CIS Final Exam

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Knowledge workers

advise middle managers

Many organizations have implemented corporate portals for which of the following reasons?

all of the above

Networks enable which of the following applications?

all of the above

Refer to IT's About Business 5.4: Hospital Improves Patient Care with Data Warehouse: A single source of all patient data, accessible to multiple hospitals will have the following benefit

all of the above

Which of the following are advantages of computer networks?

all of the above

The costs of delivering products in the ____ channel are much higher than delivering products in the _____ channel.

physical, digital

In a relational database, every row represent a(n): _____.

record

Passwords and paraphrases are examples of:

something the user does

Voice and signature recognition are examples of:

something the user does

Biometrics are an example of:

something the user is

Enterprise resource planning systems

use a common database for all functional areas.

What are three distinct characteristics that distinguish big data from traditional data?

volume, velocity, and variety

All information system's _____ is the possibility that the system will be harmed by a threat.

vulnerability

In a process called _____, a company allows nothing to run unless it is approved, whereas in a process called ____, the company allows everything to run unless it is not approved.

whitelisting, blacklisting

Which of the following is not an example of the growing initiative called green IT?

Building computer applications that use less energy.

_____ conveys understanding, accumulated learning, and expertise as they apply to a current problem.

Knowledge

____ is a process that helps organizations identify, select, organize, disseminate, transfer, and apply expertise that are part of the organization's memory and typically reside inside the organizations in an unstructured manner.

Knowledge management

Data are sent through a fiber-optic cable by a(n) ____.

Laser

The Bodymetrics body scanner is best characterized as an example of:

Mass customization

The function of ___ is to convert digital signals to analog signals and vice-versa.

Modems

_____ issues involve collection, storing, and disseminating information about individuals.

Privacy

Managing purchasing is an example of a(n):

Production Business Process

Data dictionaries perform all of the following functions except:

Providing information on each record.

The ______ ethical standard states that an ethical action is the one that best protects and respects the moral rights of the affected parties.

Rights

Which of the following statements is correct?

The absence of consistent international privacy and security laws has led to a complex global legal framework.

Which of the following is not an example of business- IT alignment?

The company views IT as a way to support the business but not as a way to create new revenue streams.

The data in a data warehouse have which of the following characteristics?

They are organized by subject.

Which of the following is not a benefit of being an informed user of IT?

Working on the IT side of the organization.

A protocol is:

A standard set of rules and procedures for the control of communications in a network.

A pharmaceutical company's research and development plan for a new class of drugs would be best described as which of the following?

A trade secret

You have moved into a different apartment, but your electricity bill continues to be sent to your old address. The Post Office in your town has which problem with its data management?

Data inconsistency

Not including alphabetic characters in a Social Security Number field is an example of:

Data integrity

_____ occurs when applications cannot access data associated with other applications.

Data isolation

The process of profiling:

Decreases individual privacy.

Which of the following is not a Section Reference 1 by organizations to business pressures?

Delay releases of innovated products.

Which of the following statements is correct?

Determining and enforcing privacy regulations can be difficult.

Which strategy for competitive advantage involves offering different products, services, or product features?

Differentiation

In TCP/IP, IP is responsible for:

Disassembling and reassembling of packets during transmission.

Which of the following is not a role that information systems play in businesses processes?

Establish Standards

Business activity monitoring is a type of scheduled reporting.

False

Each functional area within an organization has only one application.

False

Robots can handle unfamiliar situations.

False

A(n) ___ connects two or more devices in a limited geographical area.

Local area network

____ are software programs that hide in other computer programs and reveal their designed behavior only when they are activated.

Logic bombs

Which of the following statements concerning the management of information resources is not true?

Managing mainframes has become more difficult.

Collecting sales tax is an example of a(n):

Marketing Business Process

Internet service providers connect to one another through ____.

Network access points

Which of the following statements concerning technology pressures on modern businesses is true?

New technologies offer alternative service options

Privacy advocates prefer which model of informed consent?

Opt-in

A ___ attack uses deception to fraudulently acquire sensitive personal information by masquerading as an official e-mail.

Phishing

Which of the following statements concerning the difficulties of protecting information resources is not correct?

Rapid technological changes ensure that controls are effective for years.

______ means accepting the consequences of your decisions and actions.

Responsibility

_____ is the process in which an organization assesses the value of each asset being protected, estimates the probability that it will be compromised, and compares the probable costs of an attack with the costs of protecting the asset.

Risk analysis

In _____, the organization takes concrete actions against risks.

Risk mitigation

In ______, the organization purchases insurance as a means to compensate for any loss.

Risk transference

A ____ sends messages through several connected LANs or to a wide-area network.

