hello my name is

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

66. What is the systems development life cycle (SDLC)? a. A process to test new applications b. A disciplined approach to systems development c. Documentation an end user follows to operate a system d. Risk management of developing a new software e. Analysis of industry systems

A disciplined approach to systems development

What is the purpose of normalizing a database? Remove redundancy Set correct dependencies To be able to query a database accurately All of the above

All of the Above

82. How do you get Bitcoin? a. Offer goods and services in exchange for Bitcoin b. Purchase Bitcoin through an exchange c. Pay someone cash for Bitcoin d. Mine Bitcoin e. All of the above

All of the above

The primary benefit(s) of implementing ERP include _________. Improved access to quality data for operational decision making Elimination of inefficient or outdated systems Improvement of work processes Technology standardization All of the above

All of the above

_______ is the process of checking data for validity and completeness data collection data storage data processing data editing all of the above

All of the above

11) When you click on a link on a web page in your browser, the browser sends _______ to the web server. a) A cookie request b) An HTTP request c) An HTML request d) A DNS request

An HTTP Request

What are the two types of cryptography systems used in encryption today? Asymmetric, symmetric Accurate, accessibility Threat, solution Analog, digital Not listed above

Assymetric, symmetric

_______ involves making sure that information or data can only be accessed by individuals with authorized access. Integrity Availability Confidentiality Authenticity Non-repudiation

Availability

93) Which of these these colomns in the "ClassSchedule" table must have unique values? A. ClassID B. LocationID C. InstructorID D. ClassID and InstructorID

D

What technology correlates an IP address with a particular website? a) HTTP b) DNS c) TCP/IP d) HTML

DNS

62. What government privacy act regulates the use of private information by financial institutions? a. CIPA b. COPPA c. FERPA d. HIPPA e. GLBA

GLBA

79. Which one of these restricts company's internal use of our information? a. GLBA b. FERPA c. COPPA d. HIPAA e. None

GLBA

74. What is outsourcing? a. Going to an outside organization to provide services b. Hiring new management c. Adopting d. Creating a new system for use e. Merging with another organization

Going to an outside org to provide services

59. What government privacy act protects your medical record confidentiality? a. CIPA b. COPPA c. FERPA d. HIPPA e. GLBA

HIPPA

Tables in second normal form (2NF): Have all non-key fields depend on the whole primary key Eliminate the possibility of an insertion anomaly Have a composite key Never have a composite key

Have all non-key fields depend on the whole primary key

76. During which phase of the SDLC is the system made operational in a production environment? a. Requirements b. Design c. Development d. Implementation e. Maintenance

Implementation

What involves sensing conditions and predicting what conditions will require actions? Design Intelligence Choice Implementation Wisdom

Intelligence

EDI (Electronic Data Interchange) is typically used in: a) Interorganizational Systems b) B2C Commerce c) C2C Commerce d) Transaction Processing Systems

Interorganizational Systems

78. What is the term used to describe the trade-off between schedule, features and cost when trying to successfully complete the development of an information system? a. SDLC b. Iron Triangle c. Process modeling d. Gantt chart e. Database modeling

Iron Triangle

Which of the following is a metric that tracks progress in executing chosen strategies to attain organizational objectives and goals and consists of a direction, measure, target and timeframe? BI BA KPI CRISP-DM Modeling

KPI

91) ) In the sheet named 'GOOG', the formula in cell I2 (that can be copied to the cells below it) should be: A. IF(G2=C2,"Record High", "record Low") B. IF(G2=C2,"Record High", IF(H2=C2, "", "Record Low")) C. IF(G2=C2,"Record High", IF(H2=C2, "record Low","")) D. IF(G2=C2,"Record High","")

c

. Privacy of information is the __________ of the __________ collected by organizations about the individuals using their services. a. confidentiality, information b. collection, data c. protection, knowledge d. certification, wisdom e. privacy, information

confidentially, information

80. A process model should be __________. a. simple b. complicated c. descriptive d. logical e. short

descriptive

Valarie has decided to purchase her first home. Before she begins looking at houses, she has chosen to review her budget, and has decided on a very specific number that she is comfortable with for her monthly mortgage payment. What kind of analysis has Valarie done? "What-if" Analysis Goal seeking analysis Paired comparison Pros/cons Decision matrix

goal seeking analysis

When you shop online, what is an indication that the transaction is secure? http:// https:// ftp:// smtp POP3

https://

63. Which of the following is one's personal beliefs about right and wrong? a. feelings b. ethics c. morals d. core beliefs

morals

Technically speaking, a system that has been accessed illegally is victim of ______ Theft and fraud Unauthorized access Carless behavior Denial of service Automation tools

unauthorized access

. What types of viruses propagate through the internet with no user intervention? a. Virus hoaxes b. Zero-day viruses c. Stealth viruses d. Worms e. Trojan horses

worms

94) Which of these SQL queries will provide details of details of instructors from LocationID of 'L1' and instructors from LacationID of 'L3'? A. SELECT * FROM instructor WHERE Location ID= 'L1' AND LocationID='L3'; B. SELECT * FROM instructor WHERE Location ID= 'L1' OR LocationID='L3'; C. SELECT Location ID= 'L1' OR LocationID='L3' FROM Instructor; D. SELECT Location ID= 'L1' AND LocationID='L3' FROM Instructor;

