CIS review

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

According to this module (2), what is a true statement about generational theory? Select all answers that apply.

A generational cohort shares important historical, cultural, and social events that shape its members' attitudes and dispositions throughout their lives. A generational cohort shares major experiences and events that leave distinctive imprints on the cohort, manifested in espoused beliefs, values, and behaviors. This is especially true when these events are experienced at salient, early stages of life.

Drag/drop the descriptions to the correct category (advantages or disadvantages of open source software), according to your textbook and the video lectures. It's possible some descriptions do not match a category and will remain unsorted. Each category may have a different number of correct answers.

Advantages: cost of software time of market security reliability scalability Disadvantages: availability of support control over development and quality cost of support services and add ons

Technologies that measure and analyze human body characteristics for identification or authentication are known as ____________.

Biometrics

Neural networks are statistical techniques commonly used in machine learning that are modeled off the following human biological system:

Brain

According to lessons in this module (2), the following statement best describes careers in information systems.

Careers in information systems can fall on either business or technical tracks and often combine both business/soft and technical skills.

________________ refers to replacing traditional computing resources with services provided over the Internet.

Cloud computing

Which of the following statements is TRUE about cybersecurity?

Cybersecurity breaches can most often be traced back to personnel or procedural (process) factors.

Match each definition with the correct term.

Data Warehouse: A collection of databases structured for fast online queries and exploration, typically aggregating enormous amounts of data from many different operational systems Data Mart: A database or databases focused on addressing the concerns of a specific problem or business unit Data cube: A special database used to store data in OLAP reporting Data Mining: The process of using computers to identify hidden patterns and to build models from large data sets

According to your textbook, how are artificial intelligence, machine learning and deep learning related?

Deep learning is a subcategory of machine learning, which is a subset of artificial intelligence.

Drag/drop the definitions and examples to the corresponding type or category of software. It's possible some definitions/examples do not match any software type/category and will remain unsorted.

Desktop Software: presentation software computer games social media apps applications installed on a personal computing device, typically supporting tasks performed by a single user Enterprise Software: applications that address the needs of multiple users throughout an organization or work group enterprise resource planning supply chain management customer relationship management

Based on lessons in this module (2), drag/drop each description or statement to the category it best represents. Diversity and Inclusion.

Diversity: Understanding and valuing people who represent differences in races, genders, disabilities, sexual orientations, national origins, educational backgrounds, experiences, skills and knowledge (to name some characteristics) Organizations have made more progress in this area. Inclusion: Enacting practices that support respectful and collaborative work environments and encourage a sense of belonging and acceptance among all employees Organizations have made less progress in this area.

Which statements are TRUE regarding the reasons managers should pay attention to Moore's Law? Check all that apply.

Ideas that may be impossible today due to power, capacity, or cost reasons may be possible in the future. The advance of powerful, cheap computing often comes with a special kind of price elasticity that enables whole new markets to open up.

Organizations must be prepared to address and respond to the following situation(s) involving social media. Check all that apply.

Individuals with no relationship with the organization posting harmful content about an organizational employee or the organization itself Dissatisfied customers publishing negative feedback about the organization on social media Employees posting content that could damage the organization's reputation Employees making anonymous posts on social media promoting the organization and disparaging competitors

Which of the following is correct definition/description about data ? Choose all that apply

It comes before information and knowledge Raw facts and figures

According to this module, what is a true statement about "people" in information systems? Select all answers that apply.

Learning how to work effectively with people from diverse backgrounds is a critical soft skill that information systems professionals should learn and maintain. Technology implementation failures in organizations are more likely to stem from problems with "people" (e.g., end users, project managers) rather than poorly designed technology. People create and manage the technology and process components of information systems; this is one reason it's important to understand the "people" component of information systems.

Put the SDLC phases in order from start to finish.

Requirements Design Implementation Verification Maintenance

Which of the following are descriptions/examples of UnStructured Data ? Choose all that apply

Social Media is an example of this type of data This type of data is more often associated with "Big Data" Approximately 80 percent corporate data is an example of this type of data.

