MIS FINAL
_____ consists of server and client software, the Hypertext Transfer Protocol (HTTP), standards, and markup languages that combine to deliver information and services over the Internet.
The Web
Which statement about the drivers that help set information system organizational strategy is false?
They include innovative thinkers inside, but not outside, the organization.
How are machine learning and artificial intelligence different?
They learn through different processes.
How do experienced project managers handle risk?
They plan alternative courses of action.
Why, during the final stage of the multistage model for e-commerce, is comprehensive customer information captured in the supplier's database?
This facilitates customer service after order delivery.
What do organizations or individuals who provide information over the Internet use to designate where resources such as servers and documents are located?
URL
What initiates the processing flow for an order processing system?
a customer requests a product or service
Top career options in AI include becoming _____.
a data scientist, who analyzes large data sets to follow patterns and find trends
Fair information practices is a term for _____.
a set of guidelines that govern the collection and use of personal data
When you are looking for a "hotspot," you are searching for _____.
a wireless access point
A trusted third-party organization that issues attachments to emails or embedded Web site data to verify the identity of a sender or Web site is known as a(n) _____.
certificate authority
Using the values held by his organization, Don has defined an ethical approach for dealing with the needs of his team members and their customers that he has implemented within his department. His team members know what is expected of them, and their customers know what to expect from the organization. The primary benefit of this approach for Don's department is _____. Correct!
consistent operation
Which of the following is considered an "expense" among typical IS project-related costs?
consultant charges
A senior IS manager decides to invest in an information system that will reduce subcontractor labor costs for her organization by facilitating relocation of tools and materials to more optimal locations while rearranging workflows. What business strategy does this represent?
cost leadership
What must a networked device possess to truly belong to the IoT?
an IP address
Which statement about objectives and goals matches the way these terms are used in your text?
an objective is a statement of a compelling business need that an organization must meet
Within a SQL database, achieving the property of atomicity means that attributes _____.
are values that have no component parts
Which of the following is a provision of the USA PATRIOT Act?
authorization of "snack and peak warrants" for law enforcement agencies
_____ include the people, procedures, hardware, software, data, and knowledge needed to develop computer systems and machines that can simulate human intelligence processes including learning, reasoning, and self-correction.
Artificial intelligence systems
A _____ is a subset of a data warehouse that is used by small- and medium-sized businesses and departments within large companies to support decision making.
data mart
A key purpose of data normalization is to eliminate _____.
data redundancy
Which of the following is NOT considered a component of business intelligence?
data transaction processing
Because Airbnb needs to support a rapid growth in its number of users but prefers to hire a service to organize and configure its information systems infrastructure, it relies on a(n) _____.
database as a service
A tier 3 or 4 data center would be most necessary for an organization with which characteristic?
dependent on computers to manage manufacturing operations
If you shop for goods for personal use on Amazon.com, _____.
depending on which state you are in, you may or may not pay tax
Each attribute in a relational database model can be constrained to a range of allowable values called a _____.
domain
MYSTIC, Downstream, Upstream, the Secure Flight Program, and Stingray are all examples of _____.
government surveillance systems
High-quality data can increase sales by facilitating cross-selling, which involves _____.
inviting customers to purchase an item related to what they are primarily interested in
The organization's _____ is typically stated in a challenging manner to inspire employees, customers, and shareholders.
mission statement
The way consumers and large enterprises use the IoT is evolving because of advances in _____.
mobile communications
Jocelyn uses a company-owned smartphone for her job, and has noticed that applications, data, and patches are installed on her smartphone for her by a central control group. She cannot change the system or security settings on the smartphone because the central control group handles those as well. Jocelyn's company can do this using _____.
mobile device management software
One challenge to successful ERP implementation is the cost and disruption associated with upgrades when _____.
multiple other systems must be integrated with the enterprise system
Which of the following is NOT a recognized BI and analytics technique?
online transaction processing
What type of software is distributed, typically for free, with the source code also available so that it can be studied, changed, and improved by its users?
open-source
You are part of the team assigned to implement new software at XYZ Inc. The employees at XYZ Inc. trust the results obtained from the old software, but are cautious about accepting those from the proposed new software. What software implementation strategy would you recommend in this situation to allow users fall-back access to the old system as the new one is implemented?
parallel start up
One reason for the growth in business-to-consumer (B2C) e-commerce is that online B2C shoppers have the ability to design a _____ product.
personalized
The attack vector that relies on email messaging to deceive the victim into revealing personal data is known as _____.
phishing
In a manufacturing enterprise resource planning (ERP) system, demand management _____.
