BCIS 3610
The probability that your employer's IS strategy is inward focused to deliver the services cheaper, faster, and better is ________.
0.11 to 0.40
For the "determine data needs" activity of a project, the optimistic estimated duration is 10 days, the pessimistic estimated duration is 20 days, the most likely time is 15 days. What is the expected duration of completing this activity?
15 days
A company's risk assessment process can include numerous threats to the computers and networks. Which of the following can be considered an adverse event?
All of the above
You work for a company that is growing. Originally, all the users in all departments had access to all the data in the database. It is considered a security risk. What is an appropriate action to reduce the risk?
Assign roles and privileges to users so that only job-relevant data is accessible to the user.
_____ has the potential to superimpose digital data over real photos so that GPS maps can be combined with real pictures of stores and streets to help people locate their position.
Augmented reality
Which type of IS project has the highest risk of failure?
Breakthrough
_____ is is an inflammation of the nerve that connects the forearm to the palm of the wrist.
Carpal tunnel syndrome (CTS)
Which of the following is IBM's BI product?
Cognos
A vehicle routing optimization system helps in maximizing the number of drivers being assigned.
False
As the CEO of an organization, it is acceptable for you to delegate long-term decisions about the organization to a subordinate.
False
Creative data scientists - a key component of BI efforts in an organization - are people who are primarily focused on coming up with novel ways of analyzing data.
False
IS professionals believe that their field offers few opportunities for unethical behavior.
False
In linear regression, you are to find a line that best fits the data. Sometimes the line may be curved.
False
It's safe for you to input personal data into your Facebook profile because Facebook is not allowed to share this information with law enforcement officials or third parties for any reason.
False
Parallel start-up involves running a complete new system for one group of users while the rest of the users still run an old system.
False
Posting information to the Internet using anonymous email accounts or screen names makes it impossible to identify a libeler.
False
Project management is the application of knowledge, skills, and techniques to project activities so that the allotted budget can be spent.
False
Some companies offer health and wellness programs that require employee participants to share personal data. This data is protected under the same HIPAA privacy regulations as data shared with health insurance companies and doctors.
False
Spam emails make up only a small proportion (<10%) of emails.
False
Strategic planning does not enable organizational units to participate and work together toward accomplishing a common set of goals.
False
The eventual success of any system solely depends on how users work with it.
False
Training and incentives are the keys to the successful acceptance and implementation of policies and procedures governing waste and error prevention.
False
Waterfall and agile are the two types of software development processes available to organizations.
False
A marketing manager who does not have deep knowledge of information systems or data science, will NOT be able to use BI tools
False
A senior manager from the business unit most affected by a project and who ensures the project will indeed meet the needs of his or her organization is known as the project sponsor.
False
A virus can reside in a file (or many files) on the hard drive, but it would not be active in memory. As such, it is not as important to scan live memory as it is to scan the hard drive.
False
An increase in customer satisfaction is considered a tangible benefit.
False
As a project manager, you would use the stakeholder analysis matrix to manage communications with external entities such as customers, vendors, and regulatory bodies.
False
As the complexity of a network increases, the possibility of security breaches decreases.
False
If you wish to work as an IS professional in a construction business, it does not matter if you cannot communicate with the business managers in their business terms.
False
In some organizations, strategic planning is focused inward only.
False
In the regression line Y = a+ bX + e, Y is the value of the independent variable.
False
Online analytical processing is another name for enterprise application.
False
Spam emails do not add to costs because nobody reads them anyways.
False
Strategic planning does not enable organizational units to participate and work together toward accomplishing a common set of goals.
False
The degree of rivalry between competitors is low in industries with many equally sized competitors or little differentiation between products.
False
_____ is a mathematical theory for developing strategies that maximize gains and minimize losses while adhering to a given set of rules and constraints.
Game theory
Which Internet business has "Do the right thing; don't be evil." as one of its values?
What topics are considered so important that they are placed on top of the strategic planning pyramid?
Mission and vision
_____ can process many pieces of data at the same time and learn to recognize patterns.
Neural networks
_____ involves running a complete new system for one group of users rather than all users.
Pilot start-up
_________ encourages nontechnical end users to make decisions based on facts and analyses rather than intuition.
Self-service analytics
_____ involves using a new or modified system under all kinds of operating conditions.
Systems operation
_____ knowledge is hard to measure and document and typically is not objective or formalized.
Tacit
Assume your organization is experiencing an intruder attack. You have an intrusion detection system (IDS) set up. Which of the following events occurs first?
The network router sends traffic to the firewall as well as to the IDS
A group of people with common interests who come together to create, store, and share knowledge of a specific topic is known as a community of practice.
True
A neural network relies on massively parallel processing to enable a computer to simulate the function of a human brain.
True
A slipstream upgrade is a minor upgrade—typically a code adjustment or minor bug fix.
