MIS Test #1

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the following selections is not completed during data acquisition of the BI process? A) Data Mining B) Data organization C) Data cataloging D) Data cleansing

A) Data mining

Which of the following types of skills is most likely outsourced to the lowest bidder? A) Ability to experiment B) Abstract reasoning skills C) Accounting skills D) Ability to collaborate.

C) Accounting Skills

List 4 nonroutine skills:

Abstract Reasoning Systems Thinking Collaboration Ability to Experiment

Scrum:

An agile development process.

SQL:

An international standard language from processing database data. It can also be used to create and modify database structure.

Vulnerability:

An oppurtunity for threats to gain access to individual or organizational assets. Some vulnerabilities exist because there are no safeguards or because existing safeguards are ineffective.

Which of the following statements is true about unsupervised data mining?

Analysts do not create a model or hypothesis before running the analysis.

A _______ is a person who is well verse in an organization's strategy and focuses on ensuring that business processes and information systems meet the organization's competitive strategies.

Business Analyst

___________ is defined as information containing patterns, relationships, and trends or various forms of data.

Business intelligence

A _______ is a network of activities , repositories, roles, resources, and flows that interact to accomplish a business function.

Business process

Business Rules:

Business rules put into writing a brief statement that describes the relationship between entities.

In __________, statistical technique can identify groups of entities that have similar characteristics.

Cluster analysis

When working on your MIS 3100 class project, my expectations are that you are your group members work ___________ with the goals of producing a high-quality deliverable.

Collaboratively

A student team, which is assigned a term project, meets and divides the work into sections and then team members work independently on their individual pieces. An hour before the project is due the team members meet again to assemble their independent pieces into a whole. This is described as ________________.

Cooperation.

Which of the following is a critical security function that should be addressed by the senior management of an organization. A) Sharing the private key with all the systems connected to the network B) Creating IS security software programs C) Avoiding the use of perimeter firewalls D) Establishing the security policy

D) Establishing the security policy

Which of the following choices would be used to facilitate synchronous communications between team members? A) Email B) Document Checkout C) Team Surveys D) Virtual Meetings

D) Virtual meetings

In large organizations, a group of people manage and run a(n) __________, which is a facility for managing an organization's BI data.

Data warehouse

Which of the following selections is not one of the four primary purposes of collaboration?

Developing friendships

In information security, which of the following is true about managing risk? A) Passwords are classified as technical safeguards B) all organizations except financial institutions should invest heavily in security safeguards. C) Physical security is classified as human safeguards. D) organizations should implement safeguards that balance he tradeoff between risk and cost.

D) organizations should implement safeguards that balance he tradeoff between risk and cost.

What are the two key characteristics of collaboration?

Feedback and Iteration

A ___________ examines each part of a message and determines whether to let that part pass.

Firewall

Which of the following characteristics is a disadvantage of of cloud-cased hosting?

It involves high dependency on vendor

___________ is the term used to describe non-relational databases that support very high transaction rates processing relatively simple data structures.

NoSQL

Which of the following observations about RFM and OLAP reports is true.

OLAP reports are more dynamic than RFM reports.

Primary Key:

One or more columns in a relation whose values identify a unique row of that relation.

Raw Data vs Meta Data:

Raw Data: The data that appears in each excel box is Raw data. Meta Data: The Data that describes the raw data (the design view in access)

Data:

Recorded facts of figures

What is a the Acronym to create tables?

SQL

____________ is the standard language for inserting, updating, and deleting data in a database.

SQL

The fundamental purpose of the starting phase of a project is ____________.

Setting the ground rules for the project and teams

____________ is a technique for intercepting computer communications through a physical connection to a network or without a physical connection, in the case of wireless networks.

Sniffing

What is cloud computing:

The practice of using a network of remote servers hosted on the internet to store, manage and process data rather than a local server on a personal computer.

Conversion Rate:

What did you want them to accomplish on your site?

Prototype:

a small model that reflects the overall thing we hope to accomplish.

Pilot:

a type of system conversion in which the organization implements the entire system on a limited portion of the business.

HTTP:

a application-layer protocol used between browsers and web servers.

Work breakdown structure:

a breakdown of the work that needs to be accomplished, and how long it will take to accomplish it.

Botnet:

a bunch of computers controlled by a hacker

Business Process:

a network of activities that generate value by transforming inputs into outputs. A network of activities, repositories, roles, resources and flows that interact to achieve some business function.

Firewall:

a part of a computer system or network that is designed to block unauthorized access while permitting outward communication.

SQL server:

a popular enterprise-class DBSM product licensed by microsoft

TCP/IP

a protocol architecture having five layers and one or more protocol defined at each layer. PRograms are written to implement the rules of a particular protocol.

