BCIS 3610

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

​The probability that your employer's IS strategy is inward focused to deliver the services cheaper, faster, and better is ________.

0.11 to 0.40

​For the "determine data needs" activity of a project, the optimistic estimated duration is 10 days, the pessimistic estimated duration is 20 days, the most likely time is 15 days. What is the expected duration of completing this activity?

15 days

​A company's risk assessment process can include numerous threats to the computers and networks. Which of the following can be considered an adverse event?

All of the above

​You work for a company that is growing. Originally, all the users in all departments had access to all the data in the database. It is considered a security risk. What is an appropriate action to reduce the risk?

Assign roles and privileges to users so that only job-relevant data is accessible to the user.

_____ has the potential to superimpose digital data over real photos so that GPS maps can be combined with real pictures of stores and streets to help people locate their position.

Augmented reality

​Which type of IS project has the highest risk of failure?

Breakthrough

_____ is is an inflammation of the nerve that connects the forearm to the palm of the wrist.

Carpal tunnel syndrome (CTS)

​Which of the following is IBM's BI product?

Cognos

A vehicle routing optimization system helps in maximizing the number of drivers being assigned.

False

As the ​CEO of an organization, it is acceptable for you to delegate long-term decisions about the organization to a subordinate.

False

Creative data scientists - a key component of BI efforts in an organization - are people who are primarily focused on coming up with novel ways of analyzing data.

False

IS professionals believe that their field offers few opportunities for unethical behavior.

False

In linear regression, you are to find a line that best fits the data. Sometimes the line may be curved.

False

It's safe for you to input personal data into your Facebook profile because Facebook is not allowed to share this information with law enforcement officials or third parties for any reason.​

False

Parallel start-up involves running a complete new system for one group of users while the rest of the users still run an old system.

False

Posting information to the Internet using anonymous email accounts or screen names makes it impossible to identify a libeler.

False

Project management is the application of knowledge, skills, and techniques to project activities so that the allotted budget can be spent.

False

Some companies offer health and wellness programs that require employee participants to share personal data. This data is protected under the same HIPAA privacy regulations as data shared with health insurance companies and doctors.​

False

Spam emails make up only a small proportion (<10%) of emails.

False

Strategic planning does not enable organizational units to participate and work together toward accomplishing a common set of goals.

False

The eventual success of any system solely depends on how users work with it.

False

Training and incentives are the keys to the successful acceptance and implementation of policies and procedures governing waste and error prevention.​

False

Waterfall and agile are the two types of software development processes available to organizations.

False

​A marketing manager who does not have deep knowledge of information systems or data science, will NOT be able to use BI tools

False

​A senior manager from the business unit most affected by a project and who ensures the project will indeed meet the needs of his or her organization is known as the project sponsor.

False

​A virus can reside in a file (or many files) on the hard drive, but it would not be active in memory. As such, it is not as important to scan live memory as it is to scan the hard drive.

False

​An increase in customer satisfaction is considered a tangible benefit.

False

​As a project manager, you would use the stakeholder analysis matrix to manage communications with external entities such as customers, vendors, and regulatory bodies.

False

​As the complexity of a network increases, the possibility of security breaches decreases.

False

​If you wish to work as an IS professional in a construction business, it does not matter if you cannot communicate with the business managers in their business terms.

False

​In some organizations, strategic planning is focused inward only.

False

​In the regression line Y = a+ bX + e, Y is the value of the independent variable.

False

​Online analytical processing is another name for enterprise application.

False

​Spam emails do not add to costs because nobody reads them anyways.

False

​Strategic planning does not enable organizational units to participate and work together toward accomplishing a common set of goals.

False

​The degree of rivalry between competitors is low in industries with many equally sized competitors or little differentiation between products.

False

_____ is a mathematical theory for developing strategies that maximize gains and minimize losses while adhering to a given set of rules and constraints.

Game theory

Which Internet business has "Do the right thing; don't be evil." as one of its values?

Google

​What topics are considered so important that they are placed on top of the strategic planning pyramid?

Mission and vision

_____ can process many pieces of data at the same time and learn to recognize patterns.

Neural networks

_____ involves running a complete new system for one group of users rather than all users.

Pilot start-up

_________ encourages nontechnical end users to make decisions based on facts and analyses rather than intuition.

Self-service analytics

_____ involves using a new or modified system under all kinds of operating conditions.

Systems operation

_____ knowledge is hard to measure and document and typically is not objective or formalized.

Tacit

​Assume your organization is experiencing an intruder attack. You have an intrusion detection system (IDS) set up. Which of the following events occurs first?

The network router sends traffic to the firewall as well as to the IDS

A group of people with common interests who come together to create, store, and share knowledge of a specific topic is known as a community of practice.

True

A neural network relies on massively parallel processing to enable a computer to simulate the function of a human brain.

True

A slipstream upgrade is a minor upgrade—typically a code adjustment or minor bug fix.

True

A zombie computer would send requests to access to the target site again and again.

True

Although computers excel at numerical calculations, they are not as good at dealing with symbols and three-dimensional objects.

