Ch. 1-6
What is the difference between an affinity portal and a public portal?
An affinity portal is intended for a smaller audience than a public portal.
The advancement of technology has produced many positives and negatives around the quality of life of the average IT worker. Which of the following examples BEST illustrates the impact of technology on the quality of life, and why?
An improvement to the quality of life would be the ability to work from home; a decline in the quality of life would be being constantly surrounded by work-related technology
When customers purchase products online, they are provided these products by way of
B2C e-commerce
Which of the following is a benefit of the Baxter robot over traditional industrial robots?
Baxter is significantly lower in cost.
Greg uses information systems to design and manufacture products. This is an example of
CAM
What is the first step in any risk analysis process?
Calculate the value of what needs protection.
A(n)_________ portal offers routine content, occasionally in real time; a(n)__________ portal offers a single point of access for internal and external information.
Commercial; enterprise
What is the MOST LIKELY result if Company A, which has provided a specific service for the last two decades with great success, is suddenly faced with Company B, which utilizes information technology to innovate the same service to make it cheaper and more accessible to consumers?
Company B will have a competitive advantage.
A(n) __________ can be either internal or external to an organization.
Customer
Which of the following properly contrasts cyberterrorism and cyberwarfare?
Cyberterrorism is usually carried out by individuals or small groups, while cyberwarfare is typically carried out by nation states.
Which type of connection would a user need to operate the telephone and the Internet on the same line?
DSL
The Sarbanes-Oxley Act was created to force companies to disclose what type of information?
Financial
Data ________ prevents data from being used by more than one application.
Isolation
Every device in a __________ has a NIC that allows the device to physically connect to the network's communication medium.
LAN
The Israeli government has accused Palestinian hackers of manipulating government information systems in order to wreak havoc on Israel's sewage treatment plants. Without regard to the actual culprits of the attack, which of the following MOST likely was used to carry out the attack?
SCADA systems
Which of the following is TRUE about how today's interconnected, interdependent, wirelessly networked business environment contributes to the vulnerability of organizational information resources?
The Internet now enables millions of computers and computer networks to communicate freely and seamlessly with one another
Skype is an example of _________.
VoIP
Jessica is currently on an international conference call in her office. She is using the company's intranet which she accesses through a cable modem. Which type of media is she using?
Wireline
Losing the password to a computer is synonymous with
a human error
The IS Director manages
all daily IS operations
Jonas's BPI team is currently examining the "as is" process map and data to identify any problems with the process. What phase is the team in?
analysis
Repetitive strain injuries can be MOST helped by
better ergonomics
Where is a DMZ located?
between two firewalls
Your boss has asked you to implement a non-disruptive and incremental approach to ensure business process excellence. What kind of strategy should you be implementing, and why?
business process improvement, since it is designed to be incremental in nature and used to organize work around business processes rather than individual task
What part of an organization does an OAS support?
clerical staff
Jacinta would like to offer her employees a means by which they can get a personalized, single point of access through a Web browser to critical business information both inside and outside their location. Which of the following should she use?
corporate portal
Tamsin is a department manager at her organization. She finds that she is frequently overloaded by information which is scattered across various documents on the intranet and Internet, e-mail messages from different departments in the organization, and databases at her office and at company headquarters. Which of the following would be the BEST solution to her problem?
corporate portal
Evan is an amateur hacker. He is trying to access the personnel records held by a local retail company. He keeps getting denied access, despite using a handful of different methods. This is an example of __________ preventing unauthorized access to information systems.
external firewalls
Which of the following contributes to the complexity of managing IS in modern organizations?
high cost
For the Internet, the backbone is a fiber-optic network operated primarily by
large telecommunications companies.
Better software in the financial services industry has resulted in
more robust online services
Caroline, a privacy advocate, is advising her company on customer privacy issues. She recommends the _______ model of informed consent because it ________.
opt-in; prevents companies from collecting personal information unless specifically authorized
Operational effectiveness exists when a company
performs similar tasks better than its competitors.
Identity theft is the main purpose of
phishing
June owns a gallery and has recently updated its entire database system. Each artist displayed now has fields for pictures of the artist, his/her art, name, number and prices. Together these pieces of data for each artist form a
record
Coursera offers free college-level courses online from universities such as Stanford and MIT. This is an example of
software disrupting an industry that primarily functioned in the physical world.
Normalization of a relational database involves
streamlining.
MOOCs are democratizing education because
they teach high-level skills at a greatly reduced cost.
Marlee is currently estimating the probability that each patient's records will be compromised in an online attack. She is in the risk ________ stage of risk management.
Analysis
Retail businesses face a great deal of risk when it comes to protecting customer credit card information. You CANNOT mitigate risk through risk _________.
Analysis
When a company has described its business plan's steps, inputs, outputs, and resources, what is it able to do?
Analyze the process.
The head trader of a brokerage firm has come to you, the Chief Information Officer, with a request to design a new trade order execution system. After the meeting, you realize you are missing a couple strategic positions in the MIS department to fulfill his request. Scanning the pool of applicants in the HR system and budgeting for two new positions, which two of the following four applicants would be best suited for the trader's request and why: an applications programmer, a database administrator, a systems analyst, and a Web designer.
The systems analyst and the applications programmer because together they can interface between users and programmers, determine requirements and technical specifications, and create the computer code for developing the new application.
Jessica works on her organization's HR LAN. That LAN and the LANs of other departments are interconnected to a central mainframe. What type of network does the organization utilize?
Enterprise
The IT department of XYZ Corp has violated the corporation's code of ethics. Martin, the CIO, has discovered that Ylena, one of the security team analysts, is the cause of the violation. Ylena agrees that it was her decision to install tracking software onto the corporate intranet that caused the ethics violation. Which fundamental tenets of ethics are represented here?
Martin is focused on accountability, and Ylena is focused on responsibility.
Margaret Hatcher was hired to perform consultative functions for the MIS department at MI5. In her preparation, she has isolated four strategic points to address when she begins her work: 1. Educating the MIS staff on the core business; 2. Managing outsourcing; 3. Managing computer operations; and 4. Incorporating the internet into the business. Do these four points align with her consultative function in the MIS department? Why or why not?
No, choice 3 (managing computer operations) is a traditional function of the MIS department not a consultative function of the MIS department.
The CIA needs to figure out if Mr. McKern, whom the MIS department hired to perform consultative functions, did his job correctly. They identified four points to address when he began his work: 1. Educating the MIS staff on the core business; 2. Managing outsourcing; 3. Managing computer operations; 4. Incorporating the internet into the business. Do these four points align with his consultative function in the MIS department?
No, choice 3 (managing computer operations) is a traditional function of the MIS department not a consultative function of the MIS department.
