IS 301 Midterm
How much is one million seconds?
11.32 days
Which of the following is the best description of a protocol in a telecommunications network architecture?
A standard set of rules and procedures for control of communications in a network
There are four broad phases involved in security practice. Phase one involves identifying ____ , Phase 2 is about determining ____ ; phase three is about assessing ____ ; finally _____ are put in place to safeguard those things which have value to the organization.
Assets, Threats, Vulnerabilities, Protective Measures
All of the following are physical components of an RFID system except:
Bar codes
Which of the following statements is correct of business processes?
Business processes are repeatable.
Which of the following types of system would you use to manage relationships with your customers?
CRM
Which of the following models uses a general view of the firm, its competitors, and the firm's environment to understand competitive advantage?
Competitive forces model
CIA is used to describe security principles used to safeguard against threats. The acronym stands for C , I , and A .
Confidentiality, Integrity, Availability
Match the activities to the part of a bicycle to part of a system they best represent. Brakes on a bicycle
Control
Which of the following refers to all of the methods, policies, and organizational procedures that ensure the safety of the organization's assets, the accuracy and reliability of its accounting records, and operational adherence to management standards?
Controls
Using numerous computers to inundate and overwhelm the network from numerous launch points is called a(n) ________ attack.
DDoS
Which of the following systems is especially suited to situations in which the procedure for arriving at a solution may not be fully predefined in advance?
DSS
Which of the following types of systems typically use a digital dashboard to display an array of charts and graphs of a business's key performance indicators?
DSS
Which of the following correctly describes the difference between data and information?
Data are generally raw facts, while information has been shaped in some way to make it useful.
Which of the following is not one of the principal management challenges in developing global systems?
Defining an acceptable test plan
A(n) ________ signal is a discrete, binary waveform that transmits data coded into two discrete states: 1-bits and 0-bits.
Digital
Which of the following adjusts copyright laws to the Internet age by making it illegal to circumvent technology-based protections of copyrighted materials?
Digital Millennium Copyright Act
Which of the following would not be considered a disruptive technology?
According to the Net Enabled business Innovation Cycle (NEBIC), ____ Technologies lead to ____ Opportunities that spur growth through Business ___ creating ___ Value.
Enabling, Economic, Innovation, Customer
Match the TCP/IP Communication model layer to the corresponding function. Transport
End to end addressing/packetizing
Match the TCP/IP Communication model layer to the corresponding function. Data link
Error control and media access control
A modem is used to create greater efficiency on a telecommunications circuit by dividing the circuit using frequency or time division techniques.
False
An SCM is considered to be an intraorganizational system because it automates the flow of information across organizational boundaries.
False
Cellular communications has evolved from 1G to 2G, 2,5G and so on to the current version 5G. The 'G' in the evolutionary versions stands for 'GigaHertz'
False
Due process is a feature of political systems and allows individuals to recover damages done to them by others.
False
Effectiveness is typically a measurement of inputs over outputs and includes metrics such as throughput, transaction speed, and system availability.
False
Effectiveness metrics usually are some measure of inputs compared to outputs such as time (faster), cost (cheaper) or performance (better).
False
Globality refers to the practice of creating a global brand around a local product or service
False
Identifying the stakeholders—people who have a vested interest in the outcome of the decision—is the last step in analyzing an ethical issue.
False
Most IoT sensor devices support sophisticated security approaches.
False
Redesigning processes from the bottom-up is usually a better approach than top-down.
False
Smartphones are not vulnerable to malicious software or penetration from outsiders.
False
Software can never be considered to be a trade secret.
False
Systems only exist within the context of information technology.
False
The Internet was originally conceived for military purposes to avert "first strike capabilities" by building a communication network during the cold war.
False
The first real mechanism for communication over distance was the telephone, invented in 1876 by Alexander Graham Bell.
False
The terms Internet and World Wide Web are used interchangeably because they are essentially the same
False
Today, knowledge, education, science, and industrial skills are highly concentrated in North America, Western Europe, and Japan.
False
Using the GIGO method (garbage in, garbage out) for evaluating and reengineering business processes usually results in better and more efficient business processes.
False
Match the activities to the part of a bicycle to part of a system they best represent. There's a tree in the way.
