BTECH Final Study Guide
29) ________ is the most secure cable medium
Fiber-optic
7) A network stretching across New York City would be a ________.
MAN
Google maps continuously checks traffic conditions, constructions and available routes to give you the fastest way to your destination? This is an example of _________ type of data analysis.
Prescriptive analysis
Experts argue business analytics and business intelligence should be used interchangeably.
True
Whitelisting allows nothing to run unless it is on the whitelist.
True
A(n) _________ is a software package that attempts to identify and eliminate viruses and worms.
anti-malware system
A(n) ________ of an entity refers to each row in a relational table, which is a specific, unique representation of the entity.
instance
Your company hires FireEye to install security software and monitor your systems.This is an example of risk _________.
limitation
4) ___ are a set of core data that span the enterprise information systems.
master data
6) While late-model cars often utilize any number of technologies to make the driving experience more enjoyable and safer for drivers, there has yet to be a car that is completely autonomous.
False
_________ is an attack by a programmer developing a system.
A trojan horse
Which of the following is NOT a problem associated with Big Data?
Big data can be structured, unstructured, or semi-structured
15) ________ modems operate over coaxial cable.
Cable
Hackers would use a botnet to perform a _________.
DDoS
VPN is a trusted network.
True
Database systems maximize ________.
independence
Stealing a company's business plan is a violation of
intellectual property rights
10) A data ___ is a low-cost, scaled-down version of a data ___.
mart; warehouse
4) MANs are the largest networks.
False
Validation of the model and answering the question "what are my options" occur in the _____ phase of the Business decision making.
design
Rummaging through commercial or residential trash to find discarded information is called
dumpster diving
The IDC model created by Herbert Simon stands for ______________.
intelligence, design, choice
9) A data ___ is a repository of historical data that are organized by subject to support decision makers in the organization.
warehouse
What is a Decision Support System (DSS)
An information system facilitating organizational decision-making
56) ________ is the largest-volume application running over the Internet.
________ is an example of a source system for a data warehouse.
ERP
12) A relational database is basically one big table; it is also called a flat file.
False
37) The MIS department creates the business rules necessary to develop an ER diagram.
False
38) A circle for cardinality represents a single relationship.
False
A CPA firm typically performs an internal business audit.
False
You have to go through every step of the Business Decision Making process every time for every problem.
False
24) ________ cables are made of glass.
Fiber-optic
How does Firewall help in controlling network communication ?
Firewall is used to divide external and internal networks into "zones" using IP addresses. Rules are created to accept or deny network traffic from specific zone(s) to other zone(s) using specific network protocols (such as SMTP, HTTP, etc.)
In Disaster Recovery terms, a __________ allows a company to continue operation without any interruption.
Hot site
54) ________ was developed to address the Internet of Things.
IPv6
47) A(n) ________ is a company that provides Internet connections for a fee.
ISP
A connected vehicle is equipped with Internet access and usually with a wireless ________.
LAN
11) ________s allow devices to physically connect to the LAN's communication's .
NIC
17) In the example in prob 15, what type of relationship exist between Passenger and Seats ? Why ?
None. A passenger can only be assigned a Seat in a flight on a specific date. We need a table that connects Passenger, date of travel and the seat number.
14) ___ is a method of analyzing and reducing a relational database to its most streamlined form to ensure minimum redundancy, maximum data integrity, and optimal processing performance.
Normalization
If you analyze a data cube, this is an example of using ________.
OLAP
_________ involves slicing and dicing data, drilling down in the data, and rolling up data to greater summarization.
OLAP
Suppose your university automatically logs you off of a university computer after 15 minutes of disuse.This is an example of a(n) _________ control.
Physical
Greatest threat to a Nuclear power plant comes from what type of attack ?
SCADA attack
________ is the most popular query language used for interacting with a database.
SQL
21) ________ is a broadcast medium
Satellite
Alien software that captures screen every few seconds and sends to the hacker is called________________
Screen scrapper
_____ analysis examines the change in an output given the change in a particular input while keeping all other inputs constant.
Sensitivity
While deciding to purchase a plane ticket from LAX to Boston, you change the preferred departure time, date of travel and number of stops to get the best option. You see the number of options changing as you select various range of options. What type of Decision Support analysis are you performing ?
Sensitivity analysis
The difference between Phishing attack and Spear Phishing attack is
Spear phishing is much more targeted and contains specific personal information of the recipient, appearing to be genuine. Phishing attack is much more generic and does not contain person-specific information.
Cyberterrorism is typically carried out by individuals or groups whereas cyberwarfare is carried out by nation states or nonstate actors such as terrorists.
True
Data mining is a statistical tool for descriptive and predictive analytics.
True
Equifax could have upgraded and patched the software that was the cause of the breach.
True
Government systems typically lack resources and IT expertise and operate on outdated hardware and software. This makes them particularly vulnerable to ransomware attacks.
True
ID cards address physical and access controls.
True
IT security is the business of everyone in an organization.
True
If you choose not to protect your information systems, you have adopted a risk acceptance strategy.
True
The Management Cockpit is a dashboard used by executives and board members
True
The entire business analytics process starts with a business problem or organizational "pain point".
True
The external audit of information systems is frequently a part of the overall external auditing performed by a CPA firm.
True
The internet is an untrusted network.
True
Weak passwords can be addressed through multi-factor authentication.
True
You are a nice person, so you hold the door open for the person running in behind you. Since you needed to use your ID badge to open the door, the person running in behind you is tailgating.