refines a production plan by determining the amount of weekly or daily production needed to meet the demand for individual products
What is the first stage of the multistage model for B2B and B2C e-commerce?
search and identification
The purpose of an advanced persistent threat usually is to ____.
steal data
Which of the following transactions requires online transaction processing and is not a candidate for the batch processing approach?
stock investments
5G networks can support the exchange of brief bursts of data between next-generation autonomous cars because they provide _____.
sub-millisecond latency
One important difference between B2B and B2C e-commerce systems that primarily affects the second stage of the multistage model for e-commerce is that _____.
support for price and delivery negotiation is usually not essential with B2C systems
The set of activities involved in building information systems, large and small, to meet users' needs is called _____.
system development
Because SQL databases conform to ACID properties, _____.
their database transactions are processed reliably
Kennedy's company is adopting a service-oriented architecture approach to software development. This means that _____.
their software will be flexible enough to allow the addition of new services
Which of the five forces in Michael Porter's model is determined by entry barriers such as the capital required?
threat of new competitors
In most organizations, projects that involve finance and accounting must be scheduled to avoid conflicting with end-of-quarter operations. This demonstrates which key project parameter (and constraint)?
timing
The goal of unsupervised learning is for the machine to _____.
train itself to learn from the input and be in a mode of continuous improvement
Compared with 4G networks, 5G networks _____.
transmit more data
When an organization chooses to subscribe to an on-demand software service rather than buy or build software, that organization _____.
typically has 24/7 access to technical support
Small- and medium-sized enterprises (SMEs) are legally independent enterprises with _____ employees.
up to 500
The goals of _____ are to determine the work load at which systems performance begins to degrade and to identify and eliminate any issues that prevent the system from reaching its required system-level performance.
volume testing
Who uses the product pick list generated by an order processing system?
warehouse workers who fill orders
When Josephine uses an instant messaging application to ask her coworkers questions related to a presentation she is developing for an upcoming conference, she is improving her productivity using a(n) _____.
workgroup information system
When Edward finds out that his organization, which is struggling financially, is contemplating the implementation of a new enterprise system, it worries him. Does Edward have any valid reason to be concerned?
yes, because problems with an enterprise system implementation can be expensive to fix
Because of ____ e-commerce sites, anyone can become a merchant online.
C2C
_____ is the standard page description language for Web pages.
Hypertext Markup Language (HTML)
_____ is a social networking site designed to help its members develop a professional network.
_____ involves running a complete new system for one group of users rather than all users.
Pilot start-up
_____ is a process for driving traffic to a Web site by using techniques that improve the site's ranking in search results.
Search engine optimization
The Pareto principle is also known as the _____.
80-20 rule
Why are advances in 5G technology expected to influence the IoT?
5G enables many devices to transmit data quickly to the cloud.
What is one advantage that SaaS confers because it is deployed and managed from a central location?
A company can run its business from a computer with any browser.
Because they must deal with large quantities of data from so many different sources, IS employees at financial institutions may be at increased risk of failing to comply with government regulations designed to prevent money laundering, such as the _____.
Bank Secrecy Act
Which country has both the largest online population and probably the most rigorous Internet censorship in the world?
China
_____ is the use of software to assist in the creation, analysis, and modification of the design of a component or product.
Computer-aided design
_____ is a subset of e-commerce that involves electronic transactions between consumers using a third party to facilitate the process.
Consumer-to-consumer (C2C) e-commerce
_____ requires unbiased and careful questioning of whether system elements are related in the most effective ways, considering new or different relationships among system elements, and possibly introducing new elements into the system.
Critical analysis
Which statement about the Foreign Intelligence Surveillance Act (FISA) is true?
FISA created a court that meets in secret to hear applications for surveillance orders in the U.S.
Which of the following is required to create a traditional data warehouse but NOT a data lake?
Extract Transform Load process
If your home air conditioner has an IP address, it is part of the ____.
Internet of Things
How does software-defined networking reduce both the risk of human error and overall network support and operations costs?
It automates configuration, policy management, and other tasks.
Which of the following is a potential disadvantage of self-service analytics?
It can lead to over-spending on unapproved data sources and business analytics tools.
Leonard, a data scientist working in an information systems organization, is considering pursuing a certification in either Hadoop or Python. How would this benefit Leonard?
It may expand his career possibilities.
Which statement about ethics and laws is true?
Legal acts conform to the law, whereas ethical acts conform to an individual's beliefs.
When comparing potential software solutions for her company, Mavis observes that two of the three packages meet their needs closely and are similar in price, whereas the third is significantly cheaper but would require custom modifications to meet their needs. Which of the following is true?