Bill Masterson, as a Chief Information Security officer, needed to ensure that system administrators were using information systems legally. He hired a systems analyst to oversee and create a business program designed to audit administrators' usage. Was this the best choice for the role? Why or why not?
No, he should have hired an auditor or a computer security manager to oversee the ethical and legal use of information systems.
Gadget Inc. uses a program that will audit system administrators' usage to ensure they are using information systems legally. Did the Chief Information Security officer, who hired you as a systems analyst to create and oversee a business program, make the correct decision in hiring you?
No, he should have hired an auditor or a computer security manager to oversee the ethical and legal use of information systems.
A junior security analyst is working on a new ticketing system called ITCustomersNow, and is working in a new field within the tickets dealing with human mistakes as security incidents. A business executive, while travelling, was surfing a gambling site on his laptop at the airport and downloaded a virus that infected the company's e-mail system. In filling out the ticket, the junior analyst selected "carelessness with laptops" as the human error. Was the junior analyst's description of the human mistake on the ticket accurate? Why or why not?
No. "Careless Internet surfing" is a better choice because the executive accessed questionable websites resulting in a compromise.
Guitar Thrashers, Inc. is experiencing a demand surge for its guitar picks. Under the impression they need a transaction processing system, the owners hired a consultant who relayed TPS support, collection, processing, storage, and decision-making functions around the products that they sell. Is the consultant correct in his synopsis of a TPS? Why or why not?
No. A TPS does not provide decision-making functions
What is the difference between promotion analysis and price analysis?
Promotion analysis focuses on identifying the best advertising channels, while price analysis sets the product prices to obtain the highest total revenues.
What is the difference between the threat posed by systems programmers and the threat posed by application programmers?
Systems programmers completely bypass security mechanisms, while application programmers program applications to allow backdoor access.
Yahoo Messenger is an example of a(n)________ -based chat program.
Web
Mariko is a passionate golfer who is good enough to compete locally. She often needs to research the best equipment, techniques, events, and other golf-related information in the area. When she searches the Web, however, she often gets overwhelmed with the huge amounts of information out there. Mariko's coach offers her the advice to seek out a portal called Okinawagolfexcellence.com. This is great advice for Mariko because
an affinity portal such as this offers a single point of entry with specific information to a whole community of people with affiliated interest areas; here they can communicate and update information.
Developing countries often have few banks, and ATMs can be rare. Cash works, but it has security risks and requires face-to-face transactions, which can mean standing in line for hours to pay a bill. However, even developing countries have a significant (and increasing) number of smartphone users. What type of system would you put in place to make bill-paying and banking easier and to utilize the trend towards increasing technology levels, and why?
an electronic commerce system, since it enables transactions among organizations and between their customers
By focusing on how well his employees do within their department, Rick measures
efficiency.
Which of the following represents the major category of unintentional threats?
human error
Studies reveal that _________ of survey respondents take their cell phones with them on vacation.
100 percent
If a university is using a database management system, which type of binary relationship would it assign to a PROFESSOR-CLASS relationship?
1:M
School executives are developing a business continuity plan with their IT management in the event of a major disaster. They are worried about the protection of their computer operations mainly because there are so many interconnected pieces. On the other hand, they are also extremely concerned about the cost of such a plan and its impact on the company's resources. What might an IT manager propose to appease the company executives, and why
A cold site would be best because it would take care of long lead-time items the company needs.
What is the difference between a unary relationship and a ternary relationship?
A unary relationship means the degree of the relationship is one, while a ternary relationship means the degree of the relationship is three.
A(n) _________ portal supports communities with groups that enjoy the same hobbies or affiliations.
Affinity
Mark Watters was speaking about technology pressures in the business environment while discussing information overload. He focused on the need to sort through the amount of information available in the world today. He also discussed technology innovation and focused on the secure nature of bring-your-own-devices policies, in addition to its productive nature. Evaluate Mark's presentation.
Although the components of the topics match their respective areas, Mark is incorrect in his description of BYOD as being a secure choice.
How is Big Data related to predictions?
Big Data makes predictions by applying mathematics to huge amounts of data to infer probabilities
Jocelyn is able to download files at 30 Mbps and upload them at 5 Mbps. Based on these specifications, her bandwidth would be considered_________ by the FCC.
Broadband
Marcus works in a "modern" organization; he works alongside the CIO and CFO to strategize and implement information systems within the organization. Marcus is the company's
CEO
Jessica is spending a semester abroad in Italy. She is currently sitting at a table, eating her lunch and accessing the Internet for which she has paid 4.5 euros for an hour's access. Which service is she MOST LIKELY utilizing?
Cybercafé
Which statement becomes TRUE as the amount of data increases?
Data is hardest to manage
Which of the following is a characteristic of Big Data, according to the Big Data Institute?
Data sets generate a high velocity with an uncertain pattern.
You are a GS13 bureaucrat for the National Business Center, a data collection agency for the U.S. federal government. You are asked to present a seminar on business-oriented data collection on individuals to the National Security Agency which is subject to privacy training mandated by Congress. Which of the following main points should you include in your seminar?
Data should be collected on individuals only for a legitimate objective; data should be adequate, relevant, and not excessive; individuals must give their consent before data is collected, and such consent may be implied from the individual's actions.
Carlos has come to realize that, in order to stand out from firms in his industry, he has to add new services and products to his model. This is an example of a(n) __________ strategy.
Differentiation
Business process reengineering is more ___________ than business process improvement.
Difficult
If the Transmission Control Protocol used by Koo'Lot Inc. manages the movement of data packets, transfers the packets, and confirms the delivery of the packets, what will Koo'Lot Inc.'s IP do?
Disassemble, deliver, and reassemble the data during transmission
MOOCs are an example of _________ learning.
Distance
Which of the following is an example of a business focused on social responsibility that addresses the issue of what percentage goes to the philanthropic cause and what percentage goes to the business?
DonorsChoose
________ refers to learning supported by the Web, while _________ refers to learning done completely over distances using electronic means
E-learning; distance learning
A medical records storage company is considering opening offices in Berlin and Paris. Which of the following should it consult before opening these offices?
ECC data protection laws
When compared, the data protection laws of the ________ are much more restrictive than those of the ________.
EU; U.S.
Co-workers would find it _________ to collaborate seamlessly from different locations using UC.
Easier
Your grandfather's law firm won a huge settlement for its client and will become a partner in a Silicon Valley-based entity. Returning from the Bay Area, your grandfather states that he is impressed yet confused by the new methods of communication being leveraged by the new venture. Being used to landline phones, legal correspondence via courier and mail, and business being conducted orally in the courtroom, he has asked you to explain some of these new technology-oriented communication methods. Which of the following represents the BEST explanation you can give him about today's communication technology?
