MIS Exam 1

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

The amount of data produced worldwide is increasing by ___% each year. 10 50 90 It is not increasing at all.

50

Which of the following is not an example of a weak password? IloveIT 08141990 9AmGt/* Rainer InformationSecurity

9AmGt/*

_____ is a feature that must be offered by a competing organization in order to survive in the marketplace. Competitive advantage An entry barrier Strategic advantage Rapid time-to-market One-to-one marketing

An entry barrier

A(n) _____________ is a computer program designed to support a specific task or business process. Interface Application Functional area Network Database

Application

Jun is getting ready to open a store in her home town to sell unique lamp bases and shades. She has bought a laptop to use in the store for all of her operating needs. One of the first applications she needs is one to handle her accounting and checkbook. How might she obtain such an application? Open-source software Software-as-a-Service Object-oriented software Application software package Open systems

Application software package

The set of computer instructions that provides specific functionality to a user is called: Transaction processing software. Application software. General software. Systems software. Microcode.

Application software.

Which of the following is not stored in primary storage? Data to be processed by the CPU Instructions for the CPU as to how to process the data Archival data Operating system programs All of the above are stored in primary storage

Archival data

Which of the following statements is not correct? Employees have limited protection against surveillance by employers. The large majority of organizations monitor employee Internet usage. The large majority of organizations use URL filtering. As with normal first-class mail, employers cannot read employee e-mail. Employees should be aware that surveillance is legal.

As with normal first-class mail, employers cannot read employee e-mail.

Refer to IT's About Business 3.3 - Google Glass: Big Brother Really Is Watching You: Which of the following is true about the privacy issues surrounding the use of Google glass to record audio and visual information? It is possible to get the consent of everyone who is being recorded Audio and visual recordings from Google Glass can be used for any purpose, including legal proceedings Audio and visual recordings data are solely the property of Google Users of Google Glass have to announce to the public if they are going to record or photograph anything

Audio and visual recordings from Google Glass can be used for any purpose, including legal proceedings

Organizations use hot sites, warm sites, and cold sites to insure business continuity. Which of the following statements is not true? A cold site has no equipment. A warm site has no user workstations. A hot site needs to be located close to the organization's offices. A hot site duplicates all of the organization's resources. A warm site does not include actual applications.

A hot site needs to be located close to the organization's offices.

Which of the following statements concerning business processes is false? A process has inputs. A process has outputs. A process has activities that can be measured. A process creates value. A process cannot cross functional area boundaries.

A process cannot cross functional area boundaries.

A pharmaceutical company's research and development plan for a new class of drugs would be best described as which of the following? Copyrighted material Patented material A trade secret A knowledge base Public property

A trade secret

Development in software technologies result in Increased competition from established industry rivals Increased competition from new entrants into the industry Increased competition from new entrants offering substitute products or services A and B only A, B and C

A, B and C

_____ controls are concerned with user identification, and they restrict unauthorized individuals from using information resources. Access Physical Data security Administrative Input

Access

_____ issues involve who may obtain information and how much they should pay for this information. Privacy Accuracy Transferability Property Accessibility

Accessibility

Shelli runs a small boutique in Tel Aviv. She has built up a very nice client base and regularly sends her clients a newsletter. She keeps all her client data on her laptop in a password-protected file. Her decision to protect the file reflects which ethical issue related to IT? Privacy Accuracy Accountability Property (such as intellectual property) Accessibility to information

Accessibility to information

Which of the following is not an ethical issue related to IT? Privacy Accuracy Accountability Property (such as intellectual property) Accessibility to information

Accountability

______________ determines who is responsible for the actions taken. Privacy Responsibility Transferability Accountability Liability

Accountability

Reconciling bank accounts is an example of a(n): Accounting Business Process Finance Business Process Marketing Business Process Production Business Process Management Information Systems Business Process

Accounting Business Process

_____ issues involve the authenticity and fidelity of information that is collected and processed. Privacy Accuracy Transferability Property Accessibility

Accuracy

What is the relationship between advances in information technology and the practice of profiling? Advances in IT make it more difficult to profile individuals. Advances in IT have no impact on profiling. Advances in IT make it more expensive to profile individuals. Advances in IT make it easier to profile individuals.

Advances in IT make it easier to profile individuals.

The term _____ refers to clandestine software that is installed on your PC through duplicitous channels but is not particularly malicious. Alien software Virus Worm Back door Logic bomb

Alien software

Data dictionaries provide which of the following advantages to the organization? They reduce data inconsistency. They enable faster program development. They make it easier to modify data and information. Only B and C All of the above

All of the above

Increased microprocessor complexity results from which of the following? Decreasing line width Increasing transistor miniaturization Using new materials for the chip that increase conductivity Putting more transistors on the chip All of the above

All of the above

Primary storage stores which of the following for very brief periods of time? Data to be processed by the CPU Instructions for the CPU as to how to process the data Operating system programs that manage various aspects of the computer's operations All of the above

All of the above

Refer to Closing Case: Baxter: Coming to Work Right Next to You Modern industrial robots must be suited to the following situations: They can be used in the same production line as human workers They can easily be modified to learn new tasks They should be low cost and easy to install A and C only All of the above

All of the above

Secondary storage has which of the following characteristics? It is nonvolatile. It is more cost effective than primary storage. It is slower than primary storage. It can utilize a variety of media. All of the above

All of the above

The amount and type of memory that a computer possesses affects which of the following? The type of program the computer can run The speed of the computer The cost of the computer The cost of processing data All of the above

All of the above

The main types of primary storage are: Register. Random access memory. Cache memory. Read-only memory. All of the above

All of the above

Today, software comprises a larger percentage of the cost of modern computer systems than it did in the early 1950s. Which of the following reasons account(s) for this development? Hardware costs have decreased. Hardware performance has increased. Software has become increasingly complex. Building software applications remains slow, complex, and error-prone. All of the above

All of the above

Which of the following is not a strategy for mitigating the risk of threats against information? Continue operating with no controls and absorb any damages that occur. Transfer the risk by purchasing insurance. Implement controls that minimize the impact of the threat. Install controls that block the risk. All of the above are strategies for mitigating risk.

All of the above are strategies for mitigating risk.

Cybercriminals can obtain the information they need in order to assume another person's identity by: Infiltrating an organization that stores large amounts of personal information. Phishing. Hacking into a corporate database. Stealing mail. All of the above are strategies to obtain information to assume another person's identity.

All of the above are strategies to obtain information to assume another person's identity.

Business pressures on organizations are created when there are changes in Social factors Economic factors Legal factors Political factors All of the above will create business pressures.

All of the above will create business pressures.

Which of the following is not a reason why managing data is difficult over time? New systems are developed. The media the data are stored on becomes problematic. New sources of data are created. The amount of data increases exponentially. All of these are reasons why managing data is difficult over time.

All of these are reasons why managing data is difficult over time.

Which of the following is not a step in ethical decision making? Recognize the ethical issue. Get the facts. Evaluate alternative actions. Make a decision and test it. All of these are steps in ethical decision making.

All of these are steps in ethical decision making.

Which of the following statements is false? An application is a computer program designed to support a specific business process. Each functional area within an organization has only one application. A functional area information system is the same as a departmental information system. A functional area information system can obtain data from other functional area information systems. App, application, and application program all mean the same thing.

Each functional area within an organization has only one application.