Mavis should investigate the costs for modifying the less expensive option.
Suppose Task C has two predecessor tasks: Task A and Task B. Task A ends on May 8 and Task B ends on May 13. When can Task C begin?
May 14
The _____ standard spells out measures and security procedures to safeguard the card issuer, the cardholder, and the merchant.
Payment Card Industry (PCI) security
_____ is/are considered to be the most important element in computer-based information systems.
People
Which of the following legislation protects Facebook, Twitter, and other social networking organizations from defamation suits in connection with posts made by their users?
Section 230 of the Communications Decency Act
_____ is the process of analyzing systems to make sure they are operating as intended.
System review
_____ are the most powerful computers with the fastest processing speed and highest performance.
Supercomputers
_____ creates a complete set of technical specifications that can be used to construct an information system.
System design
Tim is a software developer who codes using a higher-level language utilizing a compiler. Which is true of Tim's programs?
The compiler translates the programs into a machine language.
Corporate social responsibility activities such as philanthropy benefit for-profit organizations because they _____.
gain the goodwill of the community
A useful model that describes how teams develop is the forming-storming-norming-performing-_____ model.
adjourning
Marina is a data scientist at a large financial corporation, and therefore she _____.
aims to uncover insights that will influence organizational decisions
A company's risk assessment process can consider numerous threats to the computers and networks. Which of the following should an organization identify as loss events or threats to assess?
all of the above
In which of the following forms of e-commerce is the seller most likely to offer a customized product offering to a potential buyer?
business-to-consumer (B2C) e-commerce
A security self-assessment revealed that Penelope, who owns one laptop computer, is putting herself at risk for cyberattack by _____.
backing up critical files to a single folder on her laptop once every three months
Payroll transactions and billing are typically done via _____.
batch processing
Which of the following is NOT a task typically associated with the systems analyst role?
collaborating with others to build a software product from scratch
Assessing damage following a computer incident, investigating the unauthorized disclosure of corporate confidential data, and confirming or evaluating the impact of industrial espionage are tasks most appropriate for _____.
computer forensics
The accounting, tax, and advisory company Grant Thornton International has several IS labs around the world that employ experts who examine digital evidence for use in legal cases. Their activities are best characterized as an example of _____.
computer forensics
A common reason an organization chooses a private rather than a public cloud environment is _____.
concerns about data security
Familiar applications of neural networks include _____.
email spam filters and speech-to-text applications
You might be a successful information systems worker if you _________.
enjoy learning new techniques and enjoy working with people
To improve his score on a security self-assessment, Saul set up his laptop so that the first thing he must do when he turns it on is _____.
enter a strong security password
A(n) _____ is central to individuals and organizations of all sizes and ensures that information can be shared across all business functions and all levels of management to support the running and managing of a business.
enterprise system
What determines the size of words in a word cloud?
frequency of occurrence of the word in source documents
Rosie, an office manager, recommends that her company transition to the public cloud because the office building is located in a tornado-prone area and has experienced property damage several times in the past as a result. She reasons that this move will _____.
guarantee continuity of operations even if the office is damaged by a tornado
Thomas is preparing to implement a new software package that his project team has selected and purchased. Thomas should _____.
help his coworkers identify and make any needed changes to their current processes using a DFD
Francis will need to adjust his information system strategic plan when _____.
his firm's corporate strategy changes
Which of these analysis methods describes neural computing?
historical data is examined for patterns that are then used to make predictions
It is not against the law for Ethel to possess an automatic weapon, but she believes possessing one is the wrong thing to do. For Ethel, possessing an automatic weapon is _____.
legal but unethical
Ryleigh knows that it is crucial to ensure that key business decisions are made using high-quality data. She argues that this is one reason why her firm should invest in _____.
improved data management
An organization using a public cloud allows the service provider to store their data in a remote location, possibly on the same storage device as other organizations' data. This results in which key concern with the public cloud?
inadequate data security
What is the first step in the training process for an artificial neural network?
input is given
For the ____ operation, it is required that the the two tables have a common data attribute.
join
Tara and Zach are leading a systems development project and they want the investigation phase to go smoothly and quickly. They decide to use _____ because it will also help with the analysis and design phases.
joint application development
The _____ is the heart of the operating system and controls its most critical processes.
kernel
Harold's city government uses data from sensors combined with artificial intelligence to improve the local infrastructure and efficiently manage traffic lights, water supplies, and energy usage. Harold _____.
