IS 301 Midterm

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

How much is one million seconds?

11.32 days

Which of the following is the best description of a protocol in a telecommunications network architecture?

A standard set of rules and procedures for control of communications in a network

There are four broad phases involved in security practice. Phase one involves identifying ____ , Phase 2 is about determining ____ ; phase three is about assessing ____ ; finally _____ are put in place to safeguard those things which have value to the organization.

Assets, Threats, Vulnerabilities, Protective Measures

All of the following are physical components of an RFID system except:

Bar codes

Which of the following statements is correct of business processes?

Business processes are repeatable.

Which of the following types of system would you use to manage relationships with your customers?

CRM

Which of the following models uses a general view of the firm, its competitors, and the firm's environment to understand competitive advantage?

Competitive forces model

CIA is used to describe security principles used to safeguard against threats. The acronym stands for C , I , and A .

Confidentiality, Integrity, Availability

Match the activities to the part of a bicycle to part of a system they best represent. Brakes on a bicycle

Control

Which of the following refers to all of the methods, policies, and organizational procedures that ensure the safety of the organization's assets, the accuracy and reliability of its accounting records, and operational adherence to management standards?

Controls

Using numerous computers to inundate and overwhelm the network from numerous launch points is called a(n) ________ attack.

DDoS

Which of the following systems is especially suited to situations in which the procedure for arriving at a solution may not be fully predefined in advance?

DSS

Which of the following types of systems typically use a digital dashboard to display an array of charts and graphs of a business's key performance indicators?

DSS

Which of the following correctly describes the difference between data and information?

Data are generally raw facts, while information has been shaped in some way to make it useful.

Which of the following is not one of the principal management challenges in developing global systems?

Defining an acceptable test plan

A(n) ________ signal is a discrete, binary waveform that transmits data coded into two discrete states: 1-bits and 0-bits.

Digital

Which of the following adjusts copyright laws to the Internet age by making it illegal to circumvent technology-based protections of copyrighted materials?

Digital Millennium Copyright Act

Which of the following would not be considered a disruptive technology?

Email

According to the Net Enabled business Innovation Cycle (NEBIC), ____ Technologies lead to ____ Opportunities that spur growth through Business ___ creating ___ Value.

Enabling, Economic, Innovation, Customer

Match the TCP/IP Communication model layer to the corresponding function. Transport

End to end addressing/packetizing

Match the TCP/IP Communication model layer to the corresponding function. Data link

Error control and media access control

A modem is used to create greater efficiency on a telecommunications circuit by dividing the circuit using frequency or time division techniques.

False

An SCM is considered to be an intraorganizational system because it automates the flow of information across organizational boundaries.

False

Cellular communications has evolved from 1G to 2G, 2,5G and so on to the current version 5G. The 'G' in the evolutionary versions stands for 'GigaHertz'

False

Due process is a feature of political systems and allows individuals to recover damages done to them by others.

False

Effectiveness is typically a measurement of inputs over outputs and includes metrics such as throughput, transaction speed, and system availability.

False

Effectiveness metrics usually are some measure of inputs compared to outputs such as time (faster), cost (cheaper) or performance (better).

False

Globality refers to the practice of creating a global brand around a local product or service

False

Identifying the stakeholders—people who have a vested interest in the outcome of the decision—is the last step in analyzing an ethical issue.

False

Most IoT sensor devices support sophisticated security approaches.

False

Redesigning processes from the bottom-up is usually a better approach than top-down.

False

Smartphones are not vulnerable to malicious software or penetration from outsiders.

False

Software can never be considered to be a trade secret.

False

Systems only exist within the context of information technology.

False

The Internet was originally conceived for military purposes to avert "first strike capabilities" by building a communication network during the cold war.

False

The first real mechanism for communication over distance was the telephone, invented in 1876 by Alexander Graham Bell.

False

The terms Internet and World Wide Web are used interchangeably because they are essentially the same

False

Today, knowledge, education, science, and industrial skills are highly concentrated in North America, Western Europe, and Japan.

False

Using the GIGO method (garbage in, garbage out) for evaluating and reengineering business processes usually results in better and more efficient business processes.

False

Match the activities to the part of a bicycle to part of a system they best represent. There's a tree in the way.

Feedback

Which of the following statements about disruptive technologies is not true?

