MBA6207 Chapter quizzes Midterm study set

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

With _____, the database is stored on a service provider's server and accessed by the client over a network, typically the Internet.

a. Database as a Service

Hadoop processes data using a Java-based system called _____.

a. MapReduce Hadoop has two primary components: a data processing component (a Java-based system called MapReduce

_____ is a special-purpose programming language for accessing and manipulating data stored in a relational database.

a. Structured Query Language (SQL)

Jude, a senior executive, and the managers who report to him must make many decisions for their business units. To assist them with this, they rely on strategic planning to provide _____. a. a framework and a clearly defined direction b. the human and material resources they need c. new and loyal customers d. a reactive approach to market changes

a. a framework and a clearly defined direction

George is in charge of ordering supplies for his employer, and he usually buys these supplies from the same vendors. One of the vendors, Business Office Supplies, has given George limited access to their inventory system. Now George can check whether this vendor has items in stock without contacting a salesperson by using _____.

a. an extranet A growing number of companies offer limited network access to selected customers and suppliers. Such networks are referred to as extranets, which connect people who are external to the company.

Finn designs and sells screen-printed t-shirts. He is reviewing sales data from previous years to decide which colors are the most popular, and would therefore be the best investments for his next batch of t-shirts. This is an example of _________. a. business analytics b. all of these answers c. data science d. a management information system

a. business analytics

Because Marcus works within an IS organization viewed as a cost center and service provider by the rest of his organization, one of his major goals is to _____. a. consolidate IS resources and eliminate redundant functions b. employ newer technologies such as mobile computing c. regularly collaborate with and educate external customers d. eliminate barriers to closing sales with customers

a. consolidate IS resources and eliminate redundant functions

At Coast-to-Coast Moving and Van Lines, Ryan is responsible for managing the flow of the company's data, from initial acquisition of new data to deletion of old, outdated data. Ryan is involved in ___________.

a. data lifecycle management

Barry's job responsibilities include helping maintain a large database that holds business information from over a dozen source systems, covering all aspects of his company's processes, products, and customers. This database contains not only enterprise data but also data from other organizations. Barry works with a(n) _____.

a. data warehouse A data warehouse is a large database that holds business information from many sources in the enterprise, covering all aspects of the company's processes, products, and customers.

Each attribute in a relational database model can be constrained to a range of allowable values called a _____.

a. domain

In a manufacturing organization, the supply chain is a key value chain whose primary activities include all of the following EXCEPT: a. finance and accounting. b. customer service. c. inbound logistics. d. marketing and sales.

a. finance and accounting.

A database system that stores the entire database in random access memory is known as a(n) _____.

a. in-memory database An in-memory database (IMDB) is a database management system that stores the entire database in random access memory (RAM).

Companies that share data with other organizations in a manner that conforms to rigidly defined industry standards are using a type of _____. a. interorganizational information system b. personal information system c. enterprise information system d. workgroup information system

a. interorganizational information system

An internal corporate network built using Internet and World Wide Web standards and products is known as a(n) _____.

a. intranet An intranet is an internal corporate network built using Internet and World Wide Web standards and products.

In organizations where IS becomes a catalyst for achieving new business objectives unreachable without IS, IS organizational strategies _____. a. involve using IS to achieve a competitive advantage b. react to the strategic plans of business units c. support the plans of the business d. are inward looking

a. involve using IS to achieve a competitive advantage

June and her team are planning the implementation of a new company-wide order processing information system. One of June's major concerns is the need to _____. a. redesign key work processes b. complete stand-alone tasks c. collaborate with others d. comply with EDI standards

a. redesign key work processes

The percentage of adults in an area who are interested in opening an account with an investment company drops significantly after the media reports on a successful cyberattack on this organization. This is most likely the result of _____.

a. reputation damage related to the cyberattack Damage to your organization's reputation following a cyberattack leads to a devaluation of the products and services of your organization resulting in a drop in stock price, loss of customers, supplier turnover, strained business partner relationships, and ultimately, a loss of sales and decrease in profits.

A _____ is a description that involves "telling" the database management system (DBMS) the logical and physical structure of the data and the relationships among the data for each user.

a. schema

Jamie's corporation comes under scrutiny by the media when former employees allege that the IS department failed to correctly identify which data needed protection from unauthorized access. These accusers say that this organization is not ensuring its big data is _____.

a. secure Big data introduces security concerns. Are organizations able to keep big data secure from competitors and malicious hackers?