According to the lecture videos, which statements are TRUE regarding spreadsheets? Check all that apply.

Spreadsheets are useful for analyzing data. Spreadsheets are not an effective tool to use to store large amounts of organizational data long term for decision making.

According to section 15.5 of your textbook, what is a characteristic of "data quality"? Check all that apply.

The data is accurate, clean, complete, and reasonably free of errors. The data can be trusted.

Which of the following is a TRUE statement about volatile memory? Select all that apply.

This type of memory requires power to retain stored data or information. RAM is an example of this type of memory. This type of memory is used for short-term, temporary storage.

According to the textbook and lecture, what is an example of positive outcomes associated with the use of AI?

Use of AI can improve employee retention by uncovering patterns of those most likely to leave. Use of AI can automate many tasks, providing convenience to consumers and cost savings for organizations. Use of AI can predict cancer survival better than humans. [All of these]

For some industries where the products are commodities, the Internet has afforded customers increased price transparency of these products, thereby increasing the __________.

bargaining power of buyers

What is a key way that organizations use social media?

contests and promotions customer engagement knowledge sharing data analytics human resources management viral marketing [all of these]

When an organization creates its social media awareness and response team, it should:

create an interdisciplinary team from different functional areas, such as public relations, legal, marketing, customer support, human resources, and IT, among others

The major types of computer hardware are

input, output, processing and the storage devices

The domain name service (DNS) is a distributed database that allows users to communicate with other computers by:

mapping host and domain names to IP addresses of computers.

According to the lecture, which AI tools do Apple's Siri and Android's Google Assistant rely on? Select all that apply.

natural language processing machine learning

According to Michael Porter, the reason many firms perform poorly compared to their competitors is because they've defined themselves according to

operational effectiveness strategic positioning

In cloud computing, resources are said to be "pooled" because ________.

organizations share the same physical hardware through virtualization

Two of the biggest considerations in the management of the facilities of a large data center include:

power and cooling

Which of the following best captures individuals' motivations for information security attacks?

pranking people intellectual property theft revenge (disgruntled employee) cyberwarefare stealing personal or financial data protest hacking (hacktivism) [all of these]

Which of the following is an example of "output" hardware? Select all that apply.

printer speaker

Timing and technology alone will not yield sustainable competitive advantage. Moving first pays off when the time lead is used to create critical resources that are _______. Check all that apply.

rare tough to imitate valuable lacking in substitutes

According to lessons in Module 2, the following solution(s) can help us overcome our unconscious biases. Select all answers that apply.

seek out and be open to contradictory and differing views set objective criteria to evaluate information embed ourselves in diverse networks and embrace inclusive relationships

Data is oftentimes considered a defensible source of competitive advantage; however, advantages based on capabilities and data that others can acquire will be ______.

short lived

What are some of the novel technologies presented in Chapter 5? Select all that apply.

smart umbrella that receives weather reports wirelessly and flashes when rain is expected smart billboards that detect people's demographics as they walk by in order to change its advertising to target these demographics smart diaper that sends a tweet when the sensor detects moisture smart license plate that contacts emergency services when a car crashes

Open source software is

software that provides the source code for anyone to copy and use.

According to your textbook, a scrum team repeats or reiterates its efforts in ____________, which are short time-boxed increments, each increment usually lasting 1-6 weeks.

sprints

According to the lecture and textbook, machine learning involves the following: Select all that apply.

use of algorithms learning through data and experience

According to the lecture and textbook, what are examples of artificial intelligence applications? Select all that apply.

virtual backgrounds in conferencing apps like Zoom McDonald's use of digital drive-thru menus iRobot Roomba voice analysis software to detect employees' "compassion fatigue" CAPTCHA robo-journalists IBM Watson

According to the lessons in this module (2), our unconscious mind can determine:

who we eat lunch with where we sit (e.g., in a business meeting) who we turn to for advice who we choose to help [all of the these]

What is a TRUE statement about database management systems (DBMS)? Check all that apply.