True
18) ________ is a cable medium
Twisted-pair
While deciding to purchase a plane ticket from LAX to Boston, you change the preferred departure time, date of travel and number of stops to get the best option. You see the number of options changing as you select various range of options. What type of Decision Support analysis are you performing ?
What-if analysis
Worm is more dangerous than a virus because _________________
Worm does not need any program to be run. Virus is associated with a program that has to be run by the user.
You don't lock your computer when you go to the restroom. This is_________ and is an_________ mistake.
a human error; unintentional
Triple Z Travel site allows customers to reserve discount hotel rooms and airline tickets with certain companies they have relationships with. In order to secure the credit card information used by customers, which of the following controls would you recommend Triple Z use? a) Biometrics b) Transport layer security c) Whitelisting d) Audits
biometrics
XYZ Inc. scanned the fingerprints of all of their employees and now uses these fingerprints to authenticate their employees and grant them access to different areas of the company's facilities. XYZ Inc.is utilizing which type of technology? a) Cookies b) Intellectual Property c) Biometrics d) Malware
biometrics
Bandwidth is stated in ____ per second.
bits
A ________ is a group of eight ________.
byte; bits
________ refers to the maximum number of times an instance of one entity can be associated with an instance in the related entity.
cardinality
Suppose you are failing one of your classes. Based on your evaluation, you decide to start paying attention in class and talking to the teacher about ways to improve. This decision is part of the _________ phase of the Business Decision making process (Herbert-Simon model).
choice
Verification/testing of the proposed solution and picking an option occur in the _____ phase of the Business decision making.
choice
1) ___ are those data that visitors and customers produce when they visit a website and click on hyperlinks.
clickstream data
A _________ site provides only rudimentary services and facilities.
cold
61) ________ refers to efforts by two or more entities who work together to accomplish certain tasks.
collaboration
Which of the following is NOT a use for data mining?
comparing products
Using images from a website without exclusive permission of the creator is a violation of _____________
copyright
56) A(n) ________ portal is an intranet.
corporate
57) Which of the following is NOT a reason some US companies are moving their call center operations back to the US?
cost
Which of the following is NOT an advantage of VPN?
cost
Which of the following is the correct order of the KMS cycle?
create, capture, refine, store, manage, disseminate
If you want to know what items customers typically buy together so that you can place them next to each other on the shelf, you would be using _________.
data mining
_______ are/is NOT a statistical tool for prescriptive analytics.
data mining
TCP protocol breaks down data into small chunks called ______
data packets
______________________ is the process of converting raw data into a smaller amount of more useful information.
data reduction
Suppose you are failing one of your classes. You know you need to pay attention in class, study every day, take better notes, read the book before the lectures, or talk to the teacher about ways to improve. You developed this list in the _________ phase of the Business Decision making process (Herbert-Simon model).
design
Laurie heads up a team creating a new process for the shipping department of her company. She worked with external consultants and wrote a process diagram. After getting upper management's opinions the team posted the new diagram to a corporate portal site. They are now demonstrating the new process to all shipping department employees. Laurie's team is at the ________ knowledge stage of the KMS cycle.
disseminate
The __________ of an information resource is the harm, loss, or damage that can result if a threat compromises the resources.
exposure
45) An/The ________ connects networks of multiple organizations so they can communicate securely.
extranet
Databases maximize _________; this means ________.
independence; applications and data are not linked to each other, so all applications are able to access the same data
All the information about you in your university's database is a(n) ________.
instance
Business _______________ has been defined as a broad category of applications, technologies, and processes for gathering, storing, accessing, and analyzing data to help business users make better decisions
intelligence
Examination and answering the question "what is the problem" occur in the ______ phase of the Business decision making.
intelligence
Databases minimize _________; this means ________.
isolation; applications cannot access data associated with other applications
A ___ connects two or more devices in a limited geographical region so that every device on the network can communicate with every other device.
local area network or LAN
________________ is a process by which an organization achieves its goals through the use of resources.
management
Considering the nature of decision, acquiring and using resources efficiently in accomplishing organizational goals is ___________.
management control
A data ________ is a low-cost, scaled-down version of a data ________ that is designed for the end-user needs in an SBU or an individual department.
mart; warehouse
3) ___ is a process that spans all organizational business processes and applications.
master data management
Databases ________ redundancy; this means ________.
minimize; the same data stored in multiple locations
Databases ________ inconsistency; this means ________.
minimize; various copies of the data do not agree
Normalization is a method for analyzing and reducing a relational database to its most streamlined form to ensure ________ redundancy, ________ data integrity, and optimal processing performance.
minimum; maximum
_____ is NOT a statistical tool used for predictive analytics.
multidimensional analysis
39) The ________ layer of TCP/IP places packets on, and receives them from, the network , which can be any networking technology.
network interface
A _________ is an official document that grants the holder exclusive rights on an invention or a process for a specified period of time.
patent
An official document that grants the holder exclusive rights on an invention or a process for a specified period of time is called a ________
patent
Targeted marketing relies on _________ analytical information.
predictive
________ analytics drives the coupons you get at the grocery store when you use your loyalty card.
predictive
Productivity is a _________.
ratio between the inputs and outputs for which a manager is responsible
Management is a process by which an organization achieves its goals through the use of ___________.
resources
You recently inherited an Alvin and The Chipmunks "A Chipmunk Christmas" record. Since you don't have a record player, you need to find a way to convert the record into a CD. This is an example of data ________.
rot
What is the main purpose of Internet protocol ?
routing data through various network interface
Each relational database table contains records (listed in _______) and attributes (listed in ______) .
rows; columns
_________ is a deliberate act that involves defacing an organization's website, potentially damaging the organization's image and causing its customers to lose faith.
