IS 4410 - Quizzes 7-11
You have assigned a database administrator the duty to upgrade the company database over the next couple days. However, instead of upgrading to the new version, he accidentally installs an old version on top of the current version. This is NOT an example of a security threat, since it is a human error. T or F
F
When you go to download (what looks like a perfectly normal) music file for a song you can't get out of your head, you quickly realize that the file isn't as safe as you once thought it was. Your computer begins to act buggy and you become worried. You log onto your bank account and notice that all the money in it has been pulled from your account. This is an example of a(n) ______. adware trojan horse spyware worm
trojan horse
You have recently been hired at a tech firm to help with their SEO (search engine optimization) algorithm. The CEO asks you to create a username and password for your work computer. Usernames are used to authenticate a user and passwords are used for identification of a user. T or F
F
You own a small chain of bakeries on the East coast. You wish to develop an iOS-compatible application so that your baked goods can be ordered from a mobile phone and shipped anywhere in the United States. The project (as well as your organization) is relatively small and should therefore be outsourced offshore. T or F
F
Organization A and Organization B are considered a merger contract in which they would become a single entity and integrate all business processes. Which of the following is the most important aspect of successful IS integration? Moving in-house hosting to a third-party cloud provider Considering which organization has the best infrastructure Involving CIOs in high-level discussions Enforcing the priorities of the larger organization
Involving CIOs in high-level discussions
A company has decided to outsource their data storage to a third-party cloud vendor. Which of the following factors most likely did NOT contribute to this decision? A pervasive security concern that involves the loss of Intellectual property Economies of scale Freeing the time of internal management employees to manage other work Passing the responsibility of risk management on to the vendor
A pervasive security concern that involves the loss of Intellectual property
The company you work for tasks you with developing a formula for the number of phones each warehouse manufactures each week. This is an example of a structured decision. T or F
T
The development department may work on creating a new mobile application that would benefit the organization's consumers- their main priority is to create and maintain IS. This department reports to the organization's Chief Information Officer (CIO). T or F
T
You have a hobby for skiing. You join a Facebook group called "Skiers R Us." this is an example of a social network. T or F
T
You manage a group of workers in the Operations & IS department at your job. Two of the most important objectives of your group's work is to achieve process efficiency and process effectiveness, which can change company structure and resources. T or F
T
You work for an up-and-coming Internet Service Provider in Salt Lake. One day, your boss comes to you and asks if the company should open a new office in Honolulu, Hawaii. You need some time to think about this and perform research. This is an example of a dynamic process. T or F
T
Password managers such as Bitwarden and Lastpass use a type of technology called ______, which transforms user input into a mix of jumbled and unintelligible code that securely stores password information. vault technology lock and key secret encoding encryption
encryption
A(n) ______ is able to span the entire organization and support activities in multiple departments. For instance, the process of a hospital discharging a patient would be supported through activities like housekeeping, the pharmacy, nurses' stations, and more. enterprise information system business information system workgroup information system inter-enterprise system
enterprise information system
______ is a popular type of authentication with smartphones today, where the phone owner may scan their fingerprint on the screen or show their face to the camera to gain access to the phone. Biometric authentication Short-text password (PIN) Personal Identification Number SSH (Secure Shell)
Biometric authentication
When Bob shows that his idea isn't crazy to the senior executives, they ask him to show how feasible the project is. Bob begins researching worker's schedules and budgets to determine if there are resources necessary to begin his product right away. Bob is using ______ to determine how feasible his idea is. project data outlined project metadata noniterative data
project metadata
Which of the following is LEAST likely to be a task performed by an organization's IS department? A: Manage the relationship with the organization's chosen third-party cloud provider B: Identify breaches of security and mitigate damage C: Ensure the timely compliance with federal tax code D: Develop a new employee-scheduling application
C: Ensure the timely compliance with federal tax code
Which of the following is NOT a reason that makes India an attractive place to outsource? Decisions may need to be made without all relevant information Lower labor cost English-speaking Well-educated population
Decisions may need to be made without all relevant information
You are in charge of the company CRM system. CRM systems incorporate accounting, manufacturing, inventory, and human resources applications. T or F
F
