MIS test 2

¡Supera tus tareas y exámenes ahora con Quizwiz!

________ refers to an organization-wide function that is in charge of developing data policies and enforcing data standards. -Data administration -Authentication -Usurpation -Access Control -Data encryption

Data administration

Ajax Inc. is one of the customers of a well-known linen manufacturing company. Ajax has not ordered linen in some time, but when it did order in the past it ordered frequently, and its orders were of the highest monetary value. Under the given circumstances, Ajax is most likely to have an RFM score of ________. 155 555 515 511 151

155

________ is a BI application that inputs data from one or more sources and applies reporting operations to that data to produce business intelligence. A classful application A trans enterprise application An OLAP application A reporting application A NoSQL application

A reporting application

________ is a standard set of terms and graphical notations for documenting business processes. A) Business Process Modeling Notation (BPMN) B) Business Process Execution Language (BPEL) C) International Organization for Standardization (ISO) 9000 D) International Business Modeling Notation (IBMN) E) Component Object Model (COM)

Business Process Modeling Notation (BPMN)

________ set the stage for the requirements for any information systems and applications that need to be created or adapted. -Business reports -Business repositories -Business process models -Business requirements -Business policies

Business process models

Capturing customers' clicking behavior is referred to as ________? Dimensional data Attributed data Outsourced data Metadata Clickstream data

Clickstream data

________ are small files that enables a browser to access Web sites without having to sign in every time. -Botnets -Web bugs -Cookies -Public keys -Payloads

Cookies

In a Business Process Modeling Notation (BPMN) diagram, ________ depict the flow or sequence of activities in a process. -diamonds -ovals -solid arrows -circles -dotted arrows

Correct solid arrows

Which of the following statements is TRUE about data marts? -Data marts contain only metadata for data warehouses. -Data mart users possess the data management expertise that data warehouse employees have. -Data marts address the needs of a particular department or functional area of a business. -A data mart is like a distributor in a supply chain, while a data warehouse can be compared to a retail store. -Data marts are larger than data warehouses.

Data marts address the needs of a particular department or functional area of a business.

A ______ takes data from the data manufacturers, cleans and processes the data, and locates the data on the shelves. -Data Bus -Data Mine -Data Warehouse -Data Link Layer -Data Model

Data warehouse

Which of the following statements is TRUE about the position definitions component of human safeguards? -All employees must be provided with uniform, general training on security regardless of the sensitivity of their positions. -Holding public users of Web sites accountable for security violations is easy and inexpensive. -Security considerations should not be part of the hiring process. -Documenting position sensitivity enables security personnel to prioritize their activities based on possible risk. -System administrators should retain user accounts after an employee has been terminated.

Documenting position sensitivity enables security personnel to prioritize their activities based on possible risk.

Which of the following statements is TRUE of information systems? -Information systems should consist of only one application. -Information systems should be bought entirely off-the-shelf. -Every business process should include at least one information system. -Every information system has at least one application. -Information systems include all business process activities.

Every information system has at least one application.

Achilles Gear has four major retail customers. Based on the following RFM scores of these customers, the sales team at Achilles' should attempt to up-sell more expensive sporting goods to ________. -Pelican Stores with an RFM score of 113 -WindyRiver Sports with an RFM score of 225 -Five Star Stores with an RFM score of 214 -Goalkeeper with an RFM score of 551 -Cable Sports Inc. with an RFM score of 545

Goalkeeper with an RFM score of 551

________ occurs through human error when employees do not follow proper procedures or when procedures have not been well designed. -Loss of infrastructure -Unauthorized data disclosure -Unauthorized data encryption -Denial of service -Incorrect data modification

Incorrect data modification

Which of the following statements is TRUE of the swim-lane layout used for modeling business processes? -It models knowledge flows -Each role in the business process has to share the swim-lane with other roles. -It draws attention to the interactions among components of the diagram. -All activities for a given role are repeated in all the swim-lanes. -It complicates the process diagrams.

It draws attention to the interactions among components of the diagram.