5G networks can support the exchange of brief bursts of data between next-generation autonomous cars because they provide _____.

a. sub-millisecond latency Next-generation autonomous cars will interact with other vehicles and "smart roads" exchanging information directly with other cars and/or smart devices strategically positioned along the highways. The sub-millisecond latency of 5G networks will be required to support these brief bursts of data.

A health insurance firm is hit by a successful cyberattack. The value of the assets stolen or damaged due to the cyberattack is considered _____.

a. the direct impact of the cyberattack The direct impact of a cyberattack is the value of the assets (cash, inventory, equipment, patents, copyrights, trade secrets, data) stolen or damaged due to the cyberattack.

What is an attack vector?

a. the technique used to gain unauthorized access to a device or a network An attack vector is the technique used to gain unauthorized access to a device or a network.

Domain names must always have at least _____ parts, with each part separated by a dot (period).

a. two Domain names must adhere to strict rules. They always have at least two parts, with each part separated by a dot (period).

Haley's employer has asked her to review tens of thousands of social media posts about their company's products and compile this data into a database.​ In terms of the characteristics of big data, Haley is dealing with ________.

a. variety

Because they must deal with large quantities of data from so many different sources, IS employees at financial institutions may be at increased risk of failing to comply with government regulations designed to prevent money laundering, such as the _____.

b. Bank Secrecy Act The Bank Secrecy Act Detects and prevents money laundering by requiring financial institutions to report certain transactions to government agencies and to withhold from clients that such reports were filed about them.

Hannah needs to create a Web site to advertise her catering services. Which of the following statements is FALSE?

b. Hannah must set up a server computer before publishing her Web site. You can hire someone to design and build a Web site, or you can do it yourself. If you do it yourself, you can use an online service to create the Web pages, use a Web page creation software tool, or use a plain text editor to create the site.

A newly discovered entity or attribute can be added to a NoSQL database dynamically because _____.

b. NoSQL databases do not require a predefined schema A difference between relational and NoSQL databases is that NOSQL database do not require a predefined schema; data entities can have attributes edited or assigned to them at any time. If a new entity or attribute is discovered, it can be added to the database dynamically, extending what is already modelled in the database.

Hadoop's two major components are _____.

b. a data processing component and a distributed file system Hadoop has two primary components: a data processing component (a Java-based system called MapReduce, which is discussed in the next section) and a distributed file system called the Hadoop Distributed File System (HDFS) for data storage.

A data breach at your business resulted in the loss of some customer data. Several angry customers have filed charges. What is a recommended course of action to prepare for future events?

b. activate the forensics analysis team and prepare documentation A computer forensics investigation may be opened in response to a criminal investigation or civil litigation, to retrace steps taken when data has been lost, or to assess damage following a computer incident

A company's risk assessment process can consider numerous threats to the computers and networks. Which of the following should an organization identify as loss events or threats to assess? a. data breach of customer account data b. all of the above c. DDos attack d. email attachments with worms/viruses e. invoice and payment fraud

b. all of the above Rationale: Step 2 of the risk assessment process is to identify the loss events or the risks or threats that could occur. Table 2.4 identifies the following examples of such adverse events: data breach of customer account data, distributed denial-of-service (DDoS) attack, email attachment with harmful worm, harmful viruses, and invoice and payment fraud.

During the modeling phase of the CRISP-DM method, the team conducting the data mining project ______.

b. applies selected modeling techniques The goal of the modeling phase of the CRISP-DM is to apply selected modeling techniques.

In a _____, all network devices are connected to a common backbone that serves as a shared communications medium.

b. bus network In a bus network, all network devices are connected to a common backbone that serves as a shared communications medium.