Which of the following is not a role that information systems play in businesses processes? Establish standards Execute the process Capture and store process data Monitor process performance Detect problems with the process

Establish standards

In your new position, you are told that you will be working with a business analyst. What would you expect this work to entail? Review computer code Explain the business process Test programs Identify new technology that might benefit the organization Create Web sites and pages

Explain the business process

The _____________ ethical standard states that ethical actions treat all human beings equally. Common good Fairness Rights Utilitarian Well-being

Fairness

A VPN is a network within the organization. True False

False

A mainframe is a type of server. True False

False

A password refers to "something the user is". True False

False

A supercomputer is the term given to the latest technology. True False

False

An individual or organization faced with an ethical decision is basically considering whether to break the law. True False

False

As hardware costs have decreased over the past 20 years, software costs have also decreased. True False

False

Computer code is generally efficient, well designed, and contains very few errors. True False

False

Computer hardware and software are designed to be general purpose. True False

False

Computers can run any type of program regardless of the amount and type of memory that the computer has. True False

False

Cyberterrorism is usually carried out by nations. True False

False

Dumpster diving is always illegal because it involves trespassing on private property. True False

False

Having one backup of your business data is sufficient for security purposes. True False

False

If your computer loses its power supply, you will not lose the contents of your random access memory, because it is not volatile. True False

False

Improvements in information technologies are leading to a decreasing number of ethical problems. True False

False

In general, employees have high legal protection against surveillance by employers. True False

False

Magnetic tape provides faster access to data than magnetic disks. True False

False

Microcontrollers are computer chips that are embedded in products and technologies of various types and sizes. True False

False

Off-the-shelf application software consists of specific software programs developed for a particular company by a software vendor. True False

False

Risk analysis involves determining whether security programs are working. True False

False

Sequential access is a type of data access that is associated primarily with magnetic disks. True False

False

Supervisory control and data acquisition (SCADA) systems require human data input. True False

False

The "safe harbor" framework details how the European Union exports data about U.S. citizens. True False

False

The cost per megabyte of storage is greater for traditional hard disk storage than for PC memory cards. True False

False

The individual's right of privacy supersedes the public's right to know. True False

False

The mouse is the most common input device. True False

False

The right of privacy is absolute. True False

False

The security of each computer on the Internet is independent of the security of all other computers on the Internet. True False

False

The user interface is the most sophisticated on enterprise operating systems and the least sophisticated on desktop operating systems. True False

False

You start a dog-walking service, and you store your client's records on your cell phone. You don't need to worry about information security. True False

False

Zero-day attacks use deceptive e-mails to acquire sensitive personal information. True False

False

A(n) _____ is a logical grouping of characters into a word, a small group of words, or a complete number. Byte Field Record File Database

Field

A(n) _____ is a logical grouping of related records. Byte Field Record File Database

File

Managing account collections is an example of a(n): Accounting Business Process Finance Business Process Marketing Business Process Production Business Process Management Information Systems Business Process

Finance Business Process

Which of the following statements concerning firewalls is not true? Firewalls prevent unauthorized Internet users from accessing private networks. Firewalls examine every message that enters or leaves an organization's network. Firewalls filter network traffic according to categories of activities that are likely to cause problems. Firewalls filter messages the same way as anti-malware systems do. Firewalls are sometimes located inside an organization's private network.

Firewalls filter messages the same way as anti-malware systems do.

_____ are electronic storage devices that contain no moving parts. Hard drives Flash memory devices Streaming tape devices DVDs CDs

Flash memory devices

What does a systems analyst do? Manages an IS service Writes computer code Interfaces between end users and programmers Forecasts technology trends Creates Web sites and pages

Interfaces between end users and programmers

Which of the following is not a characteristic of secondary storage? It is nonvolatile. It is more cost effective than primary storage. It is slower than primary storage. It cannot utilize any media except chips. None of the above

It cannot utilize any media except chips.

The workforce in developed countries is exhibiting all of the following trends except: It is becoming more diversified. It includes more women. It includes more single parents. It includes fewer persons with disabilities. It includes more minority-group members.

It includes fewer persons with disabilities.

Which of the following is not a function of the operating system? It allocates CPU time and main memory to programs running on the computer. It provides an interface between the user and the hardware. It supervises the overall operation of the computer. It increases the complexity of the system to the user. None of the above

It increases the complexity of the system to the user.

Which of the following statements is false? Credit card companies usually block stolen credit cards rather than prosecute. People tend to shortcut security procedures because the procedures are inconvenient. It is easy to assess the value of a hypothetical attack. The online commerce industry isn't willing to install safeguards on credit card transactions. The cost of preventing computer crimes can be very high.

It is easy to assess the value of a hypothetical attack.

The characteristics of magnetic tape include all of the following except: It is the fastest magnetic storage medium. It is the cheapest magnetic storage medium. It provides sequential access to the data. It has greater storage capacity than thumb drives. It is often used for archival storage.

It is the fastest magnetic storage medium.

Which of the following is not a characteristic of today's typical software? It s efficient. It is full of errors. It is poorly designed. It is expensive. It is an art as well as a science.

It s efficient.

_____ are segments of computer code embedded within an organization's existing computer programs that activate and perform a destructive action at a certain time or date. Viruses Worms Trojan horses Back doors Logic bombs

Logic bombs

_____ are software programs that hide in other computer programs and reveal their designed behavior only when they are activated. Viruses Worms Trojan horses Back doors Logic bombs

Logic bombs

If you wished to store a large amount of archival data for a long period of time, you would choose which of the following? Magnetic disk Magnetic tape Read-only chips Cache chips Thumb drives

Magnetic tape

A _____ is used in large enterprises for extensive computing applications that are accessed by thousands of concurrent users. Supercomputer Mainframe Midrange computer Microcomputer Laptop computer

Mainframe

A ___________ is an example of a computer system that is designed to accommodate multiple users simultaneously. Microcomputer Mainframe Laptop Palmtop Wearable computer

Mainframe

Hyo runs an ice cream store with her family. Which of the following activities is a part of their fulfillment process? Receiving goods from their supplier Making ice cream Recording daily sales revenue Recording goods received Making a custom-order ice cream cake

Making a custom-order ice cream cake

Which of the following statements concerning the management of information resources is not true? They have an enormous strategic value within an organization and therefore are relied on. Information systems are expensive to acquire, operate, and maintain. Computers are decentralized throughout the organization, which makes it harder to manage. Managing mainframes has become more difficult. Managing information resources is divided between the MIS department and end users.

Managing mainframes has become more difficult.

Collecting sales tax is an example of a(n): Accounting Business Process Finance Business Process Marketing Business Process Production Business Process Management Information Systems Business Process

Marketing Business Process

Applying copyrights and trademarks is an example of a(n): Accounting business process Finance business process Marketing business process Production business process Management information systems business process

Marketing business process

_____ provide(s) companies with a single version of the truth for their data. Data warehouses Data marts Databases Master data management Enterprise information management

Master data management

Why are many organizations turning to NoSQL databases to manage big data? NoSQL databases do not allow for missing data NOSQL databases can process unstructured as well as structured data NoSQL databases have a finite amount of data they can handle NoSQL databases are less expensive than other databases

NOSQL databases can process unstructured as well as structured data

Which of the following statements concerning technology pressures on modern businesses is true? Technology changes so rapidly that organizations should wait before they release new technology-based products. New technologies offer alternative service options. New technologies will never replace existing technologies. The amount of information on the Internet remains stable from year to year. The important information on the Internet is fee-based.

New technologies offer alternative service options.