HTTPS

a secure version of an Http

Every table in a normalized database has ___________.

a single theme

a data integrity problem will occur only if ____________.

data are duplicated in a database

A(n) _____________ is a program used to treat, process, and administer a database.

database management systems

Which protocols guarantees secure data transmission?

https

Port:

sender's address and receiver's address, it goes through a router, and knows how to get to where it is going and get back.

Five component framework:

the five fundamental components of an information system that are present in every information systems.

SQL injection attack:

the situation that occurs when a user obtains unauthorized access to data by entering a SQL statement into a form in which one is supposed to enter a name or other data.

Google Webmaster Tools:

the tools that googles give you to be able to track all your data (page visits, new visits, clickthrough rate, bounce rate, etc._

Cluster Analysis:

unsupervised data mining using statistical techniques to identify groups of entities that have similar characteristics. Commonly used to find groups of similar customers in a data about customer orders and demographics.

Business analyst:

work with business leaders and planners to develop processes and systems that implement business strategy and goals. Gather user requirements

Systems Analyst:

work with users to determine system requirements, design, and develop job descriptions and procedures, help determine system test plan. Gather user requirements

Cloud resources are _________ because many different organizations use the same physical hardware.

Pooled

Rights of individuals regarding information systems.

- Computer hardware and programs that allow you to perform your job proficiently. - reliable and secure internet connections - a secure computing enviorment - protection from viruses, worms, and other threats. - contribute to requirments for new systems features and functions. - Reliable systems development and maintenance -Prompt attention to problems, concerns, and complaints. - properly prioritized problem fixes and resolutions. - Effective training

Things to consider when choosing a webhosting provider:

- Price - Focus -limitations - tech support -features - hardware -reviews - email capabilities -control panel - growth possibilities

How should organizations respond to security threats?

- Senior Management make secuirty policy and manage cost vs risk

How to build a website:

- identify audience - create valuable content - make site trustworthy - organized site structure. - describe the content on your site

Personal Security Safeguards:

- take security seriously - create strong passwords, use multiple. - send no vulnerable data via email/text - use http to buy online - remove high value assets from computer - clear browsing history, temp files, cookies. - update antivirus -demonstrate security concern to fellow workers - follow organizational security directives and guidelines - consider security for all business initiatives.

SEO Mistakes:

-Keyword stuffing -Broken links - copied copy - Duplicate content - non unique title tags - not optimized with the right key words

Information:

-Knowledge derived from data -Data presented in a meaningful context -Data processed by summing, ordering, averaging, grouping, comparing, or other similar operations -a difference that makes a difference, -Information exists only in the minds of humans.

Responsibilities of Individuals regarding information systems.

-Learn Basic computer skills - LEarn standard technique and procedures for the applications you use. - follow security and back up procedures. -protect your passwords - Use computers and mobile devices according to employer policy - male no unauthorized hardware modifications -instill only authorized programs - apply software patches and fixes when directed to do so - when asked, devote the time required to respond carefully and completely to requests for requirements for new systems features and functions. - avoid reporting trivial problems.

Goal of IT security:

...

What is the timebox for the daily scrum meeting?

15 minutes

What is the recommended size of a scrum team?

7 +/- 2

Keys for successful SDLC projects:

4 dimensions of feasibility: You want to make sure it is done - on time, - to the user specifications - on or under budget - to meet the user's needs.

Foreign Key:

A column or group or columns used to represent relationships. Values of a foreign key math values of the primary key in a different (foreign) table.

Viruses:

A computer program that replicates itself

Market-based Analysis:

A data mining technique for determining sales patterns. A market based analysis shows the products that customers tend to biy together.

Router:

A device that forwards data packets to the correct part of a computer network

Data Warehouse:

A facility for managing and organiztion BI data

Packet:

A formatted message that passes through networks

Entities:

A representation of something that users want to track. Some entities represent a physical object; others represent a logical construct.

Ping of Death

A packet that is disguised as a normal packet but that tricks the server to process and process and process until it shuts down the server.

Threat:

A person or organization that seeks to obtain or alter data or other IS assets illegally, without the owner's permission and often without the owner's knowledge.

DBMS:

A program for creating, processing, and administering a database. A DBSM is a large and complex program that is licensed like a operating system. Microsoft Access is a DBSM.

Phishing:

A technique for obtaining unauthorized data that uses pretexting via email. The phisher pretends to be a legitimate company and sends an email requesting confidential data.

RFM

A technique readily implemented with basic reporting operations to analyze and rank customers according to their purchasing patterns.