sabotage
What type of broadband is good for remote areas ? why ?
satellite broadband, since it does not need any physical cables
_________ is an unintentional threat.
social engineering
An __________ to an information resource is any danger to which a system may be exposed.
threat
The relational database model is based on the concept of ________-dimensional tables.
two
If humans are careless with laptops, this is an_________ error which could cause theft of equipment or information (an_________ error) .
unintentional; intentional
__________ decisions deal with "fuzzy", complex problems.
unstructured
_________ is a remote attack requiring user action.
virus
60) ________ is a disadvantage of telecommuting.
visibility
8) The three distinct characteristics of Big Data are ___.
volume, velocity, and variety
An information resource's __________ is the possibility that the system will be harmed by a threat.
vulnerability
You assume the inflation rate will remain constant over the next few years, so you consider purchasing a home with a variable interest rate. You decide to double-check this assumption with a(n) __________ analysis.
what-if
Auditing _________ the computer means using a combination of client data, auditor software, and client and auditor hardware.
with
Current US laws award patents for_________ years and copyright protection for _________ years.
20; life+70
5) A(n) ___ is a collection of logically related records.
data file
Database systems minimize ________.
inconsistency
Broadband is defined as more than _____ download and more than _____ upload capacity
25 Mbps, 3 Mbps
6) A byte is a group of ___ bits.
8
Industry experts estimate that ________ percent of data in an organization is unstructured.
80-90
_________ is a physical control.
A company gate
_________ is a communications control.
A firewall
What is a Botnet?
A group of computers that have been hijacked for performing simultaneous malicious attacks, such as DDoS attacks or other cybercrimes.
_________ controls restrict unauthorized individuals from using information resources.
Access
21) A Student table has been designed to have the following fields: Student ID, Student Name, Date of Birth, Age, Gender, Grade, Parents, Siblings. What is/are wrong with the Student entity ?
Age is a calculated field - so it does not belong in the table. parents and Siblings refer to multiple values. A specific field cannot have multiple values.
Which of the following companies is NOT developing cars and self-driving technology/services?
Amazon
16) ________ modem services share bandwidth among subscribers in a locality, so speeds can decrease significantly when large numbers of neighbors access the Internet at the same time.
Cable
A(n) _________ is located between two firewalls.
DMZ
__________ analytics answers the question "what has happened".
Descriptive
____________ analytics summarize what has happened in the past and allow decision makers to learn from past behaviors.
Descriptive
13) ________ modems convert information for use on the POTS.
Dial-up
14) ________ modems convert information for use on the POTS and are almost extinct in most parts of the developed world today.
Dial-up
28) ________ is a disadvantage of fiber-optic cable.
Difficult to work with
_________ is a remote attack requiring no user action.
DoS
When a hacker highjacks a system and instead of destroying the data threatens to publish sensitive or personal information to the public, it is called ____________
Doxxing (or Doxing)
_________ is a capability of dashboards that gives the user the ability to go to details at several levels by a series of menus or by clicking on a portion of the screen that can be expanded.
Drill down
_________ is an access control.
Encryption
15) Peer-to-peer processing is illegal.
False
31) Tacit knowledge is easily codified.
False
20) ________ is a cable medium
Fiber-optic
23) ________ is a broadcast medium
Infrared
43) An/The ________ is a network of networks.
Internet
20b) ________ is a broadcast medium
Microwave
48) ________ are exchange points for Internet traffic.
NAPs
18) In case of a many to many relationship between Table1 and Table2, which table holds the primary key ?
Neither. We need a joint table with primary keys from table 1 and table 2 to establish the many-to-many relationship
___ manages the Internet.
No central agency or nobody in particular
Can an antivirus software prevent DoS attack ? Why ?
No. DoS attack overwhelms the network infrastructure with so much data that it cannot function. Antivirus software only works when a system can function properly.
Data marts and data warehouses typically use ________.
OLAP
15) In an airlines database there are three tables called Passenger, Flight and Seats. Flight table has flight number, departure and arrival times, and departure and arrival airports. Seats table holds seat numbers, class of travel (First, Business, Economy) and position attribute (Aisle, Middle, Window). Passengers are allocated seats in specific flights. What type of relationship exists between Flight and Seats table ? 16) In the above database, considering relationship between Flight and Seats tables, which table should have the foreign key ? Why ?
One-to-many from flight to seats
3) Which of the following is the correct order of networks from smallest to largest?
PAN, LAN, MAN, WAN
Fiber Optics cables transmit data using ____________
Pulses of light
22) ________ is a broadcast medium
Radio
34) Which of the following is NOT a basic function of TCP/IP?
Responsible for disassembling, delivery, and reassembling data during transmission
If a hacker takes control of equipment such as power grids or nuclear power plants, this is an example of a(n) _________ attack.
SCADA
You are a jeweler who wants to make sure you have the maximum number of diamonds for sale. You notice that the number of diamonds available drops more when the size is relevant versus when the color is relevant. By comparing these factors, you are conducting a(n) _____ analysis.
Sensitivity
33) ________ is the protocol of the Internet.
TCP/IP
A URL that begins with https uses _________.
TLS
________ is the cumulative store of subjective or experiential learning.
Tactic knowledge
What are the problems of using a Satellite broadband ?
The satellite dish or antenna needs a direct "line-of-site" access with the satellite. Atmospheric disturbance can affect or block transmission
___ is the protocol of the Internet.
Transmission Control Protocol/ Internet Protocol or TCP/IP
19) Organizations can use Big Data to conduct experiments.