Router

Which of the following is(are) designed to use your computer as a launch pad for sending unsolicited e-mail to other computers?

Spamware

Refer to IT's About Business 6.2: A New Search Engine. Which of the following statements is true about the Summly search engine?

Summly uses AI tools like genetic algorithms to generate search results.

BitTorrent uses a process called _____, which eliminated file-sharing bottlenecks by having everyone share little pieces of a file at the same time.

Swarming

Which of the following is a digital transmission system that defines circuits that operate at different rates, all of which are multiples of the basic 64 Kbps used to transport a single voice call?

T-carrier system

As a manager in your company, you expect to retrieve ___ from operation systems and present it as ______ to your boss, who will react based on his ____.

data, information, knowledge

Buyer power is ____ when buyers have many choices from whom to buy and ____ when buyers have few choices.

high, low

For most companies, the Web ____ the threat that new competitors will enter the market by _____ traditional barriers to entry.

increases, decreasing

An organization's ____ consists of the physical facilities, IT components, IT services and IT management that will support the entire organization.

information technology infrastructure

A database management system is primarily a(n) ____.

interface between applications and a database

The most overlooked people in information security are:

janitors and guards

In a database, the primary key field is used to ____.

uniquely identify a record

Which of the following is not an ethical question related to IT?

Accuracy

_____ occurs when various copies of the data agree.

Data consistency

____ is a feature that must be offered by a competing organization in order to survive in the marketplace.

An entry barrier

_____ controls are concerned with the user identification, and they restrict unauthorized individuals from using information resources.

Access

_____ issues involve who may obtain information and how much they should pay for this information.

Accessibility

What is the relationship between advances in information technology and the practice of profiling?

Advances in IT make it easier to profile individuals.

The term ____ refers to clandestine software that is installed on your PC through duplicitous channels but is not particularly malicious

Alien software

Cybercriminals can obtain the information they need in order to assume another person's identity by:

All of the above strategies to obtain information to assume another person's identity.

Refer to Closing Case: Baxter Coming to Work Right Next to You. Modern industrial robots must be suited to the following situations:

All of the above.

A(n) _______ is a computer program designed to support a specific task or business process.

Application

Which of the following statements is not correct?

As with normal first-class mail, employers cannot read employee e-mail.

Various organizations that promote fair and responsible use of information systems often develop a ____.

Code of ethics

______ portals coordinate content within relatively narrow organizational and partners' communities.

Corporate

Which of the following is not a disadvantage of telecommuting for employees?

Fewer opportunities for housebound people.

A(n) ____ is a logical grouping of related records

File

Managing account collections is an example of a(n):

Finance Business Process

How does society keep owners of electronic bulletin boards from disseminating offensive or untrue content? This is a difficult question because it involves the conflict between _____ on the one hand and _____ on the other.

Freedom of speech, privacy

_______ include B2B and B2C.

Functional area information systems

A ______ connects dissimilar networks

Gateway

Today's customers have _____.

Higher expectations

The IT infrastructure is comprised of _____ and _____.

IT components, IT services

Competitive advantage for an organization manifests itself as all of the following except:

Increased time to market

The list of all your purchases from Amazon (books bought, price paid, dates) is defined as ____.

Information

The threat of competitors' entering a market is very high in industries that perform a(n) ____ role and in industries where the primary product or service is _____.

Intermediation, digital

You are registering for the next semester at your university. You take into account your major, the courses you need, the prerequisites for each course, the times you take each course, and the professors teaching each section, as well as your work schedule. You are using ____ to select your class schedule.

Knowledge

_______ is a legal concept that gives individuals the right to recover damages done to them by other individuals, organizations, or systems.

Liability

Organizations are turning to data governance for which of the following reasons?

They are responding to federal regulations

Compared to data warehouses, data marts have which of the following characteristics?

They cost less.

____ describes the activities of the business, whereas ____ categorize (s), aggregate (s), and evaluate (s) data generate by the organization's activities.

Transaction data, master data

Refer to IT's About Business 3.1: Pinterest: Pinterest's user agreements allows

Users to pin images that they have created

The ____ ethical standard states that an ethical action is the one that provides the most good or does the least harm.

Utilitarian

With _____, phone calls are treated as just another kind of data

Voice over IP

A purchase of books in the college bookstore is _____. The report at the end of the day showing sales totals for the day is _____.

data, information


Ensembles d'études connexes

BUS 359 Consumer Behavior Chapter 1

View Set

ECON Money and Banking (Chapter 14)

View Set

Chapter 7: Cell structures and Function Study for Finals

View Set

Operations and Supply Chain Management

View Set