ERD:

A type of diagram used by database designers to document entities and their relationship to each other.

Parallel:

A type of system conversion in which the new system runs in parallel with the old one and the results of the two are reconciled for consistency.

Plunge:

A type of system conversion in which the organization shuts of the old system and starts the new system.

Phased:

A type of systems installation in which the company installs the new system in pieces across the organization until the system is complete.

Worms:

A virus that propagates itself using the internet or some other network. Worm code is written specifically to infect another computer as quickly as possible.

Which of the following is a function of an ISP? A) It serves as a user's gateway to the internet B) It described how messages must be processed for wired transmission. C) it connects computers within a LAN D) It transmits data over short distances, replacing cables.

A) It serves as a user's gateway to the internet.

Mark is transferring funds online through the web site of a reputed bank. Which of the following will be displayed in the address bar of his browser that will let him know that the bank is using the secure sockets layer (SSL) protocol? A) https B) ftp C) www D) .com

A) https

Which of the following is NOT a responsibility of a systems analyst? A) writing programs B) developing procedures C) determining system requirements D) designing job descriptions

A) writing programs

Which of the following selections depicts a situation that would benefit most by collaborations. A) Whether or not a company should relocate its headquarters to Nashville, TN. B) how much money should be allocated to purchasing a computer for new employees. C) Which invoices should be billed today? D) How many sprinklers should we maintain in inventory before reordering a new shipment?

A)Whether or not a company should relocate its headquarters to Nashville, TN.

Push publishing delivers business intelligence ______________.

According to a schedule or as a result of an event or particular data condition.

In a business process, ________ are defined as collections of related tasks that receive inputs and product outputs.

Activities

During Spring Execution, when are new sprint tasks added?

As soon as possible, unless they reflect a change in the scope of the sprint goals.

As is vs. to- be models

As-IS- How it currently stands To-be: how to make it better.

Relationships:

Associations amount entities or entity instances in an E-R model or an association among rows of a table in a relationship database.

Phone numbers, email address, first and last name, are all examples of ____________ because they describe the characteristics of an entity.

Attributes

Which of the following should not happen in the sprint review meeting? A) a live demonstration of a potentially shippable (properly tested) product increment. B) A report about what happened during the Sprint C) A declaration by the Product Owner regarding which items are complete vs. not complete. D) Feedback from stakeholders resulting in additional items added to the Product Backlog

B) A report about what happened during the Sprint

Which of the following services is being offered by a cloud vendor who provides hosted hosted computers, an operating system, and possibly a DBMS A) IaaS B) PaaS C) Saas D) VPM

B) PaaS

Which statements best describes Scrum? A) Scrum is a cookbook that defines the practices for software development B) Scrum is a framework with built in reality checks for complex work in uncertain domains. C) Scrum is a complete methodology that defines how to develope software.

B) Scrum is a framework with built in reality checks for complex work in uncertain domains.

Which of the following is the Scrum Team not responsible? A) Planning how to meet a sprint goal B) selecting the product owner C) Coordinating daily during the sprint to meet the sprint goal D) resolving internal conflicts

B) Selecting the product owner

What are the four primary purposes of collaborations?

Become informed Make Decisions Solve Problems Manage Projects

_________ refers to data collections that are characterized by huge volume, rapid velicity, and great variety.

BigData

Which of these activities is the Scrum development team expected to do during the first sprint? A) Nail down the architecture B) Build a working prototype of the entire product. C) Test the product D) Develop a detailed plan for the rest of the project.

C) Test the product

The ____________ must ensure that priorities consistent with the overall organizational strategy are developed, communicate them to the IS departments and enforce them.

CIO

Attribute:

Characteristics of an entity. (Order, Order Number, Subtotal, etc. )

What are the 5 components of the 5 component framework?

Computer Hardware Software Data Procedures People

Firewall :

Computing device that prevents unauthorized access.

According to Brooks' Law, adding more people to a late project will ___________.

Create diseconomies of scale

The _________ is a sequence of activities that determine the earliest date by which a project can be completed.

Critical path

In marketing transactions, the fact that customers who buy product X also buy product Y creates a _____________ opportunity. That is, "if they're buying x, sell them Y" if they're buying Y, sell them X

Cross- selling

Which of the following usually happens in a malicious denial of service attack? A) A hacker monitors and intercepts wireless traffic at will. B) A Phisher pretends to be a legitimate company and requests confidential data C) An intruder uses another site's IP address to masquerade as the other site. D) A hacker floods a Web server with millions of bogus service requests

D) A hacker floods a Web server with millions of bogus service requests

Which of the following accurately describes the five-component framework of information systems? A) Computer hardware, software, purpose, data, and procedures B) Computer hardware, software, data, people, and purpose C) Computer hardware, software, communication networks, data, and procedures. D) Computer hardware, software, data, procedures and people.