_____ is a method for analyzing and reducing a relational database to its most streamlined form. Structured query Normalization Query by example Joining Relational analysis

Normalization

The concept of _____ refers to competing computing products working together. Open-source software Software-as-a-Service Object-oriented software Application software packages Open systems

Open systems

_____ is software whose source code is available at no cost to developers and users. Freeware Shareware Open systems Open-source software Software-as-a-Service

Open-source software

The main system control program is the _____. Operating system Cache software Virtual memory Security monitor Multithread register

Operating system

Privacy advocates prefer which model of informed consent? Opt-in Opt-out Either A or B Neither A nor B

Opt-in

Which of the following is not a type of primary storage? Random access memory Registers Cache Read-only memory Optical

Optical

Shelli runs a small boutique in Tel Aviv. Her intern was checking the boutique's Facebook page and noticed some negative comments. He deleted them. At the end of the day, when they were closing up, he told Shelli about the comments and what he had done. Shelli was not pleased, and she told him so. Why wasn't Shelli pleased? She didn't like hearing anything negative about her store. People are free to say what they wish. She thought he should ask her before he deleted them. He wasn't supposed to be checking Facebook. All of these are reasons for Shelli's not being pleased.

People are free to say what they wish.

Jun is getting ready to open a store in her home town to sell unique lamp bases and shades. What kind of computer does she need at this point? Mainframe computer Server Supercomputer Personal computer iPad

Personal computer

Jun really likes your Apple iPad and wants to get one for her lamp business. What kind of computer would the iPad replace? Mainframe computer Workstation Server Personal computer Smartphone

Personal computer

A _____ attack uses deception to fraudulently acquire sensitive personal information by masquerading as an official e-mail. Zero-day Denial-of-service Distributed denial-of-service Phishing Brute force dictionary

Phishing

For the following entity-relationship diagram, what could the primary key be in the Grade entity? Untitled-2 Primary key in Student entity Primary key in Course entity Its own primary key. Primary key made up of the primary keys in Student entity and Course entity It doesn't need a primary key.

Primary key made up of the primary keys in Student entity and Course entity

_____ tell the database management system which records are joined with others in related tables. Primary keys Secondary keys Common attributes Common files Common fields

Primary keys

_____ activities create value for which customers are willing to pay, whereas _____ activities do not add value directly to the firm's products or services. Support, primary Human resource management, inbound logistics Procurement, operations Primary, support Accounting, outbound logistics

Primary, support

Shelli runs a small boutique in Tel Aviv. She accepts credit cards and writes the number on her copy of the receipt in case there is a problem later. This practice involves which ethical issue related to IT? Privacy Accuracy Accountability Property (such as intellectual property) Accessibility to information

Privacy

Shelli runs a small boutique in Tel Aviv. She has built up a very nice client base and regularly sends her clients a newsletter. A new bakery business down the block wants to buy Shelli's client list from her. If Shelli does sell the list, which ethical issue related to IT would be involved? Privacy Accuracy Accountability Property (such as intellectual property)

Privacy

Shelli runs a small boutique in Tel Aviv. She has built up a very nice client base and regularly sends her clients a newsletter. Clients fill out a form to join her mailing list. Shelli indicates on the form that client information will not be shared without permission. This policy illustrates which ethical issue related to IT? Privacy Accuracy Accountability Property (such as intellectual property) Accessibility to information

Privacy

_____ issues involve collecting, storing, and disseminating information about individuals. Privacy Accuracy Transferability Property Accessibility

Privacy

Refer to IT's About Business 5.3: Database Solution for the German Aerospace Center: The challenges associated with data collection from satellites include the following except: Capturing data in real time Storing data at the satellite Transferring data from the satellite to central databases Storing current and past data collected from the satellites Processing data to compare current and past information to predict future events

Processing data to compare current and past information to predict future events

Which of the following processes involves the warehouse, purchasing, and accounting functional areas? Procurement Fulfillment Order entry Accounts receivable Payroll

Procurement

Managing purchasing is an example of a(n): Accounting Business Process Finance Business Process Marketing Business Process Production Business Process Management Information Systems Business Process

Production Business Process

Shelli runs a small boutique in Tel Aviv. Her intern just came to her with a new design for her Web site. Shelli really likes the design, and she informs the intern that he is quite the artist. Section reference 1The intern responds that he found the design on the Internet. Shelli replies that they can't use it. Her decision reflects which ethical issue related to IT? Privacy Accuracy Accountability Property (such as intellectual property) Accessibility to information

Property (such as intellectual property)

Data dictionaries perform all of the following functions except: Providing information on each record. Providing information on why attributes are needed in the database. Defining the format necessary to enter data into the database. Providing information on the name of each attribute. Providing information on how often attributes should be updated.

Providing information on each record.

_____________ is(are) the part of primary storage that holds a software program (or a portion of it) and small amounts of data when they are brought from secondary storage. Read-only memory Random access memory Cache memory Registers Flash memory

Random access memory

Which of the following statements concerning the difficulties in protecting information resources is not correct? Computing resources are typically decentralized. Computer crimes often remain undetected for a long period of time. Rapid technological changes ensure that controls are effective for years. Employees typically do not follow security procedures when the procedures are inconvenient. Computer networks can be located outside the organization.

Rapid technological changes ensure that controls are effective for years.

The type of primary storage where certain critical instructions are safeguarded because the storage is nonvolatile and the instructions can be read only by the computer and not changed by the user is called: Read-only memory. Random access memory. Cache memory. Registers. Flash memory.

Read-only memory.

A(n) _____ is a logical grouping of related fields. Byte Field Record File Database

Record

Hyo runs an ice cream store with her family. Which of the following activities is a part of their procurement? Send an order to a supplier. Decide what to order. Record daily sales revenue. Record goods received. Send a check to a supplier.

Record daily sales revenue.

_____________ means accepting the consequences of your decisions and actions. Privacy Responsibility Transferability Accountability Liability

Responsibility

The ____________ ethical standard states that an ethical action is the one that best protects and respects the moral rights of the affected parties. Common good Fairness Rights Utilitarian Well-being

Rights

_____ is the process in which an organization assesses the value of each asset being protected, estimates the probability that it will be compromised, and compares the probable costs of an attack with the costs of protecting the asset. Risk management Risk analysis Risk mitigation Risk acceptance Risk transference

Risk analysis

Which of the following statements about IT's role in society is false? IT has created employee flexibility. Robots can do many routine tasks. Robots can handle unfamiliar situations. IT can be used to help doctors diagnose diseases. Telepresence robots can act as the eyes and ears of a business manager.

Robots can handle unfamiliar situations.

_____ are fields in a record that have some identifying information but typically do not identify the record with complete accuracy. Primary keys Secondary keys Duplicate keys Attribute keys Record keys

Secondary keys

Which of the following is not a component of the central processing unit? Registers Control unit Secondary storage Arithmetic-logic unit Keyboard

Secondary storage

Hyo runs an ice cream store with her family. Which of the following activities is a part of their procurement process? Recording their daily sales revenue Sending an order to their sugar supplier Making the ice cream Setting up an employee schedule Taking an order for an ice cream cake

Sending an order to their sugar supplier

Jun has been in business selling unique lamp bases and shades for two years in her first location. She is getting ready to open a second location two towns over. What kind of computer does she need at this point? Mainframe computer Server Supercomputer Personal computer iPad

Server

_____ involves building an inappropriate trust relationship with employees for the purpose of gaining sensitive information or unauthorized access privileges. Tailgating Hacking Spoofing Social engineering Spamming

Social engineering

In order to protect their software from illegal distribution, vendors often rely on _____. Secure packaging Private security agents Software licensing Internet-based distribution methods Personal honesty

Software licensing

Which of the following is not an example of the growing initiative called green IT? Designing an IT infrastructure to support sustainability. Building systems that monitor carbon throughout the organization. Asking vendors about compliance on environmental standards. Building computer applications that use less energy. Designing energy-efficient data centers.

Building computer applications that use less energy.

Which of the following statements is false? BPM begins with process modeling. Process modeling is a graphical depiction of all the steps in a process. BPM uses Web-enabled technologies for user interfaces. Business activity monitoring is used to measure and manage business processes. Business activity monitoring is a type of scheduled reporting.

Business activity monitoring is a type of scheduled reporting.

