MIS Exam 3
What is a potential problem if there is a natural disaster? A) property loss B) theft C) accidents D) terrorist activity E) hacking
A) property loss
Which of the following usually happens in a malicious denial-of-service attack? A) A hacker monitors and intercepts wireless traffic at will. B) A hacker floods a Web server with many millions of bogus service requests. C) An intruder uses another site's IP address to masquerade as that other site. D) A phisher pretends to be a legitimate company and requests confidential data. E) A hacker identifies vulnerabilities in network hosts.
B) A hacker floods a Web server with many millions of bogus service requests.
Facebooks is an example of a ________ because it provides a platform that enables the creation of social networks. A) marketing platform B) social media provider C) user D) community E) connection
B) social media provider
The manager of ABC, Inc decides to order the same number of widgets this year as last year. The manager has made a(n) ________ decision. A) informed B) structured C) gut D) regular E) centralized
B) structured
Which of the following is most likely to be a result of hacking? A) certain Web sites being censored for hurting sentiments B) small amounts of spam in a user's inbox C) an unauthorized transaction from a user's credit card D) pop-up ads appearing frequently E) slowing of network speed
C) an unauthorized transaction from a user's credit card
A ________ is a person or an organization that seeks to obtain or alter data or other IS assets illegally, without the owner's permission and often without the owner's knowledge. A) target B) vulnerability C) threat D) key escrow E) cipher
C) threat
__________ will enable an organization to determine whether it is under systematic attack or whether an incident is isolated. Encryption Practicing response to an attack Training personnel Quickly responding to an attack Centralized reporting
Centralized reporting
A new organizational position, called __________, has become common as organizations seek to develop and manage innovative social media programs. Chief Social Officer Chief Media Officer Chief Digital Officer Chief Message Officer Chief Design Officer
Chief Digital Officer
Which of the following is characterized by a group of people who work together following a process of feedback and iteration to achieve a common goal? Participatory work Collaboration Brainstorming Critical thinking Cooperation
Collaboration
An employee who believes he is about to be terminated intentionally destroys data. This is an example of which type of threat? Hacking Sniffing Computer crime Natural disaster Human error
Computer crime
When creating a new spreadsheet model, which of the following needs to be considered? A) What the model needs to accomplish? B) How much detail the model needs to show? C) From where does the data for the model come? D) All of the above E) None of the above
D) All of the above
________ is the investment of resources for future profit. A) Business to business B) Social media C) The marketplace D) Capital E) Attending a business function
D) Capital
Which social media site would organizations use to hire the best people? A) Twitter B) Facebook C) SharePoint D) LinkedIn E) Instagram
D) LinkedIn
All of the following are sources of threats except ________. A) human error B) computer crime C) natural events D) firewalls E) natural disasters
D) firewalls
Which of the following is considered a computer crime? A) accidental deletion of important records B) poorly written programs resulting in information loss C) loss of data as a result of flooding D) hacking of information systems E) failure to correctly back up customer data
D) hacking of information systems
The factors included in social capital evaluation are ________. A) Social Capital = Number of Relationships + Relationship Strength + Entity Resources B) Social Capital = Number of Relationships + Relationship Strength / Entity Resources C) Social Capital = (Number of Relationships + Relationship Strength) x Entity Resources D) Social Capital = Number of Relationships / Relationship Strength x Entity Resources E) Social Capital = Number of Relationships * Relationship Strength * Entity Resources
E) Social Capital = Number of Relationships * Relationship Strength * Entity Resources
Which of the following statements is NOT accurate? We do not know the full extent of the financial and data losses due to computer security threats. When conducting studies on the cost of computer crimes, some organizations don't report all their losses. Threats that involve hacking are attempts to obtain private data. There are no standards for tallying computer crime costs. Forms of usurpation deny access to legitimate users.
Forms of usurpation deny access to legitimate users.
The collaborative tool set that provides a power curve with an early flat spot that then increases to a moderate level is the _________ tool set. Primitive Comprehensive Minimal Good Open-source
Good
Collaboration information systems that are "in the cloud" include _______. Google Drive SharePoint LibreOffice Adobe Photoshop OpenOffice
Google Drive
Which of the following statements is accurate? By 2029, organizations will disappear. In the future, employers will have to stop allowing employees to bring their own devices to work. Because of social media and other technological advances, it will be impossible to manage employees in the future. There will be no more need for managers and executives in businesses because all employees will become directly empowered to interact directly with one another and accomplish company tasks without costly supervisory overhead. Managers may sense a loss of control in the future but managing employees may mean you have to harness the power of social behavior to advance your strategy.
Managers may sense a loss of control in the future but managing employees may mean you have to harness the power of social behavior to advance your strategy.
