Information Systems Management - C724 (Set 1)

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

What is a black-hat?

a computer hacker with criminal intent.

What is the definition of a digital signal?

a discrete, non continuous electrical waveform

What is supply chain management software used for?

channels and analyzes to assist executives in making orders, pricing, and inventory decision.

CFO

chief financial officer

CIO

chief information officer

COO

chief operations officer

CSO

chief security officer

How are user expectations best managed during system implementation?

communication and training

Forming an internal user group

consisting of users who support and resist the system can provide the implementation team and management with feedback that may help increase user adoption.

Transmission Control Protocol (TCP protocol)

consists of four abstraction layers: application, transport, Internet, and network access

Unit testing

consists of testing each program within the system in an effort to eliminate errors.

Critical path method (CPM)

is a step-by-step process planning technique that defines the critical and noncritical tasks within a project in order to reduce or minimize process delays and time-related problems.

OLAP databases are multidimensional, that is, data sets are referred to as cubic. What is a disadvantage of a multidimensional database?

lengthy ETL load phase

The Henry Mintzberg model identified ten roles performed by organizational managers. Interpersonal roles include figurehead, leader, and Hint, displayed below _____. Choices: liaison negotiator disseminator

liaison (Page 63)

tuples

list of elements

What data models are used by businesses to map processes to data requirements?

logical, physical and analytical

What does classification do?

looks for patterns that indicate customers' shopping behavior in order to target marketing efforts

What helps e-businesses respond and react quickly to changes within the business environment, more than their traditional brick and mortar counterparts?

operational efficiencies

Motherboard

or similarly the backplane, of a system is the device that contains the system bus and connects the various input and output devices that compose any given computer system.

What is information technology management concerned with?

the management of resources that facilitate access to information

Business continuity planning

is a process by which a business identifies its critical processes, or those areas of its business that must occur without failure lest the business will also fail. Such planning defines specific lengths of time for acceptable outages, responsible parties, contact information, and partners that have assumed the risk of supporting emergency continuity services.

Encryption

is a process by which data is encoded so that only persons with a decryption code may unlock and retrieve stored messages.

Clickstream

is an application that records the location on the screen in which a user clicks while browsing the Internet. These clicks are recorded and saved in web server log files.

cost-benefit analysis

is an important decision point for a business to implement controls or security for any risk, because managers need to evaluate the benefits versus the financial cost for implementing these controls.

Operational Database

is an online transaction processing database (OLTP) and can be used to gather real-time transactional or operational data.

Dumpster Diving

Gathering sensitive or nonsensitive information from refuse. This sometimes illegal act is as simple as foraging through household or corporate garbage receptacles for information. Even innocuous information tied with other innocuous information may, when combined, paint an attractive picture for identity thieves.

Accessibility issues

Issues created by barriers to access, implying that some should have access while others should not.

Property issues

Issues created by the association of rights of property ownership to tangible and intangible goods and information.

Privacy issues

Issues created by the collection, storage, distribution, or mere availability of potentially sensitive information.

Accuracy issues

Issues created by the trustworthiness, accuracy, and legitimacy of information.

Advertising

Naturally, it is not a new concept or business practice. The Internet, however provides a wide variety of methods that companies might use to attract customers and funnel them to their online storefront. Whether through direct marketing such as popup and email advertising, in application advertising, and affiliate advertising programs, helping a business to grow their customer base can be a lucrative business in itself.

Shared hot sites

Offsite facilities shared with other organizations for the purpose of disaster recovery, requiring only adequate or prioritized staffing, but at a cost shared with another organization. An obvious disadvantage and risk is that multiple tenants affected by a common event may cause a conflict.

Cold sites

Offsite office space awaiting occupancy, equipment, personnel, and utility service, allowing recovery within days.

Hot sites

Offsite office space with available and up-to-date systems and service connections, requiring only adequate or prioritized staffing, allowing recovery within minutes to hours.

Warm sites

Offsite office space with available systems and service connections, requiring staffing and updates allowing recovery within hours to days.

Phishing

Often completed through email, this generic act of fraud is often in the form of an email requesting a response containing sensitive information, such as a username or password. However, it can also take the form of a misleading and/or masked hyperlink that directs a victim to an official looking website (i.e. a pharming page) that asks for sensitive information.

SQL Injection

One high-profile example of a malware threat is.................... which uses vulnerabilities in the most popular type of database, SQL, to modify, delete, or steal information.

Physical Data Model

One or more -----------may exist within the logical data model, containing greater detail, such as database tables and key indexes.

Disaster recovery planning

is that which is primed for discharge in the case that a disastrous event occurs and business operations need recovery. Such measures include the creation and execution of processes, and the assignment of certain people to help to restore a business to an operational state.

Common good approach

This big picture approach values choices and motivations that perpetuate value for everyone, to sustain a positive whole-community benefit, despite individual income or position.

Accountability

is the application of responsibility or an obligation to accept responsibility. An example might be the person who has agreed to pay for a meal that she or someone else has consumed.

Predictive analytics

is the process of extracting information from existing data in order to identify patterns and predict future trends.

Black Hat

a computer hacker** with criminal intent.

Grey Hat

a computer hacker** with skills and intent to help organizations protect their networks and systems from others, but whose services may come at a price, or sold to the highest bidder.

Financial Services Modernization Act (aka Gramm-Leach-Bliley Act)

of 1999, which requires organizations and individuals to adhere to rules and procedures for storing and transferring financial information.

Public Company Accounting Reform and Investor Act (aka Sarbanes-Oxley Act)

of 2002, which requires organizations to adhere to rules and procedures to ensure the accuracy, integrity, and security of financial information that leads to the creation and storage of financial statements.

Denial of service

a loss of access created by cut cables or power services, malware, hoaxes, bots and botnets (i.e. a computer or groups of hijacked computers to attack others, often without notice to their owners), smurf attacks, SYN floods, DNS poisoning, or outright hijacking and/or redirection of services.

Identity management

which requires each individual in an organization to be appropriately identified and authenticated at specific entry points to an organization and its information systems, and which help with the enforcement of access control, with the appropriate authorizations pre-selected for them.

Acceptable use

which specifies acceptable and tolerable uses of an organization's computer systems, equipment, and information assets.

Normalization

a process of organizing data in a database in order to eliminate duplication, redundancy, and inconsistency. It involves correctly defining keys, tables, columns, and relationships. (1NF) to the Boyce-Codd Normal Form (BCNF)1, which is the form or state in which all redundancy has been removed.

Algorithms

based on machine learning or artificial intelligence are used in most cases to look for relationships, patterns, or trends.

Data Warehouse

is a collection of historical business transaction data, coupled with other, external market data or information. A key reason for implementing a ---------- is to enable storage of data from multiple sources to be queried and analyzed in order to help with management decision making. ---------------store transactional and analytical data for reporting and analysis purposes.

Online Transaction Processing (OLTP)

is a database design used for browsing and manipulating business transaction activity. Can be used to gather real-time transactional or operational data, such as inventory on hand.

Responsibility

is a perceived, moral, or legal duty that someone possesses to control or handle a specific or general task.

Database Server

is a powerful computer that stores the databases and DBMS to access and administer the database.

Data Mining

is a powerful tool used by many online businesses to build customer profiles. It is the process of identifying hidden patterns and relationships in large databases and applying rules to that data in order to predict future behavior.

What is the purpose of a general MIS evaluation?

A company's general evaluation of their MIS is to analyze the system performance against outlined objectives.

True or False. Changing or implementing new information systems creates opportunities for businesses to gain a competitive advantage.

True (Page 55)

Despite security risks, businesses must implement what?

a social media communication strategy

What is the total cost of ownership? (TCO)

a study to determine economic feasibility

Optical Character Recognition (OCR)

is a system that uses a scanner to read characters, automatically inputting them into the system in digital form.

Decision Tree

is a tool used in decision analysis and is another tool used to represent the entity-relationship model.

The _____ management component provides information about data relationships that are too complicated for a database to represent. Choices: knowledge interface data

knowledge (Page 65)

What is a primary role of a systems analyst?

arbitrator and consultant

The _________________ of a global information system is the basic structure of the information required to coordinate international business activities.

architecture

The _________________________of a global information system is basic structure of the information system required to coordinate international business activities.

architecture

Balanced scorecards are often used in business. What is a balanced scorecard?

a tool used by management to track and monitor staff and organizational activities

What is the definition of a systems analysis logical model?

a type of data diagram

What does a software engineer do?

code software to solve problems or perform tasks

Moore's Law

coined by the co-founder of Intel, described that components in integrated circuits or microchips will double every two years.

Transaction processing systems (TPS)

collect, store, update, and retrieve transaction data within an organization. Common business transactions include employee payroll, customer sales, and supplier payments.

What does the behavioral model hope to a accomplish in management decision making?

the unpredictable and less systematic aspects of decision-making

Packet switching refers to a computer networks ability to do what?

transmit discrete, parsed data in small packets

Telecommunication networks transmit data, voice, and _______ over long distances

video

What is a zero-day-attack

a threat or attack that exploits known or unknown vulnerabilities in software. Software developers quickly patch vulnerabilities once known, though identifying these vulnerabilities takes time. Once found and fixed, developers must send patches to all affected or potentially affected users, which, unfortunately, does not occur consistently. In other cases, the public release of patches is used as a tool for malware authors to reverse engineer and easily attack those who have not updated their systems in time.

White Hat

an authorized and ethical computer hacker**, one who helps organizations to protect their networks and systems from others, via penetration testing, or the design and implementation of policies.

What is a white-hat?

an authorized and ethical computer hacker*, one who helps organizations to protect their networks and systems from others, via penetration testing, or the design and implementation of policies.

What is a cyber criminal?

an individual or organization interested in exploiting computers and networks for the purpose of generating revenue. Note that organized crime has a very active presence in cybercrime.

What is a hacktivist?

an individual or organization interested in vandalism, cyber-terrorism, or hacking for a stated cause or purpose.

separation of duties policy

an organization might separate those roles which creates revenue (i.e. sales staff), creates sales quotas (i.e. management), and keeps track of performance (i.e. finance and accounting).

What is the overall job function of the systems analyst?

analysis, design, and implementation

The reporting service element of a successful business intelligence system creates _____ databases that help expedite custom queries. Choices: relational analytical heirarchical

analytical (Page 64)

Why is it not good practice to perform analytics on an online transaction processing database?

analytics would affect the database performance

What is the main role of the software analyst?

analyze and modify software systems, implement and test programs, and document software requirements

What does forecasting software do?

analyzes a series of values in order to predict or forecast the value of other variables.

Describe the process of data mining

analyzing data to gain insight or intelligence

Processes

and procedures provide a structured sequence of activities to govern the use, operation, and maintenance of IS.

When using GDSS, the _____ input mechanism reduces negative behavior, including groupthink and criticism of individual member input. Choices: anonymous parallel simultaneous

anonymous (Page 65)

What are the 7 layers of the OSI model?

application, presentation, session, transport, network, data link, physical

Clickstream

applications are those that track and analyze an application's activity, including how it is used and where a user clicks.

The use of all capital letters in written communication, especially letters, memos, and email, is considered to be all of the following, except: appropriate or acceptable aggressive or angry yelling or shouting

appropriate or acceptable (Page 60)

which step of the model will the company create a functional flow diagram

architecture testing

What are podcasts, and why are they a good source of information for systems analysts?

audio files that contain educational content

Business intelligence systems reduce labor costs through Hint, displayed below _____ data collection and reporting. Choices: automated customized processed

automated (Page 64)

What are the four categories of an organizational change?

automation, rationalization, process redesign, and paradigm

What configuration does the server control the traffic going back and forth the network, thereby maximizing the traffic on the network.

client/server configuration

What is information technology management responsible for in a college setting?

college computers, logins, network access, help desk support, and keeping the technology maintained, upgraded and secure

What is enterprise resource planning

combined systems into comprhensive system

What are measurement, analytics, reporting, collaboration, and knowledge management?

common functionalities of business intelligence

One reason IT is important is because video conferencing has become cheaper, quicker, more collaborative, and more efficient. Of what IT benefit is this an example?

communication

North americans are usually very straightforward and distrust evasive behavior. This characteristic is an example of a cultural difference in what?

communication style

Besides customer attributes, what factor can be used by an e-business to accurately price goods?

competitors' public pricing information

A decision tree is a viable decision analysis tool, provided the developer included all relevant _____. Choices: components events outcomes

components (Page 65)

Input

components include devices that provide input into the processing unit. These include peripherals, such as the keyboard, mouse, microphone (audio input), sensors, and document or visual scanners.

Output

components include internal storage devices or processes, as well as external peripherals such as monitor screens (visual output), speakers (audio output), and printers (physical output).

Storage

components include primary temporary storage and secondary long-term storage devices.

Data models used when mapping business processes, relationships, and data requirements

conceptual, logical, and physical

What do the letters CIA stand for?

confidentiality, integrity, and availability

The first internet social media site was Six Degrees in 1997. Six Degrees was a social network site that allowed users to develop an online profile to __________________ with other users.

connect

What are peer-to-peer network topologies?

connect each user in a network directly

What is the definition of a core router?

connect large business to backbone of internet

Wide area network (WAN)

connects business campuses consisting of computer systems across large distances

Local Area Network (LAN)

connects computer systems of an organization or a floor of a building.

What does network economics see the cost of adding new members as?

consequential

System testing

consists of testing the system as a whole in order to determine whether the modules function properly, and whether the system operates as planned.

intelligence phase

consists of the discovery, identification, and understanding of the problem1 During this phase, a problem may be classified or broken down into subproblems.

Implementation phase

consists of the execution of the alternative and continual performance monitoring. Because the ............... frequently requires the introduction of change, resistance may occur, necessitating the importance of user adoption and management support.

design phase

consists of the identification and exploration of alternatives and solutions to the problem. The design phase includes the construction of a model of the problem and the evaluation of the alternatives for feasibility.

Business analytics (BA)

consists of the tools and techniques used for the analysis and understanding of data, including data mining, modeling, statistics, and online analytical processing (OLAP). Technology vendors developed both terms, with the five largest BI and BA providers being IBM, Microsoft, Oracle, SAP, and SAS.

The ability for a telecommunication network to carry voice, data, and video is called

convergence

What are the systems implementation phases?

conversion, development, testing

What are critical issues of information systems

convey revelance and value of IT to the organization, Manage relationships between IT and Stakeholders, Implemenation of effecitve IT solutions

What is not practical for telecommunications, especially with the advent of wireless?

copper building wire

What business structure is a legal entity that can encompass a big number of shareholders?

corporations

What business structure is an individual not help personally accountable for any liabilities, risks, and debts from business operations?

corporations

What does data cleansing do?

corrects or removes duplicated, incomplete, or inaccurate data

What data should be scrubbed so that they are consistent with the design of the database?

corrupted data

IT is important because it helps businesses streamline processes that increase productivity and profits. What IT benefit does this exemplify?

cost effectiveness

How can mobile e-commerce help businesses actively market to their customers?

create direct channel for doing business, advertise through product or brand marketing using integrated applications, and develop salable mobile applications

What is a management solution when developing global systems?

introducing business process changes slowly will make the transition to the new system less disruptive, and there will be less resistance to the change

Uniform Resource Locator (URL)

is a protocol used by a client computer to request a website from a server via HTTP or HTTPS.

File Transfer Protocol (FTP)

is a protocol used to transfer files from one computer to another.

paradigm shift

is a radical form of change in which the nature of the organization is completely changed.

Virtual Private Network (VPN)

is a secure tunnel through the Internet using a public network infrastructure.

Database

is a set of data, in electronic format, organized in tables and easily searchable.

Value Chain

is a set of inputs used by a strategic information system and put into meaningful outputs to help a company gain a competitive advantage in the marketplace.

Database

is a set or collection of data that is centrally located in electronic format, organized in tables, and easily searchable.

There is a direct relationship between the system ______ of an organization and the effectiveness of the organization's management information. speed effectiveness performance

effectiveness (Page 59)

Server

A system used to provide services to other systems. Servers need not be powerful computers. Server operating systems may be used on personal computers, including desktops or laptops, though usually servers are built on more resilient and reliable components.

What are factors that influence the success of an information system?

functionality of the system, the quality of the data, the usefulness of the system, system usage, system efficiency, user satisfaction

What is the definition of data extraction?

getting data from data sources

The _____ of evaluating alternatives is to select the option that best meets the user requirements. Choices: limitation goal risk

goal (Page 57)

What are the 3 primary activities associated with business performance management?

goal selection, attainment measurement, and achievement intervention

Nation state

government focused and funded individuals or organizations interested in cyber-warfare against other nations and economic infrastructures.

What is nation state?

government focused and funded individuals or organizations interested in cyber-warfare against other nations and economic infrastructures.

What best describes the role of a Systems Analyst?

A systems analyst is responsible for recommending information technology to meet organizational needs.

hierarchical

A tree-like structure database is a type of .......... database.

TELNET

An early and insecure remote access protocol used to allow a user to log on to a remote system. Many newer, more secure and more modern forms exist, including secure shell (SSH) and Remote Desktop Protocol (RDP)

TELNET

An early and insecure remote access protocol used to allow a user to log on to a remote system. Many newer, more secure and more modern forms exist, including secure shell (SSH) and Remote Desktop Protocol (RDP).

