ITM 300 FULL quizzes and exams

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

A VPN:

is an excryped communications using Telnet

Infrastructure-as-a-Service (IaaS):

is one type of cloud computing service where users pay only for the computing capacity they actually use.

What is not a feature of the General Data Protection Regulation (GDPR)?

it prevents firms from using cookies

An ESS supports which of the following?

long-range planning activities of senior management

Which of the following is not protected by copyright law?

machines

When a cookie is created during a website visit, it is stored:

on the hard drive of the visitor's computer

Which of the following types of computing involves purchasing computing power from a remote provider and paying only for the computing power used?

on-demand

Which of the following is not an IT infrastructure service component?

operating system software

A DBMS makes the:

physical database available for different logical views.

Converting raw data into a more meaningful form is called:

processing

Microsoft Access's data dictionary displays all of the following information about a field except the:

the organization within the organization that is responsible for maintaining the data.

A business model describes how a company produces, delivers, and sells a product or service to create wealth. true or false

true

A computer worm is a program that can copy itself to other computers on the network. true or false

true

A record is a group of related fields. true or false

true

Client/server computing is a primary example of decentralized processing. true or false

true

Identifying customers is a business process handled by the marketing function. true or false

true

In public key encryption, the keys are mathematically related so that data encrypted with one key can be decrypted using only the other key. true or false

true

Information systems are used to enable new products and services via product differentiation. true or false

true

Malicious software that is installed secretly on your computer by other applications and that tracks your online movements is called spyware. true or false

true

OLAP can manage and handle queries with very large sets of data. true or false

true

The Internet of Things is based on billions of Internet-connected sensors throughout the physical world. true or false

true

Blockchain refers to a technology that:

uses a distributed ledger system of transactions.

All of the following are cloud computing services except:

virtualization as a service

Which of the following statements about business processes is not true?

Business processes are typically unaffected by changes in information systems.

Which model is used to describe the interaction of external forces that affect an organization's strategy and ability to compete?

Competitive forces model

Non-typical business problems with causes and effects that are rapidly changing are typically handled by which of the following types of information system?

DSS

Ethics describes the principles of right and wrong that can be used by individuals to make choices to guide their behavior. true or false

true

Which of the following best illustrates the use of information systems to focus on market niche?

A department store creating specialized products for preferred customers

Which of the following statements about organizations is not true?

An informal group can be considered to be an organization.

The Mandarin Oriental's use of computer systems to keep track of guests' preferences is an example of which of the following?

Customer intimacy

Which of the following types of systems typically use a digital dashboard to display an array of charts and graphs of a business's key performance indicators?

ESS

Which of the following statements about disruptive technologies is not true?

Firms that invent disruptive technologies as first movers always become market leaders.

Which of the following U.S. laws gives patients access to personal medical records and the right to authorize how this information can be used or disclosed?

HIPAA

Which main business function is responsible for maintaining employee records?

HR

Which of the following statements best describes organizational culture?

It is a fundamental set of assumptions, values, and ways of doing things that has been accepted by most members of the organization.

A colleague at work takes small amounts of office supplies for her own personal use, saying that this is a tiny loss to the company. You tell her that if everyone were to take office supplies, then the loss would no longer be minimal. Your rationale expresses which of the following ethical principles?

Kant's Categorical Imperative

The NAI is an industry association formed to help with which of the following?

Online privacy issues

Which of the following would be used as an input for an information system?

Product ID and price

The ethical "no free lunch" rule states that:

if something someone else has created is useful to you, it has value, and you should assume the creator wants compensation for this work

Data collected at checkout counters in a grocery store is an example of:

input

A(n) ________ represent data as two-dimensional tables.

relational DBMS

In a table for customers, the information about a single customer resides in a single:

row

All of the following are examples of environmental actors in an information system except:

sales force

Which of the following is not an example of a wearable computing device?

smartphones

________ tools are used to analyze large unstructured data sets, such as email, memos, and survey responses to discover patterns and relationships.

text mining

Using ________ to enable government relationships with citizens, businesses, and other arms of government is called e-government.

the Internet and networking technologies

DBMS have a data definition capability to specify the structure of the content of the database. true or false

true

The three main dimensions of information systems are management, organizations, and information technology. true or false

true

The value chain model classifies all company activities as either primary or support activities. true or false

true

Third-party cookies can collect users' browsing and shopping habits across many websites. true or false

true

Today, many business firms continue to operate legacy systems because they meet a business need and would be costly to replace. true or false

true

Zero defects cannot be achieved in larger software programs because fully testing programs that contain thousands of choices and millions of paths would require thousands of years. true or false

true

A data lake is composed of:

unstructured and structured data that has not been analyzed.

