MIS 301 (Exam)
_________ refers to determining who is responsible for actions that were taken.
Accountability
_________ issues involve the authenticity, fidelity, and correctness of information that is collected and processed.
Accuracy
_________ causes pop-up advertisements to appear on your screen.
Adware (廣告軟件)
__________ is a methodology for achieving incremental improvements in the effectiveness and efficiency of a process.
BPI (Business Process Improvement)
________ is a short-range wireless network
Bluetooth
________ organizations are purely physical.
Brick-and-mortar
________ organizations have physical and online dimensions.
Clicks-and-mortar
_______ cables are made of copper.
Coaxial
Which of the following would be an example of a SCADA attack?
Computer viruses are introduced into the electrical company's systems resulting in a shutdown of the power plant.
_______ is a disadvantage of fiber-optic cable.
Difficult to work with
Selecting and adhering to a single competitive strategy is sufficient to counter all of Porter's five forces and be successful in the long term.
False
_______ cables are made of glass.
Fiber-optic
Only a few ________ satellites are needed for global coverage.
GEO
______ is an advantage of coaxial cable
High bandwidth
Which of the following is a property issue?
How should we handle illegally copying copyrighted software?
The IT infrastructure is __________
IT Components, IT Personnel, IT Services
Which of the following is not in the business analytics domain?
In-memory computing
______________ is the right to determine when, and to what extent, information about you can be gathered and/or communicated to others.
Information privacy
An order from a customer is a(n) __________ for a business process.
Input
An/The ________ is a network of networks.
Internet
The ________ layer of TCP/IP is responsible for addressing, routing, and packaging data packets
Internet
A network that is restricted to a single building is a ________.
LAN
Satellite telephone services are provided through ________ satellites.
LEO
________ satellites are used to run the GPS system.
MEO
_______ transmission systems transmit data through electromagnetic waves.
Microwave
The __________ model of informed consent permits the company to collect personal information until the customer specifically requests that the data not be collected.
Opt-out
_________ issues involve collecting, storing, and disseminating information about individuals.
Privacy
______ is the most popular query language used for interacting with a database.
SQL
Which of the following is the most prominent data manipulation language today?
SQL (Structured Query Language)
________ transmission systems can have a large coverage area but their signals experience propagation delay.
Satellite
________ networks are an emerging technology that is becoming increasingly important to help organizations manage their data flows across their enterprise networks.
Software-defined
_________ is pestware that users your computer as a launch pad for unsolicited e-mail, usually advertising for products and services.
Spamware
Which of the following is not "unstructured data"?
Spreadsheet
_________ collects personal information about users without their consent.
Spyware
________ is the protocol of the Internet.
TCP/IP
A foreign key is a primary key in another file
True
Blacklisting is when everything can run except what is on the list.
True
_______ is a cable medium
Twisted-pair
_________ is a private network that uses a public network to connect users.
VPN (Virtual Private Network)
_________ organizations are only online.
Virtual
_________ is a remote attack requiring user action
Virus
Which of the following is NOT a characteristic of Big Data?
Viscous
Careless Internet surfing is _________ and is an _________ mistake.
a human error; unintentional
In ________, vendors ask partners to place logo on the partner's website and then pay that partner a commission.
affiliate marketing
Each characteristic or quality of a particular entity is called a(n) ________.
attribute
Which of the following is an accurate representation of the data hierarchy from smallest to largest?
bit, byte, field, record, file, database
The _________ approach highlights the interlocking relationships that underlie all societies.
common good
Which of the following is the correct order of the KMS cycle?
create, capture, refine, store, manage, disseminate
Under the convention of business flowchart,__________ shape is used to represent questions? And _________ shape is used to represent actions? How many branches should be followed by a question? _____________ (digit).
diamond, rectangle, 2
The _________ approach posits that ethical actions treat all human beings equally, or, if unequally, then fairly, based on some defensible standard.
fairness
The ________ creates links between two tables.
foreign
Intellectual capital is another term for ________.