B

What is a common tactic hackers use to allow themselves re-access to a system? Backdoor Trap door Keystroke capture Rootkit Access file

Backdoor

81. Which of the following is a false statement. a. Bitcoin transactions can be separated from the blockchain b. Bitcoin is a decentralized form of currency, meaning that it does not belong to any form of government and is not controlled by anyone c. software is used to send or receive BTC to and from a person's wallet. d. A BTC wallet has a unique encrypted set of numbers and letters which is linked only to one person

Bitcoin transactions can be separated from the blockchain

83. __________ is the process through which transactions on a cryptocurrency network are verified and stored. a. Blockchain b. mining c. validation of agreement d. all of the above

Block chain

86) In the sheet named 'GOOG', the formula in cell D2 (that can be copied to the cells below it) should be: A. (C2-D2)/D2 B. (B2-C2/C2 C. (C2-B2)/B2 D. ($C$2-$B$2)/$B$2

C

92) Based on the ERD of the database, which of these statements in true? A. Each instructor (identified by IntructorID) can teach at many locations B. Each instructor (identified by InstructorID) can teach many classes C. Each class (identified by ClassID) can be taught at many locations D. All of the above

C

64. A transaction that occurs via craigslist is an example of what? a. B2B b. B2C c. B2E d. C2C e. G2C

C2C

61. What government privacy act prevents websites from collecting personally identifiable information from children without parental consent? a. CIPA b. COPPA c. FERPA d. HIPPA e. GLBA

COPPA

Which step in an Excel to Access conversion would deal with non-atomic data be? Determine the ERD Clean and prepare worksheet data in Excel Create tables using make table query in access Setup primary keys, data types, input masks, and validation rules and text Set up table relationships

Clean and prepare worksheet data in excel

What type of hidden collection approach tracks online browsing behavior? a. Cookies b. Clickstream data c. Key logger d. Spyware e. Trojan Horse

Clickstream data

What web 2.0 technology allows several individuals to contribute and share stored data and documents and includes controls to avoid two users from changing a document simultaneiously? Mashups Collaborative content Unified communications Really simple syndication Web conferencing

Collaborative content

69. What is the primary focus of the design phase of the SDLC? a. Desired level of performance b. Construction of the system c. Placing the system in production d. How the system will satisfy requirements

Construction of the system

_______ is a graphical representation that summarizes the steps a consumer takes in making the decision to buy your product and become a customer. Data cube Conversion funnel Data table Onion graph Data visualization

Conversation Funnel

Small text files that store information that are deposited on your computer after you visit some websites are called what? a. Cookies b. Codes c. Applications d. Browsers e. Profiles

Cookies

_______ are used to determine how well each alternative meets a particular goal or requirement. Analysis Comparison Criteria Technique Tool

Criteria

73. __________ software is built from scratch using few commercially-obtained components. a. COTS b. Custom-built c. Developed d. Open source e. Hybrid

Custom-built

87) In the sheet named 'GOOG', the formula in cell E2 (that can be copied to the cells below it) should be: A. VLOOKUP(D2,Lookup!$C$5:$D$9,2,TRUE) B. VLOOKUP(GOOG!D2, Lookup!$C$5:$D$9,2,FALSE) C. VLOOKUP(D2,Lookup!$C$5:$D$9,1,FALSE) D. VLOOKUP(GOOG!E2,Lookup!$C$5:$D$9,2,TRUE)

D

88) ) In the sheet named 'GOOG', the formula in cell F2 (that can be copied to the cells below it) should be: A. MAX(C2:$C$60 B. MAX($C$3:C7) C. MAX(C3:C7) D MAX(C2:C6)

D

89) in the sheet named 'GOOG', the formula in cell G2 ( that can be copied to the cells below it) should be: A. MAX($C$2:C39) B. MAX($C$3:$C$39) C. MAX(C3:C39) D. MAX(C2:$C$39)