Krysta, who manages the IS organization for her company, is continually striving to expand IS services and capitalize on the latest technology developments to support her company's business plans through the coming months. Her IS organization is perceived as a _____. a. value chain b. business partner or peer c. cost center or service provider d. game changer

b. business partner or peer

A high-level IS manager has his firm utilize sophisticated information systems to digitally design its products so that design defects can be detected and removed early in the process, reducing development cost. What business strategy does this represent? a. focus b. cost leadership c. high standards d. differentiation

b. cost leadership

A senior IS manager decides to invest in an information system that will reduce subcontractor labor costs for her organization by facilitating relocation of tools and materials to more optimal locations while rearranging workflows. What business strategy does this represent? a. differentiation b. cost leadership c. focus d. high standards

b. cost leadership

A senior IS manager implements a vendor-managed inventory system that reduces both the administrative costs of managing inventory and inventory holding costs. What business strategy does this represent? a. focus b. cost leadership c. high standards d. differentiation

b. cost leadership

Suppose a new tech startup wants to define the data model. They would then ____.

b. create the entity-relationship model

Managed security service providers primarily help organizations keep pace with _____.

b. cybercriminals and new laws and regulations Keeping up with computer criminals—and with new laws and regulations—can be daunting for organizations. As a result, many organizations outsource their network security operations to a managed security service provider (MSSP), which is a company that monitors, manages, and maintains computer and network security for other organizations.

Jennifer is a programmer who develops malware and deploys it in the computer systems of her organization's competitors so that she can secretly steal data about new product plans and designs, thus gaining a competitive advantage for her organization. What type of cyberattack is Jennifer involved in?

b. cyberespionage Cyberespionage involves the deployment of malware that secretly steals data in the computer systems of organizations.

A ______ is a collection of instructions and commands used to define and describe data and relationships in a specific database.

b. data definition language

An upper-level IS manager proposes that his organization implement a system to consolidate shipping and exception data from multiple carriers so that consumers know when their purchase will ship and when it will arrive. What business strategy does this represent? a. high standards b. differentiation c. cost leadership d. focus

b. differentiation

Jan is using her firm's data warehouse. If she is starting from monthly sales data, and wishes to get weekly sales data, she should use the ___ feature.

b. drill down Data warehouses allow users to "drill down" to get greater detail or "roll up" to generate aggregate or summary reports.

Thanks to the Identity Theft and Assumption Deterrence Act, _____.

b. identity theft is a federal crime for which perpetrators may be sentenced to up to 15 years in prison. The Identity Theft and Assumption Deterrence Act makes identity theft a federal crime, with penalties of up to 15 years of imprisonment and a maximum fine of $250,000.

Someone who violates computer or Internet security maliciously or for illegal personal gain is known as a(n) _______.

b. lone wolf attacker A lone wolf attacker is someone who violates computer or Internet security maliciously or for illegal personal gain.

Data scientists are a necessary component to ensure an organization's business intelligence and analytics efforts are effective because they _____.

b. pull together knowledge of the business and data analytics tools and techniques One key component that an organization needs to get real value from its BI and analytics efforts is creative data scientists—people who understand the business as well as the business analytics technology, while also recognizing the limitations of their data, tools, and techniques. A data scientist puts all of this together to deliver real improvements in decision making with an organization.

Brandon, a security specialist, explains that IS security managers must use their judgment to ensure that the cost of security risk control does not exceed the system's benefits or the risks involved. Brandon is discussing the concept of _____.

b. reasonable assurance The concept of reasonable assurance in connection with IT security recognizes that managers must use their judgment to ensure that the cost of control does not exceed the system's benefits or the risks involved.

A well-designed series of rules or algorithms is a key component of which stage of the ETL process?

b. transform During the transform stage of the ETL process, a series of rules or algorithms are applied to the extracted data to derive the data that will be stored in the data warehouse.

Guillarme, a data scientist, utilizes data from company documents, machine logs, Data.gov, and Facebook Graph in his work. What characteristic of big data does this best demonstrate?

b. variety Data today comes in a variety of formats. Organizations collect and use data from a variety of sources, including business applications, social media, sensors and controllers that are part of the manufacturing process, systems that manage the physical environment in factories and offices, media sources, machine logs that record events and customer call data, public sources, and archives of historical records of transactions and communications.

One key characteristic of big data is that it is being generated at a rate of 2.5 quintillion bytes per day. This is known as big data's _____.

b. velocity Velocity refers to the rate at which new data is being generated—now estimated to be on the order of 2.5 quintillion bytes each day (that's 2,500 followed by 15 zeros).