D) Computer hardware, software, data, procedures and people.

Which of the following statements is true about data marts? A) Data mart users possess the data management expertise that data warehouse employees have. B) A data mart is like a distributor in a supply chain, while a date warehouse can be compared to a retail store. C) Data marts are larger than data warehouse. D) Data marts address the needs of a particular department or functional area of a business.

D) Data marts address the needs of a particular department or functional area of a business.

Which of the following best defines Management Information Systems (MIS)? A) The societal impact computers have on people? B) the scientific and practical approach to building computers and applications. C) the building of computers to make people more productive. D) The management and use of information systems to help organizations achieve their goals and objectives

D) The management and use of information systems to help organizations achieve their goals and objectives.

What are three primary activities in the Business Intelligence process?

Data Acquisition Perform Analysis Publish Results ( Push or Pull)

Phases in the SDLC:

Define Systems Goals and Scope Determine requirements Design system component System Implementation

In the system definition phase of the systems development life cycles (SDLC), the first major task for an assembled project team to __________.

Define system goals and scope

The first and arguably the most important task for a problem-solving collaborative group is ____________.

Defining the problem

in systems development, documents, designs, prototypes, data model, database designs, and working data entry screens are examples of ___________.

Deliverables

The term ____________ means that the computing resources leased can be increased or decreased dynamically in a short span of time and that organizations pay for just the resources that they use.

Elastic

A(n) ____________ DBMS is designed to process large organizational and workgroup databases.

Enterprise

Brad, a project manager, wants to build a database to integrate information about employees and tasks they they handle. Brad wants to track information such as task name, productivity of an employee on a daily basis, and employee name. These aspects that brad wants to track are called _________.

Entities

A database developer is likely to use a(n) _____________ to serve as the blueprint for building a database. This tool describes the entities, attributes, and relationships among entities.

Entity-relationship data model

How often should the backlog refinement meeting occur?

Every sprint

How frequently do experienced Agile software developers test?

Every time the code changes

Exit Rate:

Exit rate is the page they actually left from

A manager will essentially require ___________ skills to test ideas clearly on a small scare, before taking bigger risks or committing significant resources to a larger project.

Experimentation

If a defined project is determined to be feasible in the systems development life cycle (SDLC), the next step is to _________.

Form the project team

Belmont is going to buy new monitors this year. What component does this fall under?

Hardware

____________ are false targets for computer criminals to attack.

Honeypots

Denial of service

Human error in following procedure/ lack of procedures; pr attacks where server is flooded with bogus requests.

If belmont were to use a private cloud for the faculty and staff but a public cloud for students, what would they being using?

Hybrid Cloud

A(n) ____________ is a number that identifies a particular device.

IP address

In a business process management (BPM), once the as-is model is created, the very next step that a team must take is to ____________.

Look for improvement opportunities.

Identify a characteristics that is a disadvantage of cloud-based hosting?

Loss of control over data location

The CEO asks a team member to do some work outside of the goals of the current sprint in progress. What should the team member do?

Inform the product owner so he/she can work with the CEO.

Project Manager

Initiates, plan, monitor, and close own complex projects. Implementation of ideas.

SQL Injection attack:

Injections that will spoof the system in order to get all of the data from your table.

You are looking to buy a home that costs less than $700,000 but your real estate agent keeps sending you fliers for homes that cost 1,000,000 or more. This information is likely to be useless because it is ____________.

Irrelevant

What are necessary data characteristics?

It must be accurate It must be timely It must be relevant It must be just barely sufficient It must be worth the cost

The two key characteristics of collaborations are __________ and ___________.

Iteration, feedback

USers should no bother IS personnel for trivial reasons, so they have a responsibility to _____________.

Learn basic computer skills

Compared to in-house hosting, cloud-based hosting ____________.

Minimizes the risk of investing in technology that will soon become obsolete

How is the Product backlog arranged?

Most important items at the top to least important items at the bottom.

A student management system allows students to have multiple majors, and advisers are assigned to handle multiple students and courses. This is an example of an _____________ relationship.

N:M

The process of creating a new application begins when the IS department aligns its priorities with the _____________.

Organizing strategy

In the context of malware protection, the program code that causes the unwanted actions is called the ___________.

Payload

a ________ pretends to be a legitimate company and send an email requesting confidential data, such as account numbers, social security numbers, account password, and so forth.