True
2) Smart technologies may cause consumers to forfeit their privacy rights in legal proceedings.
True
21) Broadband Internet service is defined as a utility.
True
21) Organizations can use Big Data to create new business models.
True
39) A "Crow's foot" for cardinality represents a many relationship.
True
7) Enterprise networks are composed of embedded LANs and a WAN.
True
9) Cable and DSL modems offer broadband access.
True
You lose the company's USB with your sales spreadsheets on it.This is_________ and is an_________ mistake.
a human error; unintentional
Auditing _________ the computer means verifying processing by checking for known outputs using specific inputs.
around
The ________ provide(s) information on each attribute and why the attribute is needed in the database, who uses it, and how it should be updated.
data dictionary
________ is an approach to managing information across an entire organization.
data governance
The category "student" is a(n) ________.
entity
42) The Internet backbone is a ________ network.
fiber-optic
Jim finds out that someone accessed his bank account pretending to be him and stole thousands of dollars. This is an example of ____________.
identity theft
Biometrics is an example of something the user _________.
is
Intellectual capital is another term for ________.
knowledge
Considering the nature of decisions, executing specific tasks efficiently and effectively is ___________.
operational control
A circle with a "Crow's foot" to the entity represents the ________ cardinality symbol.
optional many
_________ analytics answers the question "what could happen?"
predictive
Database systems minimize ________.
redundancy
Data ________ refers primarily to problems with the media on which the data are stored.
rot
___________ decisions deal with routine and repetitive problems.
structured
You are an employee in Inside Sales. This means you take calls and address customer issues like entering orders, updating orders, and providing order status reports. This is a(n) _____ task and a(n) _______ decision.
structured; operational control
A ________ is an intellectual work that is not based on public information.
trade secret
37) The ________ layer of TCP/IP provides communication and packet services.
transport
62) ________ is the movement of information as it progresses through the sequence of steps that make up an organization's work procedures.
workflow
______ refers to the transmission capacity of a network.
Bandwidth
Why is DDoS attack more dangerous than DoS attack ?
Because DDoS attacks come from many sources, which have been taken over by the hacker.
Which of the following is TRUE?
Big Data systems perform well because they contain huge amounts of data on which to base their predictions.
How does VPN secure communication from sender and recipient ?
By creating a "tunnel" through the internet between sender and recipient, which cannot be breached by an outside party.
LMU is conducting an online student survey about how the Fall semester classes, trying to determine the effectiveness of remote teaching ? This is an example of what type of data analysis?
Descriptive analysis
________ deals with more objective, rational, and technical knowledge.
Explicit knowledge
11) A byte is the smallest unit of data a computer can process.
False
_________ occurs when an unauthorized individual attempts to gain illegal access to organizational information.
espionage
The goal of whaling is to trick a(n) _______ into revealing personal or corporate data.
executive
12) ___ knowledge deals with more objective, rational, and technical knowledge.
explicit
Suppose you work for XYZ Corporation. You know you can contribute 6% of your salary to a 401K and the company will match that 100% after 6 years of service because it is in the employee handbook. This is an example of ________.
explicit knowledge
Assuming someone's identity to open a credit card account is a type of threat known as _____________________
identity theft
The ________ key has some identifying information but does not identify the record with complete accuracy.
secondary
_________ decisions are partially routine and partially complex.
semi-structured
You are a marketing manager responsible for planning the budget for your department. This is a(n) ______ task and a(n) _______ decision.
semi-structured; management control
Considering the nature of decisions, the long-range goals and policies for growth and resource allocation is ___________.
strategic planning
59) ________ is an advantage of telecommuting.
stress-level
As a purchasing manager, you have to purchase widgets every week to replenish your inventory. This is a(n) ________ decision.
structured
You are a nice person, so you hold the door open for the person running in behind you. Since you needed to use your ID badge to open the door, the person running in behind you is __________; this is_________.
tailgating; an unintentional threat to your organization
You want to make sure your entire organization is using a single data warehouse instead of using a data mart for every department. This is an example of ___________.
the development of infrastructure to support enterprise-wide analytics
Data marts are typically associated with ___________.
the development of one or a few related analytics applications
Data silos are often associated with ___________.
the development of one or a few related analytics applications
Management is a process by which an organization achieves its goals (called ______) through the use of resources (called _______).
the output; inputs
Auditing _________ the computer means auditors check inputs, outputs, and processing.
through
If you shift your risk by using other means to compensate for the loss like purchasing insurance, you have implemented a risk _________ strategy.
transference
Your company decides to purchase security insurance from Travelers Insurance in case your systems get hacked and employee information is stolen. This is an example of risk _________.
transference
As a board member, you recommend hiring a new CEO to address the scandals that have been reported in the Wall Street Journal. This is a(n) ________ decision.
unstructured
Knowledge management is a process that helps organizations manipulate important knowledge that comprises part of the organization's memory, usually in a(n) ________ format.
unstructured
You are the CEO of Widgets R Us. You know your widgets need to be more efficient and cost less, so you ask R&D to develop a plan. This is a(n) _____ task and a(n) ______ decision.
unstructured; strategic planning
Determining that a specific server may be vulnerable to attack and not doing anything about it is called __________________
Risk acceptance
30) ________ is the slowest cable medium
Twisted-pair
Dave and Darla are worried about their home's security as there have been a lot of robberies in the neighborhood lately. To ease their concern, they purchase insurance for their home and possessions. This is an example of __________.
risk transference
Your name in your university's database is a(n) ________.
attribute
40) Client/server computing links two or more computers in an arrangement in which powerful ________ provide computing services for ________.
servers; user PCs
What is the main purpose of TCP ?
transfer data from one IP source to another
__________ decide what data should be stored in an organization's data warehouse.
users
You need to be particularly careful of tailgating at airport terminals.