OLAP enables:

users to obtain online answers to ad-hoc questions in a rapid amount of time

________ is a collaboration tool that supports remote (different place), synchronous (same time) collaboration.

video conferencing

Which of the following enables a single physical resource (such as a server or a storage device) to appear to the user as multiple logical resources?

virtualization

Which of the following is a grouping of characters into a word, a group of words, or a complete number?

field

VoIP technology delivers voice information in digital form using circuit switching. true or false

false

The value chain model:

highlights specific activities in the business where competitive strategies can best be applied

Which of the following is the most prominent data manipulation language today?

SQL

Which type of system integrates supplier, manufacturer, distributor, and customer logistics processes?

Supply chain management system

Which of the following statements about digital firms is not true?

Today, most firms are fully digital.

All of the following are current hardware platform trends except:

UNIX

By using cookies and recording shoppers' movements, _____ software can create electronic consumer profiles for each shopper and buyer. a. CRM b. SQL c. XML d. CGI

a

Which of the following is not one of the top five search engines? A. FB B. Google C. Yahoo D. Microsoft Bing E. Baidu

a

Which of the following refers to all of the methods, policies, and organizational procedures that ensure the safety of the organization's assets, the accuracy and reliability of its accounting records, and operational adherence to management standards? A. Controls B. SSID standards C. Vulnerabilities D. Legacy systems E. Security policy

a

_____ includes cookies and other, more sophisticated applications that are installed on your computer unbeknownst to you and transmit information about you while you are online. a. Spyware b. Honeypot c. Honeytoken d. Groupware

a

ZipRealty, which combines Google Maps with real estate data, is an example of:

a mashup

Wireless networks are more difficult for hackers to gain access to because radio frequency bands are difficult to scan. true or false

false

In data mining, which of the following involves using a series of existing values to determine what other future values will be?

forecasting

Which of the following is not an example of the consumerization of IT?

amazon web services

Linux is:

an example of open-source software

Which of the following is the most popular mobile operating system?

android

All of the following are specific security challenges that threaten corporate systems in a client/server environment except: A. copying of data. B. radiation. C. alteration of data. D. hardware failure. E. theft of data.

b

Evil twins are: A. computers that fraudulently access a website or network using the IP address and identification of an authorized computer. B. bogus wireless network access points that look legitimate to users. C. email messages that mimic the email messages of a legitimate business. D. fraudulent websites that mimic a legitimate business's website. E. Trojan horses that appear to the user to be a legitimate commercial software application.

b

WPA2 is a more effective way to secure a wireless network than WEP because it: A. includes an AUP. B. uses much longer encryption keys. C. uses symmetric encryption methods. D. operates on a VPN. E. is part of most vendors UTM products.

b

Which of the following statements about botnets is not true? A. Eighty percent of the world's malware is delivered by botnets. B. It is not possible to make a smartphone part of a botnet. C. Botnets are often used to perpetrate DDoS attacks. D. Ninety percent of the world's spam is delivered by botnets. E. Botnets are often used for click fraud.

b

Which of the following statements is not true about search engines? A. They have solved the problem of how users instantly find information on the Internet. B. There are hundreds of search engines vying for user attention, with no clear leader having yet emerged. C. Users are increasingly using search engines on mobile devices. D. They are monetized almost exclusively by search engine marketing. E. They are arguably the Internet's "killer app."

b

Wireless sensor networks (WSNs) are used for the following tasks except: A. protecting property. B. processing consumer transactions. C. detecting radioactive materials. D. identifying vehicles for trucking firms. E. monitoring machines.

b

_____ is a secured protocol used for confidential transactions. a. HTTP b. HTTPS c. VOIP d. FTP

b

The most successful solutions or methods for achieving a business objective are called:

best practices

Blockchain refers to a technology that: A. uses a centralized data store in the cloud. B. relies on the Internet to provide secure transactions. C. uses a distributed ledger system of transactions. D. uses existing banking systems to transfer funds. E. relies on peer-to-peer networks.