A DBMS is sometimes referred to as database software, which is software for creating, maintaining, and manipulating data. Although the DBMS is considered application software, using the layer cake analogy, it's useful to think of an organization's database systems as layered on top of the operating system layer but under the (enterprise) application layer.

ELIZA , demonstrated in class, is an example of what?

A chatbot.

Based on lessons in this module (2), drag/drop the scenario/example to the type of bias it best represents. Confirmation bias, Status Quo bias, Halo effect, and Horns effect.

Confirmation: A member of a project team believes the team is using an inefficient methodology to execute and manage the project. To prove this point, the team member seeks out and summarizes information that verifies the flaws associated with the chosen methodology and ignores any evidence to the contrary. The team member presents this information to the project manager's supervisor as justification to change the team's methodology. Status Quo: An organization is recruiting a new CIO (Chief Information Officer) and is considering three candidates. All candidates have exceptional qualifications and leave positive first impressions on the organizational employees they meet during the interview process. In a late stage of the interview process, Candidate A proposes the adoption of a cloud-based enterprise system that would help the organization streamline their processes and better leverage organizational data for decision making, while Candidates B and C propose working within the practices that are already in place. Several employees do not wish to learn how to use a new system and change the way they do their jobs, even if doing so would improve organizational outcomes, so they express strong disapproval of Candidate A in favor of Candidates B and C. Halo Effect: Three candidates are being considered to fill one spot on a management team that will lead a major organizational project. The team's project lead does not personally know all three candidates but observes that one candidate stands out as being the most physically attractive. Despite this candidate having the most inferior credentials of the three candidates, the hiring manager feels most inclined to recruit this candidate to the management team. Horns Effect: A recruiter interviews a candidate who appears reserved and shy. Based on this first impression, the recruiter assumes the candidate will be incapable of effectively communicating with clients and connecting with other employees. Despite the candidate having letters of recommendation that highlight the candidate's effective communication and teamwork skills, the recruiter continues to believe the candidate lacks skills in these areas.

In the ________________ of computing, there were massive mainframe computers that only large corporations and governments could afford.

First Wave (1960s)

Which of the following is a TRUE statement about websites, URLs, and phishing? Select all that apply.

Hackers might infiltrate computer systems to enlist hardware for subsequent illegal acts. One of the reasons one should be careful about clicking on any URL in an e-mail is that hackers can easily embed a redirection in e-mail links, rerouting a user to an alternate online destination. Phishing is one of the most common intrusion techniques used to spread malware. Spear phishing attacks specifically target a given organization or group of users.

According to the textbook and lecture, what is a risk or challenge associated with use of AI? Select all that apply.

Insufficient and inconsistent data will inhibit AI use. Potential for negative unintended consequences of data misuse Consumers and employees may feel their information privacy is compromised. Employees may resist AI systems in the workplace because AI could significantly alter their jobs. Potential for AI algorithms to yield biased predictions and results

Match each definition with the correct term.

Legacy System: Outdated information systems that were not designed to share data, aren't compatible with newer technologies, and aren't aligned with the firm's current business needs Transaction Processing System: Systems that record a transaction (i.e., a form of business-related exchange), such as a cash register sale, ATM withdrawal, or product return Data lake: Systems that allow for the storage of data in both structured and unstructured ("raw," "unfiltered") formats Big data: The massive amounts of data available to today's managers, often unstructured and are too big and costly to easily work through use of conventional databases

What is the relationship between Moore's Law and e-waste?

Moore's Law predicts the accelerated obsolescence of technology devices, which leads to increases in discarded hardware devices.

Drag/drop the value chain components to their corresponding level of activity: primary or secondary.

Primary Components: Support—service, maintenance, and customer support Inbound logistics—getting needed materials and other inputs into the firm from suppliers Outbound logistics—delivering products or services to consumers, distribution centers, retailers, or other partners Operations—turning inputs into products or services Marketing and sales—customer engagement, pricing, promotion, and transaction Secondary Components: Technology / research and development—new product and process design Human resource management—recruiting, hiring, training, and development Procurement—sourcing and purchasing functions Firm infrastructure—functions that support the whole firm, including general management, planning, IS, and finance

According to lessons from this module (2), one reason that people possess unconscious biases is the following

The human brain receives millions of pieces of information each second and can only process a small fraction of this information, so it relies on mental shortcuts to make decisions.