D

90) In the sheet named 'GOOG', the formula in cell H2 (that can be copied to the cells below it) should be: A. MIN($C$2:C39) B. MIN($C$3:$C$39) C. MIN(C3:C39) D. MIN(C2:$C$39)

D

The _________ operates on the TOR hidden network, so the minimum tool to access it is ________ browser. Dark web, TOR Deep Web, TOR Dark web, any Deep web, any All of the above

Dark web, TOR

Which of the following is a collection of data that contains numeric facts called measures, which are categorized by dimensions, such as time and geography? Onion graph Conversion funnel Data point Data cube Word cloud

Data cube

_______ is used to explore large amounts of data for hidden patterns to predict future trends and behaviors for use in decision-making. BI Data modeling Data mining BA All of the above

Data mining

85. What Excel tool takes a range of different inputs that vary in a regular pattern and finds the corresponding outputs? a. Data Table b. Solver c. Scenario Manager d. Data validation e. Goal seek

Data table

The ________ uses a grid that lists all of the alternatives in the first column, and all of the criteria in the first row. Paired comparison Pros/cons analysis Sophisticated paired comparison Educated guess Decision matrix

Decision Matrix

What phase in the Decision Making Process is the most critical? Defining the problem Setting the requirements/goals Identifying the alternatives/criteria/tools Evalutating/selecting/verifying

Defining the problem

What kind of threat renders a system inoperative or limits its capability to operate? Denial of service Unauthorized access Theft and fraud Forceful Passive

Denial of service

68. What is a common result of E-Commerce when B2C introduced from brick-and-mortar? a. Exchanges b. Infomediaries c. Disintermediation d. Content Providers e. All of the above

Disintermediation

75. When planning a project, it is determined that the investment in the proposed project will not result in any profit. Which feasibility is this related to? a. Technical b. Economic c. Organizational d. Legal e. Ethical

Economic

By using the TOR browser on a computer in the United States, you are ______ Committing an illegal act Encrypting your browsing traffic and passing it through several nodes Encrypting your browsing traffic through a VPN connection Not encrypting your browsing traffic, but passing it through several nodes

Encrypting your browsing traffic through a vpn connection

Creating a virtual private network (VPN) requires: a) Encryption b) Web services c) Wi-fi d) Keyloggers

Encryption

60. A faculty member receives a phone call from the parent of a student. The parents inquires about the grade of the student on the last exam. If the instructor discloses any information, that instructor would violate what privacy act? a. CIPA b. COPPA c. FERPA d. HIPPA e. GLBA

FERPA

58. What are guidelines that suggest what the organization's practices should be with respect to the privacy of customers? a. Privacy policy b. Privacy guidelines c. Privacy seal d. Fair Information Practices e. Participation

Fair information practices

84. A currency declared by a government to be legal tenure, but is not backed by a physical commodity is called __________? a. Bitcoin b. Cryptocurrency c. Fiat Money d. All of the above

Fiat money

In order for you to enter the server room at your office you must have a key to the room, and then you must have a proper user name and password to access the server. All of the student files on the server are encrypted. What is this called? Layered security Overkill Defense in depth Organizational policy Information security

Layered security

Each Network Interface Card (NIC) has a unique hardware address called the: a) IP Address b) Web Address c) MAC Address d) Internet Address

MAC Address

71. Which phase of SDLC involves fixing any problems that are uncovered and may involve modifying the program to meet new ends? a. Planning b. Requirements c. Development d. Implementation e. Maintenance

Maintenance

Your IT department is adding a firewall to the network. What type of protection is the department adding? Data access Application access Physical access Network access User control

Network Access

A web merchant wants to ensure that people cannot deny that they entered into a transaction, so they start using digital signatures and encryption as part of their transaction processing. This is an example of what? a. Integrity b. Availability c. Confidentiality d. Authenticity e. Non-repudiation

Non repudiation

A company maintains two database tables: "Employee' and 'Department'. The 'Employee' table has details on each of the 527 employees in the company. As a result the 'Employee' table has 527 rows, one for each employee. The 'Department' table has details on each of the 12 departments in the company. As a result the 'Department' table has 12 rows, one for each department. Which one of the following is likely to be a foreign key in the 'Department' table? a) Department ID b) Employee ID c) Department ID and Employee ID d) None of the above

None of the Above

95) Referential integrity is being enforced for all of the relationships shown in the ERD diagram. We can delete: A. the record from the Instructor table corresponding to InstructorID 'T02' B. the record from the Location table corresponding to LocationID 'L1' C. the record from the ClassSchedule table corresponding to ClassID 'C003' D. none of the above

None of the above

When considering decision making techniques/tools, which tool requires you to evaluate each alternative against all other alternatives? Pros/cons analysis Paired comparisons Deep research Decision criteria Requirements