________ are those that support operational day-to-day activities. A) Operational decisions B) Managerial decisions C) Strategic decisions D) Snap decisions E) Allocation resources
Operational decisions
What is one feature that differentiates social media information systems (SMIS) from Web site applications? A) A user can comment on a Web site. B) SMIS has connection data. C) SMIS has more users than a Web site. D) SMIS do not use browsers. E) A user has to login to a Web site to use the special features.
SMIS has connection data.
In an accounts payable department, the department supervisor can both approve an expense and write a check to cover the expense. This situation illustrates ignoring which type of human safeguard? Insufficient screening Inadequate hiring procedures Incomplete termination procedures Least possible privilege Separation of duties
Separation of duties
__________ enables the relationship between customers and organizations to emerge in a dynamic process as both parties create and process content. Social CRM Social MIS Traditional MIS Traditional CRM Social Sales IS
Social CRM
__________ is defined as the investment in social relations with the expectation of returns in the marketplace. Social capital Physical capital Human capital Resource capital Friend capital
Social capital
Which is the single most important safeguard that an individual computer user can implement? Removing high-value data assets from the computer Using strong passwords Clearing cookies and browser history Using http at trusted vendor sites Updating anti-virus software
Using strong passwords
An asynchronous communication method that keeps the team's work product organized and encourages participation is __________. a discussion forum file sharing a webinar virtual meeting email
a discussion forum
The most common criterion used by student teams to judge the success of the team effort is _______ have the fewest possible team meetings perceive the team experience to be satisfying and meaningful achieve a successful outcome minimize conflict and aggravation strengthen the team's capabilities
achieve a successful outcome
Collaborative information systems must support the primary collaborative purpose of _________, which means ensuring that team members are conceiving information in the same way. managing projects making friends becoming informed making decisions
becoming informed
An organization with a social media goal of increasing brand awareness might choose the metric of __________ to track performance. brand mentions in social media posts visitor frequency rate social media referral traffic reshares of social media content social media content click rate
brand mentions in social media posts
The likelihood that someone who clicks on an ad completes a transaction that benefits the advertiser is termed the __________. monetization rate completion rate advertising success rate conversion rate customer retention rate
conversion rate
________ is a group of people working together, all doing essentially the same work to accomplish a job A) Cooperation B) Collaboration C) Team work D) Working together E) Strategists
cooperation
A team of customer service representatives provides service to an organization's customers by answering questions from individual customers and solving individual customer problems. This team follows a ____________ work process. consistent complex matrix cooperative collaborative complimentary
cooperative
It is important that organizations __________ as the first step in developing a social media information system. identify success metrics define their goals make personal connections gather and analyze data identify the target audience
define their goals
A popular, widely-used team communication method that is likely to be disorganized and disconnected is ________. discussion forums chat sessions wikis surveys emails
emails
The use of social media to facilitate cooperative work of people within an organization is termed a(n) __________. enterprise social network employee social network management social network functional social network corporate social network
enterprise social network
TRUE/FALSE Human error cannot cause unauthorized data disclosure
false
By 2029, collaboration systems will result in __________. decreased ability of employees to work at home increased need for classroom-style corporate training far more face-to-face (F2F) meetings increased need for business travel far fewer face-to-meetings (F2F)
far fewer face-to-meetings (F2F)
Preventing unauthorized network access using hardware or a hardware/software combination is accomplished with a(n) __________. firewall key escrow authentication encryption key malware definition
firewall
The use of social networks within an organization includes all of the following characteristics EXCEPT __________. links search tags signals folklore
folklore
Jerry is in a group that only provides positive feedback because of group cohesion. Jerry is concerned the group is participating in ________. A) cooperation B) collaboration C) groupthink D) criticism E) a feedback loop
groupthink
When an organization encrypts sensitive data, it is important that it follow a procedure called a __________ to safeguard the loss or damage to the encryption key. key template duplicate key key locker random key key escrow
key escrow
An important aspect of a business team's successful outcome is ____________. improvement camaraderie meeting a deadline and budget completing a task decision making
meeting a deadline and budget
The next major security challenges will likely be those affecting __________. personal computers mobile devices software applications people DBMS
mobile devices
By 2029, security threats will continue to exist, but __________. human error will not cause problems the loss potential will be minimal organizations can be better prepared for them they will not affect most organizations organizations can ignore them
organizations can be better prepared for them
The computers that run the DBMS and all devices that store database data should reside in locked, controlled-access facilities. This is an example of __________. a key escrow a technical safeguard firewall physical security encryption
physical security
An often-overlooked aspect of an organization's incident response plan is __________. failing to respond quickly virus detection knowing who to inform training practicing the incident response
practicing the incident response