lives in a smart city
Someone who violates computer or Internet security maliciously or for illegal personal gain is known as a(n) _______.
lone wolf attacker
Mavis is considering signing up for a hosted enterprise software solution for her small business. She recognizes that an advantage of this software option is _____.
low financial investment and risk
Wholesale e-commerce applications often focus on improving a plant manager's efficiency in researching prices and availability from suppliers for _____.
manufacturing, repair, and operations goods and services
Suppose a goal your employer sets reads as "95% of our customers will be happy with our latest software upgrade within 1 month of its release." For which of the following characteristics is this goal inadequate?
measurable
Carson's supervisor has asked him to review a variety of portable computers for possible purchase for their company's employees. Which of the following should Carson NOT consider buying?
nettops
A botnet is a ____.
network of computers that send out access requests to servers repeatedly
Humans can make decisions based on the data that is input through our senses because that data is filtered through _____.
neurons
Samuel's employer experiences a lot of bad publicity after sensitive customer data is accidentally released. Samuel recognizes that this is a sign of _____.
poor data management
A single-tenant cloud computing environment is also known as a(n) _____.
private cloud
An important consideration for businesses considering a hybrid cloud computing approach is that a secure, reliable, low-latency connection must be provided by their _____.
private network
When entering a customer order, Josie ensures that the desired end result is achieved and any problems are reported to the correct person by following a(n) _____.
procedure
Many organizations outsource the primary activities of which stage of the multistage e-commerce model to firms such as Federal Express and United Parcel Service?
product and service delivery
James is hired as a consultant for an IS-related project and tasked with checking the finished system to ensure it meets the quality standards identified earlier in the course of the project. In this situation, James is responsible for _____.
quality control
Projects _____.
range in size and complexity from completing a spreadsheet to integrating two corporations
Machine learning is useful for the detection of health care fraud because it can successfully _____.
recognize patterns in the way insurance claims are filed
June and her team are planning the implementation of a new company-wide order processing information system. One of June's major concerns is the need to _____.
redesign key work processes
If an organization considers its IS organization a cost center or service provider, then one of its primary IS goals would be to _____.
reduce IS costs
Because electronic devices are composed of materials such as beryllium, cadmium, lead, mercury, BFRs, selenium, and polyvinyl chloride, one of the three goals of green computing is to _____.
reduce the use of hazardous material
Which of the goals of green computing, if implemented successfully, would be the BEST practice for reducing the hazards posed by e-waste in the United States?
reduce the use of hazardous material
Reagan's firm has not had to make large investments in computer or networking hardware or in personnel to maintain the hardware because they use public cloud computing. Reagan recognizes that this demonstrates which key benefit of public cloud computing?
reduced costs
The key challenges associated with big data include the difficulty of locating and deriving value from _____.
relevant data to make decisions
The percentage of adults in an area who are interested in opening an account with an investment company drops significantly after the media reports on a successful cyberattack on this organization. This is most likely the result of _____.
reputation damage related to the cyberattack
Thomas is part of a project team charged with selecting a software package for his company. The primary tool he can use to determine whether the market has a product to meet their needs is the _____.
request for information
Advanced vision systems help manufacturing plants work efficiently because _____.
robots can continue working with humans nearby
A _____ is a conditional statement that links conditions to actions or outcomes.
rule
A _____ network is one in which all network devices are connected to one another through a single central device called the hub node.
star
Clara has a device that responds to her voice commands by reviewing her calendar appointments, performing search queries, and playing streaming music. This is an example of a(n) _____.
smart speaker
An important responsibility of the data governance team is to _____.
specify who is accountable for each portion or aspect of the data
The ancestor of the Internet was _____.
the ARPANET
Big data veracity is a measure of _____.
the accuracy, completeness, and currency of the data
If customer data is stolen from a business's computers, _____.
the customers can file a class action law suit agains the business
During the load phase of the ETL process, _____.
the data is checked against the constraints defined in the database schema
The number of mobile Web sites worldwide has grown rapidly, in part because of _____.
the development of new and useful applications
An expert system's knowledge acquisition facility serves as an interface between _____.
the experts and the knowledge base
Rheneas wants to ensure his management team is aware of the common causes for failed enterprise system implementations before they begin their own. He points out to the team that _____.
the failure rate for ERP implementations worldwide is 21 percent
One of the advantages of off-the-shelf software is that ________________.
the initial cost is lower because the software firm can spread the development costs over many customers
Thomas and Emily are discussing the affect of AI on future employment. Emily correctly points out that _____.
the introduction of new technology has always resulted in the creation of more jobs than were lost