Feedback
Which of the following statements about disruptive technologies is not true?
Firms that invent disruptive technologies as first movers always become market leaders.
Which of the following is an example of a cross-functional business process?
Fulfilling a customer order
Provides location information for display on a multidimensional map
GIS
A satellite-based navigation system providing extremely accurate position, time, and speed information
GPS
Which of the following is not a specific business factor in the global environment?
Global communication and transportation technologies
Match the concept or idea to the person associated with it. Computer processing power will double every 18 months
Gordon Moore
Match the following ethical principles to its corresponding description. Select actions that achieve the best result for the most number of people
Greatest good/Least Harm
Which of the following is not one of the six strategic business objectives that businesses are seeking to achieve when they invest in information systems?
Improved community relations
Which of the following is not one of the current key technology trends that raises ethical issues?
Increase in data quality
Which of the following is not a common goal of information technology?
Increase the ability of functional units to operate independently
Match the activities to the part of a bicycle to part of a system they best represent. Pedal.
Input
Which of the following best describes the effect that new information technology has on society?
It has a ripple effect, raising new ethical, social, and political issues.
Match the concept or idea to the person associated with it. A high-end user's connection speed grows by 50% per year.
Jakob Nielsen
A colleague at work takes small amounts of office supplies for her own personal use, saying that this is a tiny loss to the company. You tell her that if everyone were to take office supplies, then the loss would no longer be minimal. Your rationale expresses which of the following ethical principles?
Kant's Categorical Imperative
Match the following ethical principles to its corresponding description. If its not good for everyone, its not good for anyone.
Kant's Categorical Imperative
Applications that use spatial information to provide a service
LBS
Match the following ethical principles to its corresponding description. Individuals improve or modify an aspect of their behavior in response to their awareness of being observed
Light of Day
Amazon's use of the Internet as a platform to enhance customer convenience illustrates which of the following strategies?
Low-cost leadership
Match the concept or idea to the person associated with it. Mosaic browser
Marc Andreesen
Match the TCP/IP Communication model layer to the corresponding function. Application
Messaging
Which of the following is a data analysis technology that finds obscure connections between data in disparate sources?
NORA
All of the following are IT-enabled products and services providing competitive advantage except:
Nike's use of celebrities to market their products.
Match the following ethical principles to its corresponding description. If something created by someone else is useful to you, the creator should be compensated
No Free Lunch
Match the TCP/IP Communication model layer to the corresponding function. Network
Node to node
Match the activities to the part of a bicycle to part of a system they best represent. Motion
Output
According to course notes, which of following is NOT unique to Gen Zs?
Prefer Netflix over a night at the bar with friends
Match the activities to the part of a bicycle to part of a system they best represent. engage the gears
Process
Use tiny tags with microchips containing data about an item and location
RFID
An analysis of an information system that rates the likelihood of a security incident occurring and its cost would be included in which of the following?
Risk assessment
Match the concept or idea to the person associated with it. The power of the network is equal to the number of nodes squared
Robert Metcalfe
Which of the following refers to policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems?
Security
Match the following ethical principles to its corresponding description. Be careful starting down a path because once you start you may not be able to stop.
Slippery Slope
Which of the following industries has the lowest barrier to entry?
Small retailer
Which of the following statements about collaboration is not true?
Successful collaboration can be achieved through technology regardless of the organization's culture or structure.
In which method of encryption is a single encryption key sent to the receiver so both sender and receiver share the same key?
Symmetric key encryption
Which of the following would be considered a 'System'? What would be considered a 'Technology'? Netflix
System
Which of the following would be considered a 'System'? What would be considered a 'Technology'? Uber
System
A(n) ________ is typically a major source of data for other systems.
TPS
Which of the following would be considered a 'System'? What would be considered a 'Technology'? Database
Technology
Which of the following would be considered a 'System'? What would be considered a 'Technology'? Smartphone
Technology
Which of the following would be considered a 'System'? What would be considered a 'Technology'? Spreadsheet
Technology
Match the following ethical principles to its corresponding description. Do unto others as you would have them do unto you.
The Golden Rule
What is the first thing you should consider when thinking about building an international information system?