Firms that invent disruptive technologies as first movers always become market leaders.

Which of the following is an example of a cross-functional business process?

Fulfilling a customer order

Provides location information for display on a multidimensional map

GIS

A satellite-based navigation system providing extremely accurate position, time, and speed information

GPS

Which of the following is not a specific business factor in the global environment?

Global communication and transportation technologies

Match the concept or idea to the person associated with it. Computer processing power will double every 18 months

Gordon Moore

Match the following ethical principles to its corresponding description. Select actions that achieve the best result for the most number of people

Greatest good/Least Harm

Which of the following is not one of the six strategic business objectives that businesses are seeking to achieve when they invest in information systems?

Improved community relations

Which of the following is not one of the current key technology trends that raises ethical issues?

Increase in data quality

Which of the following is not a common goal of information technology?

Increase the ability of functional units to operate independently

Match the activities to the part of a bicycle to part of a system they best represent. Pedal.

Input

Which of the following best describes the effect that new information technology has on society?

It has a ripple effect, raising new ethical, social, and political issues.

Match the concept or idea to the person associated with it. A high-end user's connection speed grows by 50% per year.

Jakob Nielsen

A colleague at work takes small amounts of office supplies for her own personal use, saying that this is a tiny loss to the company. You tell her that if everyone were to take office supplies, then the loss would no longer be minimal. Your rationale expresses which of the following ethical principles?

Kant's Categorical Imperative

Match the following ethical principles to its corresponding description. If its not good for everyone, its not good for anyone.

Kant's Categorical Imperative

Applications that use spatial information to provide a service

LBS

Match the following ethical principles to its corresponding description. Individuals improve or modify an aspect of their behavior in response to their awareness of being observed

Light of Day

Amazon's use of the Internet as a platform to enhance customer convenience illustrates which of the following strategies?

Low-cost leadership

Match the concept or idea to the person associated with it. Mosaic browser

Marc Andreesen

Match the TCP/IP Communication model layer to the corresponding function. Application

Messaging

Which of the following is a data analysis technology that finds obscure connections between data in disparate sources?

NORA

All of the following are IT-enabled products and services providing competitive advantage except:

Nike's use of celebrities to market their products.

Match the following ethical principles to its corresponding description. If something created by someone else is useful to you, the creator should be compensated

No Free Lunch

Match the TCP/IP Communication model layer to the corresponding function. Network

Node to node

Match the activities to the part of a bicycle to part of a system they best represent. Motion

Output

According to course notes, which of following is NOT unique to Gen Zs?

Prefer Netflix over a night at the bar with friends

Match the activities to the part of a bicycle to part of a system they best represent. engage the gears

Process

Use tiny tags with microchips containing data about an item and location

RFID

An analysis of an information system that rates the likelihood of a security incident occurring and its cost would be included in which of the following?

Risk assessment

Match the concept or idea to the person associated with it. The power of the network is equal to the number of nodes squared

Robert Metcalfe

Which of the following refers to policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems?

Security

Match the following ethical principles to its corresponding description. Be careful starting down a path because once you start you may not be able to stop.

Slippery Slope

Which of the following industries has the lowest barrier to entry?

Small retailer

Which of the following statements about collaboration is not true?

Successful collaboration can be achieved through technology regardless of the organization's culture or structure.

In which method of encryption is a single encryption key sent to the receiver so both sender and receiver share the same key?

Symmetric key encryption

Which of the following would be considered a 'System'? What would be considered a 'Technology'? Netflix

System

Which of the following would be considered a 'System'? What would be considered a 'Technology'? Uber

System

A(n) ________ is typically a major source of data for other systems.

TPS

Which of the following would be considered a 'System'? What would be considered a 'Technology'? Database

Technology

Which of the following would be considered a 'System'? What would be considered a 'Technology'? Smartphone

Technology

Which of the following would be considered a 'System'? What would be considered a 'Technology'? Spreadsheet

Technology

Match the following ethical principles to its corresponding description. Do unto others as you would have them do unto you.

The Golden Rule

What is the first thing you should consider when thinking about building an international information system?

The global environment where your business will operate and the business drivers for your firm and industry

Which of the following best describes how new information systems can result in legal gray areas?

They result in new situations that are not covered by old laws.