Which of the following is a characteristic of BigData? It is processed using traditional techniques. It is unstructured. It is usually around 100 gigabytes in size. It is generated rapidly. It is typically only text-based.

It is generated rapidly

Which of the following is TRUE of scrum? -It is generic enough to be used for the development of business processes, information systems, and applications. -It was developed to overcome the problems that occur when using the Business Process Modeling Notation (BPMN). -It does not adapt to change easily. -It produces error free systems. -Its work periods are usually three months or longer.

It is generic enough to be used for the development of business processes, information systems, and applications.

Which of the following statements is TRUE about the Secure Sockets Layer (SSL)? -It is used to send sensitive data such as credit card numbers. -It is used in wireless encryption suites. -It is a stronger version of https. -It uses asymmetric encryption exclusively. -It uses one set of encryption keys for multiple sessions.

It is used to send sensitive data such as credit card numbers.

Which of the following statements is TRUE about biometric identification? -It will decline in usage in the future. -It is a relatively inexpensive mode of authentication. -It provides weak authentication. -It involves the use of a personal identification number (PIN) for authentication. -It often faces resistance from users for its invasive nature.

It often faces resistance from users for its invasive nature.

Which of the following statements is TRUE of source data for a business intelligence (BI) system? It refers to the hierarchical arrangement of criteria that predict a classification or a value. It refers to the detailed level of data. It refers to data that the organization purchases from data vendors It refers to the relative strength of data's predictive capabilities. It refers to the organization's metadata.

It refers to data that the organization purchases from data vendors.

_______ is a broad category that includes viruses, spyware and adware. -cookie -malware -crackers -firewall -spam

Malware

An ________ and an OLAP report are the same thing. OLAP array OLAP measure OLAP cube OLAP permutation OLAP dimension

OLAP cube

_____ are the primary means of authentication for a user's computer and other networks and servers to which the user may have access. -private keys -personal identification numbers -passwords -usernames CA key rings

Passwords

Stan loves collecting stamps. He receives an email that appears to come from a well-known stamp auction site asking him to reset his username and password. He clicks on the link and it takes him to a site that looks similar to the auction site, but the Web address is "scrambled" and unreadable. He emails the customer service desk at the auction site and discovers they never sent the email. This scenario is an example of attempted ________. -Phishing -Wardriving -Stack Smashing -Sniffing -Hacking

Phishing

________ play a key role in moving development projects through the SDLC or scrum development process. -Systems analysts -Database designers -Programmers -Business analysts -Technical managers

Systems analysts

________ is a concept that computer systems will become sophisticated enough that they can adapt and create their own software and hence adapt their behavior without human assistance. The Singularity Business intelligence systems Moore's Law Knowledge management Expert systems

The Singularity

________ take computers with wireless connections through an area and search for unprotected wireless networks, and then monitor and intercept wireless traffic on unsecured wireless networks. -Phishers -Tibutors -Keyloggers -Pretexters -Wardrivers

Wardrivers

Firewalls produce ________ that include lists of all dropped packets, infiltration attempts, and unauthorized access attempts from within the firewall. -blogs -blackboxes -activity logs -honeypots -Rich Site Summary (RSS) feeds

activity logs

Rapid application development, the unified process, extreme programming, and scrum have led to ________. -systems development life cycle (SDLC) -agile development -joint application development -dynamic systems development model -coalesced development

agile development

Which of the following is considered a threat caused by human error? -a virus and worm writer infecting computer systems -an employee intentionally destroying data and system components -a tsunami floods a data center causing total data loss -an employee inadvertently installing an old database on top of the current one -a hacker breaking into a system to steal for financial gain

an employee inadvertently installing an old database on top of the current one

With ________, the sender and receiver transmit a message using different keys. -a Caesar shift -asymmetric encryption -a stream cipher -symmetric encryption -a block cipher

asymmetric encryption

A ________ is a person who is well versed in an organization's strategy and focuses on ensuring that business processes and information systems meet the organization's competitive strategies. A) business developer B) business analyst C) business application programmer D) business supervisor E) business administrator

