MIS Final
Which of the following is true of unsupervised data mining?• A) Analysts do not create a model or hypothesis before running the analysis.• B) Neural networks are a popular unsupervised data mining application.• C) Unsupervised data mining requires tools such as regression analysis.• D) Unsupervised data mining requires analysts to fit data to suggested hypotheses.
A) Analysts do not create a model or hypothesis before running the analysis.•
________ is defined as information containing patterns, relationships, and trends of various forms of data.• A) Process mining• B) Business process management• C) Business intelligence• D) Spatial intelligence
Business Intelligence
Which of the following statements is a characteristic of outsourcing?• A) Management should have expertise on a subject before it can decide to outsource.• B) An outsource vendor transfers the responsibility of risk management to the development group.• C) To achieve quality, it is easier to hire another vendor than it is to rehire internal staff.• D) Outsourcing leads to increased financial risk.
C) To achieve quality, it is easier to hire another vendor than it is to rehire internal staff.
With ________, statistical techniques can identify groups ofentities that have similar characteristics.• A) regression analysis• B) cluster analysis• C) expert systems• D) neural networks
Cluster analysis
________ are information systems that support the management and delivery of documents including reports,Web pages, and other expressions of employee knowledge.• A) Decision Support Systems (DSS)• B) Online Analytical Processing (OLAP) applications• C) Content Management Systems (CMS)• D) Data Transfer Protocols (DTP)
Content Management Systems (CMS)
Artificial intelligence (AI) requires a large amount of ____ in order to learn, represent knowledge, and process natural language.• A) Time.• B) Consumers.• C) Developers.• D) Data.
Data
________ is the process of obtaining, cleaning, organizing, relating, and cataloging source data.• A) Data entry• B) Data acquisition• C) Data mining• D) Data encryption
Data acquisition
________ protect databases and other organizational data.• A) Cookies• B) Payloads• C) Data safeguards• D) Data strings
Data safeguards
What is one way humans can survive the workplace shift caused by artificial intelligence?• A) Stop experimenting• B) Develop skills machines cannot do• C) Create personal goals• D) Discourage creativity
Develop skills machines cannot do
A robotic fast-food worker is far-fetched and something that may occur far in the future.
False
Aligning information systems with organizational strategy is a one-time process
False
An information system need not relate to any business process ,but a business process should relate to at least one information system.
False
Artificial intelligence is the ability of a machine to simulate all human tasks
False
As problems caused by human errors are accidental and not malicious, they are not considered as security threats to the information system
False
Business processes, information systems, and applications have the same characteristics and components.
False
Data mart is another term used for a data warehouse.
False
Data warehouses do not include data that are purchased from outside sources.
False
If a scrum project terminates because of budget or time limitations, the customer will not receive any result for the time and money expended.
False
In Business Process Modeling Notation (BPMN), dotted arrows depict the flow or sequence of the activities in a process
False
In market-basket terminology, confidence is the probability that two items will be purchased together.
False
In the context of information security, safeguards increase work efficiency by making common tasks easier.
False
In the context of responsibilities involved in job positions in the IS industry, a technical writer develops test plans, and designs and writes automated test scripts
False
It is safer to use the same password for all the Web sites
False
Only desktops can be connected smart devices
False
Outsourcing does not present any risks related to ending an agreement
False
Replacing an outsource vendor who is integrated into the business can be done without a lot of expenditure or duplication of effort
False
The losses due to human error are minimal; hence, organizations tend to ignore these losses.
False
The structure of the IS department remains constant across organizations.
False
________ is the term used to denote viruses, worms, and Trojan horses.• A) Malware• B) Cookie• C) Firewall• D) Spam
Malware
________ records the source, format, assumptions and constraints, and other facts about the data.• A) Clickstream data• B) Dimensional data• C) Outsourced data• D) Metadata
Metadata
________ occurs when someone deceives by pretending to be someone else.• A) Hacking• B) Usurping• C) Sniffing• D) Pretexting
Pretexting
________ analysis is a way of analyzing and ranking customers according to their purchasing patterns.• A) TQM• B) CRM• C) Market-basket• D) RFM
RFM
A common business application of decision trees is to classify loans by likelihood of default.
True
A data mart is a data collection that addresses a particular functional area of the business.
True
A steering committee is a group of senior managers from the major business functions that works with the chief information officer to set the IS priorities
True
A work breakdown structure (WBS) is a hierarchy of tasks required to complete a project.
True
An application is a combination of hardware, software, and data components that accomplishes a set of requirements.
True
Data mining is the application of statistical techniques to find patterns and relationships among data for classification and prediction.
True
Drive-by sniffers monitor and intercept wireless traffic at will.
True
Granularity is a term that refers to the level of detail represented by the data.
True
Hadoop is an open-source program supported by the Apache Foundation4 that implements MapReduce on potentially thousands of computers.
True
In case of Software as a Service (SaaS), hardware and both operating system and application software are leased
True
In the context of responsibilities involved in job positions in the IS industry, a business analyst works with business leaders to develop systems that implement business strategy and goals.