D. Trojan horse

An employee downloads software that claims to improve computer performance. Instead, it introduces system vulnerabilities. What type of threats is this software: A. Virus B. Spyware C. Worm D. Trojan Horse

Which activity is an example of how information systems support business functions of human resource management?

An employee processes monthly payroll checks and benefits using an open-source software.

D. Offering an ethics training program

An employee works as an engineer at a software firm and checks personal email while at work. Due to the long hrs at office, the employee does not have time to check email at ho me and feels that his actions are acceptable even though it is against the companies internet policy. Which method could be used to discourage the employees behavior? A. Educating employes on stockholder interests B. Reducing employee workload C. Requiring company access to personal email accounts. D. Offering an ethics training program.

Quid Pro Quo

An exchange of something of value for information. For example, the gift of a T-Shirt in exchange for personally identifiable information.

(Example of dumpster diving) What is quid pro quo

An exchange of something of value for information. For example, the gift of a t-shirt in exchange for personally identifiable information.

What is a hypervisor?

An expensive application used by large businesses to improve computer network performance without having to physically change the network. It is not necessary for small businesses

A. Zombie

An individual writes a program that will take over a computer for the purpose of launching attacks on additonal computers. Which type of threat is being used? A. Zombie B. Phishing C. Vishing D. Pharming

A. Spyware

An individual writes software that collects personal data about a user from a computer and transmits it over the internet without the user's knowledge. What type of threat is this? A. Spyware B. Virus C. Worm D. Trojan Horse

D. Genetic algorithms

An internet service provider offers subscribers e-mail accounts and would like to develop software to identify spam. Which tup of artificail intelligence technology should be used? A. Fuzzy Logic B. Virtual Reality C. Knowledge management D. Genetic algorithms

Which of the following describes a direct system implementation? An old system operates during new system implementation. An old system is used as backup for the new system. An old system is replaced by new system without any overlap.

An old system is replaced by new system without any overlap. (Page 58)

artificial neural networks

Another data mining methodology more complex is...............which are nonlinear algorithm models used in data mining.

What are two examples of information technology?

hardware and software

chief technology officer (CTO)

has ultimate responsibility for all technology implementation, maintaining technology compliance regulations, and identifying technology risks for the company. The .... focus is on day-to-day operations, overall implementation of technology strategies, and efficiency of the IT systems. In most corporations, the .... reports to the CIO.

ABC playground company has been asked to build new playground at a local elementary school. The project must be completed before the first day of school. What steps would increase the likelihood of finishing the project on time?

have the most experienced workers complete tasks on the critical path

What must an effective business intelligence platform accomplish?

help align the organization with business objectives

What does WBS (work breakdown structure) do?

helps the CPM visualize the activity diagrams that define the critical path

Multicore processor

A chip with multiple CPUs is called a ........ This typically provides more computing power for they can run multiple instructions in parallel.

What is the difference between data mining and web mining?

Data mining examines and reveals patterns in a structured DBMS, while web mining discovers patterns in a less structured format, such as the internet.

Describe the difference between data mining and big data?

Data mining is used to analyze business databases, while big data analyzes big data sets.

Primary Data

Data observed or collected directly from first-hand experience

corrupted

Data quality audits and data cleansing are important for managing data resources. What data below should be scrubbed so that they are consistent with the design of the database?

Data Information

Organized Facts

Software as a service (SAAS)

Software licensed and hosted on centralized or distributed servers that belong to a service provider

class model

helps visualize static entities and relationships between them. With systems analysis and design, the model is a representation of user requirements.

What kind of database is a tree-like structure?

hierarchical

What does predictive analytics use to better understand customers and other business entities in order to define areas of opportunities or areas of risks?

historical data

Manual data capture is most prone to _____ errors. computer machine human

human (Page 58)

What is the system that helps improve employee productivity by managing the workforce?

human resources

Digital Signature

Term used for marking or signing an electronic document, by a process meant to be analogous to paper signatures, but which makes use of a technology known as public-key cryptograph

SDLC Implementation Phase

Testing and maintaining, Implementing and evaluating

Confidentiality, integrity, and availability

The CIA triad is a model that guides information security policy. What do the letters in CIA stand for?

What is the internet?

The Internet is a complex resource that consists of billions of computer and network connections, each with its own network interface. Every single connection to the Internet requires an IP address, with a DNS system that gives users a friendly way to access web pages.

Convergence

The ability for a telecommunication network to carry voice, data, and video is called

Considerable information is available on the Internet from systems analysts and organizations who choose to share their experiences and best practices. These Internet-based sources include podcasting, RSS feeds, webinars, chatrooms and forums, social network sites, and newsletters. Can you describe the advantages and disadvantages of utilizing the Internet as a source of information?

The advantage of using the Internet to access information is the immense volumes of information and resources within it. The disadvantages to the utilization of the Internet as a source of information is the verification required and the potential inaccuracy of information. The proper techniques for an Internet search include using specific techniques and evaluating the results. (Page 61)

True or False. Easy access to information is both an advantage and disadvantage to information management.

True (IM is responsible for allowing easy access to pertinent information on a network, which is advantage, but they are also challenged with keeping employee information secure and private with can be a disadvantage to easy access.)

True or false. One of the possible ethical or societal issues that arise from the increasing globalization of technology is violating legal statutes.

True

True or false. Web Developers will continue to be in high demand because the internet will continue to transform the way society and business interact and operate in the 21st Century.

True

What is the objective of the systems analysis stage in the waterfall method?

identify user system and software requirements

Benefits of data warehousing to businesses

improves decision making, delivers business intelligence

Post Office Protocol (POP)

in the application layer of the Internet standard protocol and is used to retrieve email from a mail server.

True or False. In order to model a system, it is necessary to determine the various inputs and outputs required by the customer, as well as the necessary processes for managing them.

True (Page 57)

Which of the following is a great, free, and ubiquitous source of information for systems analysts?

internet

What factors help e-business accurately target individual customers?

internet and databases

What do hiring managers use to identify inconsistencies in a candidate's background?

internet search and social media sources

What are the categories from Henry Mintzberg's management behavior roles?

interpersonal roles, decisional roles, informational roles

True or False. The operational feasibility study objective is to understand if the proposed system is compatible with existing or proposed organization operation objectives

True (Page 57)

True or False. Project managers and software developers face many obstacles in their work. One key challenge during the design and implementation of an information system is scope creep.

True (Page 58)

True or False. Information technology supports various types of decisions and management roles at various levels within the organization.

True (Page 63)

True or False. Decisive analytics use visual analytics that reflect human reasoning in order to support management decisions.

True (Page 64)

True or False. Geographic information systems (GIS) are tools used by management to help make decisions about product pricing, product selection, and marketing efforts.

True (Page 64)

True or False. The MIS decision component referred to as hardware consists of input/output devices, CPU, operating system, and media devices.

True (Page 65)

True or False. When managing systems implementation, the primary concerns with reliability are inconsistent output, system failure, and system unresponsiveness.

True (Page 58)

True or False. The focus of strategic-oriented evaluation is the determination of whether the information system outputs enable management to make strategic decisions.

True (Page 59)

True or False. CASE workbenches are classified with the same six categories as CASE tools.

True (Page 61)

True or False. The advantage of using the Internet to understand new IT concepts and access valuable information is that the information is accurate and immense on any IT topic.

True (Page 61)

False: Mashup is the correct terminology when mixing software to create a customized app.

True/false: Cloud computing allows users to ix and match software components to create a customized application.

True

True/false: RAM is Primary storage device, and it stands for Random Access Memory

True

True/false: RFID technology enables companies to monitor and track inventory using wireless handheld devices.

True

True/false: Software applications have a life cycle because of hardware technological advances described by moores law

A. Spyware

Two individuals are notified that soaftware has been found on their computers that collects personal information about them w/out their knowledge. Which type of threat has been found? A. Spyware B. Worm C. Virus D. Trojan horse

Software and data

Two out of six of the main components of a computer-based information system.

Secondary data

Type of quantitative data that has already been collected by someone else for a different purpose to yours. For example, this could mean using: data collected by a hotel on its customers through its guest history system

A web browser is required to surf the internet. What other protocol is needed by a client computer to request a web site via HTTP or HTTPs?

URL (uniform resource locator)

URL

Uniform Resource Locator is a protocol used by a client computer to request a website from a server via HTTP or HTTPS

Bargaining Power of Suppliers

Your company makes cars and firestone tires raises its prices for the tires for your cars. Do you go to another tire company?

True

[True/False] A data warehouse enables businesses to store analytical data and business intelligence from multiple sources.

True

[True/False] Although a Geographic Information Systems (GIS) captures and analyzes spatial or geographical data, it can be used by operations in industries such as engineering, transportation and logistics, telecommunications, insurances, and food.

True

[True/False] An Energy Management System (EMS) can help to manage energy usage and reduce operating costs in an organization. Google's Nest Labs automatic thermostat is an example of an EMS.

True

[True/False] Business intelligence is obtained by performing analytics on OLTP databases.

What is a data mart?

a data warehouse subset focused on a single area or function

Intranet

is a simple yet very beneficial addition to an organization's digital presence. benefits are Centralized information sharing, Email and collaborative software and Centralized storage repository.

database management system (DBMS)

is a software program that allows an organization to organize, manage, and provide multiple users with access to data used to perform administrative tasks to databases.

Data mart

is a subset of the data warehouse that is accessible by a specific department or strategic business unit. The basic characteristics of --------------- and data warehouses are that they are organized by subject or function, they use OLAP, and they are multidimensional, integrated, nonvolatile, and time variant.

data warehouse

is a system used for data analysis and reporting. They are central libraries of data that are combined from one or more sources and organized by subject to support organizational managers.

Hyper Text Markup Language (HTML)

is a system used to convert plain-text document into one optimized for viewing as a Web page, integrating colors, graphics, fonts, and links.

Internet of Things (IoT)

is a technology in which embedded electronic sensors enable connectivity in devices so they can communicate via the Internet. They are commonly used to measure and manage environmental states.

Voice over internet protocol (VoIP)

is a technology that enables the traditional use of a telephone, but with only a high speed Internet connection instead of a standard telephone circuit connection (aka PSTN).

relational database

is a type of database in which multiple information files are combined into one database in one location, where data are stored in two-dimensional tables known as relations and contain multiple entities and attributes.

Flat File

is a type of database model that resembles file cabinet functionality.

Hierarchical Database

is a type of database that connects tables in a master/slave1, leader/follower, or primary/replica format.

Big Data

is a very large data set (structured or unstructured) that can be mined or analyzed to find new trends or relationships for business intelligence.

What is used to show the relationship between data fields and tables in entity-relationship models?

pointers (or linked lines)

Pursuing individual interests or agendas in an organization without regard for company goals is an example of what organizational feature?

politics

Storage devices

portable hard drive, flash drive, tape drive, Cloud, etc.

Consumer credit scores are an example of Hint, displayed below _____ analytics. Choices: predictive descriptive prescriptive

predictive (Page 64)

What can be used to predict future outcomes or trends, but it does not tell you what will happen in the future?

predictive analysis

What are two key elements that make up the data warehouse?

presentation and staging

What is the difference between a primary key and a foreign key in a relational database?

primary keys define columns in a table, while foreign keys are typically a constraint to reference two tables.

The primary role of a systems analyst is _____. coder project manager problem solver

problem solver (Page 60)

What are the key factors to consider when planning and organizing information technology in business?

processes and employees

Management information systems (MIS)

represent a category of information systems that serve lower to middle managers. MIS provide performance reports based on the results from transaction processing systems, such as product cost data, sales data, and expense data.

Information Technology

refers to the non-human, non-process components of an information system (e.g., hardware including network devices, software applications and data).

Cardinality

refers to the numeric relationship between two entities.

Hardware

refers to the physical IT devices (i.e., equipment) that are integrated into an information system.

What data is stored in related tables that can be accessed and joined in many different ways without having to reorganize the tables?

relational database

domain model

represents the definitions and concepts of the problem, and defines relationships of the entities.

Usability testing

requires a formal meeting with several users which includes an interview and observation or screen-sharing. Information obtained during this process will assist with the development of additional training or system customization.

Benchmarking

requires contacting users and teams that have successfully implemented a similar system in order to gather best practices.

Prototyping model

requires the development of a scaled prototype that can be tested prior to full-scale development.

What are the factors that must be considered when implementing anew information system?

resistance to change, user, technical ability

Organizations can help to maintain data integrity by implementing data governance policies. Only employees with appropriate access can __________________ data from the server

retrieve

A software library is built and shared on the cloud, enabling developers to access common software through a process known as code _______. compelling development reuse

reuse (Page 61)

Purchasing homeowner's insurance in case of a fire or hurricane is an example of what?

risk transference- shifting the risk to someone or something else.

What is qualitative risk analysis?

the measurement of probability and consequences of risks

direct implementation

the old system is replaced by the new system without any rollout or overlap.

radio frequency identification (RFID)

tracking barcodes and wireless sensor networks, some used in supply chain operations.

The origin of global markets was__________.

trading on slike route

Due to its data capture and display ability, GIS can be a very beneficial tool for law enforcement. Which data is most useful in a GIS to help fight crimes?

traffic, locations, taxes

What type of management information systems do operational and middle management use for structured decisions?

transactional processing systems

What are the for main global business strategies that form a global firm's organizational and information systems structure?

transnational, multinational, franchisers, domestic exporter

Decision ______ represent graphical representations of the rules, conditions, and actions of the process. Choices: matrices tables trees

trees (Page 57)

What reveals the patterns of behavior, such as currency fluctuations, which can affect a stock or an entire industry or market?

trend analysis

true

true/false: A server is a computer programmed to provide multiple users application services and can have a dule or quad core processor. some servers even contain a octa core CPU with eight processors on a chip.

True

true/false: Engineers tasked with designing complex systems typically require workstations as their computer systems.

-False: HTML is a software language used to design websites

true/false: HTML is a software language used to manage relational databases

true

true/false: Open source software has been found to contain fewer defects than proprietary software.

False: Plan for the future and do not try to get just the bare minimum you will need today: make sure the system meets the recommended requirements, if not more.

true/false: When purchasing hardware, do not purchase more than the minimum required by the software.

true

true/false: a 2 in 1 computer system is a computer that can act as a laptop, with high level of capability, and use tge display as a touch screen pad.

What does the query function do?

turns raw data into meaningful information based on the criteria specified by the user.

There are _____ main methods for modeling and designing systems. Choices: four two three

two (Page 55)

synchronous

two way communications, such as audio/video teleconference and instant messaging

CIO (chief information officer)

typically second in command, also known as the vice president of operations. Reports to the CEO or president and makes sure all company operations run smoothly.

Information systems are less suitable for _____ decision making. Choices: unstructured structured

unstructured (Page 63)

Strategic information systems

use technology resources to enable an organization to meet a specific business goal or initiative and to provide a competitive advantage.

Decisive analytics

use visual analytics that reflect human reasoning in order to support management decisions.

What is QoS?

used to measure performance of data communications

Unified Modeling Language (UML)

which is a general-purpose modeling language designed to provide a standard method to represent the design of a system.

system-oriented evaluation

which is the ability of an information system to discriminate between files or data that are relevant to a user query, and those which are not relevant.

Central Processing Unit (CPU)

which is the brain of the computer. Historically, this unit included several components, such as a control unit, a processor, an arithmetic or logic unit, and memory components.

System Bus

which is the medium through which communications between the input, processor, storage, and output occur.

True or False. The systems analyst sometimes plays the role of arbitrator to resolve conflicts by addressing user concerns.

True (Page 60)

True

True/false: Human touch and human gestures are computer input technologies

Tree Topology

Two or more star networks connected together. The central computers of the star networks are connected to a main bus (network of star networks)

Broadband has enabled data, voice and video to be combined and transmitted over one network. What is the name of the standard that allows this convergence between voice and data networks?

VoIP

Which conversion implementation should a company use if it plans to discontinue using the legacy payroll system on Friday and begin using a new payroll system on Monday? A Phased B. Pilot C. Parallel D. Plunge

D. Plunge

VoIP

Methodology and group of technologies for the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the Internet

choice phase

consists of the selection of an appropriate solution from the available alternatives. Specific values may be assigned to the decision components during this phase.

In information systems, what is the act of capturing data for processing called?

input

A decision tree tool is not viable when data contains a different number of

levels

What is the role of the computer systems administrator?

manage company workflows, identify and fix network issues, and maintain equipment and software

What are the major contributions or factors that drive global systems and the internationalization of business?

management and coordination, production, operation, supply, distribution, global customers, and global marketing

Scope creep

occurs when the project continues to grow in scope, or uncontrolled changes occur during the course of the project.

Family Education Rights and Privacy Act (FERPA)

of 1974, which requires educational institutions receiving certain federal funding to protect the information and privacy of certain aspects of a student record.

Health Insurance Portability and Accountability Act (HIPAA)

of 1996, which requires organizations and individuals who handle medical information to adhere to rules and procedures for billing and information transfer.

Output devices

printer, monitor, speakers, etc.