Marshall's company currently maintains their data on in-house servers, but his supervisor has asked him to research their options for having some or all of it hosted by a cloud service provider. Which challenge of big data is Marshall helping to address?

b. where and how to store the data The question of whether to store the data on in-house servers or on the cloud relates most closely to the "where and how to store the data" issue.

When you connect to the university library website to find out whether the library has an article you want to read, and the site then interacts with a database that contains a catalog of library books and articles to determine whether the book you want is available, the database management system functions as a(n) __________ to query the database and provide the requested information to the website.

back-end application

Donna is a member of a team trying to select the best type of database for a business problem. If the database must handle a variety of data, she would like to store the data on a group of servers, and the data structures must be very flexible, what would you suggest?

c. A NoSQL database would likely be a better fit than a relational database. NoSQL databases have the capability to spread data over multiple servers so that each server contains only a subset of the total data. Often, the data structures used by NoSQL databases are more flexible than relational database tables and, in many cases, they can provide improved access speed and redundancy.

Leonard, a data scientist working in an information systems organization, is considering pursuing a certification in either Hadoop or Python. How would this benefit Leonard? a. It would increase his expertise in network administration. b. It may enhance his nontechnical more than his technical skills. c. It may expand his career possibilities. d. It would allow him to collaborate more frequently.

c. It may expand his career possibilities.

Marina is a data scientist at a large financial corporation, and therefore she _____.

c. aims to uncover insights that will influence organizational decisions The goal of the data scientist is to uncover valuable insights that will influence organizational decisions and help the organization to achieve competitive advantage.

Corporate intranets _____.

c. allow all sorts of documents to be converted to electronic form for employee access Because Web browsers run on all types of computers, the same electronic information can be viewed by any employee. That means that all sorts of documents (such as internal phone books, procedure manuals, training manuals, and requisition forms) can be inexpensively converted to electronic form, posted online, and easily updated.

Compared with 4G networks, 5G networks will greatly improve the user's experience with a technology that adds a virtual layer over the real world called _____.

c. augmented reality Augmented reality (AR) adds a virtual layer over the real world opening the door to a wide range of potential applications. 5G networks with a latency of less than 1 ms will greatly improve the AR/VR experience.

Joan's organization has just set up a corporate intranet. In order to use the intranet effectively, most likely Joan _____.

c. can rely on her familiarity with Internet technology Using an intranet offers one considerable advantage: many people are already familiar with Internet technology, so they need little training to make effective use of their corporate intranet.

Liesel is an entrepreneur, and she'd like to publish a Web site for her small business. Liesel ___________.

c. can use hosting services Web hosting services provide space on their Web servers for people and businesses that don't have the financial resources, time, or skills to host their own Web sites.

Stacey is developing code that will enable users of her software to display the customized text and images sent by Web servers as Web pages. She is engaged in _____.

c. client-side programming The Web site uses server-side programming to dynamically display different data as needed. The data is pulled from a database stored on the server and sent to the client to be displayed by client-side code. The client computers display the results (Web pages) that the servers return.

Assessing damage following a computer incident, investigating the unauthorized disclosure of corporate confidential data, and confirming or evaluating the impact of industrial espionage are tasks most appropriate for _____.

c. computer forensics A computer forensics investigation may be launched for a variety of reasons, for example, to retrace steps taken when data has been lost, assess damage following a computer incident, investigate the unauthorized disclosure of personal or corporate confidential data, or to confirm or evaluate the impact of industrial espionage.

Fabiola's IS management team is formulating their IS strategic plan. Fabiola reminds them that they must consider _____. a. the IS organization isolated from the rest of the organization b. limiting communication with lower-level managers c. corporate strategy and business unit strategies d. previous but not future IT investments

c. corporate strategy and business unit strategies

The final step in the security risk assessment process is to _____.

c. decide whether or not to implement particular countermeasures Step 8 is to make the decision on whether or not to implement a particular countermeasure.

Data warehouses allow managers to _____ to get increasing levels of detail about business conditions.

c. drill down

In a denial-of-service (DDoS) attack, the perpetrator ____.

c. instructs the zombie computers to send simple access requests to target computers In a DDoS attack, based on a command by the attacker or at a preset time, the botnet computers (called zombies) each send a simple request for access to the target site again and again—dozens of times per second.