Phisher

In the system implementation phase of the systems development life cycle (SDLC), with _________ installation, the organization implements the entire new system/business processes on a limited portion of the business.

Pilot

A project manager defines the task that her team members have to perform and determines the schedule for carrying out each of the tasks. This projects is in the _________ phase of project management.

Planning

Albert create a relational database to store employee performance statistics. He stores each employee's data in independent rows and creates a column named "Employee Number" to assign unique numbers to each employee. This column is referred to as a ___________.

Primary Key

If belmont decided to maintain email on campus, on a privately owned network, this would be an example of a ____________ cloud.

Private

What are the three types of cloud?

Private Public Hybrid

Logging into a computer is an example of what component?

Procedure

The email system that belmont uses now (through Gmail) is an example of a __________ cloud.

Public

RFM analysis is used to analyze and rank customers according to their ___________.

Purchasing patterns

Brenda, the sales manager of a firm, wants to generate a particular report containing sales analyses of the second and third quarter of the year. After accessing the DBMS, she should create a ____________ to obtain the information that she wants.

Query

Diseconomies:

Refers to when economies of scale no longer work for a firm. The firm sees an increased marginal costs when output is increased.

When an employee is terminated, IS administrators should receive notice so that they can __________.

Remove the user account and password

Benefits of Cloud Computing:

Saves Time Cost effective More convenient Less maintenance

Queries:

Searched based upon data values provided by the user. Data to table

The directors of a company meet to decide is they should start a new product line or not. This is an example of a ____________ decision.

Strategic

What are three criteria for successful collaboration?

Successful Outcome Growth in team capability Meaningful and satisfying experience

In ____________, data miner's develop a model prior to the analysis and apply statistical techniques to data to estimate parameters of the model.

Supervised data mining

A manager will essentially require __________ skills to clearly understand how the resources that his or her company uses are converted to the desire outputs.

Systems thinking

The protocols used on the internet are arranged according to a structure known as the protocol architecture.

TCP/IP

Data Mining:

The application of statistical techniques to find patterns and relationships that will be stored in the database. Akin to a blueprint.

Paas:

The cloud provider provides you with the hardware you need, and you can then upload whatever software you need.

What is MIS?

The management and use of information systems that help organizations achieve their strategies.

Click through rate:

The number of times you see a page and how many times you clicked on it.

CIO:

The representative for IS and IT issues within the executive staff. They provide the IS perspective during discussions of problem solutions, proposals, and new initiatives.

What is IT security:

The state of being free from danger in an online environment.

What is to be said about wider bandwidth?

The wider the bandwidth, the more it can handle.

A ___________ is a person or an organization that seeks to obtain or alter data or other IS assets illegally, without the owners permission and often without the owners knowledge.

Threat

Primary Drivers of System Development:

Time, Cost Requirements

a ________ involves balancing three critical factors: requirements, cost, and time.

Trade-off

A company's top managers meet to decide on a potential merger with one if its competitors. They discuss various aspects of the merger, such as business valuations and conducting due diligence. This is an example of ____________________ decision making.

Unstructured

____________ are the final judges as to what data the database should contain and how the records in that database should be related to one another.

Users

Saas:

Using infrastructure, hardware, operating systems, etc. THe cloud provider provides everything for you (i.e. belmont using gmail)

VPN:

Using the public network, a VPN gives a different type of encryption to give you more security.

A(n) _________ uses the internet to create the appearance of private, secure connections

VPN

Trojan Horse:

Viruses that masquerade as useful programs or files. Typically appearing to be a computer game, MPS file, etc.

Malware:

Viruses, worms, trojan horses, spyware, and adware.

Ports of Web Traffic and Email traffic

Web Traffic (80) Email Traffic (25)

When is the Sprint completed?

When the timebox expires

Bounce Rate:

When they exit from a page and do not see another page

Data Mart:

a data collection, smaller than a data warehouse, the address the needs of a particular department or functional are of a business.

Honey pot:

organizations like banks are a great target for hackers. A honeypot is a fake website as part of their site, to draw attention of the hackers.


Conjuntos de estudio relacionados

CYBR2.TestOut Chap 5 MC Style Review (601) (39)

View Set

Major Muscles That Act at the Wrist

View Set

Chapter 9 Regional Economic Integration

View Set

Macro: Ch 30- Aggregate Demand and Aggregate Supply

View Set

(pharm) Ch 9: Drug Therapy for Coagulation Disorders

View Set

HOSPITALITY AND TOURISM CLUSTER EXAM

View Set

Skillsoft - SS-SY0-601 - TestPrep CompTIA Security+ SY0-601

View Set

FINAL EXAM study guide CH 7 blood

View Set