According to the textbook, which of the following is true of United States environmental legislation regarding e-waste and recycling standards?

There is no U.S. federal legislation signed into law covering e-waste.

Drag/drop the descriptions and examples to their corresponding type of storage. It's possible some descriptions or examples do not match any category and will remain unsorted.

Volatile Memory: short term storage RAM Requires power to retain stored data or info Non-volatile Memory: Solid state drive Does not require power to retain stored data and info long term storage

The scalability of a software product is defined as the:

ability to be easily expanded to manage workload increases.

The below example is a type of business intelligence and analytics tool called a(n) _______________.

ad hoc reporting

According to the textbook, after the initial problematic roll-out of the Healthcare.gov app, a team of seasoned technologists and committed developers worked on fixing the system using a(n) ____________ methodology and led the web app to exceed enrollment projections.

agile

Which of the following is an example of a security threat resulting from malicious human activity?

an employee who intentionally destroys data or other system components

Hordes of surreptitiously infiltrated computers, linked and controlled remotely, are known as zombie networks or:

botnets

According to the textbook, due to widespread access to simple, affordable handheld devices in East Africa's Somaliland, the country's economy is fast becoming:

cashless

Social media can be a key driver of "________" media, where consumers who are enthusiastic about products and services can help spread the word through social media and word of mouth.

earned

According to the lecture video, "Overview of Artificial Intelligence," one of the differences between data and information is the following:

facts versus risk reduction

Which of the following is a benefit of in-house hosting (as compared to cloud hosting)?

in depth visibility of security and disaster preparedness for business continuity

According to this video, a strategy you can use to resolve paradoxes (contradictory ideas and values) is the following:

introduce new ideas that can resolve the paradox account for time account for context clarify levels of analysis (individual, society, organization, etc.) all of these

The ____ controls the computer hardware and how computer resources are allocated and provides a means by which end users can interact with the computer.

operating system

According to the textbook, which of the following is NOT a strategy used by a firm to achieve and maintain competitive advantage?

packaged software

A _____ enables communication between computers and processes by defining the format of data and rules for exchange.

protocol

In one of the videos, the guest speaker Greg Watkins referred to a stereotype that people who are "techies" or who are drawn to anime and video games are perceived to be most suitable for information systems careers. This stereotype is an example of

prototype bias - Assuming that someone is the perfect fit for a role or task based on stereotyping

Messaging services are a form of social media known for the following characteristic(s). Check all that apply.

some focus on specific media types (e.g., Instagram: photos, TikTok: videos) often used on mobile devices

According to this module (2), a digital native is:

someone who has been exposed to widespread adoption and diffusion of digital technologies, such as the Internet, from a young age.

The assigned chapter discusses various sources of internal and external data that an organization collects, stores, and analyzes for strategic decision making. Which is an example of a data source discussed in the chapter?

surveys call center conversations enterprise systems sensor data focus groups social media transaction processing systems data aggregators (firms that collect and resell data) loyalty cards [all of these]

According to this module, some social media researchers express concerns that social media use is re-wiring our brains to shorten our attention spans, while other social media researchers caution that there is insufficient research to support these claims.

true

According to the lecture and your textbook, deep learning involves multiple layers of interconnections among data to identify patterns and predict results and uses _______________. Select all that apply.

unlabeled data unstructured data


Ensembles d'études connexes

Communication and Technology: Etiquette on the Web

View Set

The 4 Principles of the Declaration of Independence

View Set

Property and Casualty Practice State Exam

View Set

2.02: Acquire a foundational knowledge of information management to understand its nature and scope

View Set

Information Technology (Software) X-Slate I

View Set

CIV PRO: JURISDICTION - PERSONAL JURISDICTION

View Set

Intro to Supply Chain Final Stephanie Thomas

View Set