business analyst

During the requirements definition stage of developing an information system, the project team will consist mostly of ________. -systems engineers -test engineers and business users -database designers and administrators -finance and account managers -business and systems analysts

business and systems analysts

Packet-filtering firewalls ________. -examine the destination address but not the source address -seldom examine the data or the addresses of the message are the most complex type of firewall -can examine the contents of VPN packets -can filter both inbound and outbound traffic

can filter both inbound and outbound traffic

In ________, statistical techniques can identify groups of entities that have similar characteristics. metadata matching cluster analysis supervised data mining regression analysis neural networks

cluster analysis

The ________ phase of the systems development life cycle (SDLC) involves determining hardware and program specifications, designing the database and procedures, and creating job definitions. -component design -system maintenance -system definition -system implementation -requirements analysis

component design

Which of the following are the dimensions of feasibility? -operational, strategic, technical, and tactical feasibility -planning, process, technical, and schedule feasibility -cost, schedule, technical, and organizational feasibility -schedule, process, technical, and competitive feasibility -technical, process, procedural, and operational feasibility

cost, schedule, technical, and organizational feasibility

According to Brooks' Law, adding more people to a late project will ________. A) create diseconomies of scale B) reduce managerial overhead C) speed up the project D) reduce the need for coordination E) guarantee efficiencies

create diseconomies of scale

In marketing transactions, the fact that customers who buy product X also buy product Y creates a ________ opportunity. That is, "If they're buying X, sell them Y" or "If they're buying Y, sell them X." double-sales cross-selling value added selling quid pro quo break-even

cross-selling

In a business process, a ________ shows the movement of data among activities and repositories. -activities -repository -data flow -control flow -role

data flow

Which of the following is a fundamental category of business intelligence (BI) analysis? cataloging data hiding automation encapsulation data mining

data mining

In large organizations, a group of people manage and run a(n) ________, which is a facility for managing an organization's BI data. information tank Web server OLAP cube data warehouse neural network

data warehouse

_____ is a function pertaining to a particular database that develops procedures and practices to control and protect the database. -database administration -data encryption -data authentication -database normalization -data access control

database administration

The first step in the system definition phase of the systems development life cycle (SDLC) is to ________.

define the goals and scope

The first phase of the systems development life cycle (SDLC) is ________. -defining the system -implementing the system -determining the requirements -maintaining the system -design system components

defining the system

Problematic operational data is termed as ________. metadata septic data dirty data rough data granular data

dirty data

In business process management (BPM), an as-is model ____________. -represents the desired state of a business process -documents the existing business process -represents the ideal state of a business process -predicts the likely future state of a business process -contrasts the former and current states of a business process

documents the existing business process

the remarkable characteristic of OLAP reports is that they are ________, as they are online and the viewer of the report can change their format. dynamic accurate informal specific precise

dynamic

A sales report that is current at the time the user accessed it on a Web server is an example of a(n) ________. hybrid market report expert system temporal report static report dynamic report

dynamic report

Which of the following is a critical security function that should be addressed by the senior management of an organization? -sharing the private key with all systems connected to the network -reducing internal systems auditing -establishing the security policy -avoiding the use of perimeter firewalls -creating IS security software programs

establishing the security policy

Which of the following is classified as a technical safeguard? -training -key escrow -passwords -cookies -firewalls

firewalls

Knowledge management (KM) benefits organizations because it ________. -allows suppliers to work according to the organizational policies -improves data integrity, transmission, and valueenables -employees to solve problems and rectify mistakes later -improves process quality and increases team strength -allows distributors to work within the company premises

improves process quality and increases team strength

Which of the following terms is used as a synonym for data mining? parallel processing in databases (PPD) data warehousing data spelunking regression analysis knowledge discovery in databases (KDD)

knowledge discovery in databases (KDD)

in market-basket terminology, the ratio of confidence to the base probability of buying an item is called ________. confidence lift loop granularity support