False
Amazon remembers what items you browsed in the past and presents similar or related items when you visit next time. This is an example of _________ type of data analysis.
Predictive analysis
Computer crimes typically average_________ of dollars and cause businesses_________ of dollars in damages.
hundreds of thousands; billions
Answering the question "did this option work as proposed" occurs in the _____ phase of the Business decision making.
implementation
Suppose you are failing one of your classes. Based on the choice you made to start studying harder, you look over your notes every day after class and study at least an hour every night for at least a week before an exam. This action is part of the ______ phase of the Business Decision making process.
implementation
Someone demanding payment for not disclosing sensitive company information to public is called _____________
information extorsion
_________ occur(s) when an attacker either threatens to steal, or actually steals, information from a company and then demands payment for not carrying out a particular act.
information extortion
Suppose you are failing one of your classes. If you don't know what the problem is, you need to enter the _______ phase of the Business Decision making process (Herbert-Simon model).
intelligence
________ analytics examines recent and historical data to detect patterns and predict future outcomes and trends.
predictive
You would use optimization or simulation for ______ analytics.
prescriptive
_______ analytics answers the question "what should we do".
prescriptive
______ analytics require _______ analytics to be done first.
prescriptive; predictive
Why do we need "shielding" in network cables ?
Since ethernet cables are made of metals, teh data transmitting through these can be affected by electro-magnetic fields. Shielding protects data transmission from electro-magnetic fields.
6) WANs typically connect multiple LANs.
True
Middle managers typically handle management control decisions and semi-structured tasks.
True
2) ___ is an approach to managing information across an entire organization.
governance
A circle with a vertical line represents the ________ cardinality symbol.
optional single
The entire basis of a whaling attack is to ___________.
appears as authentic as possible with actual logos, phone numbers, and various other details used in communications that come from fake email addresses.
36) The ________ layer of TCP/IP enables client application programs to access the other layers.
application
64) Most global virtual teams are ________, which means ________.
asynchronous; team members cannot meet at the same time
Each characteristic or quality of a particular entity is called a(n) ________.
attribute
23) The collection of qualities to which NewSQL systems for online transaction processing are measured against are Autonomy, Consistency, Independence, and Durability.
False
24) In a TCP/IP data transmission, data packets are never lost
False
28) Information is knowledge that is contextual, relevant, and useful.
False
3) In the case of Ross Compton, the Butler County judge ruled that using his pacemaker data was stealing personal information and violated the Fifth Amendment.
False
35) Once a KMS is set-up, it is updated automatically by Big Data the organization collects.
False
36) Learning about and adjusting to your organization's culture increases your explicit knowledge.
False
5) Infotainment in cars is a new concept facilitated by social media technologies.
False
7) The process of acquiring, keeping, and managing data is becoming easier.
False
8) Sarbanes-Oxley requires that private companies evaluate and disclose the effectiveness of their internal financial controls.
False
9) Sarbanes-Oxley requires that public companies evaluate and disclose the effectiveness of their internal operational controls.
False
Authentication occurs after authorization.
False
Competitive intelligence and espionage are similar except that competitive intelligence crosses the legal boundary.
False
Dumpster diving is always theft and is always illegal.
False
Employee monitoring systems are illegal and unethical.
False
If you choose to spend as much as you can to protect your information systems, you have adopted a risk transference strategy.
False
It is always safe to open e-mails and click on links from your friends.
False
Lower-level managers typically handle strategic planning decisions.
False
Once a copyright and patent is established, it applies to all countries in the world.
False
Predictive analytics require prescriptive analytics with two additional components: actionable data and a feedback system that tracks the outcome produced by the action taken.
False
Prescriptive analytics require predictive analytics with one additional component: actionable data.
False
The 2017 Equifax data breach was more damaging to lenders than to consumers.
False
The purpose of prescriptive analytics is to tell decision makers what will happen in the future.
False
Whaling attacks are easier to detect than typical phishing attacks because they are so highly personalized and targeted.
False
Whaling attacks have the biggest impact on financial institutions due to the nature of their business; it is not a true concern for other types of organizations.
False
You can't return to previous stages of the Business Decision Making cycle, so it is really important to do a good job the first time.
False
12) Which of the following Internet services is typically NOT available in rural areas?
Fiber-optic
55) The ________ functions as a transport mechanism; the ________ is an application.
Internet; World Wide Web
In order to send encrypted communication to Joe, what do you need ?
Joe's public key
Alien software that captures and sends each keystroke to the hacker is called________________
Key logger
________ is an intellectual asset.
Knowledge
10) Ethernet is a technology associated with ________s.
LAN
32) Ethernet is a common ________ protocol.
LAN
8) A network that is restricted to a single building is a ________.
LAN
Competitive intelligence is legal while espionage is illegal even though both involve collecting information about competitors.
True
Cybercrime is typically nonviolent but lucrative.
True
Data marts support the development of one or a few related analytics applications.
True
If a hacker enters a building with an official-looking ID badge.This is considered social engineering.
True
If you choose limit your risk by implementing firewalls and other security measures, you have adopted a risk limitation strategy.
True
Passwords are a huge information security problem for all organizations.
True
People are not liable for fraudulent use of their credit cards.
True
People tend to violate security procedures because the procedures are inconvenient.
True
People, devices, software, and websites can be blacklisted and whitelisted.
True
Senior executives typically handle strategic planning decisions.