Electronic chat rooms are basically electronic conversations that happen textually in real time over the Internet; Internet telephony (VoIP) is how most businesses provide phone services now; unified communications bundle multiple electronic communications such as fax, instant messaging, voicemail, etc.; and telecommuters can now access in-office resources remotely.
Erin is head staff archivist at a very big state archive. She gets funding for a huge project called Archon. This project is designed to modernize the whole archive and utilize both old and new knowledge, keep it vital, and share it with other agencies. How would Erin BEST use a knowledge management system to make the Archon project successful?
Erin figures out how the Archon database works and brings in an Archon consultant for a seminar to instruct all the project archivists. Erin then decides what archival routines for both digital and physical preservation she wants to keep from the old ways and what should be renewed within project Archon. The next step for Erin is to discuss how to best integrate the Archon methods within the archive research room's context; for this, she has thorough discussions with the research staff and summarizes those insights in an online handbook. Now, the Archon database is put to use, and Erin unifies old and new knowledge and stores it for staff to access. Erin then assigns one of her project staff members to be the Archon data repository upkeeper to keep the knowledge fresh and up-to-date. As a last step, Erin holds a big seminar/workshop for all the staff at the archive and assigns liaisons to instruct other departments on how to use Archon and access all information.
What step in the ethical decision-making process must Kristof complete next if he has recognized the ethical issue and assembled the facts?
Evaluate alternative actions
Glen and his team are answering the question, "Which option best represents the rights of all stakeholders?" Which step in ethical decision making are they in?
Evaluating alternative actions
Drew, a new hire, is going over his organization's policies and procedural guidelines. What type of knowledge is he utilizing?
Explicit
Your CIO has asked you to produce a brief for the Unix team detailing the amount of social security numbers and other personal health information that could be disclosed if the company's systems were attacked and data exfiltrated successfully by hackers. Which of the following briefs would be BEST to give, and why?
Exposure brief since it displays the loss or damage that can result if a threat compromises that resource
You are currently faced with making what could be an ethical decision concerning your department. How should you BEST go about making this decision?
First, recognize whether this decision is, in fact, ethical in nature. Next, ensure you have all the pertinent information available to help you make the decision. After this, consider alternative actions and which ones fit your ethical framework. Choose the option that best fits the situation. Finally, determine whether the decision was correct and whether you learned anything from it.
A new financial analyst is starting at your firm and will be responsible for auditing mortgage data in a relational database. Although she has high financial acumen, this will be the first time she will be working with a relational database. In explaining analysis using databases, which of the following statements would be accurate with respect to analyzing data in relational databases?
Functional dependencies express values of an attribute associated with a value of another; normalization uses functional dependencies, is a means of analysis, and minimizes redundancy; and the join operation combines records from two or more tables to obtain information located in different tables.
Gerard is a library arts student developing a database in computer class as his final project. When he works on keys in his database to make it dynamic, he also creates a small data warehouse to go with the database. What would be an accurate description summarizing the project components of Gerard's final project?
Gerard works with a foreign key which is a group of fields linking to another table; a primary key which uniquely identifies and sorts a record; a secondary key which gives additional information but can't identify a record completely accurately; and finally, a data warehouse which keeps data that can't be updated or changed while in use by a researcher.
Murphy was hired through a third party vendor to create an information system designed around monitoring process performance. After weeks of design, he presented the CIO with a system that captured their sales transactions, such as price, quantity, individuals, addresses, time to delivery, and other transactional components. The CIO smiled politely, thanked him, walked into his office, and demanded the vendor compensate him for the time the consultant spent at his office. Why did the CIO demand his money back, and was he correct in doing so?
He was correct. The scope of the information system was to monitor process performance. The consultant designed an information system that revolves around capturing and storing process data.
What is the MOST likely result after Jamal correctly enters his password and the system scans his thumbprint?
He will be granted the rights and privileges to which he is entitled through network controls
You are a congressman from Utah. With the opening of an NSA collection center in Utah, your constituents have become more aware of their own personal data and how governments and corporations use this data. Today, you will be holding hearings with four major credit agencies including SegreFax and TransConfederacy. Your chief of staff has presented you four ideas on concerns related to personal information in databases. Which of the following are the BEST topics to include in your remarks regarding your constituents' concerns?
How the records are stored; how they keep records accurate; how they change inaccurate data; how the data is used
Donald and Wendy are project managers for a big project that is similar to a project carried out successfully by the company last year. They plan to find all old material from the project last year and use it as a blueprint for success this year. They also plan to prepare a business forecast, purchase new materials, and arrange a small getaway for their team so they can bond and focus better on future tasks. Which cross-functional business processes would this project include?
Human Resources, Finance, and Production
An information security expert comes to give a professional development seminar on protecting information resources at your organization. Which of the following represents a series of topics the expert would MOST likely cover?
Hundreds of potential threats exist; it can take a long time to detect computer crime; the cost of prevention can be high.
As an award-winning Fortune 500 CISO, you are giving a presentation on the difficulties in protecting information resources in the manufacturing sector. Which of the following represents the BEST outline for your presentation?
Hundreds of threats exist; the long durations to detect computer crime; the cost of prevention can be high.
What must happen regarding knowledge for an organization to be successful?
Knowledge, as a form of capital, must exist in a format that can be exchanged among people and be able to grow.
Regina has become very ill while on vacation in the Caribbean. The hospital she is in has asked a leading heart surgeon to perform an operation on Regina. Because the surgeon is located over 5,000 miles away and cannot make it in time, he uses surgical robots to perform the surgery. This is an example of ___________ in healthcare delivery.
IT improvements
Because Kelly works from home and is allowed to work any time of day, she has more time to spend with her kids. This is an example of
IT improving the quality of life.
You work for a big national census poll where your organization gets government consent to gather data about a large number of citizens for research and polling purposes. Your specific area of focus is confidentiality. What are key points in the work you conduct?
Implementation of computer security procedures, limited access to data by third parties, and only by law, strict objectives for reasons to disclose data and disclosure should always be monitored and maintained.
How is distance learning different from e-learning?
In distance learning, the students do not meet the teacher.
Barry has been asked to prepare a simple pamphlet that explains key points about encryption and to distribute the pamphlet to all company employees so they can boost their knowledge of the topic. Which of the following should be included in the pamphlet?
In public key encryption, the public key is available in a directory that all parties can access; public key encryption is considered asymmetric encryption; and a certificate authority acts as a trusted intermediary between companies.
A decrease in prices for telepresence systems is an effect of a(n)_________ in the number of companies selling cloud-based and on-premise systems.