True
A zombie computer would send requests to access to the target site again and again.
True
Although computers excel at numerical calculations, they are not as good at dealing with symbols and three-dimensional objects.
True
Artificial intelligence involves the development of machines and computer systems that can simulate human intelligence processes.
True
Assistive technology systems help people overcome disabilities and perform various tasks.
True
For a small system, site preparation can be as simple as rearranging the furniture in an office to make room for a computer.
True
For an organization to get real value from its BI efforts, it must have a solid data management program.
True
If Stan and Marcus, a new trainee at the manufacturing plant, are working together to resolve an issue on the line, they would be using joint problem solving as a means of transferring Stan's tacit knowledge to Marcus.
True
If you wish to have a visual depiction of relative frequencies of words in a document, a word cloud would be an appropriate option.
True
In some cases, metadata—the data that describes other data—is more important than the data itself.
True
In the U.S., there is some debate over privacy between those who favor data collection as a means to increase national security and those who view such programs as a violation of rights guaranteed by the Constitution and the Bill of Rights.
True
In the regression line Y = a+ bX + e, a is the slope of the regression line.
True
It is illegal for companies to buy and sell personal data collected through marketing and sales efforts.
True
Many workers claim their right to privacy trumps their employers' right to monitor employee use of IS resources.
True
Organic strategic planning defines the organization's vision and values and then identifies projects and initiatives that will achieve the vision while adhering to the values.
True
Robotics involves developing mechanical or computer devices that can paint cars, make precision welds, and perform tasks that require a high degree of precision or are tedious or hazardous for humans.
True
System testing is often done by independent testers who are not involved in developing program code.
True
The overall purpose of an inference engine is to seek information and relationships from the knowledge base and to provide answers, predictions, and suggestions similar to the way a human expert would.
True
The pages on a university's website are maintained by individual departments and organizational units. It is a useful policy to require that every change a user makes to his department pages be reviewed and approved.
True
The use of e-mail among public officials might violate "open meeting" laws.
True
To avoid potential bottlenecks and delays in accurately applying and implementing changes in business rules, many organizations use business rule management software.
True
Two primary causes of computer-related health problems are a poorly designed work environment and failure to take regular breaks to stretch the muscles and rest the eyes.
True
U.S. federal law permits employers to monitor email sent and received by employees.
True
Unit testing uncovers any defects in the interface between individual components of an information system.
True
Virtual reality simulations require special interface devices that transmit the sights, sounds, and sensations of the simulated world to the user.
True
Vision systems include hardware and software that permit computers to capture, store, and process visual images.
True
When audio files are played while they are being downloaded from the Internet, it is called streaming audio.
True
You are involved in an Information Systems project. The project's scope has widened, but there is no change in cost, quality, and user expectations. This will result in an increase in time taken to complete the project.
True
A CEO must be heavily involved in setting high-level business objectives and defining strategies.
True
According to a study by the Standish Group, approximately 70% of the IS projects do not succeed.
True
An attack that takes place before the security community and/or software developers become aware of and fix a security vulnerability is called the 'zero-day attack.'
True
An employee who is marked for a lay-off sent threatening emails to his boss, stating that he is going to delete sensitive data. This employee can be charged under the Computer Fraud and Abuse Act.
True
Data mining is used to explore large amounts of data, looking for hidden patterns that can be used to predict future trends and behaviors.
True
Default usernames and passwords should always be changed.
True
If an attack is dangerous enough, it may warrant shutting down or disconnecting critical systems from the network.
True
If an organization considers its IS organization as a cost center or service provider, then its strategic planning would be inward focused.
True
It is not uncommon for computer users to share their login ID and password with coworkers.
True
Joint application development (JAD) sessions with a cross section of users and stakeholders in a project are an effective way to define system requirements.
True
Money from the budget for one type of cost cannot be used to pay for an item associated with another type of cost.
True
Operational feasibility takes into account the need to meet certain system performance requirements that are considered important to system users and stakeholders.
True
The computer is running, but not responding to your keyboard inputs. You find that the network activities are running very slowly. You have probably been hit by a rootkit.
True
There are laws that require businesses to prove that their data is secure.
True
Transmitting a program, code, or command that causes harm to a computer is a crime.
True
Whenever there is a computer security incident, it is not recommended that the organization reveal all they know in public forums.
True
You see a deceptive pop-up that says your computer is infected and that you must visit a compromised web site where you pay them to clean your computer. You have just become a victim of ransomware.
True
You work at a call center of a large bank where you answer credit card services related questions from customers. Lately, you have noticed an increased number of customers enquiring if you had initiated a call. There can be a scam in progress.
True
Which of the following is a useful policy to minimize waste and mistakes?
Users should implement proper procedures to ensure correct input data.