Data will zip through a 5G network much faster than through a 4G network because of the 10-fold difference in _____.

c. latency 5G networks will have lower latency than 4G—less than 1 ms compared to 10 ms. This means that data will zip through the network much faster.

Banks monitor their automated teller machines from a central location, which receives status messages over the machines' network, using a form of _____.

c. network-management software Banks use a special form of network-management software to monitor the performance of their automated teller machines (ATMs). Status messages can be sent over the network to a central monitoring location.

A(n) _____ is a field or set of fields in a record that uniquely identifies the record.

c. primary key

After completing a security self-assessment, Hal decides to improve his practices related to use of social media sites such as Facebook. How can he make his social media use safer?

c. review, understand, and if necessary adjust his privacy settings for these sites According to the self-assessment security test in Table 2.6, you should review, and ensure you understand, the privacy settings that control who can see or read what you do on Facebook and other social media sites.

Miles falls prey to a con artist who uses deception to trick him into revealing the data required to access his employer's information system. Miles has experienced an attack vector known as _____.

c. social engineering There are numerous types of attack vectors. One is social engineering, the use of deception to trick individuals into divulging data needed to gain access to an information system or network.

Phil is preparing to publish a Web site he just created and researches his options. He learns that _____.

c. some Web hosts offer domain name registration services Some Web hosting sites include domain name registration, Web authoring software, activity reporting, and Web site monitoring.

Eboni is part of a workgroup conducting a security risk assessment at her firm and is currently helping to determine the impact of each threat they have identified, should it occur. Because a later step in the assessment process involves performing a cost-benefit analysis, Eboni will include _____.

c. the estimated cost of the direct impact, business disruption, recovery efforts, and legal and reputation damages The fourth step in a general security risk assessment process is as follows: Step 4—Determine the impact of each threat occurring. The estimated cost used in the cost-benefit analysis in step 7 includes the cost of the direct impact, the business disruption, the recovery efforts, and the legal and reputational damage.

One reason AT&T and Verizon have plans to expand their 5G networks is that _____.

c. they can support many more devices at one time than 4G networks 5G networks will have the ability to support many more devices (thousands) at one time than 4G networks.

The Internet Corporation for Assigned Names and Numbers (ICANN) uses companies called _____ to handle the business of registering domain names.

d. accredited domain name registrars The Internet Corporation for Assigned Names and Numbers (ICANN) is responsible for managing IP addresses and Internet domain names. ICANN uses companies called accredited domain name registrars to handle the business of registering domain names.

The US-CERT incident reporting system is used to ____.

d. alert the Department of Homeland Security about information security incidents Incident reports go to the US-CERT Incident Reporting System, which assists analysts of the U.S. Computer Emergency Readiness Team (US-CERT) (a partnership between the Department of Homeland Security and the public and private sectors) in providing timely handling of security incidents as well as in conducting improved analysis of such incidents.

In the contemporary view of information systems, they are considered an integral part of the supply chain management process mainly because they: _________. a. aid in product transformation b. produce output c. provide input into the process d. all of these

d. all of these

Common themes in setting organizational strategies include "_____." a. train customer behaviors b. increase both sales and costs c. limit product availability d. attract and retain customers

d. attract and retain customers

The smallest piece of data used by a computer is a(n) _____.

d. bit

An important role of the data scientist is to _____.

d. communicate his or her findings to organizational leaders Successful data scientists have an ability to communicate their findings to organizational leaders so convincingly that they are able to strongly influence how an organization approaches a business opportunity.

The accounting, tax, and advisory company Grant Thornton International has several IS labs around the world that employ experts who examine digital evidence for use in legal cases. Their activities are best characterized as an example of _____.

d. computer forensics Computer forensics investigators such as those at Grant Thornton International work as a team to investigate an incident and conduct the forensic analysis using various methodologies and tools to ensure the computer network system is secure in an organization.

The position of a _____ is a non-technical position responsible for defining and implementing consistent principles for setting data standards and data definitions that apply across all the databases in an organization.

d. data administrator

A _____ is a subset of a data warehouse that is used by small- and medium-sized businesses and departments within large companies to support decision making.

d. data mart Data marts bring the data warehouse concept—lots of data from many sources—to small- and medium-sized businesses and to departments within larger companies.