IT is important because it helps ensure new, quality products reach the market faster and to more customers and suppliers. This is an example which IT benefit?

product development

What can be disseminated to millions of consumers through social media, reducing marketing costs compared to traditional print, radio, and television advertising?

product marketing

System development life cycle (SDLC) consists of 6 stages. What is the last stage?

production and maintenance

RFID technology helps companies to be more ______________ with inventory management because they eliminate the need for physical handling of materials during cycle counting.

productive

What is the definition of clickstream?

records where a user clicks on a web page

What are OLAP databases used for?

reporting- generate reports that have information or business intelligence

What led to the innovation of the telephone?

telegraph technology

Who does the the LinkedIn model benefit?

the entire recruitment community

Data normalization

which is the reorganization of tables, and attributes within a database to reduce duplication is especially important during database redesign, but also when data is imported or merged.

data integrity

which refers to the accuracy and consistency of data within the database over its lifecycle.

principle of least privilege

which suggests that to avoid fraud, abuse, and theft, personnel are given only enough access in order to complete tasks within their job.

Hypertext Transfer Protocol Secure (HTTPS)

which uses HTTP as well as technologies such as Secure Socket Layer (SSL) and Transport Layer Security (TLS) to encrypt and decrypt data between the user and Web server.

What category of CASE does Microsoft Visual Basic fall under?

workbenches

Supply chain management system

works to increase the efficiency of the process of getting materials developed into the products and pushed out to the customer.

Supply chain management system (SCM)

works to increase the efficiency of the process of getting materials developed into the products and pushed out to the customer.

Credentials

would establish what level and type of access a user would have.

Computer programmers

write code to instruct computers to perform certain tasks.

Supply Chain Management (SCM)

Walmart uses ............... software to plan and distribute products from the warehouses to the local stores.

Automation

is the most common opportunity through which employees are assisted with performing tasks more efficiently and effectively.

Build and Fix

is the simplest SDLC model allowing for code to be incrementally modified and implemented until successful.

What should be avoided in effective written communication?

jargon and terminology

Written communication is a concrete form of communication because it should be difficult to Hint, displayed below ______. understand interpret misinterpret

misinterpret (Page 60)

How does web-based databases allow users to access information?

mobile devices or laptops

What are process description tools?

modular design, decision tables, decision trees

How does business intelligence make information actionable?

provides real-time, relevant, and user customized information that is easily shared

What are the classifications of cloud computing?

public, private, and hybrid

What does wireless communication use to send and receive signals?

radio waves over the radio spectrum

The key benefits provided by wireless networks are

that information is available from anywhere, and the networks can be easily reconfigured because there is no physical wiring.

What is an advantage of information management?

the ability to collect, organize and process data from internal and external sources and distribute the resulting information to support decision making and business processes.

What best describes the classical model in management decision making?

the classical management model supports planning and controlling

What is the meaning of outcomes in decision theory?

the consequences of an event

Define synergy

the cooperation of two or more companies to gain efficiency and growth

Data Management

the creation, update, and deletion of the data within the database.

Search engine optimization (SEO)

the process of ensuring the site is visible and highly ranked in search results, is a high priority. The following figure displays many of the areas that a Web developer must consider.

What does velocity mean when describing big data?

the speed required to process or analyze big data

Why is it imperative that modern businesses have a social media marketing strategy?

to capture this new community of users and to address issues of social care

Customer Relationship Management System (CRM)

Customer loyalty, customer interaction, communication, documentation, database, promote certain information into target sales

Normalization prevents inaccurate data entry

Which of the following is not a reason to normalize a database?

Types of attacker are as follows:

White-hat grey-hat black-hat cyber criminal hacktivist nation state

Clickstream

is an application that records the location on the screen in which a user clicks while browsing the Internet.

People in Information Systems are

Specialists

What application provided by the internet allows a business to transfer documents automatically without human intervention?

(EDI) Electronic Data Interchange

What is the typical broadband data speed of a 4G network?

100,000 kbps

Ring topology

Connected in a circular fashion and data travels in one direction

Using the IP address of 142.212.25.1, which two bytes are managed and assigned by the computer administrator to each individual host on the network?

25 and 1. The last two bytes are assigned to and managed by the client. The first two bytes are assigned to and managed by the ISP

What is LinkedIn?

A database of possible employees or candidates

SDLC Phases

Analysis, Design, Implementation

What is Synergy

Cooperation between businesses, combined expertise

IS 4 pyramid

TPS, MIS, DSS, EIS

Which technology trends such as the Internet of Things (IoT), Big Data, Cloud Computing, eCommerce, the internet has become a very important and useful aspect of society. To prepare for these trends and aid in technology evolution, a necessary and critical change in telecommunications was the conversion from IPv4 to IPv6. What was the primary reason to convert to IPv6?

To increase the number of available of IP addresses

The IP version 6 (IPv6) addressing scheme was developed in 2006 for what purpose?

To increase the number of unique IP addresses

TCO (Economic Feasibility)

Total Cost of Ownership

Wi-Fi Protected Access (WPA)

Wi-Fi security algorithm (256bit) - 2003 - 2006

Information Systems

accept data as input

CEO

chief executive officer

What are the basic analytical operations?

consolidation, slicing and dicing, and drilling down

System software

operating systems (windows)

Rapid application development allows adaptability because ______ are developed during the process. Choices: prototypes specifications methodologies

specifications (Page 56)

Information Technology is a subset of ______

Information Systems

Business intelligence consists of what?

databases, data warehouses, and analytics

What is the primary role of information systems managers?

decision making

Freemium involves what?

digital pricing strategies

The primary component categories that make up a Computer-based Information System (CBIS)

(PPHSND) people, processes, hardware, software, networks, and data

relational

, logical, and physical data models are used by businesses to map processes to data requirements.

What are Porters Five Forces Model?

1. Competitive Rivalary, Bargaining Power of Customers, Bargaining power of Suppliers, Threat of New entrants Threat of Subsituites

What are the 3 norms in normalization?

1NF, 2NF, and 3NF

What adoption is a method of system transfer in which the old system is replaced when the new system is implemented? Direct Parallel Serial

Direct (Page 58)

Point to Point topology

Direct link between two computers

What are the downsides to businesses having too much information? Too much information can create information overload and organizational paralysis. Too much information brings down business intelligence databases. Too much information is expensive to generate and act upon.

Too much information can create information overload and organizational paralysis. (Page 64)

Search engine optimization

Tools that allow webmasters and developers to achieve better rankings from search engines, implying that traffic would better route to a site as a result.

SDLC (Software Development Life Cycle)

Traditional method to develop software

logical data model

contains more detail than a conceptual data model, often defining operational and transactional entities for the database.

When should oral communication be avoided?

when conveying documentation

Field

An attribute of an entity, such as name, address, student id.

Data

The input the system accepts to produce useful information

DBA

Database administrators

ERP

Enterprise resource planning systems

Defeat wardriving

Hide SSID

Data

Input

Access point client

Machine wired to access point

e-Tailers

Provide access for the sale of physical goods, which are then shipped to their customers

TPS

Transaction processing systems

proprietary

belonging to a single organization.

What are steps in the decision-making process?

define problem, develop alternatives

What is an example of big data analytics applications?

new drug discovery

What size is big data database considered?

petabyte

Information that have been organized to provide value to an organization

Data

Example of IS helping HR

Monthly payroll

A decades-old company has several hundred employees and a modern IT infrastructure. An IT security analyst has been hired to provide a layered defense structure and must take measures to ensure confidential information remains confidential. Which activities will help the IT security analyst accomplish this goal? (3 answers)

1) mandating annual information security training for all employees 2) Requiring the use of ID blades at building access points 3) Requiring the regular acknowledgement of acceptable use policies

Analysis Phase

1. Identify problems, opportunities, and objectives 2. Determining information requirements 3. Analyzing system needs

Using the IP address of 142.212.25.1, which two bytes are managed and assigned by the Internet Service Provider?

142 and 212

Five competitive forces

1. threat of new entrants 2. threat of substitute products or services 3. bargaining power of customers (buyers) 4. bargaining power of suppliers 5. intensity of competitive rivalry

What is the primary difference between a 1G cellular network and the current 4G network?

1G enabled mobile voice telecommunication while 4G offers voice, data and video

What are the steps in building a logical model of a system?

1st. collect information about the proposed system, 2nd. development of functional flow diagrams, functional specifications, and a flow dictionary, 3rd. functional flow diagram presented to customer, user input obtained, model is revised, and user approval is obtained

Bluetooth is a wireless protocol that connects nearby devices with peripherals at what spectrum band?

2.4Ghz

How many steps are in the prototyping software development method?

4- user basic requirements, development of prototype, using prototype, and revising prototype

Design Phase

4. Designing the recommended system 5. Developing and documenting software

Implementation Phase

6. Testing and maintaining the system 7. Implementing and evaluating the system

Although teen usage of social media exceeds that of adults, what adult demographic is experiencing an increased use of social media, with 31% of members of that age group reportedly using social media?

65 years and older

How many layers are in the standard OSI model?

7- physical, data, network, transport, session, presentation, application

A software engineer _________________________computer programs to perform specific tasks.

? NOT procures

One of the advantages of information systems for businesses is to take raw data and turn it into information, and then transform that information into knowledge. The number of people in Florida with incomes below the poverty line is an example of

? Not Knowledge

There are four main global business strategies that from a global firm's organizational and information systems structure. Which item below is NOT one of those strategies?

? Not franchisers

Global business challenges are typically no worse than domestic business challenges, except for the distance. Knowing the challenges upfront can alleviate some of the problems in the end. Of those listed, which is the easiest to solve?

? Not personnel

?

A ............ is a planned design structure of a database.

Dynamic Host Configuration Protocol (DHCP)

A DHCP server or appropriately configured router automatically and temporarily assigns IP addresses to DHCP-enabled systems on the network.

Hadoop

A Java based open (i.e., non-proprietary) programming framework that supports big data collection, processing, and analytics of a distributed computing environment.

How are a systems analyst and a business analyst different? A business analyst understands business operations and processes. Systems analysts understand systems and some business processes. There is no difference between the two; they are both able to do the job of the other. A systems analyst understands business operations and processes and implements them in IT. A business analyst understands systems and some business processes.

A business analyst understands business operations and processes. Systems analysts understand systems and some business processes. (Page 60)

Table

A collection of related records. For example, a set of customer records would all be contained in one table.

Foreign Key

A common field that exists in multiple tables that is used to form a relationship. For example, a customer might be assigned a specific sales representative. The customer's record might contain a sales rep ID that would link to the Sales Rep table.

Foreign Key

A common field that exists in multiple tables that is used to form a relationship. For example, a customer might be assigned a specific sales representative. The customer's record might contain a sales rep id that would link to the Sales Rep table.

C. Online analytical processing

A company engineer would like to produce a new product that stores, views, and analyzes data to create multidimensional charts for the CFO. Which decision support system will be the foundation for this new product? A. Business Intelligence B. Geographic information systems C. Online analytical processing D. Executive information systems

It takes into account the needs of the end users.

A company has recently acquired a former distribution competitor in another country. The new subsidiary is found to use obsolete CRM software, so the company decides to create a new, proprietary CRM solution to be used company-wide. The company proposes to use a mutlinational team to develop the new software. Why has this approach been proposed?

Prohibitions against the transfer of certain technologies across national boundaries

A company has recently acquired a former distribution competitor in another country. The new subsidiary uses obsolete CRM software. To streamline integration with the new subsidiary, the CEO and CIO have decided to replace the outdated software with the system the company currently uses. What is a political challenge to implementing this decision?

B. Write guildlines for usage of technology

A company wants to discourage someone from inappropriately accessing the company's technology resources for personal use. Which step should the company take? A. Explain the budget process for technology B. Write guildlines for usage of technology C. Establish a reward system for whistelblowers D. Train employees to use technology efficiently

B. Optimization

A company wants to find a technique that will provide the best value for a target variable. Which analysis should the company select? A. Sensitivity B. Optimization C. What-if D. Goal seeking

B. Supply chain management

A company would like to implement a new network system. The company is looking for a system that will provide management functions of financial, production, and distribution operations at the same time. Which network system should this company use? A. Partner relationship management B. Supply chain management C. Enterprise resource planning D. Technology resource planning

Extensible markup language (XML)

A computer language similar to HTML, XML makes it easier to exchange, validate, store, and interpret data between a variety of applications and systems.

Which of the following best describes a computer network?

A computer network is a data communications system that uses cable or wireless media to transmit and receive signals.

C. Primary Storage

A computer's main memory is directly accessible to the CPU and consists of random access memory (RAM), cache memory, and read-only memory (ROM). What is it called? A. Secondary storage B. Output device C. Primary storage D. Input Device

B. HIPAA

A contractor is bidding on a system to help a dental office schedule patient appts and payments. Which law would contractor need to understand? A. Fincancial services modernizations act. B. HIPAA C. FERPA D. Sarbanes-oxley act

Security

A critical issue that information systems executives must make difficult hardware decisions regarding the issues that pose possible outside threats to the system.

data mart

A data mart is a smaller subset database from a data warehouse typically focused on a single area or function.

ERD

A database schema can be represented by which model?

Decision analysis is a method used by management to assist with decision making. Decision analysis tools increase the likelihood that the decision maker will make the best decision. Can you describe the decision tree tool and list some of its advantages?

A decision tree is a tool that uses a tree-like graph to model decisions in order to identify the most appropriate strategy to reach a goal. A decision tree presents a visual flowchart representation of the decision and each of the possible outcomes. Some advantages of the decision tree method are the following: It is easy to understand and interpret. It enables the addition of new scenarios. It contains value with limited detailed data. It can be combined with other decision analysis tools and techniques. (Page 65)

C. Phased

A development team is creating a new reporting system to track vacation and expenses. Which converstion implementation should the team use if it uses the new vaccation reporting module first and implements the expense reporting module two months later? A. Pilot B. Plunge C. Phased D. Parallel

When performing systems analysis, why is a feasibility study important? A feasibility study determines if a solution is possible for an organization. A feasibility study helps understand and define a system. A feasibility study determines if a solution is too expensive.

A feasibility study determines if a solution is possible for an organization. (Page 55)

Primary Key

A field that uniquely identifies a record, such as customer ID or student ID.

Primary Key

A field that uniquely identifies a record, such as customer id or student id.

Grid computing

A form of supercomputer constructed from many smaller systems that have been connected together.

Network

A group of two or more computers and other devices connected to each other.

What is a denial of service attack?

A hacker attempt to tie up network host resources making them unavailable

Mainframe

A high-capacity, high-performance system built for large organizations and used to quickly process large volumes of data.

(Example of dumpster diving) What is Pharming?

A high-tech attack that is an act of using malicious code to redirect users to a website that mimics the appearance of an official page, but that merely collects sensitive information, such as names, addresses, phone numbers, usernames and passwords, and security questions and answers.

A company will experience many challenges during the design and implementation of an information system. The design team must not only manage the design and implementation process, but must also manage the people involved and their perceptions of the proposed system. Name one key reason why a large majority of system implementations result in failure.

A key reason system implementations fail is due to change, such as system change, information access change, and organizational change. Change brings about fear and fear causes employees to resist (and even undermine) implementation. (Page 58)

3 years

A large part of IS management's main agenda changes this often due to the constant evolving of information systems, confirming the highly dynamic nature of the IS management function.

(Example of dumpster diving) What is tailgating?

A low-tech attack that allows unauthorized personnel access to sensitive or restricted areas merely by overtly or covertly following an authorized employee through a controlled access entry point.

(Example of dumpster diving) What is shoulder surfing?

A low-tech attack that is as simple as watching someone type in their password, or obtaining sensitive information from a computer screen.

Shoulder Surfing

A low-tech attack that is as simple as watching someone type in their password, or obtaining sensitive information from a computer screen.

What is baiting?

A low-tech attack where an attacker depends on the victim's greed or curiosity to provide sensitive information.

Describe predictive analytics.

A method or algorithm that uses statistics and data mining to forecast models.

What is social engineering?

A method used by hackers to develop a relationship to trick employees into revealing confidential information or passwords.

system on a chip

A microchip that performs more functions than a CPU and has other devices embedded in it is called what?

Workstation

A more powerful system used by individuals in order to run more resource-intensive applications.

Business Ecosystems

A network of businesses, such as suppliers and distributors, are involved in providing delivery of a service or product through cooperation.

Tangible User Interface (TUI)

A person interacts with digital data through a physical environment.

Entity

A person, item, event, etc. for which an organization collect data. An example of an entity would be customer or student.

Entity

A person, item, event, etc., for which an organization collects data. An example of an --- would be customer or student.

What is a potential obstacle that may inhibit decision analysis when using a decision support system? Choices: Untrained management A poorly defined problem Cause-and-effect diagrams The environment

A poorly defined problem (Page 65)

D. WAN

A real estate office has several divisions located in different states. Which type of network should the real estate company implement to connect their divisions? A. MAN B. P2P C. LAN D. WAN

B. Data Warehouse

A sales manager for a national chain wants to provide customer demographics and historical sales data to staff in the sales and production departments to help them determine how many products to make and ship to each retail location for the upcoming holiday season. Which approach would allow the staff to most efficiently extract that information? A. Decision support B. Data Warehouse C. Relational D. Object-oriented

You are working on a project and hear the word "sensitive" referred to with regard to the work schedule. What is meant by a project schedule being sensitive? A sensitive schedule has slack time. A sensitive schedule has more than one critical path. A sensitive schedule addresses resource allocation.

