing
The _________ is a _________ way to track cell phones.
StingRay; legal
________ is an Indian MOOC service.
Swayam
A URL that begins with https uses _________
TLS
_______ does not allow participants to communicate face to face.
Teleconferencing
________ is the wireless transmission and receipt of data gathered from remote sensors.
Telemetry
_________ is an advantage of the buy option.
Time
_________ is NOT a major task of the IT steering committee.
Training the top managers from each functional area
Customers manage the most with the IaaS service model compared to the PaaS and SaaS service models.
True
Distance learning refers to any learning situation in which teachers and students do not meet face to face.
True
E-parking apps are illegal in some large cities because those companies charged for something they did not own, free public parking.
True
End-user development is also called Shadow IT.
True
Enterprise networks are composed of embedded LANs and a WAN.
True
Ethernet is a common LAN protocol.
True
Facebook frequently runs experiments on its website.
True
Hypertext is the underlying concept defining the structure of the WWW
True
It is illegal to block Wi-Fi hotspots in places like hotels.
True
John Hancock and Vitality partnered to monitor employee wellness and lower premiums for consumers engaged in healthy activities.
True
Many users experienced extortion as a result of the Ashley Madison data breach.
True
Modern smartphones exhibit a process called dematerialization.
True
PANs are the smallest networks.
True
People tend to violate security procedures because the procedures are inconvenient.
True
Privacy rights apply to individuals, groups, and institutions.
True
Project Fi brings wireless services to more than 120 countries worldwide.
True
San Francisco and Boston are investing in networks of sensors in parking spaces to help people find open spaces.
True
Satellite TV runs using GEO satellites.
True
Social engineering is an unintentional threat on the part of the employee.
True
The computing resources from the evolution of the modern IT infrastructure are cumulative; this means some organizations still use mainframes today.
True
The core tenet of agile development is to do only what you have to do to be successful right now.
True
The development process in RAD is iterative.
True
The internet is an untrusted network.
True
The recent trend indicates that CEOs lose their jobs after data breaches. In theory, this should impact the "lack of management support" factor that increases the vulnerability of organizational information resources.
True
________ allows MIS professionals to search for needed web services by creating public or private searchable directories of these services.
UDDI
Which of the following cloud computing characteristics allows organizations to use a single physical server for multiple purposes?
Virtualization
________ is a disadvantage of telecommuting.
Visibility
A network between Mars and the Earth would be a ________.
WAN
_______ is a wide-area wireless network.
WiMAX
Careless Internet surfing is _________ and is an _________ mistake.
a human error; unintentional
Marriott did NOT claim blocking Wi-Fi was ________.
a way for them to make money
If you accept the potential risk, continue operating with no controls, and absorb any damages that occur, you have adopted a risk _________ strategy.
acceptance
Private clouds provide IT activities and applications as a service over ________
an intranet
A(n) _________ is a software package that attempts to identify and eliminate viruses and worms.
anti-malware system
The _________ is/are a prioritized inventory of present applications and a detailed plan of projects to be developed or continued during the current year.
application portfolio
RFID was developed to replace _______
bar codes
A _________ site provides only rudimentary services and facilities.
cold
A(n) ________ portal is intended for broad and diverse audiences, and it offers routine content, some of it in real time.
commercial
The _________ approach highlights the interlocking relationships that underlie all societies.
common good
A(n) ________ portal offers a personalized, single point of access through a web browser to critical business information located inside and outside an organization.
corporate
If a company wants to write some computer code, it would choose to ________.
customize a prewritten application
The _________ approach states that the morality of an action is based on whether the action itself is right or wrong under a series of rules, rather than based on the consequences of that action.
deontology
The deliverable of the system _________ phase is the set of technical system specifications.
design
The US Office of Personnel Management hack involved the loss of _________ information.
employee
St. Louis Cardinal scouting director Christopher Correa hacked the Houston Astros' system. This was an example of _________
espionage
The _________ of an information resource is the harm, loss, or damage that can result if a threat compromises that resource.
exposure
The _________ approach posits that ethical actions treat all human beings equally, or, if unequally, then fairly, based on some defensible standard.
fairness
Which of the following is the correct order of the SDLC?
investigation, analysis, design, programming/testing, implementation, operation/maintenance
Biometrics is an example of something the user _________.
is
Cloud computing costs ________ and is ________ flexible than an on-premise system.
less; more
If you limit your risk by implementing controls that minimize the impact of the threat, you have implemented a risk _________ strategy.
limitation
The IT steering committee is comprised of ________.
managers from each functional area
Ashley Madison is an online dating and social network service targeting ________
married people
The _________ model of informed consent prohibits an organization from collecting any personal information unless the customer specifically authorizes it.
opt-in
Some homeowners objected to Pacific Gas & Electric's smart meters because of ________ concerns.
privacy
Security is greatest when using a ________ cloud.
private
The main problem with ________ transmission systems is their signals experience propagation delay.
satellite