_______ is useful for healthcare companies who are trying to connect system islands through a new layer of software. It can also be used to move towards Enterprise Resource Planning in the future. Gap identification Enterprise application integration Data integrity Inter-enterprise application
Enterprise application integration
As an intern at the small tech firm you work at, you quickly realize that one of the most important tasks in your role is making sure people get their paychecks on payday, or else they are grumpy for the rest of the week. This is an example of an unstructured process, since it is up to your decision when payday comes. T or F
F
If you began your own social media company, you can rely on your users being rational in monetary ways. Therefore, they are a consistent source of revenue. T or F
F
If your goal is to be hired as a Chief Information Officer (CIO), it is important to have some level of business knowledge, but many competitive applicants have only a 2-year degree. T or F
F
One outcome of successful collaboration is that the team becomes more efficient as they work together more often. This is an example of "successful outcome" criteria for judging team success out of the three criteria: successful outcome, growth in team capability, and meaningful and satisfying experience. T or F
F
Senior managers of an online shoe store are considering two project proposals from the IS department. One project involves the use of augmented reality to show users on a mobile device what a pair of shoes would look like on their feet. Another project involves introducing cryptocurrency payment options for their customers. Which of the following is true? Neither of these projects should be pursued because they will be too expensive Making a decision on whether or not to pursue these projects will be the responsibility of the company's steering committee Cryptocurrency is a rapidly expanding payment option that should be used by all competitive online vendors Both ideas advance the store's use of technology and should be implemented
Making a decision on whether or not to pursue these projects will be the responsibility of the company's steering committee
Identify a key difference between managerial decisions and operational decisions. Operational decisions have broad scope, whereas the scope of managerial decisions is limited to day-to-day activities. Managerial decisions deal with the allocation of resources, whereas operational decisions concern broad-scope, organizational issues. Managerial decisions are corporate decisions, whereas operational decisions concern the utilization of resources. Managerial decisions concern the allocation of resources, whereas operational decisions concern day-to-day activities.
Managerial decisions concern the allocation of resources, whereas operational decisions concern day-to-day activities.
A manager at Tesla who decides which invoices need to be paid for Model S components is making a(n) _______ decision. Operational Unstructured Managerial Strategic
Operational
Jerry is the Chief Information Officer (CIO) at a large organization. Many departments report their progress to him, including _________. Jerry then reports this information to the _______. HR; Development department Outsourcing Relations; Chief Operating Officer (COO) Sales; Chief Security Officer (CSO) VP Engineering; Chief Executive Officer (CEO)
Outsourcing Relations; Chief Operating Officer (COO)
A social media concept that you can see in your own life is ______. It is noticed when you set up friends on dates, help family members learn subjects they are interested in, and help friends get jobs. There is a future return on this kind of help. customer lifetime value human capital metric of a relationship social capital
social capital
During a new employee onboarding procedure, Sarah is given a list of her IS responsibilities. Which of the following was most likely on this list? Protect her passwords Make reasonable hardware modifications that will improve her system Report every problem that she encounters Suggest beneficial outsourcing opportunities
Protect her passwords
An organization establishes team roles, responsibilities, and authorities for the project team. The project is in the starting phase of project management. Starting
Starting
Bob has been having trouble getting everyone to respond to his messages about a new tech idea for the IT company he works at. He worries that his idea isn't respected by his peers! Rather than wait any longer, he requests a face-to-face meeting with all the senior executives. Bob has switched from asynchronous to synchronous communication. T or F
T
Many people ask, "How can Google be free? They provide so much value to my life but they never charge me for their services!" This is because for most social media platforms, YOU are the product. T or F
T
The company you work for is debating whether to build a data center in New Orleans, Louisiana. This data center would replace all other data centers across the country and be the sole provider of all company data. It is wise to advise against building in this geographical area since natural disasters can include the initial loss of service plus losses stemming from the recovery of the initial loss. T or F
T
Which of the following is a key difference between collaboration and cooperation? People should work together to cooperate, whereas they need not work together to collaborate. Unlike cooperation, collaboration emphasizes iteration and feedback. Unlike cooperation, collaboration occurs when a job has to be accomplished. Cooperation requires people to have a common goal, whereas collaboration occurs even without a common goal.