A sensitive schedule has more than one critical path. (Page 57)

Infrastructure as a service (IAAS)

A service provider provides a cloud fabric, or pooled services, including server space, servers, storage, and all other aspects of the computing platform, with the exception of the operating system and applications

Infrastructure as a service (IAAS)

A service provider provides a cloud fabric, or pooled services, including server space, servers, storage, and all other aspects of the computing platform, with the exception of the operating system and applications, which the client organization would install and manage. Benefits include dynamic scaling and may include geographic distribution. An example would be Windows Azure or Rackspace.

Platform as a service (PAAS)

A service provider provides server space, the server, virtualization, operating system, database, and development environment in a platform that can be used for application development. An example would be Amazon Web Services

Platform as a service (PAAS)

A service provider provides server space, the server, virtualization, operating system, database, and development environment in a platform that can be used for application development. An example would be Amazon Web Services.

Virtual computing

A software-based platform that allows multiple virtual servers, isolated from host computer, to operate on a single or, potentially, a fabric of many systems. Initially intended to more efficiently use expensive and underutilized hardware, virtualization has allowed for better fault tolerance and flexible, dynamic, and automated server operation and maintenance.

C. Executive information system

A strategic team is using the aggregate results from the decision support system to support long-term decisions that require judgement. Which system is being used by the team? A. Virtual reality system B. Expert system C. Executive information system D. Transaction processing system

Which type of emerging computing technology allows a computer to diagnose its own failure and develop a workaround that enables the computer to continue to function? A. Autonomic B. Auto-correction C. Alternative D. Avatar

A. Autonomic

What is the difference between data and information in information systems? A. Information is processed data B. Data contains numbers where information contains text C. Information and data are synonymous D. Data is written reports where info is the raw numbers

A. Information is processed data

Why would a vendor choose to utilize electronic data interchange (EDI)? A. It permits secure transmissions of business information B. It provides many personal productivity applications. C. It allows multiple computers to run on a single machine. D. It integrates all dept functions into a single IT system

A. It permits secure transmission of business information

Why would a school admin choose to utilize Microsoft Office? A. It provides many personal productivity applications. B. It integrates all department and functions into a single IT system. C. allows multiple computer to run on a single machine. D. permits transmission of business info.

A. It provides many personal productivity programs

What is true of a relational database? A. It provides relational integrity for the database B. It allows for the creation of data marts C. It compiles the metadata about the data elements in the data model D. It creates an indirect backup of data in the database

A. It provides relational integrity for the database

What is the main challenge to growth that is encountered when e-business is used? A. Product or service limitations B. Poor social media presence C. Underdeveloped user interface D. Inability to adhere to taxation rules or regualtions

A. Product or service limitations

What measures computer speed? A. RPM B. CPU C. Hard disk size D. Network interface card

A. RPM

Which risk is reduced when the investigation step is well executed during the planning and analysis phases of systems development? A. Scope creep B. System obsolescence C. End user training failure D. Continual maintenance

A. Scope creep

An individual writes software that collects personal data about a user from a computer and transmits it over the internet without the user's knowledge. What type of threat is this? A. Spyware B. Virus C. Worm D. Trojan Horse

A. Spyware

Two individuals are notified that soaftware has been found on their computers that collects personal information about them w/out their knowledge. Which type of threat has been found? A. Spyware B. Worm C. Virus D. Trojan horse

A. Spyware

What is the primary networking standard used to communicate over the internet? A. TCP/IP B. XBRL C. HTTP D. URL

A. TCP/IP

An individual writes a program that will take over a computer for the purpose of launching attacks on additonal computers. Which type of threat is being used? A. Zombie B. Phishing C. Vishing D. Pharming

A. Zombie

A network protocol designed to handle broadband integrated services such as voice and video is

ATM

Major business functions by IS

Accounting and Finance, HR, Prod and Ops, Sales and Marketing

What are major business functions by information systems

Accounting/Finance, Human Resources, Production/Operations, and Sales and Marketing

Accounting and Finance

Accounts payable, receivable, budgeting, general ledgers, payroll, cash flow, financial transactions

Why would you invest in IS?

Achieve operational excellence, develop new products and services, and competitive advantage

How can IS achieve a competitive advantage

Achieve operational success, develops new products, attains customer service, improves decision making, promotes competitive advantages.

Wardriving

Act of searching for Wi-Fi wireless networks by a person in a moving vehicle, using a portable computer, smartphone or personal digital assistant (PDA)

The information system used to support decision making should be flexible and _____ to various users. Choices: Adaptable Comprehensive Insightful

Adaptable (Page 63)

______ maintenance adds new capabilities to an existing system. Corrective Adaptive Perfective

Adaptive (Page 59)

operating system

All computer systems are composed of hardware components and software components and require a CPU and a ------ to function

When performing a systems analysis, why does the organization need to be analyzed as part of the process? Organizations can veto a change, and therefore, they must be included in analysis. All information systems have an impact on organizations, and therefore, organizational issues need to be part of the analysis. Organizations have the IT resources, and therefore, they must be accounted for.

All information systems have an impact on organizations, and therefore, organizational issues need to be part of the analysis. (Page 55)

Digital Market

Allow for diminished search costs, costs for changing prices, and a better ability to change prices for different types or categories of customers or sellers, or as market conditions change

CASE (computer-aided software engineering)

Allows designers, code writers, testers, planners, and managers to share a common view of where a project stands at each stage of development. Helps ensure a disciplined, check-pointed process.

Hostile or intrusive software with harmful intent can take the form of executable code and greatly damage a user's computer. Which technology can be used to minimize the chance of this happening?

Anti-malware

Content Provider

As with traditional newspapers, cinemas, and video stores, online ------------- rent or sell online access to digital content, such as music, news, video, and images. Examples include iTunes, Shutterstock.com and Netflix.com.

e-Tailer

As with traditional retailers of goods, groceries, and other physical products, ------------- provide access for the sale of physical goods, which are then shipped to their customers. Examples include pure-play firms such as Amazon.com, as well as traditional brick-and-mortar organizations such as Bestbuy.com and Walmart.com.

What social media activity should be avoided by job seekers?

Any post or activity that represents discriminatory behavior

Marketing manager uses a desktop publishing software to create advertising brochures that will be mailed to potential customers. To which major software category does desktop publishing software in this scenario belong?

Application software

A company is exploring the possibility of a merger with another company and decides to create system model of the merged companies. In which step of the model will the company create a functional flow diagram?

Architectural testing Process Enterprise

Service-oriented architecture (SOA)

Architectural pattern in computer software design in which application components provide services to other components via a communications protocol, typically over a network

End Users

Are people actually using systems

Data Inconsistency

As a student taking classes, imagine if your name was misspelled in one class, but not the other, and the impact this would have on your student record. If the same attribute in related data files has different values, what is this an example of?

When a corporation embarks on a new information system development program to either replace its legacy system or invest in a new system to give it a competitive advantage, a team of outside consultants, subject matter experts, systems analysts, business analysts, and super users will form the steering committee. If you are tasked to be the systems analyst, explain your key role in the overall project.

As the systems analyst, I would support the systems analysis, design, and implementation for the project. I would bring expertise in operating systems, programming languages, and computer hardware. My primary roles would include that of consultant, supporting expert, change agent, problem solver, communicator, and arbitrator. I will conduct meetings with managers and users to keep everyone informed of progress. (Page 60)

Community

As with clubhouse and conference facilities, online communities provide a space which individuals, families, and groups might meet, and share content and communications. Examples include Facebook, Google+, and LinkedIn.

Brokerage

As with offline -------, such as with travel agencies and stock trading firms, online ---------- provide a means to create a transaction, and then charge a fee for their services. Examples include Hotwire.com and TDAmeritrade.com.

______ is one of the desired critical outcomes of business implementation of a new or upgraded information system. Choices: Simplicity Automation Complexity

Automation (Page 55)

Which security technique helps protect systems by examining each message as it enters the system and blocking improper or unauthorized messages? A. Biometric security B. Firewalls C. Encryption D. Antivirus software

B. Firewall

Which type of ecommerce model is used when a company sells tires to automobile companies? A. G2B B. B2B C. C2C D. C2B

B. B2B

How do info systems support accounting functions? A. By planning for upcoming capital expenses and loan payments B. By generating balance sheets and income statements C. By managing corporate wealth and interest expenditures D. By automating inventory and customer management systems

B. By generating balance sheets and income statements.

A sales manager for a national chain wants to provide customer demographics and historical sales data to staff in the sales and production departments to help them determine how many products to make and ship to each retail location for the upcoming holiday season. Which approach would allow the staff to most efficiently extract that information? A. Decision support B. Data Warehouse C. Relational D. Object-oriented

B. Data Warehouse

What business strategy is a large computer company using if it offers products with several appearances and screen interfaces? A. Cost Leadership B. Differentiation C. Loss Leadership D. Focus

B. Differentiation

Which security technique uses private key and public key pairs to protect sensitive information? A. Antivirus software B. Encryption C. Firewalls D. Biometric Security

B. Encryption

Which solution would allow a company to host a computing service on an internal network and restrict it to employees within the organization? A. Exchange server B. Extranet C. Private Cloud D. Virtual private network

B. Extranet

A contractor is bidding on a system to help a dental office schedule patient appts and payments. Which law would contractor need to understand? A. Fincancial services modernizations act. B. HIPAA C. FERPA D. Sarbanes-oxley act

B. HIPAA

What can happen when the project requirements are not clearly defined? A. It can lead to a lack of business requirements B. It can lead to feature creep. C. It can lead to missing user training documentation D. It can lead to insufficient design alternatives

B. It can lead to feature creep

Why would a company consider using a prototype when converting an existing order entry system to a web-based system? A. It detects errors after development B. It supports change through iteration C. It ensures managerial participation D. It creates a secure system

B. It supports change through iteration

What would be the impact of a hospital using a medication system that automatically distributes prescriptions in the hospital pharmacy? A. It would reduce the total number of medicines prescribed. B. It would decrease errors in medications C. It would increase employee safety D. It would improve customer satisfaction

B. It would decrease errors in medicaitons

Which application is utilized by GPS and GIS? ch 16 A. Automatic vehicle location B. Location-based services C. Edge mapping D. Mapping densities

B. Location-based services

Which type of computer system would an employee need to complete a project requiring a spreadsheet? A. File server B. Microcomputer C. Mainframe D. Midrange System

B. Microcomputer

A company wants to find a technique that will provide the best value for a target variable. Which analysis should the company select? A. Sensitivity B. Optimization C. What-if D. Goal seeking

B. Optimization

A company would like to implement a new network system. The company is looking for a system that will provide management functions of financial, production, and distribution operations at the same time. Which network system should this company use? A. Partner relationship management B. Supply chain management C. Enterprise resource planning D. Technology resource planning

B. Supply chain management

Which method measures the ease with which people perform transactions or find information? A. Transaction speed B. Usability C. Accuracy D. Response time

B. Usability

Which networking standard is used by businesses to transfer information through radio waves over distances up to several miles? A. RFID B. WiMAX C. WiFi D. NFC

B. WiMAX or C. Wi-Fi

A company wants to discourage someone from inappropriately accessing the company's technology resources for personal use. Which step should the company take? A. Explain the budget process for technology B. Write guildlines for usage of technology C. Establish a reward system for whistelblowers D. Train employees to use technology efficiently

B. Write guildlines for usage of technology

What are the methods of social engineering?

Baiting Dumpster diving Phishing

TCP/IP (Transmission Control Protocol/Internet Protocol)

Basic communication language or protocol of the Internet

Ava manages a group of basket weavers and ensures that each basket is perfectly woven. When Ava notices that Caroline and Anna are chatting during much of their shift, she tells them to work quietly so that they can be more productive. But the productivity still did not increase. Which management model would improve the morale of the employees and also increase productivity? Choices: Classical Behavioral

Behavioral (Page 63)

Petabyte

Big Data database size is considered to be in the ........ level.

How does big data analytics enable business to be more competitive? Big data analytics enable businesses to reorganize to improve operations. Big data analytics enable businesses to recommend new products and services based on historical data. Big data analytics enable businesses to become lean and to implement Just in Time (JIT) practices.

Big data analytics enable businesses to recommend new products and services based on historical data. (Page 64)

When reviewing successful communication, what documentation guidelines should be considered? Grammar and clarity Consistency and accuracy Both

Both (Page 60)

Direct Marketing

Both manufacturers and retailers may sell directly to their customers using a disintermediated online marketing strategy, perhaps in addition to others. This model is particularly useful for digital goods, although ------------- of physical goods has massive following too. HP, Dell, and other computer manufacturers offer websites that allow customers to customize products and/or buy them directly off the assembly line.

Work Breakdown Structure (WBS)

Broken down list of all deliverables showing what the customer will get at the end of a project.

A marketing research firm is planning a study involving consumer preferences towards new coffee flavors. The company needs to analyze coffee data from the manufacturer, as well as preference data from consumers in order to discover whether certain flavors are more or less popular among certain segments of the population. Which database technology would help the company conduct online research

Business Intelligence system utilizing data mining technology

Corporations should strive to gain a competitive advantage to remain profitable or relevant. Business intelligence systems can provide corporations an edge in the market place. What are possible benefits and values that all businesses, no matter their size, can experience with business intelligence?

Business intelligence reduces labor costs through automated data collection and reporting. It also makes information actionable by providing real-time, relevant, user-customized information that is easily shared for collaboration. Business intelligence aligns the organization with business objectives by defining key performance indicators (KPIs) and metrics. (Page 64)

Business performance management (BPM) is the collection of analytic and management processes that enable organizational performance management in order to achieve goals or objectives. BPM is a component of and occasionally confused with business process management (BPM). Can you briefly describe the difference between the two?

Business performance management is strategic. It consists of three primary activities within business performance management. One is setting corporate goals. The second is creating metrics or scorecards to measure goal attainment. Finally, management intervention might be required when goals are not being met. Business process management is used by management to improve corporate performance by changing processes. (Page 64)

Company A ordered printer toner cartridges from Company B. Company B ships the products to Company A every two months. What is the e-commerce model described in this scenario?

Business to Business (B2B)

Mary purchased a digital camera from an online store for her upcoming road trip. What is the e-commerce model of the online store?

Business to Consumer (B2C)

Business intelligence and business analytics offer several benefits to organizations. Business intelligence consists of databases, data warehouses, and analytical platforms. Business analytics consists of the tools and techniques used for the analysis and understanding of data. Please list various benefits that result when a business implements a business intelligence program.

Businesses that use analytics can recommend products or services to customers based on analysis of customer preferences, purchase history, and Internet search history. Another more common application of business intelligence is the ability to generate prepackaged production reports that are helpful for users at multiple organizational levels. Finally, predictive analytics can be used to forecast potential customer behavior and future business trends. (Page 64)

Which of the following is NOT the best avenue for the evaluation of alternative solutions for an information system? Evaluate companies in the same industry and their implemented systems/solutions. Buy three systems and test them to see which one performs best. Develop a system in house and test its performance and reliability.

Buy three systems and test them to see which one performs best. (Page 57)

What is a disadvantage of buying digital goods online?

Buying digital goods online makes the buyer more prone to online fraud.

How does the internet help to improve a company's reputation?

By providing information about the company's vision, mission, and community efforts.

What is a successful business that uses big data to find flaws, boost production, and rootlet counterfeiters?

Caseficio Scalabrini

What e-Business tool converts an audio broadcast to a file that can be played on a digital music player? A. Videoconferencing B. Instant Messaging C. Podcasting D. Webinar

C. Podcasting

What is telematics? A. A form of telecommunication technology that is used to identify and track assets via radio frequency. B. A telecommunication chip embedded in store shelving to help retailers. C. A blend of computers and wireless telecommunications technologies. D. A telecommunications device that allows goods and services to be purchased wirelessly

C. A blend of computers and wireless telecommunications technologies.

Which investigative tool is used during the analysis phase of systems development to guide process improvement? A. An entity-relationship diagram B. A brainstorming diagram C. A data flow diagram D. A flow chart

C. A data flow diagram

What is the most recent federal bill that addresses computer monitoring of employees? A. Sarbanes oxely act B. Homeland security act. C. Electronic communications privacy act. D. USA PATRIOT act

C. Electronic communications privacy act

A strategic team is using the aggregate results from the decision support system to support long-term decisions that require judgement. Which system is being used by the team? A. Virtual reality system B. Expert system C. Executive information system D. Transaction processing system

C. Executive information system

What is a drawback of outsourcing system development projects? A. It increases operation expenses for head count B. It leads to a decrease in project quality C. It leads to a loss of confidentiality D. It increases the time needed to market for products

C. It leads to a loss of confidentiality

Which type of software manages the users and contains an array of programs that ensure that data is being transmitted to the correct user, computer, or other devices? A. Device B. Utility C. Network Operating System D. Open-source system

C. Network Operating System

A company engineer would like to produce a new product that stores, views, and analyzes data to create multidimensional charts for the CFO. Which decision support system will be the foundation for this new product? A. Business Intelligence B. Geographic information systems C. Online analytical processing D. Executive information systems

C. Online analytical processing

A development team is creating a new reporting system to track vacation and expenses. Which converstion implementation should the team use if it uses the new vaccation reporting module first and implements the expense reporting module two months later? A. Pilot B. Plunge C. Phased D. Parallel

C. Phased

A computer's main memory is directly accessible to the CPU and consists of random access memory (RAM), cache memory, and read-only memory (ROM). What is it called? A. Secondary storage B. Output device C. Primary storage D. Input Device

C. Primary Storage

Which type of software application is most effective for analyzing small to medium numbers? A. Database B. Web browser C. Spreadsheet D. Word processor

C. Spreadsheet

Which technology allows businesses to use network phone software to make calls to other network users? A. Token Ring B. Frame relay C. VoIP D. ATM

C. VoIP

What combines multiple tools or workbenches to support the complete software cycle?

