CIS Ch. 1-4 Exam

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

_____ controls restrict unauthorized individuals from using information resources and are concerned with user identification.

Access Control

_____ issues revolve around who should have access to information and whether a fee should be paid for the access.

Accessibility

______ refers to determining who is responsible for actions that were taken.

Accountability

_____ means verifying processing by checking for known outputs using specific inputs.

Auditing around the computer

______ is a real-time approach for measuring and managing business processes.

Business activity monitoring

______ systems provide computer-based support for complex, non-routine decisions, primarily for middle managers and knowledge workers.

Business intelligence (BI)

______ is the tight integration of the IT function with the strategy, mission, and goals of the organization

Business-Information technology alignment

The title of the executive who is in charge of IS function is the:

CIO

_____ is/are an advantage over competitors in some measure, such as cost, quality, or speed; it leads to control of a market and to larger-than-average profits.

Competitive advantage

A ______ is an information system that uses information technology to perform some of all of its intended tasks.

Computer-based information system

Data aggregators sell digital dossiers to companies that want to know their customers better. This practice is called ________.

Customer intimacy

Amazon provides a personalized one-to-one relationship by welcoming you by name back to its Web site on your second visit. This is employing which strategy for competitive advantage?

Customer-orientation

______ is the science of designing machines and work settings that minimize injury and illness.

Ergonomics

_____ refers to the principles of right and wrong that individuals use to make choices that guide their behavior.

Ethics

An organization's_____ consists of the IT components plus IT services.

Information Technology infrastructure

A(n) ______ is a person knowledgeable about information systems and information technology.

Informed User

Which strategy for competitive advantage involves introducing new products and putting new features in existing products?

Innovation

______ is delegating operations or jobs within a business to another company that specializes in those operations.

Insourcing

The threat of competitors entering a market is particularly high in industries that perform a(n) _____ role and in industries where the primary product or service is _____.

Intermediation, digital

The list of all your purchases from Amazon (books bought, price paid, dates) would be considered to be:

Knowledge

_____ uses deception to fraudulently acquire sensitive personal information by masquerading as an official e-mail.

Phishing

Under which ethical issue would the following questions be asked: Who owns the information? What are just and fair prices for its exchange? How should access to information channels be allocated?

Property

_____ is the process in which an organization assesses the value of each asset being protected, estimates the probability that each asset might be compromised, and compares the probable costs of each being compromised with the costs of protecting it.

Risk Analysis

In _____, the organization takes concrete actions against risks.

Risk Mitigation

_____ involves building an inappropriate trust relationship with employees for the purpose of gaining sensitive information or unauthorized access privileges.

Social Engineering

Biometrics are an example of:

Something the user is

_____ is designed to use your computer as a launch pad for sending unsolicited e-mail to other computers.

Spamware

Court decisions in many countries have followed two rules fairly closely. Those rules are?

The right of privacy is not absolute AND the public's right to know supersedes the individual's right of privacy.

Information-based industries are most susceptible to which one of Porter's five forces?

Threat of substitute products

_____ are software programs that hide in other computer programs and reveal their designed behavior only when they are activated.

Trojan Horses

When software is used to block connections to inappropriate web sites, it is called:

URL Filtering

According to Friedman's the World is Flat, ______ empowered all Internet users to create content and put it on the Web.

Uploading

The ____________ ethical standard states that an ethical action is the one that provides the most good or does the least harm.

Utilitarian

Dumpster diving is:

always legal because the dumpster is not owned by private citizens.

Which of the following is the correct hierarchy from the lowest level to the highest level? a. Knowledge, information, data b. Information, data, knowledge c. Data, information, knowledge

c. Data, information, knowledge

Which of the following is NOT true regarding transborder data flows? a. Every country around the world has some privacy laws, which makes coordination for transborder data flows difficult b. The absence of consistent or uniform standards for privacy and security obstructs the flow of information among countries c. EU privacy laws are stricter than US privacy laws d. There is always a problem of whose laws apply when data is transmitted across boarders e. All of the above are TRUE regarding transborder data flows

e. All of the above are TRUE regarding transborder data flows

Computer information systems have many capabilities. Which of the following is NOT a major capability of information systems presented in chapter 1? a. Perform high-speed, high-volume numerical computations b. Store huge amounts of information in an easy-to-access, yet small space c. Automate both semiautomatic business processes and manual tasks d. Provide fast, accurate communication and collaboration within and among organizations e. All of the above are major capabilities of information systems presented in Chapter 1

e. All of the above are major capabilities of information systems presented in Chapter 1


Ensembles d'études connexes

Intercultural Communication Chapter 9 and 10

View Set

Chapter 10: making capital investment decisions

View Set

Computer Info: Customer Service- Chap. 9 Test Review

View Set