knowledge
_______ is an example of pre-digital data storage that is comparable to a database.
library card catalog
A data ________ is a low-cost, scaled-down version of a data ________ that is designed for the end-user needs in an SBU or an individual department.
mart; warehouse
You use your smartphone to look up how much money you have in your bank account. This is an example of _________ commerce.
mobile
Dashboards are used in which of the following processes?
monitoring process performance
The ________ key is an identifier field that uniquely identifies a record.
primary
With ________, customers use the internet to self-configure products or services.
product customization
In public-key encryption, the _________ key is used for locking and the _________ key is used for unlocking.
public; private
Database systems minimize ________.
redundancy (多餘的)
Whereas phishing attacks are ____, denial of service attacks are ____.
remote attacks requiring user action; remote attacks requiring no user action
In _________ auctions, one buyer wants to purchase a product or a service; these auctions result in _________ prices over time.
reverse; lower
The _________ approach maintains that an ethical action is the one that best protects and respects the moral rights of the affected parties.
rights
Each relational database table contains records (listed in _______) and attributes (listed in ______) .
rows; columns
Keystroke loggers and screen scrapers are examples of _________
spyware
The ________ layer of TCP/IP provides communication and packet services.
transport
_______ cellular networks use digital signals and can transmit voice and data at different speeds based on how fast the user is moving; it supports video, web browsing, and instant messaging.
3G
_________ is a communications control.
A firewall
_________ is the most difficult, radical, lengthy, and comprehensive strategy.
BPR (Business Process Reengineering)
Hackers would use a botnet to perform a _________.
DoS
_________ is a remote attack requiring no user action.
DoS (Disk Operating System)
________ defines how messages are formulated and how their receivers interpret them.
HTTP
Which of the following is FALSE of QR codes?
QR codes are larger than bar codes because they store information both horizontally and vertically.
The Internet is a ________.
WAN
Which of the following is the correct order of networks from largest to smallest?
WAN, MAN, LAN, PAN
A data ________ is a repository of historical data that are organized by subject to support decision makers in the organization.
warehouse
Bandwidth is stated in ________ per second.
bits
IT _________ be used to create a competitive advantage ____________
can; when it is used effectively
In _________ auctions, sellers solicit bids from many potential buyers; these auctions result in _________ prices over time.
forward; higher
The _________ model of informed consent prohibits an organization from collecting any personal information unless the customer specifically authorizes it.
opt-in
An electronic _________ is a website the represents a single store.
storefront
According to the textbook, ________ is the most widely available cable medium.
twisted-pair
The relational database model is based on the concept of ________-dimensional tables.
two
The _________ approach states that an ethical action is the one that provides the most good or does the least harm.
utilitarian
The _____________ approach states that an ethical action is the one that provides the most good or does the least harm.
utilitarian
In ________, recipients of your marketing notices send information about your product to their friends.
viral marketing
An information system's ____ is the likelihood that the system or resource will be compromised by a ____ that will result in its ____ to further attacks.
vulnerability (脆弱性); threat; exposure
LTE is ________ cellular technology.
4G
_________ is an attack by a programmer developing a system.
A Trojan horse
Which of the following is NOT an example of alien software?
Blockware
_______ is NOT an advantage of twisted-pair wire.
High bandwidth
________ was developed because we have run out of IP addresses in the original IP addressing scheme.
IPv6
________ is a broadcast medium.
Microwave
________ transmission systems have signals that pass through walls but they are susceptible to snooping unless encrypted
Radio
_________ means that you accept the consequences of your decisions and actions.
Responsibility
Which of the following is NOT a basic function of TCP/IP?
Responsible for disassembling, delivering, and reassembling data during transmission
A ________ is a group of eight ________.
byte; bits
A _________ site is a fully configured computer facility with all of the company's services, communication links, and physical plant operations.
hot
The _________ model of informed consent permits the company to collect personal information until the customer specifically requests that the data not be collected.
opt-out