CASE (computer aided software engineering)

Focused marketing efforts, better customer experiences, automated reporting, and better cooperation to respond to customer needs.

CRM (Customer Relationship Management)

What strategic role has emerged as critical in recent years in large organizations due to cyber attacks?

CSO (Chief Security Officer)

Data Warehouse

Central libraries of data that are combined from one or more sources and organized by subject to support organizational managers

A corporation is using the encryption illustrated in the diagram below to protect business-sensitive information. Abcd Bcde What type of encryption is the corporation using?

Character shifting

_______ and forums are online discussions in which users exchange information. Chatrooms Newsgroups Blogs

Chatrooms (Page 61)

An automobile manufacturer is considering equipping the engines of its new models with the capability of detecting early symptoms of imminent mechanical or electrical failure, automatically transmitting that warning to the dealership form which the customer purchased the car, and the dealership automatically contacting the customer to schedule a repair appointment. It is facing the challenge of whether all of this is technically feasible and operationally viable. Who needs to address the challenge of value creation through technology use?

Chief Information Officer

A small company that is growing quickly into a medium sized company is facing the challenge of consolidating and storing information received from multiple. Sources from the ground up in order to ensure that operations run efficiently. The company needs to hire an expert who will, in addition to the above, maintain security and apply upgrades as needed. Which IT professional does the company need to hire in order to address the challenge?

Chief Technology Officer

_____ management models are primarily focused on following rules, production, and efficiency. Choices: Classical Bahavioral

Classical (Page 63)

A marketing manager would like to study customer behavior and how it relates to customer's purchase products from its online store. Specifically, she would like to know which website page the majority of customers spent the most time on, when and where they decided to abandon the shopping cart, and ow long on average a customer takes to complete a sale. Which database technology supports this study?

Clickstream analysis

A national publisher of newspapers wants to mine its data warehouse (including inputs from social media) to identify which of its publications customers believe provide reliable reporting? What tool is used for this initiative?

Clickstream analysis

A business requires large amounts of data that are processed into information and used to maintain a competitive advantage over their competitors. As the business grows, the data storage and processing capabilities are becoming extremely challenging and costly. What external technological environment can be used to help address these issues?

Cloud computing

Cloud computing has had a major impact on businesses and in systems design. In the most basic sense, how would you define cloud computing to someone unfamiliar with the term? Cloud computing allows software to be stored remotely and accessed via the Internet. Cloud computing is a shared mainframe resource. Cloud computing is a remote data center accessed via corporate WAN.

Cloud computing allows software to be stored remotely and accessed via the Internet. (Page 61)

Cloud computing allows application software to be stored in one or more locations, and accessed and operated using Internet-enabled devices. Cloud computing can be classified as public, private, and hybrid, and relies on shared resources to achieve economies of scale. Please list the benefits for businesses to adopt cloud computing.

Cloud computing enables users to lease hardware and software, thereby reducing capital expenditures, implementation times, and operating costs. Another benefit of cloud computing is the ability to share or reuse software. In addition, numerous prototype tools are available through the cloud, enabling systems analysts to test or pilot software in order to determine if it is appropriate for the system. (Page 61)

Clickstream analysis

Collecting, analyzing, and reporting aggregate data about which pages visitors visit in what order - which are the result of the succession of mouse clicks each visitor makes

Foreign key

Column or set of columns in one table whose values must have matching values in the primary key of another (or the same) table

One reason IT is important because video conferencing has become cheaper, quicker, more collaborative, and more efficient. Of what IT benefits is this an example?

Communication

Asynchronous

Communication occurs at different times via bulletin boards, blogs, and streaming videos

Synchronous

Communication occurs in real time, with their client using online chat or instant messaging

When corporations embark on a large information system development project, they must utilize a method to keep control and monitor project schedule, effectiveness, and cost. There are different methods or options that corporations have, depending on project objectives. Can you name three different methods, besides the SDLC method, and explain why companies might choose that method?

Companies have different options for what method to use when developing an information system. One option is called agile software development, in which the outcome is adaptive planning and fast delivery. Another method is called scrum, which helps meet customer needs that may change throughout the project. Prototyping is another methodology, in which the outcome produces quick modules that can be tested, deployed, and fixed. (Page 56)

database integrity

Companies must maintain .............. by keeping their data safe from unauthorized changes.

Businesses must implement new initiatives to remain competitive or gain a competitive advantage. Information systems initiatives must be evaluated and well planned to ensure success. Discuss why businesses should use the systems development life cycle process to ensure information systems are deployed and implemented successfully.

Companies should use systems development life cycle (SDLC) to gain control and monitor large information system projects. SDLC provides a detailed step/stage approach in systems design, cost and technology evaluation, and organization or user community impact. The seven sequential stages of SDLC reduce the risk of failure or cost overruns. (Page 55)

CASE is a method used to organize and control software development on big projects. What does CASE stand for? Computer-aided software engineering Comprehensive active software engineering Computing and standard engineering

Computer-aided software engineering (Page 61)

An investment banking corporation utilizes employee passwords as data privacy measure to secure sensitive data. The IT security team has been tasked with ensuring the data is produced and modified in the correct way. Which data privacy goal is the IT security team tasked with accomplishing in this scenario?

Confidentiality

Privacy Goals

Confidentiality, integrity, Availablity

What tactic defeats a war driver by barring access to your secured wireless network?

Configuring the access point to hide the SSID

Hierarchical database

Connects tables in a master/slave1, leader/follower, or primary/replica format.

Relational database

Connects tables of records together with complex relationships.

Wireless bridge

Connects two wired networks together over Wi-Fi

What is meant by conversion during the system implementation phase? Conversion is a change management process. Conversion is the process of replacing the old system with new system. Conversion is the transferring of all data to a new system.

Conversion is the process of replacing the old system with new system. (Page 58)

What is an important decision point for a business to implement controls or security for any risk?

Cost-benefit analysis

Lightweight Directory Access Protocol (LDAP)

Created by the International Telecommunications Union; a standardized protocol that defines the organization of a set of directory records, such as groups, individual names, and attributes that are associated with them. Many applications use the LDAP standard. The most used example is Microsoft Outlook's global address list and Microsoft Active Directory.

What is advanced networking?

Creations of networks that connect widely disparate regions, peoples, and cultures allows for information sharing on a global scale, causing issues concerning the appropriateness and authority of those sharing it.

Advanced networking

Creations of networks that connect widely disparate regions, peoples, and cultures allows for information sharing on a global scale, causing issues concerning the appropriateness and authority of those sharing it. Although the availability of information on a wide basis is generally a positive attribute, property rights and the propriety of information sharing may cause and perpetuate conflict.

Which of the following is NOT an element of a decision tree? Choices: Payoff Acts Events Criteria

Criteria (Page 65)

What are the most popular products sold?

Customer Relationship Management (CRM) systems collects and store customer data, product information, and customer orders. Using the appropriate analytical tool, a CRM can answer all, except for which of the following question?

Bargaining Power of Customers

Customer chooses lower price on cell phones. Goes with ATT instead of Verizon

CRM

Customer relationship management

Many factors need to be weighed when managing system implementation, both tangible and intangible, to reduce project risk. What is an intangible benefit when evaluating information systems costs and benefits?

Customer satisfaction (is hard to measure)

What is business intelligence? A. Knowledge B. Technology C. Data sources D. Collective Information

D. Collective Information

What is the difference between data and information as they relate to business functions? A. Data is related to hardware but info is not related B. Data is stored but information is not stored C. Data comes from info D. Data is processed to get information

D. Data is processed to get information

Which investigative activity must occur during the analysis phase of this project? A. Designing the technical architecture B. Setting the projet scope C. Defining the system to be developed D. Gathering the business requirements

D. Gathering the business requirements

An internet service provider offers subscribers e-mail accounts and would like to develop software to identify spam. Which tup of artificail intelligence technology should be used? A. Fuzzy Logic B. Virtual Reality C. Knowledge management D. Genetic algorithms

D. Genetic algorithms

An employee works as an engineer at a software firm and checks personal email while at work. Due to the long hrs at office, the employee does not have time to check email at ho me and feels that his actions are acceptable even though it is against the companies internet policy. Which method could be used to discourage the employees behavior? A. Educating employes on stockholder interests B. Reducing employee workload C. Requiring company access to personal email accounts. D. Offering an ethics training program.

D. Offering an ethics training program

Which term is used to describe an iterative approach to building a system? A. Sketching B. Scrum C. Waterfall D. Prototyping

D. Prototyping

What is a requirement of a field when it is in a table and is defined as the primary key? A. The field must have numeric values B. The field must appear in another relation C. The field must have duplicated values in the relation D. The field must have unique values

D. The field must have unique values

An employee downloads software that claims to improve computer performance. Instead, it introduces system vulnerabilities. What type of threats is this software: A. Virus B. Spyware C. Worm D. Trojan Horse

D. Trojan horse

A real estate office has several divisions located in different states. Which type of network should the real estate company implement to connect their divisions? A. MAN B. P2P C. LAN D. WAN

D. WAN

What application does one use to query and administer databases?

DBMS (database management system)

Which system helps support business decision making activities by manipulating and building upon the information from the systems below it in the hierarchy?

DSS

A company has many separate departments that focus on different business aspects and uses data warehouse subsets to hold data specific to each individual department. The company started a new department and created a new subset. What is the new subset called

Data Mart

Which aspect of data governance is used to ensure that the customer data and payment information saved In the company server are properly encrypted?

Data are properly stored

For the DBMS of a financial institution to function properly, ____________ should be performed after a data quality audit on tables that are merged or imported.

Data cleansing and normalization

flat file

Data files containing records with no structured relationships are a type of................database.

OLTP (online transaction processing)

Database design used for browsing and manipulating business transaction activity

ODS (Operational data store)

Database designed to integrate data from multiple sources for additional operations on the data. Unlike a master data store the data is not passed back to operational systems. It may be passed for further operations and to the data warehouse for reporting

In 1965, computers had .092 MIPS, and today's computers have about 238,000 MIPS. What business practices have taken advantage of this increase in computer speed?

Database management systems Network management systems

Object-oriented database

Database that subscribes to a model with information represented by objects

OLAP (online analytical processing)

Databases containing data that are used for making decisions

Which of the following is NOT a concern for information security? Dealing with risks associated with the environment, malicious attacks, and intentional and unintentional loss of assets or revenue Dealing with the potential for failure from a wide array of threats and vulnerabilities Dealing with factors that contribute to the failure of business practices Dealing with the understanding and management of risks that might affect the security of information assets

Dealing with factors that contribute to the failure of business practices

A police department at a large metropolitan city implemented an information system that analyzes historical crime data including date and locations as well as other external, environmental and city related data. The system then produces daily predictive reports of the major locations around the city that are likely to require additional police attention. The police uses the reports to plan the officer's patrol routes targeting the areas that the system predicted to have high likelihood of incidents. Which type of system provides a competitive advantage based on the described scenario?

Decision Support System that improves decision making

An online mail order company decides to create its own Customer Relationship Management (CRM) system to help management analyze customer's purchasing patterns. To be successful at managing relationships with customers, the CRM system must have access to large amounts of customer purchasing data for analysis and report generation. Which MIS tool is usable by the company's CRM system?

Decision Support system

DSS

Decision support systems

Management decision making is supported by IT by which of the following systems? Choices: Enterprise support systems Decision support systems Business support systems

Decision support systems (Page 63)

What is a decision analysis method that uses branched lines to model decision choices in order to identify the most appropriate strategy? Choices: Cause and effect Statistical analysis Decision tree

Decision tree (Page 65)

Business intelligence uses analytics tool sets to investigate, data mine, or analyze data to help the business see trends or make better decisions. There are four key analytical modeling processes: decisive, descriptive, predictive, and prescriptive Please describe each one of these analytical models.

Decisive analytics uses visual analytics to reflect human reasoning to support management decisions. Descriptive analytics assists management in gaining insight from historical data. Predictive analytics is a modeling that utilizes statistical and machine learning techniques to predict behavior or trends. Prescriptive analytics uses optimization and simulation to recommend solutions to management. (Page 64)

What is the first step in the decision-making process? Choices: Develop alternatives. Evaluate the decision. Define the problem.

Define the problem. (Page 63)

The implementation of a new system consists of many steps, including acquisition, development, training, and testing, and is also referred to as what? Conversion Replacement Delivery

Delivery (Page 58)

SDLC Design Phase

Designing the recommended system, Developing and documenting software

Which two benefits can a business realize by using social media to connect to customers?

Detailed marketing research & targeted sales promotions

Anti-Malware

Detect and remove malware that even the most well known anti-virus and anti-malware applications fail to detect

The value of security and control is an important question that organizations must address. What must organizations specifically address to protect their security?

Determine the likelihood a loss will occur, along with the target and the source.

Which of the following stages is part of the analysis phase of SDLC? Choices: Determine user requirements Testing the system Developing software

Determine user requirements (Page 55)

Common post-implementation information systems risks include all of the following, except what? Determining the user satisfaction Reluctance to report negative information Rushing project completion

Determining the user satisfaction (Page 59)

A university is looking for ways to customize its courses to the unique needs of its students by creating various levels of hybrid online courses, such as 80% online for one student, whereas only 30% online for another. Which IT management challenge is addressed in this scenario?

Develop new products and services

A regional manager has received an important financial document seemingly sent by a branch manager, but he doubts whether the was actually sent by the manager. Which technology could be used to verify that the report was indeed sent by the branch manager?

Digital signature

A regional manager has received an important financial document seemingly sent by a branch manager, but he doubts whether the report was actually sent by that manager. Which technology could be used to verify that the report was indeed sent by the branch manager?

Digital signature Firewall Virtual private network Anti hack

Large established businesses often have networks of other businesses within their supply chain in order to maintain the flow of information and materials. Company A is and organization that hosts its own marketplace of suppliers in order to facilitate the pursuit of its own interests. Which network describe Company A's example of e-commerce?

Direct marketplace

An art history professor should like to show an original oil painting from the eighteenth century on the classroom projector. The class is held in a large auditorium with more Than 250 students. Which hardware component is required to digitize the painting?

Document camera

DNS

Domain Name Service = Server-based service that translates human language Web address or URL into an IP address, which is used.

Votes

Due to its data capture and display ability, GIS can be a very beneficial tool for law enforcement. Which of the following data is least useful in a GIS to help fight crimes? Traffic Taxes Votes Locations

Normalization

During the database design process, ............ takes place to eliminate data redundancy.

Once an information system has been designed and is ready for testing, system data and information will be required. Collecting and managing data is a time consuming and expensive process. Automated data capture is the most desirable method because it is faster, cheaper, and less prone to error. Why is outsourcing a viable option for this process, and what is its downside?

During the implementation phase, design teams can outsource data capture. Outsourcing is a viable option because data entry firms have expertise with several data capture methods and can best determine which might be necessary or appropriate for a given project. Outsourcing is a less expensive form of manual data input. The downside is that it requires the data to be shared with, and transmitted to, a third party. (Page 58)

DHCP

Dynamic Host Configuration Protocol = A DHCP server or appropriately configured router automatically and temporarily assigns IP addresses to DHCP-enabled systems on the network

Which is a well known tool in project management that illustrates project tasks against a timeline?

Gantt chart

There are different types of information systems based on the different levels of hierarchy in an organization. Which one helps senior executives analyze information and come up with alternate actions and business strategies?

EIS executive information systems is at the top of the hierarchy.

There are different types of information systems based on different levels of hierarchy in an organization. Which one helps senior executives analyze information and come up with alternate actions and business strategies?

EIS- Executive Information Systems

A database schema can be represented by which model?

ERD (entity relationship model) describes the data and map processes to data requirements

Standardized business procedures that allow for more consistency within the business and removes redundancy.

ERP (Enterprise Resource Planning)

What systems do upper management use for decision making?

ESS (executive support systems)

What is the process associated with data warehouse updates and backup?

ETL (extraction, transfer, and load)

What are pitfalls when maintaining a data warehouse database?

ETL load phase

Star topology

Each network host is connected to a central hub with a point-to-point connection

Bus topology

Each node is connected to a single cable, by the help of interface connectors

A hotel experiences relatively long checkout lines on Sundays when the majority of its customers check out. Replacing the hotel's existing checkout system with an expensive state-of system has crossed the mind of top management, and het due to it's relative monopoly in that region, the hotel's. Customers trend to be rather loyal. The management is wondering if the costs involved in installing a new system would be recouped by the new system in the long run. Which type of feasibility is presented in this scenario?

Economic (TCO) feasibility

Elegant Terrific Outlaws Seized Lethal Penguins (SDLC - Feasibility study)

Economic, Technical, Operational, Schedule, Legal, Political

Threat of New Entrants

Electric cars, Prius, Chevy, Tesla, who's coming in to make another better electric car

Competitive Rivalary

Gas stations on same road and 1 gas station lowers the price of gas by 4 cents

What is Dumpster diving?

Gathering sensitive or nonsensitive information from refuse. This sometimes illegal act is as simple as foraging through household or corporate garbage receptacles for information.