Jun has bought an accounting package for her business, which involves selling unique lamp bases and shades. She wants to hire some part-time help to assist her in implementing and becoming comfortable with the new software. Which of the follow skill sets would be the most beneficial for this worker to possess? Business processes Operating systems Programming languages HTML Open systems

Business processes

A(n) _____ represents a single character, such as a letter, number, or symbol. Byte Field Record File Database

Byte

Which of the following is not a source for external data? Commercial databases Corporate databases Sensors Satellites Government reports

Corporate databases

Data aggregators sell digital dossiers to companies that want to know their customers better. This practice is called ________. Customer relationships Customer profiling Customer intimacy Customer knowledge Spying

Customer intimacy

_____ occurs when various copies of the data agree. Data isolation Data integrity Data consistency Data redundancy Application/Data dependence

Data consistency

_____ is a formal approach to managing data consistently across an entire organization. Database management Enterprise information management Data warehousing Data governance Data mart

Data governance

You have moved to a different apartment, but your electricity bill continues to be sent to your old address. The Post Office in your town has which problem with its data management? Data redundancy Data inconsistency Data isolation Data security Data dependence

Data inconsistency

Not including alphabetic characters in a Social Security Number field is an example of _____. Data isolation Data integrity Data consistency Data redundancy Application/data dependence

Data integrity

_____ occurs when applications cannot access data associated with other applications. Data isolation Data integrity Data consistency Data redundancy Application/Data dependence

Data isolation

_____ occurs when the same data are stored in many places. Data isolation Data integrity Data consistency Data redundancy Application/Data dependence

Data redundancy

The process of profiling: Increases individual privacy. Decreases individual privacy. Has no effect on individual privacy. Is illegal in more than half of the states. Is legal but unethical.

Decreases individual privacy.

Which of the following is not a Section Reference 1 by organizations to business pressures? Delay releases of innovated products. Build strategic systems that enable an organization to increase market share or profits. Provide tools that satisfy customers so they don't go to a competitor. Manufacture customized goods at a lower cost. Conduct business electronically with customers and business partners.

Delay releases of innovated products.

Which of the following statements is correct? An individual's right to privacy is absolute. Determining and enforcing privacy regulations can be difficult. An individual's right to privacy supersedes the needs of society. Advances in information technologies have not affected individual privacy. The Internet has increased individuals' privacy.

Determining and enforcing privacy regulations can be difficult.

To access a specific piece of information, _____ are usually faster than _____. Sequential access storage devices, direct access storage devices Direct access storage devices, sequential access storage devices Streaming tape devices, DVDs Optical storage devices, random access memory Sequential access storage devices, thumb drives

Direct access storage devices, sequential access storage devices

_____ is(are) a written description of a computer program's functions. Explanatory instructions Documentation Graphical user interface Plug and play README files

Documentation

Ted works in his family's bakery business. They supply bread and rolls to neighboring restaurants, and they have their own store front where they sell breads, rolls, pastries, cookies and cupcakes. Ted wants to start a Cookie Club that gives each member (joining is free) a free cookie after they have purchased a dozen. This idea reflects which one of Porter's five competitive forces? threat of entry of new competitors bargaining power of suppliers bargaining power of customers threat of substitute products rivalry among existing firms in an industry

bargaining power of customers

In the relational database model, related tables can be joined when they contain common _____. primary keys rows records columns files

columns

Porter's _____ help(s) companies identify general strategies, whereas his _____ help(s) to identify specific activities where companies can use the strategies for greatest impact. value chain model, competitive forces model primary activities, support activities competitive forces model, primary activities competitive forces model, value chain model value chain model, support activities

competitive forces model, value chain model

Refer to IT's About Business 3.2 - The Dot Clones: It is easy to replicate online business models because of the following reasons eCommerce website and their business models are easy to replicate eCommerce websites can be easily sold and rebranded eCommerce websites do not require a large amount of investment eCommerce website cannot have a presence in more than one country

eCommerce website and their business models are easy to replicate

How does society keep owners of electronic bulletin boards from disseminating offensive or untrue content? This is a difficult question because it involves the conflict between _____ on the one hand and _____ on the other. the public, the individual the public, ethics freedom of speech, privacy the individual, freedom of speech ethics, security

freedom of speech, privacy

Porter's competitive forces model helps organizations identify _____, whereas his value chain model helps organizations identify specific _____. competitive opportunities, activities general strategies, activities activities, competitive opportunities activities, general strategies primary activities, support activities

general strategies, activities

Walmart's automatic replenishment system, which enables the company to reduce inventory storage requirements, is an example of which strategy for competitive advantage? cost leadership differentiation innovation operational effectiveness customer-orientation

cost leadership

When Amazon welcomes you by name back to its Web site on your second visit, it is employing which strategy for competitive advantage? cost leadership differentiation innovation operational effectiveness customer-orientation

customer-orientation

Rank the following in terms of dollar value of the crime, from highest to lowest. robbery - white collar crime - cybercrime white collar crime - extortion - robbery cybercrime - white collar crime - robbery cybercrime - robbery - white collar crime white collar crime - burglary - robbery

cybercrime - white collar crime - robbery

Which of the following is(are) designed to use your computer as a launch pad for sending unsolicited e-mail to other computers? Spyware Spamware Adware Viruses Worms

Spamware

_____ programs are often used to analyze financial data. Database Word processing Spreadsheet Graphics Communications

Spreadsheet

Buyer power is _____ when buyers have many choices from whom to buy and _____ when buyers have few choices. high, the same high, low low, low low, high low, the same

high, low

Today's customers have ________. less knowledge about products less sophistication difficulty in finding information about products higher expectations difficulty in comparing prices

higher expectations

Employees in which functional areas of the organization pose particularly grave threats to information security? human resources, finance human resources, management information systems finance, marketing operations management, management information systems finance, management information systems

human resources, management information systems

A _____ refers to the fastest computing engines available at any given time. Supercomputer Mainframe Midrange computer Microcomputer Laptop computer

Supercomputer

To model the weather or simulate nuclear weapons testing, you would most likely use a(n): Mainframe computer. Workstation. Supercomputer. Personal computer. Active badge.

Supercomputer.

Which of the following is not an advantage of open-source software? It produces high-quality code. It produces code that can be changed to meet the user's needs. Bugs are discovered quickly. Support is available only through online communities of core developers. It produces reliable code.

Support is available only through online communities of core developers.

The set of computer programs used to manage hardware resources is called: Microsoft Office Suite. Application software. General software. Systems software. Personal application software.

Systems software.

Refer to IT's About Business 1.3 - Different Types of Robots ______________ enable an individual to maintain a consistent connection with co-workers, customers, or clients. Drones Telepresence Robots Autonomous Cars Remote Sensors

Telepresence Robots

How does the Internet affect the way you purchase your textbooks? The Internet gives you fewer choices. The Internet increases your bargaining power. The Internet provides you with less information. The Internet decreases your bargaining power. The Internet increases your switching costs.

The Internet increases your bargaining power.

The data in a data warehouse have which of the following characteristics? They are organized by subject. They are coded in different formats. They are updated in real time. They are typically retained for a defined, but limited, period of time. They are organized in a hierarchical structure.

They are organized by subject.

Organizations are turning to data governance for which of the following reasons? They have too little data. They are responding to federal regulations. Their data are typically structured. Their data are usually located in the organization's databases. Data across their organizations are generally consistent.

They are responding to federal regulations.

Registers have all of the following characteristics except: They are a type of primary storage. They can store only extremely limited amounts of instructions and data. They provide the fastest storage. They are slower than RAM. All of the above are characteristics of registers.

They are slower than RAM.