lift

Which of the following are the steps in the business process management (BPM) cycle? -model processes; create components; implement processes; assess results -implement processes; create components; model processes; assess results -create components; model processes; implement processes; assess results -create components; implement processes; model processes; assess results -model processes; implement processes; assess results; create components

model processes; create components; implement processes; assess results

____ presents the largest risk for an organizations infrastructure loss. -electromagnetic pulse weapons -hackers -employees dissatisfaction -competitors -natural disasters

natural disasters

In the system implementation phase of the systems development life cycle (SDLC), with ________ installation, the new system runs alongside the old one until it has been tested and is fully operational. -pilot -phased -parallel -plunge -immersion

parallel

In the context of malware protection, the program code that causes the unwanted actions is called the ________. -bundler -payload -key escrow -bot herder -kernel

payload

In a business process, resources are ________. -collections of related tasks that receive inputs and produce outputs -collections of procedures and activities -the total number of points of work that can be accomplished in each scrum period -data stores within the system -people or computer applications that are assigned to roles

people or computer applications that are assigned to roles

A person claiming to be from central IT called Chris and asked him to participate in a password reset audit. The person had Chris change his password to the word "123456", and then again to a secret passphrase only Chris knew. Later that day Chris noticed odd system behavior, and then the system crashed. Chris was a victim of ________. -appropriating -hacking -pretexting -usurping -sniffing

pretexting

The computers that run the DBMS and all devices that store database data should reside in locked, controlled-access facilities. This is done to ________. -prevent unauthorized encryption -prevent brute force attacks -prevent email spoofing -stop SQL injection attacks -provide physical security

provide physical security

RFM analysis is used to analyze and rank customers according to their ________. motivation and needs socioeconomic status receptivity to promotions purchasing patterns propensity to respond to marketing stimulus

purchasing patterns

Which of the following is an example of a supervised data mining technique? metadata matching regression analysis cluster analysis click streaming market-basket analysis

regression analysis

Which of the following is a personal security safeguard? -using single password for all the sites -disabling operating system updates -removing high-value assets from computers -storing browsing history, temporary files, and cookies -sending valuable data only via email or IM

removing high-value assets from computers

In a business process, a ________ is defined as a collection of something. Selected Answer: -repository -activities -resources -presentations -applications

repository

The project plan which results from defining the system is the input to the ________ phase of the SDLC. -system maintenance -system design -requirement collection -requirements analysis -systems implementation

requirements analysis

Key escrow is a(n) ________. -protocol used to secure communication over the internet -device that prevents unauthorized network access -the creation of related public and private keys -safety procedure that allows a trusted party to have a copy of the encryption key -encryption algorithm that uses both public and private keys

safety procedure that allows a trusted party to have a copy of the encryption key

During the system implementation phase of the systems development life cycle (SDLC), once a system has passed testing, the organization installs the new system. Which of the following terms is used to refer to this activity? -system control -system conversion -system configuration -system overlay -system development

system conversion

Which of the following was passed to give individuals the right to access their own health data created by doctors and other healthcare providers? -the Computer Privacy Act of 2014 -the Privacy Act of 1974 -the Gramm-Leach-Bliley Act -the Sarbanes-Oxley Act -the HIPAA of 1996

the HIPAA of 1996

A ________ involves balancing three critical factors: requirements, cost, and time. -diagnostic plan -test plan -trade-off -work breakdown structure (WBS) -critical path

trade-off

In the context of security threats, pretexting, sniffing, spoofing, and phishing are all examples of ________. -loss of infrastructure -SQL injection -incorrect data modification -unauthorized data disclosure -faulty services

unauthorized data disclosure

Which of the following is one of the keys to successful systems development life cycle (SDLC) projects? -critical path template -internal process auditing -scatter plot -control chart -work breakdown structure

work breakdown structure

A ________ is a type of virus that self-propagates using the Internet or other computer network. -sniffer -worm -mole -phisher -Trojan horse

worm


Conjuntos de estudio relacionados

Chap 2: The Interview aand Health History

View Set

Marketing Management - Iacobucci - Ch 14

View Set

5.2.14 (Outline the role of feedback with the learning process

View Set