What is encryption?

Encryption is a process by which data are encoded so that only persons with a decryption code may unlock and retrieve stored messages.

Application Software

End Users use (excel, MS office, Firefox, Powerpoint)

Which methodology below uses fourth generation computer language? Agile End user RAD

End user (Page 56)

There are many organizational features that can change the direction of the company. Some of these include processes, politics, culture, and environment. Managers must understand how organizational features can influence their business in order to build and se information systems successfully. Internal and external elements that affect various parts of an organization, for instance the government, competitors, customers, and suppliers are examples of what organizational feature?

Environment

Assume you are building out wired technologies in an old building. If you are replacing token rings, what technology are you most likely to be replacing it with?

Ethernet

After implementing a new reporting system, London is leading a "lessons learned" workshop for his employees. This is an example of which step in the decision-making process? Choices: Identify the problem. Develop decision alternatives. Evaluate the decision.

Evaluate the decision. (Page 63)

A bowling center has implemented a new expensive system in hopes of increasing it's clientele. The system stores and tracks patrons bowling performance over time and displays for them the extent to which their performance has been improving over time. However this new system has failed to attract more patrons. During which phase of system development is this failure discovered?

Evaluation (part of the Implementation phase)

Telecommunications technology has always been essential to business. What is the best definition of telecommunications?

Exchanging information via electrical signals

Executive Management

Executive Info Systems, Long term goals and use dashboards

EIS

Executive information systems

Executives at corporations are constantly evaluating business performance and analyzing the competitive landscape. They rely on information and decision support systems. There are four systems used to provide decision support. These are MIS, DSS, ESS, and GDSS. Describe the systems an executive committee that is co-located would use to support their decision-making process.

Executive management would benefit from an executive support system (ESS). ESS provides high-level information concerning key performance indicators (KPI). ESS data for executives includes internal and external data from financial, industry, and trade databases. This information can be analyzed and discussed using group decision support systems (GDSS). GDSS provide interactive collaboration support for multiple decision makers at multiple geographic locations through digital communication. (Page 65)

True or false. Modern forms of information technology include digital calculators, computer systems of many sizes and applications, and Morse code.

False

True or false. Organizational structure does not have an effect on the success or failure when implementing information systems.

False

True or False. A model is an image of an item, system, or process that we code in order to imitate, follow, or duplicate whatever the model represents.

False (Page 57)

True or False. Cloud computing relies on private resources to achieve economies of scale among users.

False (Page 61)

True or False. Upper management requires transaction processing systems (TPS) to provide high-level information concerning key performance indicators.

False (Page 63)

True or False. Business performance management (BPM) is a management action to optimize organizational or business processes.

False (Page 64)

True or False. A facilitator in a GDSS meeting designs the meeting structure, moderates the process, and leads the team.

False (Page 65)

True or False. System-level security maintains the quality of the software and protects the system from events and processes that can exploit or violate the system.

False (Page 59)

True or False Telephones are an example of how information systems are used in business.

False (telephones are hardware therefore represent information technology. )

True or False. Examples of competitive forces include new market entrants, substitute products, and customer rivalry.

False - Customer rivalry is not a competitive force.

True or False. A business ecosystem is a network-based strategy that is tight collection interdependent industries that provide related services and products.

False. (A business ecosystem is a collection of "loosely coupled" interdependent industries that provide related services and products across many industries.

True or False. The key role of the CTO is to provide vision and leadership or IT initiatives.

False. (This is the key role of a CIO, maintaining efficiency of IT systems is Key responsibility of CTO)

FTP

File Transfer Protocol = An unsecure method used to transfer files from one computer to another.

Major threats to managing information systems

Floods, earthquakes, power outages and more.

data cleansing

For the DBMS of a financial institution to function properly, ................ should be performed after a data quality audit on tables that are merged or imported.

Which of the following is a derivative of the waterfall model? Tree Creek Fountain

Fountain (Page 56)

The balanced scorecard measures outcomes on how many organizational dimensions? Two Four Six

Four (Page 64)

An organization is planning its yearly budgeting cycle. Management has requested the information systems team to validate current hardware and software performance. Which type of evaluation can the team use to perform this validation?

Function oriented evaluation

When building a logical model of the system, you use a functional flow diagram. What is the purpose of the functional flow diagram phase in modeling systems? Functional flow diagrams are waterfall depictions of element interaction. Functional flow diagrams emphasize element behavior, function, and flow. Functional flow diagrams represent the relationship of data.

Functional flow diagrams emphasize element behavior, function, and flow. (Page 57)

What are three models of e-business. Choose 3 G2D G2B G2G G2E G2C G2S

G2B, G2C, G2G

_____ does not rely on a knowledge base and mathematical models but instead relies on ideas created by a group of people. Choices: GDSS DSS MIS

GDSS (Page 65)

What should be the objective of good communication during an information system project? Good communication objectives mean all communication should be verbal. Good communication objectives involve all project documentation. Good communication objectives involve the who, what, when, why, and how of a project.

Good communication objectives involve the who, what, when, why, and how of a project. (Page 60)

What business earns much of its revenues from online advertising and by providing e-business services to hundreds of millions of individuals and businesses?

Google

Graphics tools

Graphics, video, animations, and interactive multimedia are popular elements in Web pages. Popular tools used to create these elements include Adobe's Photoshop, Flash, and Premier products.

What system supports creative thinking and allows users to interact simultaneously at multiple geographic locations to collectively participate in decision making?

Group decision support system (GDSS)

Executive management,who are interacting simultaneously in different locations to collectively participate in the decision-making process, use what type of decision support system?

Group decision support systems (GDSS)

In today's global business environment, corporate leadership is constantly on the move and located in various geographical locations. The executive team must ensure corporate performance is maintained in order to solve problems and make decisions, no matter where the team members are located. Describe a decision support system that enables remote, simultaneous collaboration.

Group decision support systems (GDSS) provide interactive collaboration support for multiple decision makers at multiple geographic locations through digital communication and the use of numerous resources and tools. A GDSS differs from traditional DSS in that users are interacting simultaneously and anonymously to collectively participate in the decision-making process. GDSS facilitates increased meeting size and anonymity, reducing the possibility of groupthink, which suppresses alternative points of view. (Page 65)

Hard Data Network System Security Ecommerce (IS elements)

Hardware and Software, Data Resource Mgmt, Network, Systems and Decisions, Security and Ethics, Ecommerce and Social Meida

What makes up Information Technology

Hardware, Software, Netoworks, Data

What makes up Information Software

Hardware, Software, networks, data, people, processes

Hotdogs Since Nutritionists Died (IT = Sub of IS)

Hardware, software, networks and data

Your company has been asked to develop a user's manual for a new product. The project must be completed within 60 days. Which of the following steps would increase the likelihood of finishing the project on time? Have the most experienced workers complete tasks on the critical path. Evenly divide the experienced workers between all tasks for the project. Assign the least experienced workers to the tasks on the critical path.

Have the most experienced workers complete tasks on the critical path. (Page 57)

Which database type, used frequently in early style databases but much less frequently today, contained inflexible data relationships that formed a treelike structure?

Heirarchial

Management is a crucial component of effective and successful business performance. Management plays a key role in disseminating information from various management information systems and making unstructured, semi-structured, and structured decisions. Henry Mintzberg, a management theorist, identified ten roles performed by organizational managers. Categorize and outline these ten roles.

Henry Mintzberg identified ten roles performed by organizational managers, categorized into three areas: interpersonal, decisional, and informational. Interpersonal roles include figurehead, leader, and liaison. Decisional roles include entrepreneur, disturbance handler, resource allocator, and negotiator. Information roles include nerve center manager, disseminator, and spokesperson. (Page 63)

Which database type, used frequently in early style databases but much less frequently today, contained inflexible data relationships that formed a treelike structure?

Hierarchical *

The IS function is _____ in structure and its success depends on its cooperation and relationship with the other functions in an organization

Horizontal

B. By generating balance sheets and income statements.

How do info systems support accounting functions? A. By planning for upcoming capital expenses and loan payments B. By generating balance sheets and income statements C. By managing corporate wealth and interest expenditures D. By automating inventory and customer management systems

What is meant by the political aspect of a feasibility evaluation? How users will respond to new systems How stakeholders respond to system changes How executive management funds projects

How stakeholders respond to system changes (Page 57)

HTTPS

Hypertext Transfer Protocol Secure, which uses HTTP as well as technologies such as Secure Socket Layer (SSL) and Transport Layer Security (TLS) to encrypt and decrypt data between the user and Web server

HTTP

Hypertext Transfer Protocol is the communications protocol at the foundation of all communication of the World Wide Web

What is the difference between ICR and OCR?

ICR (intelligent character recognition) is an intelligent or advanced form of OCR. (optical character recognition

Several independent parties or governing bodies work together to define the rules that help to manage effective network communications. What are the 3 governing bodies that recommend and decide communications standards?

IOS (International organization for standardization), ARPANET (creator of the original internet in 1967), IETF (internet engineering task force)

A systems analyst must possess effective written and oral communication skills. Although a systems analyst may understand the proposed system, it is important to be able to communicate system benefits and capabilities to the audience. Can you describe effective presentation skills that will be required by a systems analyst when keeping stakeholders up to date on a project?

IT professional should understand the knowledge level of their audience. When presenting to stakeholders, IT professionals should be organized, plan their presentation, and even rehearse it. Technical acronyms should be avoided when possible and defined when required. Visual aids should be used because they are helpful in maintaining audience interest. (Page 60)

SDLC Analysis Phase

Identify problems, determine requirements, analyze system needs

The four phases of the decision-making process are intelligence, design, choice, and _____. Choices Implementation Information Integration

Implementation (Page 63)

What does the United States government do to businesses that violate federal legislation? What does the United States government do to businesses that violate federal legislation?

Impose heavy penalties

A police department at a large metropolitan city implemented an information system that analyzes historical crime data including date and locations as well as other external, environmental and city related data. The system then produces daily predictive reports of the major locations around the city that are likely to require additional police attention. The police uses the reports to plan the officer's patrol routes targeting the areas that the system predicted to have high likelihood of incidents. Which two strategies does the information system at the police department aim to accomplish

Improving decision making Operational efficiency

Primary key

In a relational database that is unique for each record

logic bomb

In some cases, internal attackers, such as disgruntled employees, may introduce malware

Data tuple (THU_PL)

In the Relational Model, is a set of named and typed values. The nearest equivalent in SQL is a "row".

Mesh topology

In the full topology, each workstation is connected directly to each of the others. In the partial topology, some workstations are connected to all the others, and some are connected only to those other nodes with which they exchange the most data

A candidate is applying for a job at a local company. His resume listed the most recent position as a supervisor at XYZ corp. However, his social media profile indicated the position during the same time period as a manager at XYZ corp. Which aspect of the job candidates qualification can negatively affect his hiring potential?

Inconsistent experience

Primary reason to convert to IPv6?

Increase number of IP addresses

Pseudocode

Informal high-level description of the operating principle of a computer program or other algorithm

What is meant by informal user support when a system comes into production? Informal user support means documentation support and maintenance. Informal user support means training, communication, and acceptance. Informal user support means waiting for implementation team training.

Informal user support means training, communication, and acceptance. (Page 59)

Data is input in a computer and then processed into _______________.

Information

___________________is the application of management techniques to collect, communicate, and process information in order to make better management decisions.

Information Management

System that accepts input data and processes it into information as output

Information System

What is the difference between IT and IS?

Information Technology refers to the non human, non process componets of an information system. (Hardware, Software, Data, and Networks. Information Systems include the people and processes.

Simple Network Management Protocol (SNMP)

Information concerning network status that is periodically passed between a network management server and routers on a network, for the purpose of monitoring network status.

Corporations that are planning strategic initiatives related to their information system, such as upgrading, replacing, or internally building a system, must discuss and plan possible solutions carefully. Why is it important for companies to evaluate various alternatives to a system development program?

Information systems have the ability to increase productivity and create a competitive advantage. Because companies change over time, any information system must be adaptable. Several factors should be considered when evaluating system alternatives to select the option that best meets the user requirements. Alternative solutions should be evaluated for system compatibility with existing architecture and organization, return on investment, and scalability. (Page 57)

Fred is an IT engineer at a small online news agency, where 35 employees carry laptops and print to the wireless printer. Recently, the company has discovered that the many Bluetooth headsets, cordless telephones, and regular usage of the break room microwaves are causing long-standing intermittent micro outages at often unpredictable times of the day. Which solution to this problem will avoid disruption to the work environment?

Install traditional network wiring

What type of data and information do executive support systems display? Choices: Internal data from enterprise applications, external data from financial, industry, and data from trade databases Operational data, analytical data, and business intelligence Transactional data, sales data, and process performance data

Internal data from enterprise applications, external data from financial, industry, and data from trade databases (Page 63)

IoT

Internet of Things

What is meant by Web 2.0? Internet sites that emphasize interoperability and user-generated content Internet sites that offer passive viewing and downloading of content Internet sites that are driven by web-based databases

Internet sites that emphasize interoperability and user-generated content (Page 61)

How does the use of Internet-based technologies help businesses?

Internet-based technologies allow for distribution of information with external business entities.

Knowledge

Is intellectual capital is an asset, Needs to be dispersed throughout our company to be fully valued, and use IT/IS spread knowledge.

Hardware

Is the computer and all of its peripherals

What function does a data warehouse serve in a business intelligence platform? Choices: It is a depository of trade and market data to predict behavior. It is a central depository of business environment data used for analytics. It is a depository of customer credit history used with predictive analytics.

It is a central depository of business environment data used for analytics. (Page 64)

Definition of a private industrial network

It is a single organization that controls the construction and maintenance of relationships for a relatively small number of other organizations

Reduce

It is good practice to ............. data that is backed up on a regular basis.

Document camera

Real-time image capture for displaying an object to a large audience

A company has recently acquired a former distribution competitor in another country. The new subsidiary is found to use obsolete CRM software, so the company decides to create a new, proprietary CRM solution to be used company-wide. The company proposes to use a mutlinational team to develop the new software. Why has this approach been proposed?

It takes into account the needs of the end users.

PERT stands for Program Evaluation and Review Technique. Which of the following is true about PERT? It was developed by the U.S. Defense Department. It was developed by IBM. It was developed by Microsoft.

It was developed by the U.S. Defense Department. (Page 57)

RAD (Rapid application development)

Iterative alternative to the conventional waterfall model of software development

_________________ have mentioned that inappropriate or provocative photos or information and evidence of alcohol and drug abuse, by the job seeker revealed during social media search can negatively impact employment opportunities

Job recruiters

Supportive, collaborative, culture that includes corporate learning to foster corporate efficiency and gain value from intellectual assets.

KM (Knowledge Management)

What is the meaning of the acronym KPI as it relates to decision support? Choices: Key practices and instructions Key performance indicators Key process and inputs

Key performance indicators (Page 63)

Knowledge

Knowledge is the practical application of the information given.

Which of the following best describes the knowledge management function enabled by business intelligence? Choices: Knowledge management enables strategic management. Knowledge management enables collaboration between departments. Knowledge management allows a company to become data driven.

Knowledge management allows a company to become data driven. (Page 64)

KMS

Knowledge management systems

Why do users fail to adopt new information systems?

Lack of training or acceptance for new system

MDX (Multidimensional Expressions)

Language provides a specialized syntax for querying and manipulating the multidimensional data stored in OLAP cubes

Why is the size of the project a risk element in system design and implementation? Large projects require more system downtime. Large projects mean broader changes and more resources. Large projects must be outsourced.

Large projects mean broader changes and more resources. (Page 58)

Wi-Fi Protected Access II (WPA2)

Latest algorithm - Mandatory use of AES algorithms and the introduction of CCMP (Counter Cipher Mode with Block Chaining Message Authentication Code Protocol) - 2006

A company is considering an expansion into a new target market. The company's management team develops a decision process to analyze current market strengths and to predict needs for the proposed new target market. Which benefit does the company gain by developing this target market decision process?

Management decisions are easier

MIS

Management information systems

Interactions between buyers and sellers are often more effective when sellers intimately understand the needs of their customers, and when customers have more information to make important decisions. Thanks to the variety of beneficial resources, information, and services made possible by the internet, such interactions may be highly individualized, and tailored to the buyers purchasing capacity, and relative influence. What is another important advantage of a digital market over a traditional market from a buyer's perspective?

Less price discrimination

LDAP

Lightweight Directory Access Protocol = Created by the International Telecommunications Union; a standardized protocol that defines the organization of a set of directory records, such as groups, individual names, and attributes that are associated with them. Many applications use the LDAP standard. The most used example is Microsoft Outlookâs global address list and Microsoft Active Directory

What is LAN?

Local area network, and typically connects computer systems of an organization or a floor of a building;

Supply Chain Managment

Logistics, Sharing Production info with supplies, transmit info back and forth, GM and Good Year Tires, they know what they need to do, the amounts, inventory, and etc

Business strategy is how a business achieves it's goals and outperforms its competitors. Strategic information systems (SIS) are used to help companies accomplish business strategies. Some of the initiatives for implementing an SIS include all except which of the following:

Low switching costs.

Management Information

Lower Management (Coaching employees)

Which system helps managers manage their departments more efficiently?