Compared to data warehouses, data marts have which one of the following characteristics? They cost less. They have longer lead times for implementation. They provide for central rather than local control. They contain more information. They are more difficult to navigate.

They cost less.

Refer to IT's About Business 2.3 - "Bring Your Own Device" Can Cause Problems: Hamilton Fraser's human resource department created an acceptable use policy for their employees' personal communication devices for the following reason: They didn't want their employees wasting time playing games on their iPhones They didn't want the corporate data to be accessible on mobile devices that were lost/misplaced They wanted to monitor how their employees were spending their time They didn't want their employees to use social media while working They only wanted employees to use Android devices

They didn't want the corporate data to be accessible on mobile devices that were lost/misplaced

The most important benefit of knowledge management systems is: They improve customer service. They make best practices available to employees. They enable the organization to retain scarce knowledge when employees retire. They improve employee morale. They make product development more efficient.

They make best practices available to employees.

Which of the following is not a characteristic of strong passwords? They are difficult to guess. They contain special characters. They are not a recognizable word. They are not a recognizable string of numbers. They tend to be short so they are easy to remember.

They tend to be short so they are easy to remember.

_____ describe the activities of the business, whereas _____ categorize(s), aggregate(s), and evaluate(s) data generated by the organization's activities. Transaction data, master data Source data, transaction data Operational data, master data Master data, source data Business dimensional data, databases

Transaction data, master data

A URL that begins with https rather than http indicates that the site transmits using an extra layer of security called transport layer security. True False

True

A byte represents a particular alphanumeric character or a simple mathematical operation. True False

True

A code of ethics is a collection of principles that are intended to guide decision making by members of the organization. True False

True

A thin-client system is a desktop computer that doesn't have locally installed software. True False

True

An optical storage device is a form of secondary storage device on which data are recorded and read by laser in a computer's disk drive. True False

True

Application software cannot be run on computer hardware without systems software. True False

True

Companies who develop software for sale license that software for use to protect their product from being copied and distributed illegally. True False

True

Computer technologies become obsolete faster than other technologies in the organization. True False

True

Cyberterrorism and cyberwarfare can attack supervisory control and data acquisition (SCADA) systems to cause widespread physical damage. True False

True

Digital video disks (DVDs) have higher storage capacities than CD-ROMs. True False

True

Each generation of computer hardware has exhibited increased processing power and decreased costs. True False

True

Human errors cause more than half of the security-related problems in many organizations. True False

True

IT security is the responsibility of everyone in the organization. True False

True

In most cases, cookies track your path through Web sites and are therefore invasions of your privacy. True False

True

Laptop, notebook, and netbook computers cost more than desktops because of their portability. True False

True

Minicomputers are relatively small, inexpensive computers that perform the same functions as mainframe computers, but to a limited extent. True False

True

Open systems refers to a model of computer products - hardware, operating systems, and application software - that allow any computing device to be seamlessly connected to and interact with any other computing device. True False

True

Organizations use authentication to establish privileges to systems operations. True False

True

Organizations utilize layers of controls because they face so many diverse threats to information security. True False

True

Packaged application software addresses a specific or unique business need for a company. True False

True

Personal application software consists of widely used packages such as word processing, spreadsheet, communications, and graphics software. True False

True

Primary storage is the main memory of a computer, in which small amounts of data that will be used immediately are stored. True False

True

Public-key encryption uses two different keys, one public and one private. True False

True

Random access memory is that part of primary storage that holds a software program (or a portion of it) and small amounts of data when they are brought from secondary storage. True False

True

Software can be copyrighted. True False

True

Software consists of computer programs, which are sequences of instructions for the computer. True False

True

Software is typically quite complex. True False

True

Source data automation uses various technologies to input data with minimal human intervention. True False

True

The Platform for Privacy Preferences automatically communicates privacy policies between a commerce Web site and its visitors. True False

True

The area located between two firewalls within an organization is called the demilitarized zone. True False

True

The computing skills necessary to be a hacker are decreasing. True False

True

The flow of information among countries is called transborder data flows. True False

True

The higher the level of an employee in organization, the greater the threat that he or she poses to the organization. True False

True

The operating system supervises the overall operation of the computer. True False

True

The opt-out model of informed consent allows a company to collect personal information until the customers specifically requests otherwise. True False

True

Trojan horses are software programs that hide in other computer programs and reveal their designed behavior only when they are activated. True False

True

Voice recognition is an example of "something a user does" authentication. True False

True

When you interview for a job at a company, it is likely that the company will Google you and search social networking sites for information on you. True False

True

Refer to Closing Case: Target Provides a Surprise: which of the following is not a source of information used by Target to profile their customers? Shopping patterns for each guest Online shopping activities User's e-mail correspondences Customer's public records Customer's credit information

User's e-mail correspondences

Refer to IT's About Business 3.1: Pinterest: Pinterest's user agreements allows Correct Users to pin images that they have created Users to pin images from any website Users to pin images others have pinned A and C A, B and C

Users to pin images that they have created

The ____________ ethical standard states that an ethical action is the one that provides the most good or does the least harm. Common good Fairness Rights Utilitarian Well-being

Utilitarian

_____ are segments of computer code that attach to existing computer programs and perform malicious acts. Viruses Worms Trojan horses Back doors Logic bombs

Viruses

Refer to IT's About Business Section Reference 1: 1.1 - Warby Parker : Which of the following statements is false? Warby Parker is using IT to provide better customer experience Warby Parker is using IT to reduce it's cost to increase profit margins Warby Parker's innovative IT based business model can be easily replicated

Warby Parker is using IT to reduce it's cost to increase profit margins

Which of the following is not a benefit of being an informed user of IT? Understanding what is "behind" applications you use in your organization. Providing input to enhance your organization's applications. Helping to select new applications. Keeping abreast of new technologies. Working in the IT side of the organization.

Working in the IT side of the organization.

The data in a data warehouse: are updated constantly in real time. are updated in batch mode, approximately once per day. are not updated. are purged constantly as new data enter. are available for MIS analysts, but not users.

are not updated.

In a university's relational database, the student record contains information regarding the student's last name. The last name is a(n): attribute. entity. primary key. object. file.

attribute.

Access controls involve _____ before _____. biometrics, signature recognition authentication, authorization iris scanning, voice recognition strong passwords, biometrics authorization, authentication

authentication, authorization

A listing of all courses offered at your university would be considered _____, whereas a listing of all courses required in your major would be considered _____. information, data knowledge, information information, knowledge data, information data, knowledge

data, information

A purchase of books in the college bookstore is ___________. The report at the end of the day showing sales totals for the day is ____________. information, knowledge information, data data, information data, database data item, business intelligence

data, information

As a manager in your company, you expect to retrieve ______ from operational systems and present it as _________ to your boss, who will react based on his ____________. knowledge, information, data information, data, knowledge data, information, knowledge data, information, experience information, experience, wisdom

data, information, knowledge

Which of the following is the correct hierarchy from the lowest level to the highest level? knowledge, information, data information, data, knowledge data, information, knowledge data, information, experience information, experience, wisdom

data, information, knowledge

Over the past 20 years, hardware costs have _____, while software costs have _____. increased, increased decreased, decreased decreased, increased increased, decreased increased, remained level

decreased, increased

Which strategy for competitive advantage involves offering different products, services, or product features? cost leadership differentiation innovation operational effectiveness customer-orientation

differentiation

In a _____ attack, a coordinated stream of requests is launched against a target system from many compromised computers at the same time. phishing zero-day worm back door distributed denial-of-service

distributed denial-of-service

Moore's Law predicted that microprocessor complexity would ______. double every year double every two years increase slowly decrease slowly decrease rapidly

double every two years

Bob is using public key encryption to send a message to Ted. Bob encrypts the message with Ted's _____ key, and Ted decrypts the message using his _____ key. public, public public, private private, private private, public none of these