Unlike cooperation, collaboration emphasizes iteration and feedback.
Facebook, Twitter, and Instagram are all examples of ______. content creators communities management information systems social media providers
social media providers
The number of second- and first-tier community members on a social media site grows exponentially. This is both a blessing and a curse for organizations. This is a curse because ______________________. a member of the community can blast her disappointment about the organization a member of the community may post a profile picture a member of the community may share a favorite cat video a member of the community may share positive reviews of products and services
a member of the community can blast her disappointment about the organization
To begin replacing the old and outdated information systems your company utilizes, you may undergo ________, which would involve altering existing and designing new business processes to take advantage of newer information systems. business process reengineering enterprise resource planning process modification inter-enterprise resource processes
business process reengineering
After a massive layoff at the tech firm you work at, one employee becomes so enraged that they intentionally destroy customer records from the database before they leave the office. This is an example of ______. phishing spoofing denial of service (DoS) computer crime
computer crime
While shopping on your favorite clothing retailer's website, you see a jacket you want to buy, but want to wait for it to go on sale. You forget about the jacket for a week, but when you log back on, the jacket is still in your shopping cart. This is because your browser has saved a ______ to remember information you have entered in the website. token keyword datapoint cookie
cookie
A popular strategy for companies who use social media strategies in their business is ________, where users test the product and provide feedback for redesign. crowdsourcing business to consumer social media spotlighting trialing
crowdsourcing
Spotify uses a ________ revenue model, which offers users a basic service for free, and then charges a premium for upgrades or advanced features. pay-per-click freemium licensing premium
freemium
Since the features and functions of complex products like CRM or ERP are not easy to identify, gap identification is the first challenge when implementing enterprise systems. gap identification
gap identification
When your team begins planning how to accomplish the IS 4410 group project, you notice that everyone seems to be agreeing with each other. Instead of being excited that the group is so cohesive, you recognize that _______ may be occurring which will damage the quality of your project in the future. negative feedback reputation groupthink negative collaboration
groupthink
Mark is transferring funds online through the Web site of a reputed bank. Which of the following will be displayed in the address bar of his browser that will let him know that the bank is using the Secure Sockets Layer (SSL) protocol? https http ftp www
https
Someone who is able to change the opinions of others simply by the amount of popularity their content receives is said to be a(n) _______. leader influencer main account titan
influencer
The company you work for has an information system for each workgroup within the organization. You realize that this is not a good sign for the future of IT at this organization since these separate information systems could create ________. separated algorithms information silos data isolations procedural anomalies
information silos
Supply chain management is an example of a(n) inter-enterprise information system because it spans two or more independent organizations. inter-enterprise information system
inter-enterprise information system
When evaluating which manager you want to work under for the next year, you begin to study the most important characteristics of an effective collaborator. Which skill is the most important that a manager should have if you choose to work with them? open minded and curious perceptive listener previous experience as a collaborator known for following through on commitments
open minded and curious
One way a company can advertise their product is _____, where advertisers only pay for the ad space when the user physically interacts with the ad. folksonomy use increases value pay-per-click crowd-sourcing
pay-per-click
When you log onto your email, you see an email from your boss who is asking for your social security number to verify forms before tax season. However, a couple things seem fishy about the email and it doesn't look like an email your boss would send. With this in mind, you think back to IS 4410 and realize you are at risk of a ______ attack. phishing sniffing system overriding hacking
phishing