MIS (management information systems)

Trojan Horse

Malware is spread through a variety of methods, direct download (intentional or not), as a part of another application or utility

First level managers

Management information systems focus on technology, people, and organizations. They primarily serve these people.

Web design tools

Many graphical and traditional text based HTML editors exist and range from the unsophisticated text editors to feature rich graphical WYSIWIG (What You See Is What You Get) interfaces. Modern popular examples include Adobe's Dreamweaver and Microsoft's Visual Studio.

What are the roles of IS Business?

Marketing/Sales, Production/Operations, Accounting/Finance, and Human Resources

Core Competency

Marketplace leader competitive advantage Central to employee focus

Private Exchanges

Marketplaces of health insurance and other related products. Employers and then their employees can choose a health plan from those supplied by participating payors

What is meant by master data in entity-relationship modeling?

Master data are objects shared across the enterprise.

Sasha is an IT engineer at a small online news agency, where 35 employees carry laptops and print to the wireless printer. Several wireless access points are installed in the ceiling at appropriate points throughout the office space, through they share the same SSID (Service Set Identifier). In fact, an employee can start a large download and then carry her laptop from one end of the office space to the other without losing her connection. Which network topology configuration supports this scenario?

Mesh topology

Word substitution

Method of encoding by which units of plaintext are replaced with ciphertext

Structured systems models

Methodical and process-oriented, moving from the general level to the specific level through a series of processes

JAD (Joint application design)

Methodology that involves the client or end user in the design and development of an application, through a succession of collaborative workshops _____ sessions

Decision Support

Middle Management (what products sell more at Aldi's on Sundays)

When it comes to identifying and evaluating alternative solutions prior to acquiring a new information system, which of the following is NOT correct? When embarking on a strategic complex initiative, various solutions should be evaluated. Mistakes can be very costly to businesses. Before deciding on a solution, several alternatives should be evaluated. Mistakes can be easily corrected when identified.

Mistakes can be easily corrected when identified. (Page 57)

Customers with to have the capability of performing tasks anytime, anywhere without being tethered to a desktop computer. Which term describes computer programs designed specifically for this purpose?

Mobile apps

Flat file database

Model that resembles file cabinet functionality

Shared hot sites

Offsite facilities shared with other organizations for the purpose of disaster recovery, requiring only adequate or prioritized staffing, but at a cost shared with another organization

Cold Sites

Offsite office space awaiting occupancy, equipment, personnel, and utility service, allowing recovery within days

What is Moores Law?

Moore's Law says that computing power and storage capacity will continue to increase or double approximately every two years.

Secure File Transfer Protocol (SFTP)

Much like HTTPS, SFTP uses secure technologies, this time Secure Shell (SSH), to secure the connection for transferring files from computer to computer.

Portal

Much like a hotel's concierge desk, an online portal provides gateway access to information, entertainment, and business. With an enormous number of websites, storefronts, encyclopedias, several portals exist and serve as the starting point for many on the Internet. Examples include Google.com, Yahoo.com, and Bing.com.

Market Creator

Much like a traditional bazaar or shopping mall brings together buyers and sellers, the Internet has many organizations who have built a business around providing a market platform. On this platform, individuals and organizations may transact business that is unrelated to the market creator, who nonetheless collects a fee for helping to create the opportunity. Examples include Amazon's Marketplace and eBay.

Partnership

Much like sole proprietorships, partnerships may be created by two or more individuals who may then personally and individually share in the rewards and liabilities created by that business, in proportion to their share of the business.

Hot Sites

Offsite office space with available and up-to-date systems and service connections, requiring only adequate or prioritized staffing, allowing recovery within minutes to hours

Warm Sites

Offsite office space with available systems and service connections, requiring staffing and updates allowing recovery within hours to days

Token Ring

Network is a local area network (LAN) in which all computers are connected in a ring or star topology and a bit- or token-passing scheme is used in order to prevent the collision of data between two computers that want to send messages at the same time

SCM (supply chain management)

Network of businesses that are connected to provide products and services more efficiently to customers, accommodate rapid growth, and meet requirements of retailers and distributors. Lower costs, improve collaboration, reduce cycle times, respond to conflict, forecast demand, and manage product flow. Diane's Designer clothing wants to be the price leader in the industry by cutting out the middleman, renting warehouse space, producing easier clothing designs, and bringing products to market in less than 3 weeks.

The "Internet of ThIngs" (IoT) is a growing topic in business and a hot IT career field. What best describes IoT?

Network of physical devices.

A corporation needs to improve its security policies and has decided to limit physical access to the corporate computers. What value will the corporation realize with this policy?

Network/system protection

Virtual Company Model

Networks of people and resources join together to provide a service or create a product without the traditional storefront boundaries.

Transaction Processing Systems

Non Managerial Employees (people running the cash register at Aldi's)

What are used to handle large amounts of data in a database, and the databases can be stored in multiple locations?

Non-relational database

Unified Modeling Language (UML)

Not a programming language. This is a graphical notation specifically for drawing diagrams of an object-oriented system

Reporting

OLAP databases are used for ......... , such as being used for regional sales.

Which of the following is NOT a primary type of requirement in SDLC? Object Product Project

Object (Page 55)

In Memory Computing

Of the components in a computer, the processor and memory are the fastest and most necessary.

Freemium

Offering of product samples and trial versions

What is Phishing?

Often completed through email, this generic act of fraud is often in the form of an email requesting a response containing sensitive information, such as a username or password. However, it can also take the form of a misleading and/or masked hyperlink that directs a victim to an official looking website (i.e. a pharming page) that asks for sensitive information.

decision trees

One data mining methodology is ......... which generate rules and classify data sets.

What are the Benefits of Enterprise Systems

One key business benefits of enterprise resource planning is the foundation that it provides for a business to standarize it's business procedures across all business units. The systems tightly intergrate functional areas as one single comprhensive system.

Simple Mail Transfer Protocol (SMTP)

One of several popular email protocols in use today (others include IMAP and POP3).

A fast food restaurant chain is in the process more restaurants in an overseas market. One of the requirements is to have a reliable and scalable database technology which allows the local restaurants, A s well the corporate office, data access regardless of the platforms and locations.

Online analytical processing database

Although printed catalogues are still produced and mailed by specialty retailers, for most of these retailers a customer can place an order immediately at the website instead of mailing an order form. Which specific feature of e-business enables this opportunity?

Online order entry

Net Marketplace

Online platform host where transactions may take place between a seller and a buyer

Examples of IS

Online reservation booking, track customer activities, and predicting future sales patterns.

What does OLTP stand for?

Online transaction processing

What is one management solution to overcome global information system challenges?

Only some of the core systems should be shared initially, and then gradually share some of the other systems, but only if they share key elements.

OSI stands for

Open System Interconnection and is the foundation for data communication protocols.

In what areas should a systems analyst be a subject matter expert? Operating systems, programming languages, and computer hardware Embedded software, databases, and microchip Network design, electronics, and databases

Operating systems, programming languages, and computer hardware (Page 60)

During information system development programs, oral communication will be utilized throughout the duration of the project. Oral communication is the transfer of information via verbal and visual content, including conversations, presentations, and speeches. Can you explain the potential pitfalls of oral communications in the professional environment?

Oral communication is part of being a professional. Included in oral communication are nonverbal content such body language and changes in tone, which can help or hinder message comprehension. Oral communication is also subject to misinterpretation. (Page 60)

When a new system is designed, the proposed changes must consider the organization's jobs/skills, along with organizational structure. Which choice below is NOT true when considering a new system? Organizations are living organisms that do not accept change readily, and therefore, they must be included in systems design. Organizations are living organisms that readily accept change and do not require much planning. Organizations should be included in the analysis and design because they must accept change inherent by new systems.

Organizations are living organisms that readily accept change and do not require much planning. (Page 55)

retrieve

Organizations can help to maintain data integrity by implementing data governance policies. Only employees with appropriate access rights can ............. data from the server.

Why is it a challenge for businesses to invest in strategic information technology projects?

Organizations have difficulty defining business objectives.

HR

Recruiting and training, employee benefits and regulations management, employee records

Why is it desirable to use original documents during data capture? Originals have the required keys. Originals ensure validity and fewer errors. Duplicates contain incomplete information. Correct! If data capture is performed using copies or duplicates, there may be more errors.

Originals ensure validity and fewer errors. (Page 58)

Information

Output

Types of computers

PC, Workstation (more than 1 person), Server (printers, fax), Mainframe (high performance to process large data), Supercomputer (simulating weather patters, decoding genome structures), Grid computing (supercomputer for many smaller systems connected), Virtual

Point to Point protocol (PPP)

PPP stands for Point-to-Point protocol. Encryption is used to ensure the privacy of the content being communicated.

Software

Package coded instructions

A corporation wishes to modify its current distribution system. The management team asks the Information systems team to analyze the proposed distribution change. Upon approval of the proposed IS project, the IS team must choose the project implementation method. Which method allows the old system to operate while the new system is developed and tested?

Parallel adoption

What element in decision theory assigns values to events? Choices: Payoff Acts Outcomes Events

Payoff (Page 65)

Widespread use of the internet caused disruption and quick eveloution within the music industry. Responses to widespread internet usage included technological evolutions, such s uniquely identifiable digitally tagged files, and the passage of laws that penalized file sharing. Which type of e-commerce put music industry artists, publishers, publishers and retailers at risk of losing potential revenue due to the widespread use of the internet?

Peer to peer networks

There are six major components of a computer-based information system, four of which are also in the information technology component. Which two are only parts of the information system? Data / Processes / Hardware /Networks /People/Software

People & Processes

Information systems specialists

People who develop, operate, and maintain the systems. Specialists include programmers, systems analysts, testers, computer operators, and other managerial IS personnel

Playboys Produced Hotdogs Since Nutritionists Died (IS)

People, processes, hardware, software, networks, and data

Information systems

People, processes, hardware, software, networks, and data comprise the six major components of a computer-based

Hardware

Physical Device

______ is key for user support after implementation because it helps identify and prepare for future needs and budget planning. Testing Communication Planning

Planning (Page 59)

IT Mgmt Challenges

Political and Legal Pressures, Cultural Pressures, Technological Pressures, Economic Pressures

When managing a database, it is important to be knowledgeable about the risks of poor data quality. What is one consequence of poor data quality? Poor data quality results in poor output. Poor data quality results in system bugs. Poor data quality results in hardware failure.

Poor data quality results in poor output. (Page 59)

Which telecommunications protocol is used to retrieve email from a mail server?

Post Office Protocol (POP)

Imagine a Cat Going To School In (ICGTSI - Decision Making Process (6)

Prob ID, Data Collection, Solution Generation, Solutions Test, Solution Selection, Solution Implementation

A large hotel chain needs to develop a system that would coordinate its airport shuttle service with its customer's needs. This requires that their systems analysis staff interacts with both customers and shuttle drivers to identify and document the necessary requirements. In which role would a systems analyst assume to address this issue?

Problem solver

Which business function is responsible for Quality Control?

Prod and Ops

You have created a database to store the products sold in a department store so they can be managed, updated, and manipulated more easily. The store manager wants to create a query to show the items that are selling today. What would be an appropriate field to sort the data?

Product ID

Which business functions is primarily the responsibility of production and operations information systems?

Product life cycle, manufacturing Inventory management, quality control Research and Development

Prod and Ops

Product life cycle, manufacturing, inventory management, quality control, research and development

What business function benefits from both wireless networks and cellular technologies?

Product sales support

Which feature of social media websites can a job seeker use to convince prospective employers that the job seekers talents are real and are already valued by a number of other individuals and organizations?

Profile creation

Software

Programs comprised of pre-coded instructions written in a programming language which the end user typically uses to interact directly with the IS.

Utility Software

Programs perform periodic system maintenance activities, such as virus detection, storage space consolidation, backup and recovery, intrusion detection, and access authentication monitoring

A company has recently acquired a former distribution competitor in another country. The new subsidiary uses obsolete CRM software. To streamline integration with the new subsidiary, the CEO and CIO have decided to replace the outdated software with the system the company currently uses. What is a political challenge to implementing this decision?

Prohibitions against the transfer of certain technologies across national boundaries

A ride-sharing cab company is looking for ways to generate more business by attracting more customers, both on the supply (drivers) and the demand (passengers) side, via a strategy of tracking their monthly miles and offering "frequent flier" bonuses, just like the airline companies have done. Which IT management challenge is addressed in this scenario?

Promote competitive advantage

Business intelligence provides benefits and value to businesses and organizations. Which answer below is NOT a benefit of BI? Reduced labor costs Reduced IT staff Reduced information bottlenecks

Reduced IT staff (Page 64)

EUD (End-user development) / EUP (End-user programs)

Refers to activities and tools that allow end-users - people who are not professional software developers - to program computers

As a software developer, you explain the prototyping development method to your colleagues. Which of the following best describes the prototyping software development method? Prototyping allows for unexpected changes. Prototyping is a four-step method that results in quick module development. Prototyping is an incremental form of agile software development.

Prototyping is a four-step method that results in quick module development. (Page 56)

RAID (redundant array of independent disks; originally redundant array of inexpensive disks)

Provides a way of storing the same data in different places (thus, redundantly) on multiple hard disks

A company has issued smartphones to its employees with a policy that the devices may not be used off the company's campus. An IT analyst has been tasked with finding a way to enforce this policy. Which solution provides a fitting solution to this problem?

Proximity authentication access control

Which tool is appropriate for use in the design phase of information systems development to specify the detailed logic of a business process in narrative form in a manner easily translatable into program language?

Pseudocode

WAN networks are interconnected via the Internet, private networks, or Hint, displayed below

Public switched telephone networks

Analytical Platforms

Purpose built appliance systems that are designed to process and analyze enormous amounts of data quickly.

When designing and implementing an information system, one must keep in mind the quality and reliability of the information system. Quality and reliability seem to be redundant when discussing and evaluating key aspects of managing systems implementation. Can you describe the difference and relation, if any, between the meaning of "quality" and "reliability" when designing and implementing an information system?

Quality refers to the factors that affect system design, behavior, and the user experience. Reliability is concerned with inconsistent output, system failure, and system unresponsiveness. Quality and reliability do come together when addressing run-time quality factors of the information system. When testing run time, the design team of the information systems must address system availability, manageability, operability, performance, reliability, scalability, and security. (Page 58)

What is used to retrieve specific data from a database?

Query language

What technology is used to track inventory and can be read hundreds at a time, even if the tag is covered?

RFID

Which approach to systems development has a limited emphasis on the planning process and uses prototypes in lieu of predetermined specifications?

Rapid Application Development (RAD)

Which development methodology brings developers together with clients or end users in order to regularly collaborate on a solution?

Rapid application Development (RAD)

Analytical database

Read-only system that stores historical data on business metrics such as sales performance and inventory levels

_____ is defined as the ability of a system to continue operating as expected over a period of time. Usability Quality Reliability

Reliability (Page 58)

A business wished to extend the use of its virus scanning software to the business' customers. This requires the business to allow customers enough access to the internal network so virus scanning software can be downloaded to a customer computer. Which security measure will the business have to take to ensure customer access for virus scanning downloads yet protect internal systems from possible unauthorized access?

Require a username and password for network access

Interactive online communications, such as instant messaging, email and video teleconferencing, have allowed managers at a large retailer to boost efficiency by enabling collaboration between geographically separated employees. However such technologically assisted interactions have led to inappropriate conduct by employees, requiring the employer to implement processes or technological controls to reduce risk and encourage professionalism, but potentially invade employee privacy. Which technological action, if used, will represent an ethical challenge for this large retailer?

Reviewing instant messaging logs

Common risk management terms include:

Risks—The potential for loss, commonly associated with the monetary and non-monetary impact to such a risk, as well as the probability of occurrence. Vulnerabilities—A weakness in the technology, process, and procedure, or people involved with any given information asset. Such vulnerabilities may include weaknesses in the technologies used, including their configurations, and the security policies that are enforced or not within an organization. Threats—The identified and unidentified actors that have the potential for attacking the information assets. Such actors may include elements both internal and external to the organization. Attacks—The damaging or potentially damaging acts that are the product of an attacker's process, which may include: reconnaissance, scanning, gaining and maintaining access, escalating privileges, building backdoors, and destroying evidence.

Network of businesses that are connected to provide products and services more efficiently to the customer, accommodate rapid growth and meet requirements of retailers and distributors.

SCM (Supply Chain Management)

OLAP is a database used for analyzing business data.

Why is an OLAP database considered business intelligence?

Electronic communications has predominantly become the primary form of communications in first world countries. What protocol is used to mange and monitor the massive amount of emails that we receive every day?

SMTP (simple mail transfer protocol) the popular mail protocols include IMAP and POP3

Sales and Marketing

Sales analysis, set pricing, marketing mix, and product promotions, customer profiling

______ feasibility assessment is very important for projects that have long implementation time frames. Choices: Techinical Schedule Project

Schedule (Page 57)

What is a database schema?

Schema is a planned design of the data organization.

Scope, time, cost, quality and risk are five major variables in project management that must be monitored when managing information technology to ensure project success. _____________________________________ is what is included or defined in a project, including goals, deliverables, costs and deadlines.

Scope.

SEO

Search engine optimization

SFTP

Secure File Transfer Protocol = Much like HTTPS, SFTP uses secure technologies, this time Secure Shell (SSH), to secure the connection for transferring files from computer to computer

Processes

Sequence of activities that provide input and output guidelines

A company needs to allow multiple computers to have access to a shared printer. Which type of computer is required to manage the print requests to a shared printer?