True
Social engineering is an unintentional threat on the part of the employee.
True
Social engineers will often pose as real employees or contractors such as exterminators or fire marshals.
True
You purchased a copy of Microsoft Office and give a copy to a friend so he/she doesn't have to buy it too. This is piracy and is illegal.
True
_________ is a private network that uses a public network to connect users.
VPN
66) ________ allows participants in one location see participants, documents, and presentation at other locations.
Videoconferencing
4) _________s cover large geographical areas.
WAN
5) The Internet is a _________
WAN
6) A network between Mars and the Earth would be a ________.
WAN
2) Which of the following is the correct order of networks from largest to smallest?
WAN, MAN, LAN, PAN
______ analysis attempts to predict the impact of changes in the assumptions (input data) on the proposed solution.
What-if
19) What is Transitive Dependency ?
When an entity (say Entity A) is related to another entity (Entity B), only when a third entity exists, Entity A has a transitive dependency on entity B
Which of the following does NOT contribute to the increasing vulnerability of organizational information resources? a) Additional management support b) Decreasing skills necessary to be a computer hacker c) International organized crime taking over cybercrime d) Smaller, faster, cheaper computers and storage devices e) Today's interconnected, interdependent, wirelessly networked business environment
a
Which of the following does NOT contribute to the increasing vulnerability of organizational information resources? a) Increasing skills necessary to be a computer hacker b) International organized crime taking over cybercrime c) Lack of management support d) Smaller, faster, cheaper computers and storage devices e) Today's interconnected, interdependent, wirelessly networked business environment
a
The entire business analytics process starts with ___________.
a business problem
Judith works from home. In order to access her corporate email and other computer systems she logs into a virtual private network (VPN). The VPN is an example of _____________.
a communication control
Careless Internet surfing is_________ and is an_________ mistake.
a human error; unintentional
Carelessness using unmanaged devices is _________ and is an _________ mistake.
a human error; unintentional
You get a new smartphone and throw your old one away without erasing all your data. This is_________ and is an_________ mistake.
a human error; unintentional
You leave your laptop at your desk while you go to the restroom. This is_________ and is an_________ mistake.
a human error; unintentional
You open an e-mail from your friend that looks a little odd, but you figure your friend would never send you anything bad. This is_________ and is an_________ mistake.
a human error; unintentional
A Data packet contains __________, ____________, ______________, _________ and __________
a small chunk of data, total number of packets in the transmission, sequence of this packet, originating IP address, and destination IP address
63) ________ is a group of people working in different locations.
a virtual team
A _________ is a statutory grant that provides the creators or owners of intellectual property with ownership of the property for a designated period.
copyright
A statutory grant that provides the creators or owners of intellectual property with ownership of the property is called a ________________
copyright
The U.S. government considers the Sony hack _________.
cyberterrorism
_________ refers to malicious acts in which attackers use a target's computer systems to cause physical, real-world harm or severe disruption, often to carry out a political agenda.
cyberterrorism
Sarah received an email that claimed to be from her bank. The email asked her to provide her password. Sarah later found out that the email was not from her bank and that she had given sensitive information to someone who gained access to her accounts. This is an example of a ____________.
phishing attack
You purchased a copy of Microsoft Office and give a copy to a friend so he/she doesn't have to buy it too.This is _________ and is _________.
piracy; illegal
The ________ key is an identifier field that uniquely identifies a record.
primary
Intellectual property is NOT protected under_________ laws.
privacy
58) ________ is an advantage of telecommuting.
productivity
In public-key encryption, the _________ key is used for locking and the _________ key is used for unlocking.
public; private
Blacklisting allows everything to run unless it is on the list.
True
Only large organizations use business analytics applications.
False
31) ________ is a common LAN protocol.
Ethernet
5) The Internet is a WAN.
True
A data ________ is a repository of historical data that are organized by subject to support decision makers in the organization.
warehouse
A _________ site typically does not include the actual application the company needs to get the business back up and running immediately.
warm
A ______ attack is a targeted attempt to steal sensitive information from a company, such as financial data or personal details about employees.
whaling
Making sure that the business keeps running in case of disaster is called ______________
Business continuity planning
29) Knowledge is information in action.
True
What is the difference between a Router and a Modem ?
A modem connects a network to internet. It does not participate in data communication inside a network. Router connects various devices in a network, as well as various networks (e.g. LAN to LAN)
3) PANs are the smallest networks.
True
What is the similarity and difference between a Trojan Horse and a Logic Bomb?
Both enter a company's system hidden in another software and then wait to be activated. Trojan Horse is activated by the hacker using some type of communication. Logic Bomb does not need any communication - it gets activated on a specific date and time.
What the differences between Cat 5, Cat 5e and Cat 6 cables ?
Cat 5 is unshielded cable with a max transmission capacity of 10 Mbps. Cat 5e is unshielded cabled with a max transmission capacity of 1 Gbps. Cat 6 is shielded cable with a max transmission capacity of 1 Gbps.
________ are those data that visitors and customers produce when they visit a website and click on hyperlinks.
Clickstream data
41) ________ leads to the ideas of fat and thin clients where ________ clients have no local storage and only limited processing power.
Client/server computing; thin
25) ________ cables are made of copper.
Coaxial
19) ________ is a cable medium
Coaxial
_________ controls secure the movement of data across networks.
Communications
Which of the following is NOT a characteristic of Big Data?
Complexity
17) ________ modems use the digital portion of a voice telephone to offer broadband access.
DSL
Examples of _______ include sensitivity, what-if, and goal-seeking analyses.