When organizations enable social media communities to rapidly propose and evaluate complex supply chain problem solutions, the primary concern is __________. contradictory advice uncertainty privacy loss of control how to provide compensation
privacy
Collaborative information systems _______ specify standards, policies, and techniques for conducting the team's work. data hardware software procedures people
procedures
The data component of a collaborative information system that includes the team's schedules, tasks, and budgets is the __________. project data schedule task list project budget project metadata
project metadata
In a security system the purpose of a username is to __________. enable screening provide authentication add complexity provide identification provide interpretation
provide identification
Organizations such as Facebook, LinkedIn, and Twitter are termed social media __________, since they provide the platforms that enable the creation of social networks. participants providers content enablers communities
providers
The Comprehensive set of collaboration tools requires a significant time investment to learn and ________. is readily available to all users provides little value to the users most team members already know how to use these tools provides a high degree of utility is typically cost free to use
provides a high degree of utility
Which of the following is vitally important to a meaningful work experience? A) Teaching other team members tasks. B) Having a successful outcome C) Recognizing individuals for their contribution to the team. D) Promotion opportunities. E) Shortening the learning curve for new activities
recognizing individuals for their contribution to the team
Your personal IS security goal should be to find an effective trade-off between __________ and __________. level of threats; level of vulnerabilities risk of loss; level of complexity risk of loss; cost of safeguards level of threats; level of inconvenience level of complexity; cost of safeguards
risk of loss; cost of safeguards
When it comes to risk of security threats and losses, __________. sources of risk are diminishing risks cannot be eliminated risk is declining every year risk is unimportant to senior management only the IS department employees need be involved in this issue
risks cannot be eliminated
The simplest, most effective, and least expensive way to share a task list is _________. post the task list in the discussion forum share the task list on Google Drive share the task list using LibreOffice distribute the task list as an email attachment share the task list using SharePoint
share the task list on Google Drive
The purpose of developing a(n) __________ is to delineate employees' rights and responsibilities regarding social media. work rule guideline social media policy enterprise policy restricted action statement social media promotion
social media policy
Organizations seek to __________ relationships to increase the likelihood that the other party in the relationship will do something beneficial to the organization. broaden promote review strengthen expand
strengthen
A collaborative team is not likely to be tasked with dealing with _________. unstructured decisions solving problems managing projects becoming informed structured decisions
structured decisions
In the future, collaboration systems are expected to _____________. increase the need for face-to face (F2F) meetings substantially improve international business operations increase the need for large office spaces to house employees increase the need for business travel decrease the ability of employees to work from any location
substantially improve international business operations
A difficult aspect of understanding the cost of computer security threats is the fact that most data are based on __________ methods that have several weaknesses. forecasting survey projection estimation verification
survey
A well-managed team makes sure that all of the following are accomplished at the end of a meeting, EXCEPT __________. the task list is updated tasks are written so that completion of the task is measurable task completion dates are established task responsibility is assigned the date of the next team social event is in the calendar
the date of the next team social event is in the calendar
TRUE/FALSE A spreadsheet model is a physical representation of a larger or more complicated thing or idea
true
TRUE/FALSE Column Charts are useful when comparing different categories of items or the same category over time
true
TRUE/FALSE Email spoofing is a synonym for phishing
true
TRUE/FALSE Line charts are useful for identifying trends in a dataset
true
TRUE/FALSE Pie Charts express the parts of a data series as percentages
true
TRUE/FALSE The two key characteristics of collaboration are iteration and feedback
true
TRUE/FAlSE Social media allows people to form communities.
true
Besides selling advertising, social media providers frequently make money by __________. collecting member fees charging users when pages are created using the freemium model monetizing "Likes" selling ad-blocking software
using the freemium model
A __________ is an opportunity for threats to gain access to individual or organizational assets. target vulnerability security flaw safeguard threat
vulnerability
An organization's policy statement about customer data should include all of the following elements EXCEPT __________. whether sensitive data will be shared what sensitive data will be stored what field is used as the primary key who can see sensitive data how sensitive data will be processed
what field is used as the primary key
__________ personnel have been, often inadvertently, the source of serious security risks. Data administration Help-desk Senior management Database administration IS operations
Help-desk
_________ includes the risk of inappropriate and negative comments. User-generated content Controlled content Purposeful content Open content Restricted content
User-generated content
Social media data consists of two components, __________ and __________. Question content area bottom content; social content; connection friend; social user; friend friend; connection
content; connection
When a team of students decide to meet together at a specific date and time using videoconferencing, they are utilizing a(n) __________ communication practice. asynchronous, single location asynchronous, multi-location synchronous, single location synchronous, virtual meeting synchronous, multi-location
synchronous, virtual meeting