Increase
Arnold Smith is a former hacker and programmer for an underground investigative journalism organization that focused on hacking government and corporate systems in order to leak information on criminal activity. Now, he regularly speaks to organizations on how to protect themselves against similar threats. In his presentations, which of the following would he NOT include as a factor that contributes to the increased vulnerability of information systems and why?
Increased skills required to be a hacker because the skills required have decreased due to sophisticated software and easily accessible hacking scripts
You are leading a seminar on better work ethics for employees of a large state agency. The IT department has supervised a large number of employees and found their work performance lacking in regards to slacking off on inappropriate sites on the Internet such as social media sites and dating sites. What would be the MOST effective recommendations for you to make to the managers of the state agency?
Install URL filtering software so that inappropriate web sites are blocked and employee work hours not wasted.
What is the MOST likely result for a company whose business practices have enabled it to innovate and execute more effectively and efficiently than its competitors?
It gains a competitive advantage.
Which is characteristic of a data mart?
It is primarily used by smaller companies.
Why is metadata important?
It tells you about the data stored in a data warehouse.
What is the MOST likely result for an organization that keeps its knowledge assets in emails, documents, and people's heads, rather than in a relational database?
It will suffer less effective decision making.
Jason works at a marketing company that, over four years, has undergone some internal changes and implemented different BPI efforts accordingly. When Jason is asked to perform an analysis of the company's many BPI projects, he realizes that the system is scattered and unsupported by many employees. What would be a viable strategy to implement in Jason's case?
Jason should implement a BPM strategy to ensure consistency and integration of scattered efforts.
You are creating a pamphlet for a Chinese delegation arriving for two weeks of trade negotiations with your firm. The first day is an education seminar, and your topic is ethics in the corporate environment. You decide to focus on responsibility, accountability, and liability. Which of the following is an accurate description of the three components to place in the pamphlet?
Liability is a legal concept giving individuals the right to recover damages; accountability determines responsibility for actions taken; and responsibility means the acceptance of decision and action consequences.
Lin is involved in a complicated case of plagiarism and is trying to make heads and tails of the ethics. She gets the facts about the situation and asks relevant legal and lay people about it. She then evaluates which option would treat the different parties in the most equal way and considers all solution options. Finally, she carefully implements her decision and reflects on its consequences. Which would be the BEST way for Lin to make a perfectly balanced ethical decision?
Lin recognizes that it is a problem of an ethical nature, asks relevant legal and lay people about facts, and evaluates which options treat parties in the most equal way. She then considers all solution options, carefully implements her decision, and reflects on its consequences
It was ________ to manage security when IT relied on mainframes only. The ________ makes it much easier for hackers to gain access to organizational resources.
easier; Internet
You want to discourage a small rural college in the American South to incorporate massive open online courses (MOOCs) into its program since you are highly critical regarding how they work. What would be the BEST and most accurate argument you could make to the panel of decision makers?
MOOCs do not bring in revenue to universities and have poor participation rates. They have not proven that they can effectively teach students to reach the same skill levels as students from traditional education. In addition, it is hard to design classes that effectively teach students from such different backgrounds as those enrolling in MOOCs, and completion rates from these classes is fairly low.
Malcom is using Six Sigma to statistically analyze the process, while Carin is using a Web-enabled technology to display and retrieve data via a Web browser. Compare the two.
Malcom is using BPI, while Carin is using BPM
You need to determine how likely it is that your company can get hacked and how you can make sure those hackers will not get customer information (or at least not get much). You are a risk _________.
Manager
Jonathan was just hired as a mail clerk at AddOn Inc. Ashley is a janitor at the company. Javier is a floor manager. Marilynn is the CIO. Based on human error, which person presents the GREATEST threat to the company's information security?
Marilynn
Victor and his team are creating a data warehouse of the hub and spoke kind; as team leader, Victor chooses the team's newest member, Ashley, to make a presentation of the new data warehouse for the company. Ashley's presentation describes the data warehouse environment, explains the hub and spoke kind of warehouse, talks about independent data marts in general, and reviews metadata, data integration and user needs. Would you say that she gives a true presentation of the warehouse? Why or why not?
No. Ashley should not have independent data marts as part of her presentation of the data warehouse.
Stanford has just made an ethical decision. He first discovered that the decision would cause damage to the marketing group within his company. He then made sure that he knew which groups within his company had a stake in the outcome of his decision. After that, he had to figure out which option presented to him would do the most good and do the least harm. Then, he implemented his decision, making sure that the concerns of all stakeholders were considered in the decision. Finally, he sat down and evaluated the outcome of his decision and what he had learned from having to make it. Did Stanford make the ethical decision appropriately? Why or why not?
No. He forgot to consider all the approaches and decide which option best addressed the situation
A third-party forensics team is in the middle of investigating a records breach of 40,000 hospital records. Up to this point in their forensics, they've noticed that security mechanisms were actually bypassed instead of being cracked or brute forced. The lead investigator on the team wants to start looking at all the users to see if one of them may have bypassed the security controls and exfiltrated the database. Is this a good approach? Why or why not?
No. He should target the system programmers initially because, with their inherent knowledge of coding the system, they are best able to bypass security mechanisms.
When evaluating privacy issues in the state agency he works for, Carlos considers surveillance, the types of information that can be gathered about employees, what can be revealed to others, if the information can be stored in a database, and who does and does not get access to it. Has Carlos carried out his thought process on privacy issues correctly?
No. In this matter, it is not up to him to decide who gets access to the stored information.
Bad Ben LLP, a 5th Avenue marketing firm, is deciding on a privacy policy to give its customers a voice in how their information is used. The President of Operations, in his desire to make it harder for customers to control their personal data, has decided to use an opt-in model so that the customer has to explicitly ask the company to stop collecting and sharing their information with other marketers. Is this a good, and why?
No. It is the opt-out model that requires customers to explicitly ask the company to stop collecting and sharing their information, not the opt-in model.
Louisa is holding a business class about KMSs and summarizing them as formal information systems aimed to integrate explicit and tacit knowledge. She talks about the KMS cycle which makes the system dynamic and refined over time until the knowledge is finalized. She finishes by going through the six steps of the cycle in order: creating, capturing, refining, storing, managing, and disseminating organizational knowledge. Do you think Louisa's class is accurate? Why or why not?
No. Louisa claims that knowledge in a KMS cycle is finalized, while, in reality, it is constantly updated to reflect change.
Bob Barnes has a barnacle cleaning service in which he services local recreational harbors and a couple of industrial shipyards. He is worried about the possibility of robots taking his business away and hires a consultant for an analysis on the current market. The consultant states that he won't accept payment because he knows that robots won't be able to do specialized jobs such as Bob's for a very long time, and they would also have a hard time operating under water. Was the consultant correct? Why or why not?
No. Manual jobs such as cleaning and scraping are already being performed by robots. There are also pool-cleaning robots that function well under water.