Best Value Hardware Stores, a national chain, has established strict policies about the conditions under which a customer can return merchandise. These policies are an example of: __________.
a business rule
The graphical representation that summarizes the steps a consumer takes in making the decision to buy your product and become a customer is called _____.
a conversion funnel
There has been a data breach at your business and the business has lost some customer data. It has led to angry customers who have filed charges. What is a recommended course of action to prepare for future events?
activate the forensics analysis team and prepare documentation
Phil has been working on a new version of his company's best-selling sales management software and now he'd like to ask several co-workers and a handful of the existing version's top users to perform an acceptance test. Phil is preparing for _________.
alpha testing
During modeling of the CRISP-DM method, we would ______.
apply selected modeling techniques
You joined an agriculture business as an Assistant Marketing Manager and you are full of ideas on how to improve sales. When you voiced your thoughts to your boss, she mentions "do not reinvent the wheel". It means _______.
before starting any new project, try to build on expertise and knowledge of others in the organization
Once new software has been selected, implementation will include all of these tasks EXCEPT _________.
consulting with stakeholders to establish future needs
The process of switching from an old information system to a replacement system is called _____.
cutover
Which of the following security incidents is least costly to fix?
defacing of web pages
Which of the following is NOT a component of a KPI (key performance indicator)?
format
A job that requires sitting at a desk and using a computer for many hours a day can lead to _______.
formation of blood clots
The second phase of an Advanced Persistent Threat attack is _____.
incursion
In an expert system, the _____ is the component that delivers the expert advice.
inference engine
You have observed that it is possible that some of your organization's projects may end up having little or no value after they are completed. You are tasked with selecting potential future projects. Which type of projects would you recommend the organization consider?
only those projects that are tied to specific organizational goals
A _____ is a conditional statement that links conditions to actions or outcomes.
rule
A _____ is a description of the logical and physical structure of data and the relationships among the data for each user.
schema
Kelly has just been hired as a server at a seafood restaurant. Since this is her first job as a server, her manager has instructed her to follow Mark, an experienced server, for an entire shift to learn how to do the job. Kelly is: _______.
shadowing
The business unit most affected by the project and the one whose budget will cover the project costs is known as the _____.
sponsoring business unit
Knowing the best way to negotiate with a foreign government about a volatile hostage situation is an example of _____ knowledge.
tacit
A new _____ is a major program change, typically encompassing many new features.
version
Which of the following shortcoming may be revealed during an IT security audit?
whether only a limited number of people have access to critical data or not
Once a _____ is installed, the attacker can gain full access to the computer.
worm
Which of the following is a potential disadvantage with self-service BI?
Can lead to over spending on unapproved data sources and business analytics tools.
_____ is used to explore large amounts of data for hidden patterns to predict future trends.
Data mining
Although Roberta had signed a form preventing her doctor from sharing her personal medical records with the company she worked for, she later discovered that the doctor's office had, in fact, shared her data with her health insurance provider and her employer, which caused her to be terminated. Because the doctor's practice violated its own privacy policy, she was able to file a lawsuit under the ________.
Health Insurance Portability and Accountability Act
Which of the following is NOT a popular vendor of firewall software?
Red Hat
Which of these organizations offers guidelines on developing security policies?
SANS
Which of the following is a vendor of popular anti-virus software?
Symantec
The coefficient of determination, r squared, is ____.
a number that indicates how well data fits the statistical model
Miranda works at a small-batch soda pop manufacturing plant. For eight hours a day, she uses her right hand to lift individual bottles of soda pop off the production line and place them in packing crates. Lately her right elbow has been hurting, so she visited her doctor, who diagnosed her with _______.
a repetitive strain injury
The US-CERT incident reporting system is used to ____.
alert the Department of Homeland Security about information security incidents
Which of the following is NOT one of the factors that have caused many organizations to establish knowledge management programs?
economic fluctuations
What determines the size of words in a word cloud?
frequency of occurrence of the word in source documents
The organization's _____ is stated in a challenging manner to inspire employees, customers, and shareholders.
mission statement
Suppose your business has agreed to pay a vendor for his services using a cost-plus-fixed-fee contract. This means _____.
the agreement is to reimburse the costs plus a fixed amount as fee
To analzye various alternative scenarios, a manager would use _______.
the spreadsheet's 'what-if' capability
Which of the following is NOT true about linear regression?
the technique implies causality between the independent and the dependent variables
On the back of a credit card the three-digit number above the signature panel is used to _____.
verify the card is legitimate and not a stolen card number
Graydon noticed Jack, his friend and classmate, cheating on a physics exam and now he is trying to decide what to do about it. He knows he could keep quiet about it, but that would violate his moral values, plus the school's code of ethics requires students to report incidents of cheating. On the other hand, if he reports the incident, both his friend and probably all of their other friends will be mad at him. In which phase of the ethical decision-making process is Graydon?
weighing options