public, private

New technologies can produce new products very _____, which _____ the threat from substitute products. Selected Answer: Incorrect [None Given] Answers: slowly, decreases slowly, increases slowly, does not affect quickly, increases quickly, does not affect

quickly, increases

In a relational database, every row represents a(n) _____. file record attribute primary key secondary key

record

In _____, the organization takes concrete actions against risks. risk management risk analysis risk mitigation risk acceptance risk transference

risk mitigation

In _____, the organization purchases insurance as a means to compensate for any loss. risk management risk analysis risk mitigation risk acceptance risk transference

risk transference

Refer IT's About Business 2.1 - Sharing Bicycles. Alta's competitive advantage stems from the fact that they have a unique product or service they have un-replicable business model they have a first mover advantage they are the cost leader in their industry none of the above

they have a unique product or service

A _____ is any danger to which an information resource may be exposed. vulnerability risk control threat compromise

threat

Information-based industries are most susceptible to which one of Porter's five forces? threat of entry of new competitors bargaining power of suppliers bargaining power of customers threat of substitute products rivalry among existing firms in an industry

threat of substitute products

Refer to IT's About Business 2.4 - The Surui Tribe of the Amazon: The Surui Tribe's use of technology demonstrates how IT can be used to to conserve natural resources to prevent deforestation to catch criminals to create carbon off-sets to create awareness about environmental problems

to prevent deforestation

A _____ is intellectual work that is known only to a company and is not based on public information. copyright patent trade secret knowledge base private property

trade secret

Dumpster diving is: always illegal because it is considered trespassing. never illegal because it is not considered trespassing. typically committed for the purpose of identity theft. always illegal because individuals own the material in the dumpster. always legal because the dumpster is not owned by private citizens.

typically committed for the purpose of identity theft.

What is _____ is not necessarily _____. illegal, unethical ethical, illegal unethical, illegal unethical, legal ethical, legal

unethical, illegal

In a database, the primary key field is used to _____. specify an entity create linked lists identify duplicated data uniquely identify a record uniquely identify an attribute

uniquely identify a record

Tacit knowledge has which of the following characteristics? codified objective unstructured rational technical

unstructured

Enterprise resource planning systems were designed to process transactions faster. evolved because newer technologies made older systems obsolete. use a common database for all functional areas. are utilized to conduct site analyses. all the above statements are true.

use a common database for all functional areas.

Random access memory is _____ and _____. volatile, temporary nonvolatile, permanent nonvolatile, temporary volatile, permanent volatile, inexpensive

volatile, temporary

What are the three distinct characteristics that distinguish big data from traditional data? volume, variety and veracity volume, velocity and verification volume, velocity and variety volume, verification and variety

volume, velocity and variety

An information system's _____ is the possibility that the system will be harmed by a threat. vulnerability risk control danger compromise

vulnerability

A _____ is a document that grants the holder exclusive rights on an invention for 20 years. copyright patent trade secret knowledge base private property notice

patent

The costs of delivering products in the _____ channel are much higher than delivering products in the _____ channel. e-commerce, digital digital, e-commerce digital, physical physical, financial physical, digital

physical, digital

When data are normalized, attributes in the table depend only on the _____. secondary key common attribute primary key common row common record

primary key

An organization's IT components include all of the following except: a network programs procedures a database monitors

procedures

_____ is (are) data that have been organized to have meaning and value to a recipient. Insights Information Knowledge Experience Wisdom

Information

Which of the following statements is false? BPM is a task-oriented approach. BPM can help companies reduce costs. BPM can help companies increase revenue. BPM can improve customer satisfaction. BPM can improve organizational flexibility.

BPM is a task-oriented approach.

Refer to IT's About Business 2.5 - Massachusetts Mutual Transforms Its Information Systems: What kind of transformation did Massachusetts Mutual Transforms undergo? BPI BPR BPM

BPR

Refer to IT's About Business 2.2 - Chevron: The changes over the past few years at Chevron were brought about by __________ and __________ at the company level and ____________ at the local level. BPI, BPM, BPR BPR, BPI, BPM BPM, Six Sigma, BPR BPR, BPM, BPI

BPR, BPM, BPI

The cost of a stolen laptop includes all of the following except: Loss of intellectual property Loss of data Backup costs Loss of productivity Replacement cost

Backup costs

You have just been hired by the largest manufacturer in your area to join their management trainee program. You enjoyed your "computer course" in college and hope that you'll be able to put that knowledge to good use. Which of the following might you expect to do during the management training program? Code a new application Recommend new technologies that might impact the organization Design a new application Become familiar with tools to support using data for decision making Work 9-5 in your office

Become familiar with tools to support using data for decision making

In the data hierarchy, the smallest element is the _____. Record Bit Byte Character File

Bit

Place the following members of the data hierarchy in their correct order: Bit - byte - field - record - database - file Bit - field - byte - record - file - database Byte - bit - record - field - database Bit - byte - field - record - file - database Bit - record - field - byte - file - database

Bit - byte - field - record - file - database

The title of the executive who is in charge of the people who design and build information systems, the people who use those systems, and the people responsible for managing those systems is the CEO CFO CIO CIS CIT

CIO

The type of primary storage, located closest to the CPU, where the computer can temporarily store blocks of data used most often is called: Read-only memory. Registers. Random access memory. Cache memory. Flash memory.

Cache memory.

Jun has bought an accounting package for her business, which involves selling unique lamp bases and shades. She and a part-time employee are getting up to speed on the package but are having trouble matching her business processes to the software. What does Jun have to do to make the software more effective? Change the UI Change the way the program works Change her business processes to match the software Install an updated version of the software Hire another part-time worker to help

Change her business processes to match the software

Various organizations that promote fair and responsible use of information systems often develop a _____. Code of ethics Strategic plan Mission statement Responsibility charter Goals outline

Code of ethics

The computing skills necessary to be a hacker are decreasing for which of the following reasons? More information systems and computer science departments are teaching courses on hacking so that their graduates can recognize attacks on information assets. Computer attack programs, called scripts, are available for download from the Internet. International organized crime is training hackers. Cybercrime is much more lucrative than regular white-collar crime. Almost anyone can buy or access a computer today.

Computer attack programs, called scripts, are available for download from the Internet.

_____ are sequences of instructions used to direct the workings of a computer. Computer programs Microcode instructions Assembler commands Systems software Input/output instructions

Computer programs

Refer to IT's About Business Section Reference 1: 1.2 - Internet Registry Enhances Island Nation's Economy, Which of the following statements is true about the ways Tokelau has benefited by giving the use the its top level country domain .tk to Freedom Registry? Freedom Registry sells the .tk domain name at a cost and pays Tokelau a portion of its earnings Freedom Registry earns revenue from advertising on expired websites that is shared with Tokelau

Freedom Registry earns revenue from advertising on expired websites that is shared with Tokelau

Which of the following processes involves the warehouse, sales, and accounting functional areas? Procurement Fulfillment Order entry Accounts Receivable Payroll

Fulfillment

___________ include B2B and B2C. Enterprise resource planning systems Computer-based information systems Functional area information systems Interorganizational information systems

Functional area information systems

Which one of the following statements is false? Businesses tend to view government regulations as expensive constraints on their activities. Government deregulation reduces competition. IT support is essential for compliance with many new regulations. IT has been used to identify patterns of behavior associated with terrorist activities. Information ethics can destroy the morale of a company's employees.

Government deregulation reduces competition.

Refer to Opening Case - What to Do About WikiLeaks?: Which of the following is false about WikiLeaks? Anyone can submit files to WikiLeaks. The most controversial expose involved the U.S. government. Governments and companies are using network forensics to identify intruders who break into systems. Because of WikiLeaks, governments and companies are trying to use data leak prevention software to prevent unauthorized downloads. WikiLeaks is legally protected in the U.S. because it is merely a conduit for the documents.