Paired comparisons

With the advent of extensive network capacity, smart phones, Internet of things and RFID, what is the term that some use to convey the ability of a few to control a society because of these merged technologies? a) Web 3.0 b) Biometrics c) Big Data d) Panopticon

Panopticon

Online content that is not visible via google search engine is ________. Inaccessible Part of the deep web Of little value Not on a hosted server All of the above

Part of the deep web

Your information systems group has decided to use Google Docs to work on your semester project. What type of architecture is your group using? VPN Cloud Computing Wireless Intranet Peer-to-peer

Peer to peer

70. If the integration plan is to implement a new system while the existing system is still running, what type of conversion plan would you be following? a. Direct Changeover b. Parallel Operation c. Phased Implementation d. Pilot Operation e. Use Case

Phased Implementation

You have received an email from your university IT department stressing that the IT department will never ask you for your username and password to your email account. What type of scheme is the university most likely trying to protect you from? Phising Smurfing Spoofing Break-Ins Security Holes

Phishing

67. Which phase of the SDLC begins the process? a. Requirements b. Planning c. Development d. Implementation e. Maintenance

Planning

What tools and techniques, rather than technologies, are available to help protect you online? a. Cookies managers b. Privacy policy and seals c. Cookies d. Spyware e. Surveillance

Privacy policy and seals

72. Auto makers spend a significant amount of time and money developing new automobiles. Often these auto makers create a working mock-up for display and testing. What methodology are these automakers using? a. Prototyping b. Modeling c. Maintenance d. Spiral Model e. Off the shelf

Prototyping

65. efile is an example of what business classification? a. Brick-and-Mortar b. Clicks-and-Mortar c. Pure E-Business d. E-Commerce e. Pure Play

Pure Play

What do you call conditions that any acceptable solution must provide? Goals Alternatives Requirements Desires Wants

Requirements

When verifying that the solution solves the problem at hand, you must be sure that the alternative meets all _______ and best meets the ________. Requirements, goals Requirements, needs Goals, wants Solutions, vision Problem, definition

Requirements, goals

What is software that allows hackers to have unfettered access to everything on the system, including adding, deleting, and copying files called? a. Spyware b. Sniffers c. Keystroke capture programs d. Backdoors e. Rootkits

Rootkits

You have been included on an IT steering committee for your University. The committee's priority is wireless access on your campus. The committee chair keeps discussing increasing enrollment numbers. What principle of architecture is the chair most likely alluding to? Ease of implementation Flexibility Control Scalability Security

Scalability

Which of these Excel tools would you use (just once) to find values of multiple inputs that provide a given single output value? a) Goal seek b) Scenario manager c) Solver d) Formula auditing

Scenario Manager

What term is used to refer to someone (or something) pretending to be someone else (or another computer)? Phising Spoofing Smurfing Porting Break-In

Spoofing

Order fulfillment at a warehouse using robots is a type of: a) Semi-structured decision making b) Structured decision making c) Unstructured decision making d) Non-programmed decision making

Structured Decision Making

Transaction Processing Systems (TPS) can make decisions using predetermined rules and processes. This is an example of a(n) _______ decision of a(n) _______ control. Unstructured, operational Structured, operational Semi-structured, managerial Unstructured, managerial Structured, strategic

Structured operational

What did Arpanet grant develop? a) HTTP b) DNS c) TCP/IP d) HTML

TCP/IP

Every packet of data on the internet contains within it _____ the source machine. The web address of The HTML content from The IP address from A cookie form

The IP Address from

77. What documentation or modeling technique is used to convey what the system is to do? a. DFD b. ERD c. CASE d. Database Modeling e. Both b and d

both ERD and DATAbase modeling

If a virus is embedded in a legitimate file, they are often called a(n)__________. Worm Trojan horse Hack Theft Active content

Trojan horse

What type of decisions are novel and do not have agreed upon procedures for making the decisions? Unstructured Structured Semi-structured Dependent Independent

Unstructured

A(n) ______ is a data inconsistency that results from data redundancy Update anomaly Insertion anomaly Deletion anomaly Any of the above

Update anomaly

What technology, other than computer communications, is necessary for cloud computing? a). SSL/TLS b). DNS c). TCP/IP d). Virtualization

Virtualization

innovators are working on Web 3.0. What type of new technology is expected from Web 3.0? Virtualization Instant gratification Signatures Procedures Semantics

Virtualizationq


Ensembles d'études connexes

Business Policy and Strategy Exam 1

View Set

AP Bio Chapter 19 Practice: Viruses

View Set

Chapter 11: Childhood and Neurodevelopmental Disorders

View Set

Test 4 Luther and the Reformation

View Set