Four separate law firms were hired to tackle privacy, accuracy, property, and accessibility issues in that respective order. The law firm hired to tackle accuracy issues wants to focus on three topics for the client. These topics include who has responsibility for authenticity, fidelity, and accuracy of the information; how they can ensure information will be processed properly and presented accurately to users; and who owns the information. Is this law firm correct in its coverage of accuracy issues? Why or why not?
No. Ownership of the information is a property issue not an accuracy issue.
Chuck does underwater welding, working on boat hulls, propeller shafts, and rudders so that boats don't have to be put in a dry dock for certain repairs. He is worried about robots taking his business away and wants to hire a consultant to see if his fears are justified. The consultant states that he won't accept payment for that job because he already knows that robots won't be able to do specialized jobs like Chuck's for a very long time and that robots would have a hard time working under water, as well. Is the consultant correct? Why or why not?
No. Robots are already performing dangerous jobs like welding, and robots can perform in various environments, including under water
When Suzanne realized that her company had been selling products created by child labor, she realized that the clothing production group would be damaged. Suzanne then consulted an expert in the company, as well as relevant members of the production group. Suzanne determined that the most commonly good option for the company, as a whole, would be to close that particular line of clothing produced by child labor, and she considered all the choices while testing this conclusion. Suzan implemented her decision and went on to another project. Did Suzanne carry out her ethical decision properly? Why or why not?
No. She forgot to reflect on the outcome of her ethical decision
Sarah Reid, a consultant for an oil company, is setting up business processes for a merger. In one of her working group meetings, she was presenting to the CFO business processes created by her team. She stated the business process for finance would not need to be cross-functional, since the only processes they will be managing are account collections, stock transactions, accounts receivable, and petty cash. Is she correct in her assessment? Why or why not?
No. The business processes listed are accounting business processes and finance business processes.
A small grocery store chain owner in the San Francisco area is having difficulties getting certain products in to the market while other products seem to be sitting on the shelves. In addition, he has had discrepancies in meat prices changing day-to-day without receiving updates. A consultant advised that an electronic commerce system would be a good IT investment, as it will help alleviate these transactional dilemmas. Is the consultant correct, and why?
No. The grocery store owner is having a supply chain management issue where the flow of products and information is being interrupted, as evidenced by the price updates and product unavailability. A supply chain management system would be prudent
What is the expected result of a technology that improves rapidly and alternative service options with superior quality become available?
Obsolescenc
Which of the following is an example of a technology pressure?
Obsolescence
Your commanding officer has asked for a briefing on the difficulties of managing data in corporations two weeks before the commencement of an information warfare exercise with the private sector. Which of the following presentations should you give?
One that includes data degradation, the tendency for data to become outdated; data rot, where data media becomes unreadable; federal regulations, holding CEOs and CFOs personally responsible for disclosures; and companies drowning in unstructured data
It was ________ to manage security when IT relied on mainframes only. Companies can protect themselves by using a ________ network.
easier; untrusted
Veronica, a gamer who is a member of several gaming sites, is worried about privacy. As a friend of Veronica's who frequently uses P3P to get information on privacy on all the many web spots where you are a customer/client, what would be your BEST recommendation for P3P?
P3P is great because it gives information on the various sites' privacy policies and what kind of data they collect.
Your friend Marla comes to you, an IT professional, worried that she has a computer virus or an identity theft issue. She says that a company that she frequently purchases from both online and in person has begun sending her fliers and coupons in the mail as well as e-mails and banner ads online geared towards preferences and habits she has never shared with the company. Which advice should you give her to BEST explain what is happening?
Personal data about her daily living activities has likely been parsed and profiled into a digital dossier by a data aggregator; this digital dossier was then sold to the company in a process known as customer intimacy.
Bill is a member of an information security team at a large, international organization. His team often gives presentations to local university students interested in going into security programming. Last week he gave a presentation that focused on alien software. At the end, he gave a quiz to the audience and asked them to categorize the different software programs based on their names: Pirate Keyloggerz, Prince of Mali PopUp, and ContactEmailBlast. Which of the following BEST categorizes these programs?
Pirate Keyloggerz is spyware; Prince of Mali PopUp is adware; and ContactEmailBlast is spamware.
Sebastian's boss wants a pro and con list from him detailing some of the impacts of introducing IT to the end of their tea production line, specifically the part where the boxes of tea bags get sorted, put in cartons, and prepared for shipping. This would involve an automated system to sort the boxes, package the boxes into cartons, and send the cartons to the proper shipping areas with computer controls along the way to direct the handling of different products. Of the following pro and con lists, which BEST describes the impact on employees of the IT changes they are considering, and why?
Pro: Replacing manual sorting and packaging with a computer-controlled system would allow the company to utilize workers in wheelchairs to operate the computers. Con: The repetitive task of typing at the control computers would cause repetitive strain industries.
Preston's firm has adopted software that allows vendors to electronically deliver services and programs. This is an example of which support activity in Porter's value chain model?
Procurement
Miranda would like to search her database. She could describe the data she wants but isn't sure she could specifically key in every detail to ensure a thorough search; because of this, Miranda should use _________ to query her database.
QBE
Which of the following is a way to find information in databases by filling out a form describing the data desired?
QBE
Which of the following could Molly's Mart do to safeguard the information of its customers but likely will not do because it is too inconvenient?
Require that PINs be entered with every credit card transaction.
Jenna works for DataProof Inc., a corporation with limited access to personal data on a large number of people in the Midwest. Jenna's main tasks are to keep the information in the database current and to verify sensitive data before adding it. She also makes the data available to those individuals who want to pull up their own information, and reviews permits from third parties who need to review accumulated data. All of these task areas are growing and Jenna's manager suggests that she pick one particular area to focus on which stands out from the rest and also takes up the most time. Which area do you think Jenna's manager should suggest?
Reviewing of the permits from third parties as it is such a sensitive area and needs review of legal work, unlike the rest of the tasks
A guest executive from StopMommy, a domain registrar, gave a presentation to an Introduction to Information Systems class that her friend teaches. During her presentation, she mentioned that a top-level domain is the highest level domain in the hierarchy DNS of the Internet. She also mentioned that the Internet Assigned Numbers Authority operates the Internet Corporation for Assigned Names, which is in charge of maintaining the DNS route zone. She concluded her discussion of Internet addresses by stating that the Internet Protocol address is what distinguishes each computer on the Internet from all the other computers, by leveraging either IPv4 or IPv6. How would you evaluate her presentation?
She was correct in all her statements except when discussing the relationship between IANA and ICANN. ICANN is the organization that operates IANA, and IANA is responsible for maintaining the DNS route zone.