Governments and companies are using network forensics to identify intruders who break into systems.

The _____ allows users to exert direct control of icons on the computer screen. Systems software Application software Graphical user interface Plug-and-play Operating system

Graphical user interface

Which of the following is not a reason why software currently comprises a larger percentage of the cost of modern computer systems than it did in the early 1950s? Hardware costs have increased. Hardware performance has increased. Software has become increasingly complex. Building software applications remains slow, complex, and error-prone. None of the above

Hardware costs have increased.

For many organizations, business process reengineering Is easy to implement. Is not disruptive to implement. Has little impact on facilities. Is inexpensive. Has a major impact on the corporate culture.

Has a major impact on the corporate culture.

Managing pay and payroll is an example of a(n): Accounting Business Process Finance Business Process Marketing Business Process Human Resources Business Process Management Information Systems Business Process

Human Resources Business Process

_____ is/are the computer hardware, software, and communications technologies that are used by IT personnel to produce IT services. IT components IT services Information technology An information system A computer-based information system

IT components

IT personnel use _____ to produce _____. IT components, IT services computer-based information systems, IT architecture IT infrastructure, IT architecture IT infrastructure, IT platform IT components, IT architecture

IT components, IT services

The IT infrastructure is comprised of _______ and ________. IT components, IT personnel IT components, IT services IT services, IT personnel IT personnel, computer-based information systems Computer-based information systems, IT personnel

IT components, IT services

Which of the following statements about the potential impact of IT on non-managerial workers is true? IT will create more jobs than it eliminates. Employees will feel a higher degree of loyalty towards their company. IT could cause employees to experience a loss of identity. The flexibility of IT can minimize stress on the job.

IT could cause employees to experience a loss of identity.

Which of the following statements is false? IT ultimately decreases the number of managers and experts. IT makes managers more productive. IT increases the number of employees who can report to a single manager. IT reduces stress by giving managers more time to make decisions. IT decreases the number of promotional opportunities.

IT reduces stress by giving managers more time to make decisions.

Creating specific application software using an organization's own resources is called ____. Outsourcing Consultant-based development In-house development Contract software Documentation

In-house development

Which of the following is not an overall trend in software? Increased complexity Increased cost Increased number of errors Increased amount of mainframe software written by users Increasing percentage of the costs of information systems

Increased amount of mainframe software written by users

The overall trends in software include all of the following except: Increased complexity. Increased cost. Increased number of defects. Increased security. Increasing percentage of the costs of modern computer systems.

Increased security.

Competitive advantage for an organization manifests itself as all of the following except: Lower costs Higher quality Increased time to market Increased profits Increased speed

Increased time to market

Arrange the hierarchy of terms to describe memory capacity in the correct sequence, from smallest to largest: Megabyte - kilobyte - gigabyte - terabyte - exabyte - petabyte Exabyte - petabyte - terabyte - gigabyte - megabyte - kilobyte Kilobyte - megabyte - gigabyte - terabyte - petabyte - exabyte Petabyte - exabyte - kilobyte - gigabyte - kilobyte - terabyte Kilobyte - gigabyte - megabyte - exabyte - petabyte - terabyte

Kilobyte - megabyte - gigabyte - terabyte - petabyte - exabyte

_____ conveys understanding, accumulated learning, and expertise as they apply to a current problem. Data Information Knowledge Experience Wisdom

Knowledge

_____ is a process that helps organizations identify, select, organize, disseminate, transfer, and apply expertise that are part of the organization's memory and typically reside inside the organization in an unstructured manner. Discovery Knowledge management Decision support Online analytical processing Data mining

Knowledge management

_____ can be exercised to solve a problem, whereas _____ may or may not be able to be exercised to solve a problem. Knowledge, information Data, information Information, data Information, knowledge Data, knowledge

Knowledge, information

Which of the following is not a cause of inadequate alignment between IT and business? A lack of communication Different objectives Not understanding each group's expertise Lack of IT knowledge on the part of the business executives Lack of funds

Lack of funds

______________ is a legal concept that gives individuals the right to recover the damages done to them by other individuals, organizations, or systems. Privacy Responsibility Transferability Accountability Liability

Liability

Which of the following does not affect the speed of the machine instruction cycle? Clock speed Word length Bus width Line width Physical design of the chip

Line width

Which of the following statements is correct? International privacy and security laws are very consistent. Consistent international privacy and security laws help companies with their regulatory requirements from country to country. Consistent international privacy and security laws enable information to flow freely among countries. The absence of consistent international privacy and security laws has led to a complex global legal framework. Consistent international privacy and security laws are followed by all countries.

The absence of consistent international privacy and security laws has led to a complex global legal framework.

Which of the following is not an example of business - IT alignment? The company goals are clear to every IT and business employee. The company ensures that IT employees understand how the company makes money. The company views IT as a way to support the business but not as a way to create new revenue streams. IT professionals rotate into business departments. The company views customer service as extremely important.

The company views IT as a way to support the business but not as a way to create new revenue streams.

You receive an e-mail from your bank informing you that they are updating their records and need your password. Which of the following statements is true? The message could be an industrial espionage attack. The message could be a phishing attack. The message could be a denial of service attack. The message could be a back door attack. The message could be a Trojan horse attack.

The message could be a phishing attack.

You start a new job, and the first thing your new company wants you to do is create a user ID and a password. Which of the following would be a strong password? The name of the company Your last name Your birthdate Your initials (capitalized) and the number of the floor you are on The name of the company spelled backward

The name of the company spelled backward

Which of the following is not a component of hardware? Primary and secondary storage The operating system Input and output technologies The central processing unit Communication technologies

The operating system

Your company's headquarters was just hit head on by a hurricane, and the building has lost power. The company sends you to their hot site to minimize downtime from the disaster. Which of the following statements is true? The site will not have any servers. The site will not have any workstations, so you need to bring your laptop. The site is probably in the next town. The site should be an almost exact replica of the IT configuration at headquarters. The site will not have up-to-date data.

The site should be an almost exact replica of the IT configuration at headquarters.

Which of the following statements about your future role as a manager is false? The people I manage will likely be dispersed geographically. The size of my team will likely be smaller than teams of today. There will be less emphasis on office politics. Many of my decisions will be "real time". I will need IT tools to handle the data I utilize to make decisions.

The size of my team will likely be smaller than teams of today.

The amount and type of memory that a computer possesses affects all the following except: The type of program the computer can run. The speed of the computer. The cost of the computer. The cost of processing data. The speed of data entry.

The speed of data entry.

You start a new job, and human resources gives you a ten-page document that outlines the employee responsibilities for information security. Which of the following statements is most likely to be true? The document recommends that login passwords be left on a piece of paper in the center desk drawer so that others can use the laptop if necessary. You are expected to read the document, and you could be reprimanded if you don't follow its guidelines. You can back up sensitive data to a thumb drive so you can take them home to work with. The document indicates that you can leave your laptop unlocked if you leave your desk for less than an hour. The document permits you to lend your laptop to your brother for the weekend.

You are expected to read the document, and you could be reprimanded if you don't follow its guidelines.

Knowledge workers handle day-to-day operations within an organization. make tactical decisions. advise middle managers. make routine decisions. are generalists.

advise middle managers.