True

Artificial intelligence involves the development of machines and computer systems that can simulate human intelligence processes.

True

Assistive technology systems help people overcome disabilities and perform various tasks.

True

For a small system, site preparation can be as simple as rearranging the furniture in an office to make room for a computer.

True

For an organization to get real value from its BI efforts, it must have a solid data management program.

True

If Stan and Marcus, a new trainee at the manufacturing plant, are working together to resolve an issue on the line, they would be using joint problem solving as a means of transferring Stan's tacit knowledge to Marcus.​

True

If you wish to have a visual depiction of relative frequencies of words in a document, a word cloud would be an appropriate option​.

True

In some cases, metadata—the data that describes other data—is more important than the data itself.​

True

In the U.S., there is some debate over privacy between those who favor data collection as a means to increase national security and those who view such programs as a violation of rights guaranteed by the Constitution and the Bill of Rights.​

True

In the regression line Y = a+ bX + e, a is the slope of the regression line.

True

It is illegal for companies to buy and sell personal data collected through marketing and sales efforts.​

True

Many workers claim their right to privacy trumps their employers' right to monitor employee use of IS resources.

True

Organic strategic planning defines the organization's vision and values and then identifies projects and initiatives that will achieve the vision while adhering to the values.

True

Robotics involves developing mechanical or computer devices that can paint cars, make precision welds, and perform tasks that require a high degree of precision or are tedious or hazardous for humans.

True

System testing is often done by independent testers who are not involved in developing program code.

True

The overall purpose of an inference engine is to seek information and relationships from the knowledge base and to provide answers, predictions, and suggestions similar to the way a human expert would.

True

The pages on a university's website are maintained by individual departments and organizational units. It is a useful policy to require that every change a user makes to his department pages be reviewed and approved.

True

The use of e-mail among public officials might violate "open meeting" laws.

True

To avoid potential bottlenecks and delays in accurately applying and implementing changes​ in business rules, many organizations use business rule management software.

True

Two primary causes of computer-related health problems are a poorly designed work environment and failure to take regular breaks to stretch the muscles and rest the eyes.

True

U.S. federal law permits employers to monitor email sent and received by employees.

True

Unit testing uncovers any defects in the interface between individual components of an information system.

True

Virtual reality simulations require special interface devices that transmit the sights, sounds, and sensations of the simulated world to the user.

True

Vision systems include hardware and software that permit computers to capture, store, and process visual images.

True

When audio files are played while they are being downloaded from the Internet, it is called streaming audio.

True

You are involved in an Information Systems project. The project's scope has widened, but there is no change in cost, quality, and user expectations. This will result in an increase in time taken to complete the project.

True

​A CEO must be heavily involved in setting high-level business objectives and defining strategies.

True

​According to a study by the Standish Group, approximately 70% of the IS projects do not succeed.

True

​An attack that takes place before the security community and/or software developers become aware of and fix a security vulnerability is called the 'zero-day attack.'

True

​An employee who is marked for a lay-off sent threatening emails to his boss, stating that he is going to delete sensitive data. This employee can be charged under the Computer Fraud and Abuse Act.

True

​Data mining is used to explore large amounts of data, looking for hidden patterns that can be used to predict future trends and behaviors.

True

​Default usernames and passwords should always be changed.

True

​If an attack is dangerous enough, it may warrant shutting down or disconnecting critical systems from the network.

True

​If an organization considers its IS organization as a cost center or service provider, then its strategic planning would be inward focused.

True

​It is not uncommon for computer users to share their login ID and password with coworkers.

True

​Joint application development (JAD) sessions with a cross section of users and stakeholders in a project are an effective way to define system requirements.

True

​Money from the budget for one type of cost cannot be used to pay for an item associated with another type of cost.

True

​Operational feasibility takes into account the need to meet certain system performance requirements that are considered important to system users and stakeholders.

True

​The computer is running, but not responding to your keyboard inputs. You find that the network activities are running very slowly. You have probably been hit by a rootkit.

True

​There are laws that require businesses to prove that their data is secure.

True

​Transmitting a program, code, or command that causes harm to a computer is a crime.

True

​Whenever there is a computer security incident, it is not recommended that the organization reveal all they know in public forums.

True

​You see a deceptive pop-up that says your computer is infected and that you must visit a compromised web site where you pay them to clean your computer. You have just become a victim of ransomware.

True

​You work at a call center of a large bank where you answer credit card services related questions from customers. Lately, you have noticed an increased number of customers enquiring if you had initiated a call. There can be a scam in progress.

True

Which of the following is a useful policy to minimize waste and mistakes?

Users should implement proper procedures to ensure correct input data.