DSS
A _____________ provides easy access to timely information and direct access to management reports.
Dashboard
__________ can perform two basic operations: 1) identifying previously unknown patters and 2) predicting trends and behaviors.
Data mining
During recent presidential debate, news channels analyzed the number of times a specific candidate's name was mentioned in twitter in order to determine popularity of the candidate. This is an example of what type of data analysis ?
Descriptive analysis
Ransomware negatively affected the city of Atlanta in many ways. Which vulnerability was the main cause of the problems? a) Today's interconnected, interdependent, wirelessly networked business environment b) Smaller, faster, cheaper computers and storage devices c) Decreasing skills necessary to be a computer hacker d) International organized crime taking over cybercrime e) Lack of management support
E
______ is the most popular and common business analytics tool.
Excel
46) ________ offer limited accessibility to the ________ of participating companies.
Extranets; intranets
10) Sarbanes-Oxley holds CIOs personally responsible for financial disclosures since they manage the systems that hold financial information.
False
15) Unstructured data can reside in a traditional relational database.
False
17) Big Data is so large and complex that it must be managed using a traditional DBMS.
False
17) The cost of running the Internet is huge for most governments.
False
18) The term "Big Data" refers simply to huge amounts of data.
False
19) The Internet and World Wide Web are synonyms.
False
20) Telecommuting means you have to drive a long distance to work.
False
22) Computer network transmissions speeds are faster than the processing speeds of the computers themselves.
False
22) TCP sends all data packets of a transmission at the same time
False
For this Christmas, you have a certain budget for a gift you want to give your Mom? You know she loves certain types of perfumes, specific brand of cookies, and house decoration items. You are researching online stores to decide what will be the best gift you can give your mom within your budget. What type of Decision Support analysis are you performing ?
Goal seeking analysis
_____ analysis attempts to calculate the value of the inputs necessary to achieve a desired level of output.
Goal-seeking
35) ________ defines how messages are formulated and how their receivers interpret them.
HTTP
Specific phases of Decision making was first conceived by ____________
Herbet Simon
26) ________ is NOT an advantage of twisted-pair wire.
High bandwidth
27) ________ is an advantage of coaxial cable.
High bandwidth
49) ________ is the most commonly used IP addressing scheme.
IPv4
50) ________ consists of 32 bits.
IPv4
51) 135.62.128.91 is an example of an ________ address.
IPv4
53) ________ consists of 128 bits.
IPv6
52) ________ was developed because we have run out of IP addresses in the original IP addressing scheme.
IPv6
30) Explicit knowledge deals with more objective, rational, and technical knowledge.
True
What are the 3 key elements of a DSS ?
Organizational data, mathematical or statistical model, and an user interface to interact with the model
_________ controls prevent unauthorized individuals from gaining access to a company's facilities.
Physical
________ analytics examines recent and historical data to detect patterns and predict future outcomes and trends.
Predictive
Recommending products to customers based on past purchases and search history is what type of data analysis ?
Predictive analysis
_____ analytics go beyond descriptive and predictive models by recommending one or more courses of action and showing the likely outcome of each decision.
Prescriptive
State Farm analyzes trend of accidents a driver is involved in based on distance travelled daily, address of the driver, age, and marital status. Based on these trends State Farm comes up with the Automobile Insurance rates. This is an example of what type of data analysis ?
Prescriptive analysis
In order to read encrypted communication from Joe, what do you need ?
Private key corresponding to the public key Joe used to encrypt the message
A company decides that a specific group of servers may be vulnerable to attack. They decide to purchase insurance to protect from potential loss in case the servers actually get affected. This is called __________________
Risk transference
32) Tacit knowledge is more unstructured than explicit knowledge.
True
33) KMS are useful for creating best practices in an organization.
True
34) Organizations may need to reward employees to get them to add their expertise to a KMS.
True
You are trying to find the best deal for a flight from LAX to Houston. You decide to freeze the travel dates first and change the time of departure to see what is the best price you can get. Then you fix the time of departure and change the date of travel to see how it impacts the available ticket prices. What type of Decision Support analysis are you performing ?
Sensitivity analysis
9) ________ networks are an emerging technology that is becoming increasingly important to help organizations manage their data flows across their enterprise networks.
Software-defined
4) As we incorporate more and more technology into myriad aspects of daily life, so too are we presented with a whole new set of legal questions that must be answered.
True
40) The join operation combines records from two or more tables in a database to obtain information that is located in different tables.
True
8) Burying fiber-optic cables costs approximately $30,000 per mile, so telecommunications and cable companies are resistant to installing fiber in rural areas.
True
Affinity analysis is a data mining application that discovers co-occurrence relationships among activities performed by specific individuals or groups.
True
All organizational information systems support decision making.
True
An intranet is a trusted network.
True
Anti-malware systems are generally reactive.
True
Authorization means someone has privileges to do certain things on a system.
True
65) ________ does not allow participants to communicate face to face.
Teleconferencing
20) Entity A is related to Entity B (A -> B) and Entity B is related to Entity C (B -> C), therefore entity A is related to entity C, or A->C. This is an example of ___________.
Transitive dependency
1) Download speed is much faster than upload speed when defining the term broadband.
True
1) Law enforcement agencies can use devices in the Internet of Things category to arrest and prosecute criminals.
True
10) Ethernet is a common LAN protocol.
True
11) In packet switching, packets travel independently across the network and can be routed through different paths in the network.
True
12) Fat clients have large storage and processing power and therefore can run local programs.
True
13) A foreign key is a primary key in another file.
True
13) In peer-to-peer processing, every computer is a server.