An organization's information technology architecture: provides a guide for current operations. provides a blueprint for future directions. integrates the information requirements of the organization and all users. is analogous to the architecture of a house. all of the above

all of the above

Refer to IT's About Business 5.4: Hospital Improves Patient Care with Data Warehouse: A single source of all patient data, accessible to multiple hospitals will have the following benefit aid in medical research reduce duplicate tests eliminate the need for patients to do their own record keeping faster transfer of high-volume image data across different locations all of the above

all of the above

Historically, management information systems have focused on capturing, storing, managing, and reporting _____ knowledge. tacit explicit managerial geographical cultural

explicit

The process of moving data from various sources into the data warehouse is called: uploading. extracting, transforming, and loading. online transaction processing. master data management. online analytical processing.

extracting, transforming, and loading.

Ted works in his family's bakery business. They supply bread and rolls to neighboring restaurants, and they have their own-store front where they sell breads, rolls, pastries, cookies and cupcakes. Ted wants to build a web site for the business that will allow customers to order cookies and cupcakes for later pickup. Is this idea a strategic information system in alignment with the business in support of a cost leadership strategy likely to provide long term competitive advantage a support activity within the value chain

in alignment with the business

Office automation systems support only the clerical staff. are comprised of software that is used to develop documents and spreadsheets. include report generators. are a type of interorganizational system. are usually developed in-house.

include report generators.

For most companies, the Web _____ the threat that new competitors will enter the market by _____ traditional barriers to entry. Selected Answer: Incorrect [None Given] Answers: decreases, increasing increases, decreasing increases, increasing decreases, decreasing

increases, decreasing

The _____ complexity of software results in a _____ potential for errors. decreasing, decreasing decreasing, increasing increasing, decreasing increasing, level increasing, increasing

increasing, increasing

The list of all your purchases from Amazon (books bought, price paid, dates) is defined as ___________. data information knowledge experience wisdom

information

An organization's _____ consists of the physical facilities, IT components, IT services, and IT management that will support the entire organization. information technology architecture information technology infrastructure information technology information system computer-based information system

information technology infrastructure

Which strategy for competitive advantage involves introducing new products and putting new features in existing products? cost leadership differentiation innovation operational effectiveness customer-orientation

innovation

As an individual student in your university's student database, you are a(n) _____ of the STUDENT class. instance individual representative entity relationship

instance

A database management system is primarily a(n) _____. file-handling program data-modeling program interface between applications and a database interface between data and a database interface between queries and a database

interface between applications and a database

The threat of competitors' entering a market is very high in industries that perform a(n) _____ role and in industries where the primary product or service is _____. intermediation, physical broker, physical sales, financial financial, digital intermediation, digital

intermediation, digital

At your university, students can take more than one class, and each class can have more than one student. This is an example of what kind of relationship? one-to-one one-to-many many-to-one many-to-many some-to-many

many-to-many

Refer to Closing Case - IBM's Watson: IBM Watson differs from other information systems' capabilities in the following manner: it can store vast amounts of information it can search through a large amount of information it can process natural language commands it can process large amounts of information in response to a query and assign confidence measures to a set of possible solutions it can selectively update information based on current trends on the Internet

it can process large amounts of information in response to a query and assign confidence measures to a set of possible solutions

The most overlooked people in information security are: consultants and temporary hires. secretaries and consultants. contract laborers and executive assistants. janitors and guards. executives and executive secretaries.

janitors and guards.

When companies attempt to counter _____ by requiring users to accurately select characters in turn from a series of boxes, attackers respond by using _____. keyloggers, screen scrapers screen scrapers, uninstallers keyloggers, spam screen scrapers, keyloggers spam, keyloggers

keyloggers, screen scrapers

If Amazon uses a list of all your purchases (books bought, price paid, dates) to recommend other books to you, then it is applying its _____. data information knowledge experience wisdom

knowledge

You are registering for the next semester at your university. You take into account your major, the courses you need, the prerequisites for each course, the times you take each course, and the professors teaching each section, as well as your work schedule. You are using _____ to select your class schedule. information knowledge experience wisdom data

knowledge

Which of the following factors is not increasing the threats to information security? smaller computing devices downstream liability the Internet limited storage capacity on portable devices due diligence

limited storage capacity on portable devices

The threat of competitors' entering the automobile manufacturing industry is _____ because barriers to entry are so _____. low, low high, high high, low low, high

low, high

Unintentional threats to information systems include all of the following except: malicious software tailgating power outage lack of user experience tornados

malicious software

IT will impact managers' jobs in all of the following ways except: managers will have time to get into the field managers can spend more time planning managers can spend more time "putting out fires" managers can gather information more quickly none of the above

managers can spend more time "putting out fires"

If there are _____ substitutes for an organization's products or services, then the threat of substitutes is _____. many, high few, low few, high many, low few, negligible

many, high

Producing customized items in large quantities is called: strategic systems. customer focus. continuous improvement. mass production. mass customization.

mass customization.

The Bodymetrics body scanner is best characterized as an example of: mass production. customer focus. real-time customer input. mass customization. continuous improvement.

mass customization.

Producing identical items in large quantities is called: strategic systems. customer focus. continuous improvement. mass production. mass customization.

mass production.

Explicit knowledge has which of the following characteristics? objective personal slow costly to transfer ambiguous

objective

Which strategy for competitive advantage involves improving the manner in which an organization executes its internal business processes? cost leadership differentiation innovation operational effectiveness customer-orientation

operational effectiveness

Ted works in his family's bakery business. They supply bread and rolls to neighboring restaurants, and have their own store-front where they sell breads, rolls, pastries, cookies, and cupcakes. Ted thinks he should put free Wi-Fi in the store front (which seats about 15 people). This idea reflects which one of Porter's five competitive forces? threat of entry of new competitors bargaining power of suppliers bargaining power of customers threat of substitute products rivalry among existing firms in an industry

rivalry among existing firms in an industry

The visibility of Internet applications on the Web makes proprietary systems more difficult to keep secret. This is an example of which of Porter's five forces? threat of entry of new competitors bargaining power of suppliers bargaining power of customers threat of substitute products rivalry among existing firms in an industry

rivalry among existing firms in an industry

Traditional data formats change ______ while big data formats change _______. slowly, rapidly rapidly, slowly slowly, incrementally both formats of data change at the same rate

slowly, rapidly

The digital divide is an example of which type of societal pressure? social responsibility government regulations protection against terrorism ethics information overload

social responsibility

Voice and signature recognition are examples of: something the user is. something the user wants. something the user has. something the user knows. something the user does.

something the user does.

Biometrics are an example of: something the user is. something the user wants. something the user has. something the user knows. something the user does.

something the user is.

Passwords and passphrases are examples of: something the user is. something the user wants. something the user has. something the user knows. something the user does.

something the user knows.

A standardized language used to manipulate data is _____. MS-Access Oracle query-by-example language structured query language data-manipulation language

structured query language

For the following entity-relationship diagram, the attributes you would NOT expect to see in the Computer entity are Untitled-1 manufacturer. type (laptop or desktop). memory size. disk size. student's dorm room.

student's dorm room.

Market pressures include which of the following? the global economy weak competition a homogeneous workforce weak customers high-cost offshore labor

the global economy

In a process called _____, a company allows nothing to run unless it is approved, whereas in a process called _____, the company allows everything to run unless it is not approved. whitelisting, blacklisting whitelisting, encryption encryption, whitelisting encryption, blacklisting blacklisting, whitelisting

whitelisting, blacklisting

An organization's e-mail policy has the least impact on which of the following software attacks? virus worm phishing zero-day spear phishing

zero-day


Kaugnay na mga set ng pag-aaral

Adolescent Development: Introduction Biological and Social Transitions

View Set

Peripheral Vascular PrepU/ Sakai Quiz

View Set

GOVT 2305 Exam Review (For Test #2 of 3)

View Set

Anthropology Kinship and Family test

View Set

Nevada Driver's Handbook: Highway Markings

View Set

Chapter 43: - PrepU - Nursing Assessment: Neurologic Function

View Set