The goal of a large bank hoping to get a 360-view of its customers is to analyze banking transactions through multiple methods (mobile, ATM, in person, online). The database programmers at the bank are trying to decide on whether a hub and spoke approach to the data warehouse architecture would be most effective. What explanation might be offered for the effectiveness of a hub and spoke architecture for handling this problem?
Smaller data marts can provide faster queries for a 360-view of customers.
Wakawaka Corp. has just upgraded to an SDN from its traditional network. What is the MOST LIKELY result of this upgrade?
Software will manage the decisions controlling how network traffic flows across network devices
An example of ____________ pressures is new and improved technologies rapidly creating and supporting substitutes for products, alternative service options, and superb quality.
Technology
Reagan needs to hold a conference call with her team and their biggest client. Reagan's team members need to be able to share their screens with the client. Which of the following should they use?
Telepresence
__________ are/is the latest version of videoconferencing.
Telepresence systems
David is the head administrator for a research site and is responsible for ethical issues and accuracy on the site, its database, and all its pages. What are some of David's main concerns during a normal work week?
That the material is authentic and presented properly to the users, that database errors are not intentional, who is accountable for errors, and how to adequately compensate researchers who receive the wrong information.
Lance has been with his company for many years and has seen the gradual transitions from early office electronics to today's modern IT systems. Regarding the impact of changing technology on the quality of life, which of the following examples BEST illustrates what Lance has witnessed?
The ability to work from home has been an improvement to the quality of life, while being constantly surrounded by work-related technology has been a decline in the quality of life
Jessica is opening a used book store in a university town. She is trying to profile her business to attract customers and is competing with two other used book stores, an independent regular book store and a big chain mass-market book store, in addition to online book stores. Which is the CORRECT analysis of Jessica's product offering according to the competitive forces model?
The bargaining power of buyers is high because of the many options for obtaining books in Jessica's area.
You have been asked to conduct a market analysis on a new product using Porter's competitive forces model. The product is a highly-sensitive plutonium trigger needed in the production of nation-state weapons. Which of the following is an INCORRECT analysis of the product using the competitive forces model?
The bargaining power of buyers is high because plutonium is not a readily-available resource
Through a new online initiative, a local parks and recreation department wishes to put all of its park schedules on the Internet for residents. The data will be accessible through a standard Web browser and downloadable in multiple formats. Why would it be crucial to keep track of the department's master data?
The master data are necessary to determining how well the change works.
Luke works for a big non-profit organization with a traditional enterprise network. Lately the organization has experienced some problems, and Luke gets advice from a friend working for another organization that the non-profit should invest in some SDN technology. What are some of the problems Luke's organization has likely encountered?
The organization's routers and network devices must be configured individually and sometimes manually to implement change.
Which of the following is TRUE about passwords?
They are incredibly vulnerable to attack.
Linda is using process modelling to outline a process, while Ben is trying to support business processes throughout the organization by integrating different initiatives. What is the relationship between Linda's and Ben's work?
They both work to support the structure of the company's BPM.
Which of the following is a characteristic of physical controls?
They can be inconvenient to employees
How are MOOCs helpful to those who lack the ability to pay tuition in order to obtain a college degree?
They offer highly-skilled classes at no cost.
If MagnaCorp's Web site is translated into both English and Spanish, what is the MOST LIKELY result?
They will not reach 80 percent of the Internet's users.
What is the difference between traditional and consultative functions of the MIS department?
Traditional MIS departments manage all systems development and project management, while consultative MIS departments design systems based on end user needs.
Deborah is creating a team in her organization to develop a new business process. She is at the company's headquarters in New York City, the accounting teammate is in London, the production teammate is in Mumbai, and the distribution teammate is in Sao Paolo. Which of the following is TRUE of their team members?
They will probably have to collaborate asynchronously.
In a packet-switching network, what happens to data packets that cannot be delivered when the network is busy?
Those packets are re-routed around the slowdown.
What is the goal of risk management?
To reduce risk to acceptable levels
____________ integrates all forms of communications, such as voice, fax, e-mail, and presence; __________ enables you to know people's location and availability in real time.
UC;presence services
Sarbanes-Oxley was passed in response to ________ behavior in the finance industry.
Unethical
Betty telecommutes to her job, and the main office is located 1,500 miles from her house. Her company deals with highly sensitive information and is paid well by its clients based, in part, on the promise that they secure client information with a number of different measures. Betty needs access to this client information, however, on a daily basis. What should she use to access the company network on which it is stored?
VPN
Monika spent all morning shopping for a new lawn mower online. After she bought her mower, she logged onto Facebook to message a friend. As soon as she logged on, she saw Facebook-generated ads for lawnmowers and the site from which she made her final purchase. This is an example of which characteristic of Big Data?
Velocity
Veronica has scheduled a meeting with her organization's technology department heads as well as their top technology vendors. The department heads have requested a face-to-face meeting; however, the vendors are located over 1000 miles away and cannot meet in person. Because of these needs, Veronica should set up a________ meeting.
Videoconference
You are a security analyst for a large corporation in Houston, Texas. Your manager asks you to create an informative brochure that details remote attacks in order to send it to all of the corporation's employees. Which of the following collections of topics should you include in the brochure?
Viruses, phishing attacks, and denial-of-service attacks
Rhonda works for the IRS and is in charge of record keeping and privacy issues. Recent events at her particular branch have prompted her to commence an internal audit on how personal information is handled. What are the MOST pertinent questions for Rhonda to ask employees who work with personal information in databases?
Where are the records, and are they accurate? How do you change inaccurate data, and how is the data used? How secure is the data against unauthorized people?
Transborder data flow asks which question?
Which country's laws should be followed?
Pretend for a moment that there is a special ethics jury sitting in on traffic court along with a normal jury. The case is that Suzanne has rear ended another car while driving and texting. She is determined accountable for the accident and liable in a tort law case by the normal jury. She needs to cover the costs of the whiplash injury the other driver suffers. After this is determined, Suzanne goes to dinner with her friends and spends the whole evening analyzing the accident from a point of view of her own personal innocence. Being part of the ethics jury, you are, of course, privy to all these details, how would you conclude the ethical verdict of Suzanne's situation?
While Suzanne has been made accountable and liable for the accident, she has not accepted responsibility for it.
Your CISO is taking an online information security awareness survey and is stumped. He has asked you to help categorize the following types of software for him into clandestine-type software categories. The survey displayed the names of the software as XYZ Keyloggerz, Niagara PopUp Marketing Toolbar, and Blitz.Your.Friends.Emails. Which of the following is the BEST category listing for these software programs?