True
14) A secondary key can be a foreign key.
True
14) In peer-to-peer processing, each computer can access all files on all other computers.
True
16) Big Data is a collection of data so large and complex that it is difficult to manage using traditional database management systems.
True
16) No central agency manages the Internet.
True
18) IP addresses must be unique around the globe to have a global Internet.
True
2) The definition of broadband is fluid.
True
20) Organizations can use Big Data to microsegment customers.
True
23) TCP protocol sends data packets of a transmission in arbitrary sequence
True
24) A data mart is a low-cost, scaled down version of a data warehouse.
True
25) Data marts and data warehouses are typically organized by business dimension or subject.
True
26) Data marts and data warehouses maintain historical data.
True
27) Knowledge is distinct from data and information.
True
If you accept the potential risk, continue operating with no controls, and absorb any damages that occur, you have adopted a risk _________ strategy.
acceptance
Your company decides not to implement security procedures because employees refuse to comply anyway.This is an example of risk _________.
acceptance
Microsoft ________ is a popular example of a relational database.
access
_________ causes pop-up advertisements to appear on your screen.
adware
Spam costs US companies_________ of dollars per year.
billions
A ________ represents the smallest unit of data a computer can process.
bit
Which of the following is an accurate representation of the data hierarchy from smallest to largest?
bit, byte, field, record, file, database
1) Bandwidth is stated in ________ per second.
bits
A _________ site is the least expensive option.
cold
Data reduction is the conversion of raw _______ into a smaller amount of more useful _______.
data; information
7) A ___ is a set of programs that provide users with tools to create and manage a database.
database management system or DBMS
You would use OLAP and DSS as statistical procedures for __________ analytics.
descriptive
_________ analytics is the first step in data reduction.
descriptive
Today, computer networks communicate through ___ signals, which are discrete pulses that are either on or off, representing a series of bits.
digital
If you have to speak into your phone to unlock it, this is an example of something the user _________.
does
You are looking at a sales report from last month. You notice one salesperson's numbers are much lower than the rest, so you click on that person's name to get more details on the products they sold last month. You are using the _______ feature of a dashboard.
drill down
_________ is the process of converting an original message into a form that cannot be read by anyone except the intended receiver.
encryption
An unauthorized individual attempting to gain illegal access to organizational information is called _____________
esiponage or trespass
A(n) _________ is a system that prevents a specific type of information from moving between untrusted networks and private networks.
firewall
The ________ key creates links between two tables.
foreign
You want to spend a maximum of $100,000 on your first house. You need to use a(n) _____ analysis to figure out the location and size of those types of homes.
goal-seeking
Your student ID is an example of something the user _________.
has
Business analytics is the process of developing actionable decisions or recommendations for actions based on insights generated from ______________ data.
historical
A _________ site is a fully configured computer facility with all of the company's services, communication links, and physical plant operations.
hot
A _________ site is the most expensive option.
hot
Suppose you have a primary location in New York City where you main corporate servers are located. Just in case something happens in New York City, you have backup servers that are updated every minute in Chicago.This is an example of a _________ site.
hot
38) The ________ layer of TCP/IP is responsible for addressing, routing, and packaging data packets.
internet
44) An/The ________ is a network that allows users to take advantage of familiar applications and work habits within an organization's network.
intranet
11) ___ is a process that helps organizations manipulate important knowledge that comprises part of the organization's memory, usually in an unstructured format.
knowledge management
Typing in your password to access a system is an example of something the user _________.
knows
A data _______ is a central repository that stores all of an organization's data, regardless of their source or format.
lake
If you limit your risk by implementing controls that minimize the impact of the threat, you have implemented a risk _________ strategy.
limitation
A vertical line with a "Crow's foot" to the entity represents the ________ cardinality symbol.
mandatory many
Two vertical lines represent the ________ cardinality symbol.
mandatory single
________ is a process that spans all organizational business processes and applications.
master data management
Data marts can be implemented ________ compared to data warehouses.
more quickly
An employee at ABC Inc.downloaded an email and opened the attachment contained within the message. Shortly afterwards all employees were blocked from accessing files on the company's servers and the criminals told ABC Inc. they would have to pay a large amount of Bitcoin to regain access to their files. ABC Inc. was a victim of ____________.
ransomware
A ________ generally describes an entity.
record
Laurie heads up a team creating a new process for the shipping department of her company. She worked with external consultants and wrote a process diagram. The team is now asking the VP of shipping to review the process diagram and give opinions. Laurie's team is at the ________ knowledge stage of the KMS cycle.
refine
Every year, you have to give each of your employees a performance review and decide whether they have earned a raise. This is a(n) ________ decision.
semistructured
Watching laptop screen over one's shoulder is called ____________
shoulder surfing
A hacker coming into office impersonating as a Fire Marshall is a type of threat known as ______________________
social engineering
_________ is an attack in which the perpetrator uses social skills to trick or manipulate legitimate employees into providing confidential company information such as passwords.
social engineering
_________ is pestware that users your computer as a launch pad for unsolicited e-mail, usually advertising for products and services.
spamware
Keystroke loggers and screen scrapers are examples of _________.
spyware
_________ collects personal information about users without their consent.
spyware
You decide to implement a new customer loyalty program that rewards customers for shopping in your store. To accomplish this, you need to implement a data warehouse to collect data from all your physical and online stores. This is an example of ___________.
support for organizational transformation
13) ___ knowledge is generally imprecise and costly to transfer.
tacit
Suppose you are a salesperson. You take great pride in knowing each customers' favorite places to eat and their favorite meals. This is an example of ________.
tactic knowledge