True
In the system definition phase of the SDLC, schedule feasibility is difficult to determine because it is hard to estimate the time it will take to build the system.
True
Knowledge management is the process of creating value from intellectual capital and sharing it with those who need it.
True
OLAP provides the ability to sum, count, average, and perform other simple arithmetic operations on groups of data.
True
One of the major functions of the information systems department is to develop, operate, and maintain applications
True
Operational data is structured for fast and reliable transaction processing.
True
Outsourcing is the process of hiring another organization to perform a service
True
SQL injection attack occurs when users enter an SQL statement into a form in which they are supposed to enter a name or other data
True
Technical safeguards involve the hardware and software components of an information system.
True
The four fundamental categories of BI analysis are reporting, data mining, BigData, and knowledge management.
True
The purpose of the data administration group is to protect data and information assets by establishing data standards and data management practices and policies.
True
The security of online transactions has increased with the use of https
True
The senior management must establish a company-wide security policy that states the organization's posture regarding the data that it gathers
True
The systems development life cycle (SDLC) is a process that can be used to develop both information systems and applications.
True
The three primary activities in the BI process are to acquire data, perform analysis, and publish results
True
There are activities in business processes that do not involve an information system.
True
Unauthorized data disclosures are possible due to human error .
True
In a business process, a role refers to ________.• A) a physical repository• B) the movement of data• C) a collection of data• D) a collection of activities
a collection of activities
With ________, the sender and receiver transmit a message using different keys.• A) asymmetric encryption• B) block cipher• C) symmetric encryption• D) stream cipher
asymmetric encryption
During the requirements definition stage of developing an information system, the project team will consist mostly of________.• A) programmers and testers• B) testers and business users• C) business and systems analysts• D) database designers and administrators
business and systems analysts
If an organization does not develop programs in-house, then the development group of the IS department will be staffed primarily by________ who work with users, operations, and vendors to acquire and install licensed software and to set up the system components around that software.• A) programmers and development personnel• B) PQA test engineers• C) business and systems analysts• D) technical writers
business and systems analysts
A ________ is a network of activities, repositories, roles, resources, and flows that interact to accomplish a business function.• A) business stature• B) business analysis• C) business process• D) business policy
business process
The responsibilities of a ________ include advising the chief information officer, executive group, and project managers on emerging technologies.• A) technical writer• B) chief financial officer• C) system analyst• D) chief technology officer
chief technology officer
According to Brooks' Law, adding more people to a late project will ________.• A) guarantee efficiencies• B) speed up the project• C) create diseconomies of scale• D) reduce the need for coordination
create diseconomies of scale
The first step in the system definition phase of the systems development life cycle (SDLC) is to ________.• A) plan the project• B) conduct a feasibility study• C) determine the goals and scope• D) form the project team
determine the goals and scope
In the context of KM systems, ________ attempted to directly capture employee expertise.• A) expert networks• B) expert systems• C) expert analyses• D) expert decisions
expert systems
Which of the following is classified as a technical safeguard?• A) cookies• B) firewalls• C) key escrow• D) passwords
firewalls
The final phase of the systems development life cycle (SDLC) is________ A) implementing the system• B) determining the requirements• C) maintaining the system• D) designing system components
maintaining the system
Which of the following shows the products that customers tend to buy together? A) regression analysis• B) market-basket analysis• C) neural networks• D) cluster analysis
market-basket analysis
Which of the following shows the products that customers tend to buy together?• A) regression analysis• B) market-basket analysis• C) neural networks• D) cluster analysis
market-basket analysis
Which of the following is a right of users of information systems?• A) installing programs and applications of their choice• B) making hardware modifications when desired• C) receiving effective training• D) obtaining the configuration of their choice
receiving effective training
In a Business Process Modeling Notation (BPMN) diagram, a________ symbol represents an activity.• A) dotted arrow• B) rectangle• C) diamond• D) solid arrow
rectangle
Which of the following is an example of a supervised data mining technique?• A) cluster analysis• B) market-basket analysis• C) regression analysis• D) click streaming
regression analysis
Which of the following is a function of the steering committee for an IS department?• A) writing program code• B) imparting training• C) adapting software• D) setting IS priorities
setting IS priorities
In order for a computer to pass the ____, a human should have a conversation with it and not be able to tell if it was a machine or a human.• A) Super test• B) language test• C) supervised data mining• D) click streaming
supervised data mining
With ________, data miners develop a model prior to the analysis and apply statistical techniques to data to estimate parameters of the model. A) cluster analysis• B) unsupervised data mining• C) supervised data mining• D) click streaming
supervised data mining
A ________ works with users to determine system requirements, designs and develops job descriptions and procedures, and helps determine test plans.• A) system analyst• B) business analyst• C) user support representative• D) systems auditor
system analyst
Tasks in the ________ phase of the SDLC include building and testing system components and converting users to the new system.• A) system definition• B) component design• C) system maintenance• D) system implementation
system implementation
The SDLC process follows a linear sequence from requirements to design to implementation. Therefore, the SDLC process is also known as the ________.• A) waterfall method• B) swim-lane method• C) scrum process• D) agile development method
waterfall method