XYZ is spyware; Niagara is adware; and Blitz is spamware
When Lena created an information system for handling process performance, she was asked by the client to specifically add an element of process performance monitoring around shipments to clients overseas. Lena's IS ended up covering information about shipment methods, comparisons of shipments to a specific standard, reminders to employees on deadlines for shipments, transaction tasks, active requisitions, and invoices. Would you conclude that there is a component in Lena's IS that covers process performance monitoring? Why?
Yes, the comparison of shipments to a specific standard covers process performance monitoring.
Mike Firestone made a presentation to a bank board about the primary activities of his business according to Porter's value chain model. He laid out details of his operations, especially in manufacturing and quality control; his marketing and sales around promotion and sales analyses; information on logistics, including finished goods and raw materials control; and finally, details about product and process design, including engineering, research, and development. The board appreciated his detail but commented that one of the facets of his value chain model is not a primary activity to his business. Were they correct? If so, which facet is incorrect, and why?
Yes, they were correct; product and process design is a support activity of the overall business
Deborah Harkin was evaluating strategies for competitive advantage to focus on with her newly-created cyber security firm. In analyzing her new partners' strengths at the firm, she decided, as productive and efficient as they are, she would hone in on those skills and compete with a strategy of operational effectiveness. Is this the correct approach for her to take, and why?
Yes. Competing with an operational effectiveness strategy focuses on performing activities more efficiently and with higher productivity than others in the same market space.
Derek, who works for a big gaming site, has created an opt-out model for customers in regards to sharing their private information since the company wants to give customers a say when it comes to guidelines for privacy. Veronica, an avid gamer and active member of the site, informs Derek that she does not want her game preferences to be collected. Must Derek honor this?
Yes. It is the site's own rule that a customer must actively express a request for the data to not be collected.
Pastor Jim and his community were very fond of the gazebo they had on the church grounds; it served as a social spot during many gatherings across the year. A young member of Jim's congregation, Adam, age 17, became involved in a drunk driving case where he crashed his car into the gazebo and totaled it. Nobody was hurt, and the church received some insurance money which will cover some damage repairs and materials. Pastor Jim decides not to press charges. He suggests that Adam help build a new gazebo and puts Adam in charge of the fundraiser to get the full amount to build it. Would you say that Pastor Jim's approach is a valid ethical solution to a problem?
Yes. Pastor Jim is engaging the whole community and making Adam part of the process of rebuilding in an effort to make a traumatic experience meaningful to a larger group
Roger has seen a big drop in his brokerage business. Few people stop by in person, and even phone calls have noticeably decreased. A business analyst he hired to examine the demand for stock trading services in his community said he had found the problem: technology advances - specifically, software that lets people trade via on-line systems - had disrupted the person-to-person brokerage industry. Is the analyst correct, and why?
Yes. The person-to-person brokerage business has been severely disrupted by financial transaction software designed for popular use.
A print film manufacturer of Kodachrome has seen demand for the print film decline almost to zero. Only a few shops in Europe need the product currently. He hired a business analyst to look over the market demands and the print film segment as a whole. The analyst came into the office at the end of the day and declared that he found the problem: the print film industry has been disrupted by advances in technology and software that include digital cameras and websites that print pictures at home. Is the analyst correct, and why?
Yes. The print film industry has been severely disrupted by advances in digital photography and the Internet
Andrea Rogers, your manager, has vowed to make information systems security more of a priority. She has recently asked you to develop a brief for her that details how many social security numbers and other sensitive employee information could be exposed if your systems were infiltrated by hackers who were able to collect all of this sensitive information. Which brief should you prepare for her, and why?
You should prepare an exposure brief because it details the amount of loss or the damage that could occur if a system is compromised.
When visiting a Web site such as Amazon, you are usually greeted by name if you have a profile there. You can have customized wish lists, recommendations, cheap deals and freebies, various ways of paying, and several shipment methods. It is also connected to numerous other sites where product variety expands even more. What type of market implementation would you say that Amazon is mostly relying on?
a customer-focused system, with specific processes aimed at customer satisfaction by using algorithms that follow customer tastes and focus on customer service
Hoping to gain a Fortune 500 client in its portfolio, a consulting firm is sending you to give a presentation on support activities within the healthcare sector. Of the four following presentations, which would be BEST suited for this company?
a presentation surrounding product and technology development, product and process design, computer-aided design, and computer-aided design systems
Malcom is on call at the systems help desk today. He receives a call from someone who says they are in the sales department and their password is not granting them access to the system. The person on the phone asks Malcom to please give them a working password so that they can finish updating client files before a big conference next week. It is likely that this is
a social engineering attack.
The compliance department, usually attached to IT, was tasked by a business to address social responsibility within the business. In planning for avenues within social responsibility, compliance drew up a plan to manage facilities design and management; to obtain the LEED certification; to become carbon neutral; to become familiar with environmental laws for corporate sustainability and global citizenship; and finally, to create an adherence avenue under the USA Patriot Act for social responsibility in the global war on terror. Although the plan was lauded for its lofty goals, the business's stakeholders said one of these factors is not a component of social responsibility. To which one are they referring, and why?
adherence to the USA Patriot Act, since it is a component of compliance with government regulations
A food products firm has purchased several small specialty food companies, and it needs to integrate those companies into the firm. This will involve integrating supply chains and distribution channels, as well as merging personnel, payroll, benefits, and other critical systems. There are numerous IS products on the market designed to handle the details of business mergers and acquisitions. The firm needs to start by purchasing an information system that will aid in choosing a subsequent integration system to determine how the companies purchased will impact overall revenues, expenses, and operations. What are the firm's BEST choices, and why?
an enterprise resource planning system to integrate comprehensive business functions, and a decision support system to provide access to analysis and data in "what-if" scenarios
A solar energy company has acquired a portfolio of several dozen wind farms. It needs to integrate different functions within the organization including payroll, power generation, and energy prices, in addition to human resources and other critical functions. There are several organizational information system products to handle this, but the company must choose which information system to purchase for this integration. The company also needs an information system that will help determine how budgets, revenues, and operational interruptions are affected by changes in the competitive environment. Decide which two systems you would choose and why.
an enterprise resource planning system to integrate comprehensive business functions, and a decision support system to provide access to analysis and data in "what-if" scenarios
You have been tasked with designing a transactional-based information system. Which of the following should you include in this system?
capturing and storing process data that is collected automatically by the IS, as well as through RFID tags and barcodes
A defining characteristic of the ________ approach is the emphasis on conditions that are important to the welfare of everyone.
common good
A __________ is a pathway used to communicate data from one location to another
communications channel
When a person studies the Web sites and press releases of other companies, attends trade shows, and does similar work, he or she is participating in
competitive intelligence.