Match the TCP/IP Communication model layer to the corresponding function. Physical

Transmission

A TPS is an information system that keeps track of all of the daily routine transactions of a business

True

A firewall is a combination of hardware and software that controls the flow of incoming and outgoing network traffic.

True

Application proxy filtering examines the application content of packets.

True

Biometric authentication uses systems that read and interpret individual human traits.

True

Cisco co-founder Len Bosack is credited with saying "The Internet changes nothing." It follows that he probably also believes that technology doesn't solve problems.

True

Digital Darwinism implies that organizations which cannot adapt to the new demands placed on them for surviving in the information age are doomed to extinction.

True

Disruptive technologies are substitute products that perform as well as or better than anything currently produced.

True

Ethics describes the principles of right and wrong that can be used by individuals to make choices to guide their behavior.

True

Given a finite number of radio frequencies available, frequency reuse is employed to improve the overall efficiency the cellular network

True

Global firms can collaborate from different locations at the same time using synchronous collaboration tools.

True

Information technology (IT) consists of all hardware and software that a firm needs to use in order to achieve its business objectives.

True

Location Based services (LBS) can be used by telecommunications providers to "push" advertisements to your phone based on where you are.

True

Managers can use DSS to make decisions about problems that are unusual and not easily specified in advance.

True

Most Internet businesses do very little to protect the privacy of their customers.

True

Network bandwidth is a measure of a medium's capacity to transport data.

True

Phishing is a form of spoofing.

True

Processes can be assets or liabilities for an organization.

True

Routine violations of individual privacy are made easier by advances in data storage.

True

Routines are also called standard operating procedures.

True

Sniffers enable hackers to steal proprietary information from anywhere on a network, including email messages, company files, and confidential reports.

True

Social networking and group projects are part of the organizational structure that can improved using information systems

True

Some experts believe that exposure to computers reduces intelligence and cognitive abilities.

True

Symmetric encryption uses one key.

True

The Web and online travel reservations have disrupted the travel industry.

True

The coronavirus pandemic has called into question the dependence on global supply chains where sourcing is concentrated in a single country.

True

The growth of powerful communications technologies and the emergence of world cultures create the condition for global markets.

True

The long-tail effect can be used to explain the potential market for a product or service.

True

The ultimate goal of AI is the ability to build a system that can mimic human intelligence

True

Which of the following is the single greatest cause of network security breaches?

Users

Match the following ethical principles to its corresponding description. Take the action that achieves the higher or greater value

Utilitarian Principle

Descriptive

What happened?

Prescriptive

What should we do?

Diagnostic

Why did it happen?

The 802.11 set of standards is known as:

Wi-Fi

Early on in the evolution of cellular phones manufacturers competed on ____ (what the look like) mostly because these handsets were really only designed to access underlying telecommunications infrastructures. Later in the evolution as uses for the handsets converged and became more integrated, the companies are competing more on ____ (what they can do) to differentiate their products.

aesthetic, functionality

All of the following are steps in the process for analyzing an ethical issue except:

assigning responsibility.

The interaction between information technology and organizations is influenced:

by many factors, including structure, politics, culture, and environment.

All of the following are new technology-related trends in MIS except:

co-creation of business value.

New levels of global coordination of all of the major business functions permit the location of business activity according to:

comparative advantage

Bandwidth is the:

difference between the highest and lowest frequencies that can be accommodated on a single channel.

All of the following are competitive forces in Porter's model except:

disruptive technologies.

A firewall allows the organization to:

enforce a security policy on data exchanged between its network and the Internet.

When hackers gain access to a database containing your personal private information, this is an example of:

identity theft

The term management information systems refers to a specific category of information systems serving:

middle management functions.

When a cookie is created during a website visit, it is stored:

on the hard drive of the visitor's computer.

Which of the following would be an example of a strategic objective fulfilled by an information system?

trying to achieve a competitive advantage through analysis of big data, using technology to create new products and improve existing ones, using technology to comply with new government regulations

A wiki is a type of collaborative:

website

Predictive

what will happen next?


Kaugnay na mga set ng pag-aaral

Workbook Multiple-choice- CH:38,39,40,41,42 (review for final)

View Set

Ch. 12 Object-Oriented Programming: Polymorphism

View Set

Geometry B, Assignment 2. Ordered Pairs: Points in a Plane

View Set