The global environment where your business will operate and the business drivers for your firm and industry
Which of the following best describes how new information systems can result in legal gray areas?
They result in new situations that are not covered by old laws.
Match the TCP/IP Communication model layer to the corresponding function. Physical
Transmission
A TPS is an information system that keeps track of all of the daily routine transactions of a business
True
A firewall is a combination of hardware and software that controls the flow of incoming and outgoing network traffic.
True
Application proxy filtering examines the application content of packets.
True
Biometric authentication uses systems that read and interpret individual human traits.
True
Cisco co-founder Len Bosack is credited with saying "The Internet changes nothing." It follows that he probably also believes that technology doesn't solve problems.
True
Digital Darwinism implies that organizations which cannot adapt to the new demands placed on them for surviving in the information age are doomed to extinction.
True
Disruptive technologies are substitute products that perform as well as or better than anything currently produced.
True
Ethics describes the principles of right and wrong that can be used by individuals to make choices to guide their behavior.
True
Given a finite number of radio frequencies available, frequency reuse is employed to improve the overall efficiency the cellular network
True
Global firms can collaborate from different locations at the same time using synchronous collaboration tools.
True
Information technology (IT) consists of all hardware and software that a firm needs to use in order to achieve its business objectives.
True
Location Based services (LBS) can be used by telecommunications providers to "push" advertisements to your phone based on where you are.
True
Managers can use DSS to make decisions about problems that are unusual and not easily specified in advance.
True
Most Internet businesses do very little to protect the privacy of their customers.
True
Network bandwidth is a measure of a medium's capacity to transport data.
True
Phishing is a form of spoofing.
True
Processes can be assets or liabilities for an organization.
True
Routine violations of individual privacy are made easier by advances in data storage.
True
Routines are also called standard operating procedures.
True
Sniffers enable hackers to steal proprietary information from anywhere on a network, including email messages, company files, and confidential reports.
True
Social networking and group projects are part of the organizational structure that can improved using information systems
True
Some experts believe that exposure to computers reduces intelligence and cognitive abilities.
True
Symmetric encryption uses one key.
True
The Web and online travel reservations have disrupted the travel industry.
True
The coronavirus pandemic has called into question the dependence on global supply chains where sourcing is concentrated in a single country.
True
The growth of powerful communications technologies and the emergence of world cultures create the condition for global markets.
True
The long-tail effect can be used to explain the potential market for a product or service.
True
The ultimate goal of AI is the ability to build a system that can mimic human intelligence
True
Which of the following is the single greatest cause of network security breaches?
Users
Match the following ethical principles to its corresponding description. Take the action that achieves the higher or greater value
Utilitarian Principle
Descriptive
What happened?
Prescriptive
What should we do?
Diagnostic
Why did it happen?
The 802.11 set of standards is known as:
Wi-Fi
Early on in the evolution of cellular phones manufacturers competed on ____ (what the look like) mostly because these handsets were really only designed to access underlying telecommunications infrastructures. Later in the evolution as uses for the handsets converged and became more integrated, the companies are competing more on ____ (what they can do) to differentiate their products.
aesthetic, functionality
All of the following are steps in the process for analyzing an ethical issue except:
assigning responsibility.
The interaction between information technology and organizations is influenced:
by many factors, including structure, politics, culture, and environment.
All of the following are new technology-related trends in MIS except:
co-creation of business value.
New levels of global coordination of all of the major business functions permit the location of business activity according to:
comparative advantage
Bandwidth is the:
difference between the highest and lowest frequencies that can be accommodated on a single channel.
All of the following are competitive forces in Porter's model except:
disruptive technologies.
A firewall allows the organization to:
enforce a security policy on data exchanged between its network and the Internet.
When hackers gain access to a database containing your personal private information, this is an example of:
identity theft
The term management information systems refers to a specific category of information systems serving:
middle management functions.
When a cookie is created during a website visit, it is stored:
on the hard drive of the visitor's computer.
Which of the following would be an example of a strategic objective fulfilled by an information system?
trying to achieve a competitive advantage through analysis of big data, using technology to create new products and improve existing ones, using technology to comply with new government regulations
A wiki is a type of collaborative:
website
Predictive
what will happen next?