c

Together, a protocol prefix, a domain name, a directory path, and a document name, are called a(n): A. child domain B. root domain C. uniform resource locator D. IP address E. third-level domain

c

Which of the following is the best description of a protocol in a telecommunications network architecture? A. A pathway through which packets are routed B. The main computer in a telecommunications network C. A standard set of rules and procedures for control of communications in a network D. A device that handles the switching of voice and data in a local area network E. A communications service for microcomputer users

c

The fundamental set of assumptions, values, and ways of doing things that has been accepted by most of a company's members is called its:

culture

All of the following are typically factors in a firm's decision to engage consulting and system integration services except: A. the firm does not have the staff necessary to deploy and maintain the firm's IT infrastructure. B. the firm's staff do not have the skills necessary to deploy and maintain the firm's IT infrastructure. C. The firm does not have the budget to deploy and maintain a firm's IT infrastructure. D. The firm's staff knows more about the firm's IT infrastructure than service providers. E. The firm's staff does not have the necessary experience to deploy and maintain the firm's IT infrastructure.

d

Based on your reading of the examples in the chapter, which of the following would be the best use of RFID for a business? A. Lowering network costs B. Logging transactions C. Improving employee engagement D. Managing the supply chain E. Enabling client communication

d

CryptoLocker is an example of which of the following? A. Sniffer B. Worm C. SQL injection attack D. Ransomware E. Evil twin

d

Two-factor authentication utilizes a(n): A. a digital certificate. B. encrypted connection. C. a firewall. D. a multistep process of authentication. E. unique password.

d

Which of the following refers to policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems? A. Algorithms B. Identity management C. Controls D. Security E. Benchmarking

d

Which of the following is the most common reason that business systems fail?

data quality

Detecting and correcting data in a database or file that are incorrect, incomplete, improperly formatted, or redundant is called:

data scrubbing

The term big data refers to all of the following except:

datasets with fewer than a billion records.

A digital certificate system: A. uses digital signatures to validate a user's identity. B. uses tokens to validate a user's identity. C. protects a user's identity by substituting a certificate in place of identifiable traits. D. uses government-issued certificates of authority. E. uses third party CAs to validate a user's identity.

e

On which of the following protocols is the Internet based? A. IMAP B. HTTP C. DNS D. FTP E. TCP/IP

e

The Internet is based on which three key technologies? A. Client/server computing, packet switching, and HTTP B. TCP/IP, HTTP, and packet switching C. TCP/IP, HTML, and HTTP D. Email, instant messaging, and newsgroups E. Client/server computing, packet switching, and the development of communications standards for linking networks and computers

e

The backbone networks of the Internet are typically owned by long-distance telephone companies called: A. regional network providers. B. enhanced service providers. C. backbone providers. D. internet bulk providers. E. network service providers.

e

What service converts natural language names to IP addresses? A. IP B. HTML C. FTP D. HTTP E. DNS

e

Which one of the following statements is not true? A. ICANN manages the domain name system. B. The IAB establishes the overall structure of the Internet. C. The Internet must conform to laws where it operates. D. W3C determines programming standards for the Internet. E. The Internet backbone is owned by the federal government in the United States.

e

________ is malware that hijacks a user's computer and demands payment in return for giving back access. A. A virus B. A Trojan horse C. An evil twin D. Spyware E. Ransomware

e

Information systems enhance core competencies by:

encouraging the sharing of knowledge across business units

A(n) ________ system collects data from various key business processes and stores the data in a single, comprehensive data repository, usable by other parts of the business.

enterprise

Which of the following systems is designed to span functional areas, focus on executing business processes across the firm, and include all levels of management?

enterprise applications

A DSS is most commonly used by the executive management level of an organization. true or false

false

All business processes are formally documented by an organization. true or false

false

Digital rights activists believe differentiated pricing does not violate net neutrality principles. true or false

false

IT infrastructure consists of only those physical computing devices and software required to operate the enterprise. true or false

false


Kaugnay na mga set ng pag-aaral

CPE 202 Final Time Complexity Review

View Set

Nature and the environment, Карп'юк, 9 клас

View Set

Chapter 25 Care of Patient with Skin Problems

View Set

CHAPTER 1 SOCIAL PSYCHOLOGY: THE SCIENCE OF THE SOCIAL SIDE OF LIFE {test bank}

View Set

SEHS Topic 11.2: Notation and analysis

View Set

Business Communications Learning: Ch 06: Completing Business Messages

View Set

Erikson's Eight Stages of Psychosocial Development

View Set

Chapter 7: Auditing, Testing, and Monitoring

View Set