Best Value Hardware Stores, a national chain, has established strict policies about the conditions under which a customer can return merchandise. These policies are an example of: __________.

a business rule

​The graphical representation that summarizes the steps a consumer takes in making the decision to buy your product and become a customer is called _____.

a conversion funnel

​There has been a data breach at your business and the business has lost some customer data. It has led to angry customers who have filed charges. What is a recommended course of action to prepare for future events?

activate the forensics analysis team and prepare documentation

Phil has been working on a new version of his company's best-selling sales management software and now he'd like to ask several co-workers and a handful of the existing version's top users to perform an acceptance test. Phil is preparing for _________.

alpha testing

​During modeling of the CRISP-DM method, we would ______.

apply selected modeling techniques

You joined an agriculture business as an Assistant Marketing Manager and you are full of ideas on how to improve sales. When you voiced your thoughts to your boss, she mentions "do not reinvent the wheel". It means _______.

before starting any new project, try to build on expertise and knowledge of others in the organization

Once new software has been selected, implementation will include all of these tasks EXCEPT _________.

consulting with stakeholders to establish future needs

The process of switching from an old information system to a replacement system is called _____.

cutover

​Which of the following security incidents is least costly to fix?

defacing of web pages

​Which of the following is NOT a component of a KPI (key performance indicator)?

format

A job that requires sitting at a desk and using a computer for many hours a day can lead to _______.

formation of blood clots

​The second phase of an Advanced Persistent Threat attack is _____.

incursion

In an expert system, the _____ is the component that delivers the expert advice.

inference engine

​You have observed that it is possible that some of your organization's projects may end up having little or no value after they are completed. You are tasked with selecting potential future projects. Which type of projects would you recommend the organization consider?

only those projects that are tied to specific organizational goals

A _____ is a conditional statement that links conditions to actions or outcomes.

rule

​A _____ is a description of the logical and physical structure of data and the relationships among the data for each user.

schema

Kelly has just been hired as a server at a seafood restaurant. Since this is her first job as a server, her manager has instructed her to follow Mark, an experienced server, for an entire shift to learn how to do the job. Kelly is: _______.

shadowing

​The business unit most affected by the project and the one whose budget will cover the project costs is known as the _____.

sponsoring business unit

Knowing the best way to negotiate with a foreign government about a volatile hostage situation is an example of _____ knowledge.

tacit

A new _____ is a major program change, typically encompassing many new features.

version

​Which of the following shortcoming may be revealed during an IT security audit?

whether only a limited number of people have access to critical data or not

Once a _____ is installed, the attacker can gain full access to the computer.

worm

​Which of the following is a potential disadvantage with self-service BI?

​Can lead to over spending on unapproved data sources and business analytics tools.

​_____ is used to explore large amounts of data for hidden patterns to predict future trends.

​Data mining

Although Roberta had signed a form preventing her doctor from sharing her personal medical records with the company she worked for, she later discovered that the doctor's office had, in fact, shared her data with her health insurance provider and her employer, which caused her to be terminated.​ Because the doctor's practice violated its own privacy policy, she was able to file a lawsuit under the ________.

​Health Insurance Portability and Accountability Act

​Which of the following is NOT a popular vendor of firewall software?

​Red Hat

​Which of these organizations offers guidelines on developing security policies?

​SANS

​Which of the following is a vendor of popular anti-virus software?

​Symantec

The coefficient of determination, r squared, is ____.

​a number that indicates how well data fits the statistical model

Miranda works at a small-batch soda pop manufacturing plant. For eight hours a day, she uses her right hand to lift individual bottles of soda pop off the production line and place them in packing crates. Lately her right elbow has been hurting, so she visited her doctor, who diagnosed her with _______.

​a repetitive strain injury

​The US-CERT incident reporting system is used to ____.

​alert the Department of Homeland Security about information security incidents

Which of the following is NOT one of the factors that have caused many organizations to establish knowledge management programs?​

​economic fluctuations

What determines the size of words in a word cloud?

​frequency of occurrence of the word in source documents

​The organization's _____ is stated in a challenging manner to inspire employees, customers, and shareholders.

​mission statement

​Suppose your business has agreed to pay a vendor for his services using a cost-plus-fixed-fee contract. This means _____.

​the agreement is to reimburse the costs plus a fixed amount as fee

​To analzye various alternative scenarios, a manager would use _______.

​the spreadsheet's 'what-if' capability

​Which of the following is NOT true about linear regression?

​the technique implies causality between the independent and the dependent variables

​On the back of a credit card the three-digit number above the signature panel is used to _____.

​verify the card is legitimate and not a stolen card number

Graydon noticed Jack, his friend and classmate, cheating on a physics exam and now he is trying to decide what to do about it. He knows he could keep quiet about it, but that would violate his moral values, plus the school's code of ethics requires students to report incidents of cheating. On the other hand, if he reports the incident, both his friend​ and probably all of their other friends will be mad at him. In which phase of the ethical decision-making process is Graydon?

​weighing options


Kaugnay na mga set ng pag-aaral

Lecture 12 - Criminal Offenders: Sentencing and Risk Assessment

View Set

9.2 Voice over IP (VoIP) Q + A (Network)

View Set

Ecommerce chapter 7 (Real Ting Set)

View Set

SIE Chapter 5: Investment Banking

View Set

Project Management Chapter 2 Questions

View Set

Transitions Final - All Questions from Lecture Packets

View Set