Jensen works for a big Web site that uses tags, a blog, a podcast, videos, and many other Web methods. What type of problems would Jensen need to tackle because of these factors?
data management problems
Which are examples of traditional enterprise data? Select all that apply.
customer information , e-commerce transactions, general ledger data
BarkemBooks has enlisted the services of a data aggregator in order to know its customers more personally in a process called
customer intimacy.
When a business considers how it aligns business processes to fulfill customers' needs, what is it measuring?
customer satisfaction
Carlos works with a group of people who use computer networks to target known software security weaknesses. This group is participating in
cybercrime
Alec gets fired from Netflix, and Alicia gets hired in his place. For Netflix, this leads to
data degradation.
Veronica's information is part of a relational database; people are listed as EMPLOYEES in this database. Examples of these employee are Veronica, the CEO; Betty, in HR; and Archie, the "IT guy". The database also has listed each employee's ID number, salary, vacation days, and department. Which of the following represents an attribute in this database?
employee ID number
Gregory has just gained membership in the Association of Skilled Machinist Workers. As part of his membership packet, he receives a handbook that includes a code of _________ intended to help him make appropriate decisions
ethics
Jameson wants to implement a client/server processing element to his organization. Because he wants to be sure that the clients on his network can still run local programs should the network servers go down, he needs to be sure that the clients are______
fat
When Justin creates clickstream data, he
follows various links on Web sites.
An individual being able to connect around the world anytime and anywhere for competition and collaboration is an example of
globalization
Lukas is a young market expert with a focus on the contemporary business climate. He is asked to do a TED talk about this subject and chooses to center his talk on business environment pressures with a focus on market pressures. Lukas should include in his talk
globalization, the changing workforce, and powerful customers.
A city in the Pacific Northwest has hundreds of sensors along a natural fault line. These sensors are part of an early detection and warning system, and they are constantly recording and storing seismic data for analysis. The sensor data are then used to predict the likelihood of an earthquake occurring at any given moment, how powerful the earthquake(s) will be, and the epicenter within a 15-mile radius. What kind of Big Data usage is this an example of?
government operation
It is paramount to understand that what is unethical is not necessarily
illegal.
Privacy rights apply to
individuals, groups, and institutions
An individual's right of privacy is ________ to the public's right to know
inferior
Tacit knowledge, as opposed to explicit knowledge, deals more with
insights
Randall is the highest-grossing salesperson in his organization. He is currently writing down tips on how he has been able to secure and manage large accounts. His company plans to use this information to help train new sales employees via training sessions stored in the corporate intranet. This is an example of
integrating tacit and explicit knowledge into a KMS
An __________ supports communication within an organization, while an __________ connects parts of different organizations.
intranet; extranet
Walmart shopping cart robots CANNOT (either in reality or potentially)
load the customers car after the purchase and drive back to the store.
Which is a potential NEGATIVE impact of IT on the non-managerial workers in an organization?
loss of identity choice
Kirsten is offered the task of being a business process overseer in her organization. She is inexperienced and a little daunted by the sheer number of BPI projects and employees she needs to keep track of. A more experienced coworker advises her to
make a graphical description of all the steps in the process with the help of process modelling software in order to understand the people, dependencies, interactions, and tasks better within a BPM setting
Companies transform data in order to
make the data more useful.
What type of data is Bradley working on if he is analyzing account data?
master data
Data integrity deals with
meeting system constraints with the data.
Which has been a MAJOR improvement in healthcare delivery because of IT?
monitoring critically ill patients
The _________ model of informed consent allows companies to collect customer information until told otherwise, while the ________ model of informed consent allows companies to collect consumer information when explicitly authorized.
opt-out; opt-in
What feature of unified communication allows users to locate each other when communicating?
presence services
Carrie is responsible for making sure that her company has the needed materials from external vendors. She is in charge of the
procurement process
Relational databases are based on what type of structure?
related tables
Accepting the results of one's own actions and behavior is being
responsible
The ________ approach is used by companies that believe they have an obligation to protect the moral liberties of their customers, while the ________ approach is used by companies that believe in the importance of the interlocking relationships that underlie all societies.
rights; common good
Jessica has taken her kids to story time at the local library. While there, she notices another mother using her laptop to sign in to her company's intranet over the library's Wi-Fi. Jessica is close enough that she can see both the woman's username and password. She writes this information down just in case she needs it later. What is this an example of?
shoulder surfing
Darryl's company has instituted a new technology to interface with customers on wired and mobile platforms with the end goal of improving process execution. What is his company using?
social BPM
Privacy must be balanced against the needs of
society
Janet Seymour works for an existing major software company handling on-site video storage for movie production companies. Which type of industry disruptor should she be most concerned about, and why?
software industry disruptive technologies because cloud products and other SaaS products threaten her on-site storage systems
Dirk Miller creates databases for PC-based video games and has been doing this for 10 years. If he is worried about disruptive technologies, which type of industry disruptor should he be MOST concerned about and why?
software industry disruptive technologies because cloud products and other SaaS products threaten his PC-based database
Which of the following is MOST LIKELY a benefit of telecommuting for employees?
stress levels
When customers have limited choices, there is little bargaining power with
suppliers.
The utilitarian approach stresses that to take the most ethical action, one must consider
the action that does the most good and the least harm.
What does OLAP involve?
the analysis of accumulated data by users
One of the reasons that alignment in organizations is difficult to achieve is because
the business and IT departments know little of each other's expertise
The fact that many Web sites on the Internet contain anonymous and derogatory information on individuals who have little recourse in the matter is an example of ________ in technology.
the conflict between free speech and privacy
Fund for Care, a large nonprofit organization, was holding a meeting on social responsibility, and the speakers addressed topics such as sustainable work environments, carbon management, corporate philanthropy, the digital divide, and privacy invasion. During the after-evaluation of the event, everybody agreed that most speakers had been interesting and on-topic but that one expert had seemed out of place for the theme of the meeting. To which speaker are they referring, and why?
the speaker on privacy invasion, since it is an ethics topic
Why is being an informed IT user important?
to enhance the quality of IT applications
What is the main aim of business process management for a company
to improve profitability by decreasing costs and increasing revenue
The business plan that Edward just wrote for his new company is an example of a ________.
trade secret
Which type of system would collect and analyze data from all business operations?
transaction processing system
Your firm's in-house attempt to implement a Big Data system was an abject failure. As the new project manager, you realize that the firm probably needs to use an externally provided system. To convince the firm of that, your presentation needs to use the three characteristics of Big Data to show why the in-house effort failed. Which of the following points would you need to include in your presentation?
volume, the extreme quantities of machine-generated and other data; velocity, the ever-increasing rate at which data flows into and out of the Big Data system; and variety, the widely different types of data formats that Big Data systems use
Historical data are stored in a data _____________.
warehouse.
Compared to a virus, a _________ spreads by itself without another program.
worm