Corporate strategy, business unit strategies, innovative thinking, and technology innovations are all _____. a. spheres of influence for types of information systems b. components of Leavitt's Diamond c. elements of the value chain d. drivers that set information system organizational strategy

d. drivers that set information system organizational strategy

A hospital system that wants to utilize big data can use HIPAA regulations to help them _____.

d. identify which data needs to be protected from unauthorized access The Health Insurance Portability and Accountability Act (HIPAA) safeguards protect health information (PHI) and electronic PHI (ePHI) data gathered in the health care process and standardizes certain electronic transactions within the health care industry.

Janelle is helping create a strategic plan for her organization. What should she anticipate will be stable--that is, change little, if at all--over time? a. suppliers b. economic growth c. competitors d. importance of planning

d. importance of planning

Collaboration between two or more organizations that lowers costs and reduces manual effort among employees is enabled by a(n) _____. a. workgroup information system b. personal information system c. enterprise information system d. interorganizational information system

d. interorganizational information system

Early 5G users should be aware that their coverage may be limited compared with 4G coverage, at least initially. Why will 5G networks likely be less widespread at first?

d. more cell towers will need to be installed Because more cells will need to be installed, 5G users can expect that their coverage may not be as widespread at first.​

After a successful cyberattack, the funds spent on repairing affected systems, restoring lost data, and performing a post-incident analysis are considered part of the _____.

d. recovery cost Cyberattacks may entail significant recovery costs. It may take people from the IS organization and business areas days or weeks to repair affected systems and recover lost or compromised data. Resources will need to be drawn from their normal work responsibilities to perform a post-incident analysis.

Marcus is a developer hired to write code that dynamically pulls data from a database stored on a host computer in order to customize Web site content for individual users. He is engaged in _____.

d. server-side programming The Web site uses server-side programming to dynamically display different data as needed. The data is pulled from a database stored on the server and sent to the client to be displayed by client-side code. Server-side programming enables Web site designers to customize Web site content for individual users.

A _____ network is one in which all network devices are connected to one another through a single central device called the hub node.

d. star In a star network, all network devices connect to one another through a single central device called the hub node.

Matthew is a developer who uses a combination of programming languages to create and run programs for the Web. He has access to a rich library of code for building XML Web applications, which he often finds helpful. Matthew develops Web services using _____.

d. the .NET platform Microsoft provides a development and Web services platform called .NET, which allows developers to use various programming languages to create and run programs, including those for the Web. The .NET platform also includes a rich library of programming code to help build XML Web applications.

During the load phase of the ETL process, _____.

d. the data is checked against the constraints defined in the database schema As the data is being loaded into the data warehouse, new indices are created and the data is checked against the constraints defined in the database schema to ensure its quality.

What is the primary difference between an entity and an attribute?

An entity is information about people, places, or events, where as an attribute is a column or specific field of the data elements associated with an entity.

Some databases use ______, which is a visual approach to developing queries and requests.

Query by Example (QBE)

A data model is a diagram of data attributes and their relationships. True False

False

A database administrator is an important nontechnical position responsible for defining and implementing consistent principles for a variety of data issues, including setting data standards and data definitions that apply across all the databases in an organization. True False

False

Billie Jean doesn't need to consider her information system strategic plan when she chooses projects to assign to the contractors she is supervising. True False

False

Suppose your computer network was compromised in a large-scale virus attack last Thursday. Most of the data files were corrupted beyond repair. The last data backup was done the Sunday before the virus attack. This means your company has an adequate backup process in place. True False

False All backups should be created with enough frequency to enable a full and quick restoration of data if an attack destroys the original, and this process must be tested to confirm that it works.

Carlos is working with an existing database, but he wants to eliminate some of the columns in the table to create a new, more streamlined database. He will use projection to create his new database.​ True False

True

Unstructured data comes from sources such as word-processing documents and scientific research. True False

True


Kaugnay na mga set ng pag-aaral

Chapter 1 - Managing and the Manager’s Job

View Set

Which number is bigger? Three Digits

View Set

Marketing 380 Comprehensive Quiz Review

View Set

6.4 Social Effects of Industrialization

View Set

Digestive System Review McGraw Hill Connect

View Set

Exam 3 Physics! 1 more to go!! ALMOST THERE!!!

View Set

Module 50 and 51: Quality Improvement and Safety (NURS2700)

View Set