Server computer

To help facilitate business in areas without traditional infrastructure, some companies offer devices that allow businesses to accept credit cards with the tablets and cell phones. Which business model category do these companies fall in?

Service Provider

On premises (private cloud)

Services are provided in-house on servers or in a datacenter owned, managed, and administered by the organization

On Premises (private cloud)

Services are provided in-house on servers or in a datacenter owned, managed, and administered by the organization.

TCO takes into account the total costs over time, including all of the following, except: Maintenance and service contract costs Fixed and ongoing operating costs Deployment and network infrastructure costs Shipping and transportation costs

Shipping and transportation costs (Page 57)

SMTP

Simple Mail Transfer Protocol = One of several popular email protocols in use today (others include IMAP and POP3)

SNMP

Simple Network Management Protocol = Information concerning network status that is periodically passed between a network management server and routers on a network, for the purpose of monitoring network status

How many types of CASE tools are there? Six Three Five

Six (Page 61)

Micropayment

Small payment made each time a user accesses an Internet page or service

Personal Computer (PC)

Small systems are used on an individual basis (i.e., one-person use) and include traditional multicomponent desktop systems (monitor, computer, keyboard, mouse) and integrated systems, such as laptops and tablet computers.

_______ sites are web-based platforms that allow individuals to develop a public profile and connect with persons of common interest to exchange information. Underground Social Network Social Media

Social Network (Page 61)

A food truck wants to connect with its customers using a site that enables users and businesses to use public messages to create informed commerce. Which concept best describes service to consumers and businesses closing the feedback loop?

Social networking

automation

Software applications benefit business because they enable process

Software as a service (SAAS

Software licensed and hosted on centralized or distributed servers that belong to a service provider. Users access this software using a connection to the Internet and a Web browser. Examples include Salesforce.com's CRM (Customer Relationship Management) application or Google Apps.

What communication best practice should IT professionals perform during a project? Holding regular meetings to give status updates Soliciting feedback throughout the project Sharing documentation with all users

Soliciting feedback throughout the project (Page 60)

IEEE 802.11

Specifies an over-the-air interface between a wireless client and a base station or between two wireless clients

Critical Path Method (CPM)

Step-by-step process planning technique that defines the critical and noncritical tasks within a project in order to reduce or minimize process delays and time-related problems

Information asymmetry

Study of decisions in transactions where one party has more or better information than the other. This creates an imbalance of power in transactions, which can sometimes cause the transactions to go awry, a kind of market failure in the worst case

Data Mart

Subset of the data warehouse that is usually oriented to a specific business line or team

Character shifting (Ceasar cipher)

Substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions down the alphabet. For example, with a left shift of 3, D would be replaced by A, E would become B, and so on. The method is named after Julius Caesar, who used it in his private correspondence.

Which of the following is not a dimension of the balanced scorecard tool? Financial Process Supply

Supply (Page 64)

SCM

Supply chain management system

An international company is facing the challenge of its software development team working on a specific application spread across the globe in 16 countries in 12 different time zones. Flying them to the same location once a week or even once a month for coordination purposes would be prohibitively expensive. Moreover, the issues that arise trend to be urgent and in need of almost immediate resolution in communication with team members in other countries. Which communication style is necessary to resolve the issues in the given scenario?

Synchronous

An international company is facing the challenge of its software development team working on a specific application spread across the globe in 16 countries in 12 different time zones. Flying them to the same location once a week or even once a month for coordination purposes would be prohibitively expensive. Moreover, the issues that arise tend to be urgent and in need of almost immediate resolution in communication with team members in other countries. Which communication style is necessary to resolve the issues in the given scenario?

Synchronous *

The traditional systems development. Lifecycle (SDLC) consists of six formal phases.. Which phase involves. Developing the plan for capturing data and producing output?

System Analysis

Why is system modeling referred to as an iterative process? System modeling is an iterative process because it is required to model several times. System modeling is used to implement findings and start over to ensure the system is understood. System modeling is an iterative process because information gathering is not a perfect process.

System modeling is used to implement findings and start over to ensure the system is understood. (Page 57)

Corporations are constantly evaluating their processes, changing or upgrading their management information systems, or implementing a new strategic initiative. These initiatives can sometimes be designed or deployed using information systems. Why is it important to use systems analysis in these circumstances?

Systems analysis is the process of analyzing organizational programs that can be solved with an information system. It is critical to understand the problem as a whole by defining the problem, looking at the underlying causes, and identifying a possible solution along with system requirements. The requirements will involve process development, information technology, and possible changes to the organization's management. (Page 55)

Which of the following best describes systems analysis as a general term? Systems analysis is a feasibility study. Systems analysis is used to analyze organizational problems. Systems analysis is defined by Systems Development Life Cycle.

Systems analysis is used to analyze organizational problems. (Page 55)

As previously discussed, corporations are always taking on new initiatives to remain competitive or gain a competitive advantage. When taking on an information system development project, it is necessary to evaluate the program. Describe why it is important to perform a feasibility study during the systems analysis phase.

Systems analysis necessitates the performance of a feasibility study to determine whether the solution is financially, technologically, or organizationally feasible. The objective is to determine whether the proposed system is a good investment, whether the necessary technology is available, and whether the organization can adapt to the changes introduced by the new system. (Page 57)

Which of the following best describes a systems evaluation? Systems evaluation includes performance of software. System evaluation includes performance of hardware. Systems evaluation includes query response speed, data relevancy, and memory space demands.

Systems evaluation includes query response speed, data relevancy, and memory space demands. (Page 59)

What is a universal telecommunication network protocol that most operating systems can recognize?

TCP/IP

What should team members acknowledge and understand when projects are global? Team members should communicate in foreign languages. Team members should translate documents. Team members should try to understand foreign cultures.

Team members should try to understand foreign cultures. (Page 60)

What are telecommunications?

Telecommunications is the process of exchanging information between various entities over electrical, electromagnetic, or digital networks.

Which of the following is not a modern telecommunications system technology?

Telegraph

Examples of IT

Telephone and radio equipment, data, voice, and video equipment, and computer peripherals.

Complex corporate initiatives, such as software development or information system development, are managed as projects. Project management and the SDLC method are essential strengths in systems development. One way to manage a complex project is to evaluate and understand the project's critical path. Describe the benefits of applying critical path method (CPM) to complex projects.

The benefit of applying critical path analysis is that it defines the longest paths for each task, as well as calculates the earliest and latest dates each task. This process identifies tasks that are critical and those that cannot be delayed; it also identifies the tasks that can incur delays without adversely affecting the project. (Page 57)

In organizational management, two management models have influenced our understanding of the decision-making process. These models are called classical and behavioral. Describe the differences between these two models and provide examples where they can be applied.

The classical model of management describes the role of management within the context of four functions: planning, organizing, leading, and controlling. An example of the application of this model is the action of budgeting. Budgeting is part of planning. On the other hand, the behavioral model of management recognizes that actual management behavior is less systematic or predictable than classical management. Behavioral models can be applied in unstructured decisions. (Page 63)

Schema

The complete definition of a database, including the tables, records, fields, and relationships.

schema

The complete definition of a database, including the tables, records, fields, and relationships.

Network economies

The cost of adding another business participant to a business venture is small, and the potential gain is great.

To facilitate the economic aspects of security and to implement a feasible risk assessment, what question must that organization address?

The cost of potentially lost resources

Attacks

The damaging or potentially damaging acts that are the product of an attacker's process, which may include: reconnaissance, scanning, gaining and maintaining access, escalating privileges, building backdoors, and destroying evidence.

When identifying post-implementation considerations, which of the following best defines strategy oriented system evaluation? The determination of the success of the information system in meeting functional objectives The determination of whether the information system outputs enable management to make strategic decisions The ability of the information system to discriminate between files or data that are relevant to a user query

The determination of whether the information system outputs enable management to make strategic decisions (Page 59)

What is a disaster recovery plan?

The disaster recovery plan is one that depicts the process involved with returning operations to their appropriate function in case an emergency or disaster halts them.

database management systems (DBMS)

The evolution of software has produced the ability to manage large databases of information, known as

What is the role of the facilitator when using GDSS in decision making? Choices: The facilitator leads the meeting. The facilitator ensures meeting productivity. The facilitator schedules the meeting.

The facilitator ensures meeting productivity (Page 65)

The information systems support team is asked to perform an analysis of corporate privacy measures regarding a centralized relational database. The database is interconnected to several business groups via the internal data network that also supports connectivity to outside organizations. Which ethical risk is identified after a secondary analysis?

The financial system introduces unwanted liabilities

Threats

The identified and unidentified actors that have the potential for attacking the information assets. Such actors may include elements both internal and external to the organization.

Decision making is one of the primary functions of management. Good decision making relies on information technology. Corporations invest and support management decision making through various IT systems. Describe a positive attribute of decision-making support systems and name at least three types of decision-making support systems.

The information system used to support decision making should be flexible and adaptable to various users and enable management to use and develop their individual or group decision-making styles. Systems supporting decision making include decision support systems (DSS), group decision support systems (GDSS), and online analytical processing (OLAP). (Page 63)

What is the critical path? The longest path through the network diagram, indicating the shortest amount of time in which a project can be completed The shortest path through the diagram, indicating the maximum length of time in which a project can be completed The path with the most activities and longer durations

The longest path through the network diagram, indicating the shortest amount of time in which a project can be completed (Page 57)

search

The marketing manager for an airline company can perform a ............... on the Members table in their DBMS to identify frequent fliers who qualify for their credit card program.

Analysis

The most important task performed during system analysis is defining the information requirements, because the leading cause of system failure and cost overrun is inaccurate requirements.

Freemium

The offering of product samples and trial versions is not a new concept, although with a digital market and digital goods, product quality and available features can be tightly controlled so that when a customer wishes to expand their usage of a product, they need merely pay a fee and the new features may be immediately available. Often with --------- pricing strategies, the core service might be free, but additional features and services may be available for a charge. Mobile phone apps and games are an example of this concept, where limited versions of software are available for free, but often charge a fee for full versions, additional features, or related digital goods.

Device operators, network administrators, system specialists, and users are components of what system? Choices: The people who make structured decisions The people component of MIS The people component of co-located management for GDSS

The people component of MIS (Page 65)

What is the definition of decision making in the context of DSS? Choices: The process of identifying and selecting an alternative based on the values and preferences of the decision maker. The process of analyzing and testing outcomes. The process of defining user preferences that should be considered in the decision-making process.

The process of identifying and selecting an alternative based on the values and preferences of the decision maker. (Page 63)

What is risk management in system security?

The process of identifying, analyzing, and responding to risk

Sole proprietorship or sole trader

The simplest form of business allows an individual to register as a business, and enjoy all of the profits and benefits of doing business, but also be personally accountable for to all liabilities, risks, and debts from business operations.

User support after implementation is important because user adoption is critical for the success of any information system. Users often fail to adopt the new system because they were not properly trained, or because the system is different from the previous system. There are six methods to increase user adoption and lower post-implementation costs. What are the six methods, and which one do you think is the most important for driving user adoption?

The six methods include benchmarking, usability testing, user communication, forming an internal user group, planning, and leveraging existing resources. Benchmarking is critical because it teaches best practices. Usability testing is critical because there can never be enough testing. Communication among the users is most critical because communication is key for driving change acceptance. Forming user communities builds a support infrastructure. Finally, leveraging existing resources drives down cost. (Page 59)

The waterfall model is a type of systems development life cycle model. Which of the following is true about the waterfall model? The waterfall model is a non-sequential development process. The waterfall model is most appropriate when system requirements are clear, well-documented, and unlikely to change. The waterfall model is easy to manage due to the rigidity of the model. The waterfall model consists of five stages that follow the criteria of the SDLC model.

The waterfall model is most appropriate when system requirements are clear, well-documented, and unlikely to change. (Page 56)

When corporations embark on an information system development project, it is necessary to evaluate the program, its objectives, and how to approach development. There are methods to keep control and monitor project schedules, effectiveness, and cost. One of these methods is the waterfall model. Can you describe a scenario in which the waterfall model would be most appropriate?

The waterfall model is most appropriate when system requirements are clear, well-documented, and unlikely to change. This model is also useful when the technology is understood and will not change, when the project is relatively short term, and when sufficient resources and expertise are available to support the process. The waterfall model includes stages that must be completed prior to moving forward to the next stage, moving in a flow that is similar to a waterfall. (Page 56)

How does business intelligence reduce irrelevant information and information bottlenecks? Business intelligence makes information available to the entire organization. Business intelligence generates constant real-time data. Trained users can generate individualized reports without support from IT.

Trained users can generate individualized reports without support from IT. (Page 64)

Analytics would affect the database performance

Why is it not good practice to perform analytics on a online transaction processing database?

Computer-aided software engineering (CASE) is the use of computer methods to organize and manage software development in information systems. CASE software can be classified into three categories or hierarchies: tools, workbenches, and environments. Please describe the types of tools in each category.

There are six types of CASE tools and CASE workbenches: business analysis or graphic modeling; development; verification and validation; configuration management; metrics and measurement; and project management. There are five categories of CASE environments: toolkits, fourth-generation, language-centered, integrated, and process centered. (Page 61)

When designing an information system, it is imperative that security is planned and addressed at the system level. System level security consists of the architecture, policy, and processes that establish the security on computer systems. No matter how much time is spent analyzing and designing security protection, the system will always have a risk of being breached. Describe the three levels of risk when performing risk management analysis.

There are three levels of risk for system security: low, moderate, and high. Low-level risks have a noticeable impact and possible damage. Low-level risks can affect the short-term performance of a business. A moderate-level risk is very serious and would result in severe impairment, adversely impacting the organization's operations. A high-level risk would result in complete loss of capabilities. The resulting damage from a high-level threat could threaten public safety or economic stability. (Page 59)

What type of information systems does middle management use to support decision making? Choices: Decision support systems Executive support systems Transaction processing systems

Transaction processing systems (Page 65)

Partitioning is done to improve performance.

Why is partitioning done when administering relational database systems?

Management information systems (MIS) should make an organization more effective. MIS provides information to employees and management, enabling increased productivity and better, faster management decision making. Why is it important for executive management to periodically evaluate corporate management information systems?

There is a direct relationship between the effectiveness of an organization and the effectiveness of the organization's management information system. Periodic evaluations of MIS yield important information about the cost-effectiveness, impact, and future potential of the system. (Page 59)

What is a benefit of public cloud computing? There is no need for software customization. There is no need for new software development. There is no capital expenditure on hardware or software.

There is no capital expenditure on hardware or software. (Page 61)

Why are DBMS reports a valuable database tool in helping managers make business decisions?

They display data in a structured format

Information system

This consists of all the components that work together to process data into useful information.

Information

This is data that has been organized to provide value to an organization.

Skilled workers

This is one of the most important issues facing businesses today since the IS management function is extremely complex and changes regularly.

Horizontal

This is the structure of the IS function because information systems encompass many different business functions in an organization, and cannot work alone in a vertical structure.

implementation

This phase includes testing, user training, maintenance, and documentation of the system.

TPS, MIS, DSS, EIS

This system organizes and presents data and information using internal and external data sources in support of senior executives as a four-level pyramid that depicts different types of information systems, as they relate to different hierarchical levels within an organization.

Management information systems (MIS)

This system provides first level managers with reports on current performance and historical records to help keep an organization running smoothly

MIS (Management Information System)

This system provides first level managers with reports on current performance and historical records to help keep an organization running smoothly.

Decision-support systems (DSS)

This system provides modeling and analytical tools that support middle to senior managers in all aspects of the decision making process, when problems are unique, unstructured, and not easily specified in advance, to project potential future trends

DSS (Decision-support System)

This system provides modeling and analytical tools that support middle to senior managers in all aspects of the decision making process, when problems are unique, unstructured, and not easily specified in advance, to project potential future trends.

Executive information systems (EIS)

This system supports senior executives by providing important data in the form of graphs and charts to analyze and identify long-term trends

EIS (Executive Information System)

This system supports senior executives by providing important data in the form of graphs and charts to analyze and identify long-term trends.

Transaction processing systems (TPS)

This system tracks the flow of daily routine transactions that are necessary to conduct business, such as payroll or order processing

TPS (Transaction Processing System)

This system tracks the flow of daily routine transactions that are necessary to conduct business, such as payroll or order processing.

What does TCP/IP stand for?

Transmission Control Protocol/Internet Protocol

Telecommunications

Transmission of Information

Supercomputer

This term merely implies the fastest category of computer available. Supercomputers are purpose built to handle vast amounts of information very quickly. Examples of supercomputer applications include simulating global weather patterns, decoding genome structures, or simulating the human mind.

How many types of management information systems evaluations are there? Four Two Three

Three (Page 59)

How many types of decision-making processes in decision support systems are there? Choices: Three Four Five

Three (Page 63)

About one third of the IS management agenda is expected to change every _____ ______ , confirming the highly dynamic nature of the IS management function.

Three years

As an IT professional, you are conducting a feasibility study for a project. What is the overall objective of a feasibility study? To determine development cost To determine the technology required To determine if the outcome is possible and desirable

To determine if the outcome is possible and desirable (Page 57)

Why do communications networks use defined rules or standards called protocols?

To ensure communication between packets is accurate and understood.

What are the three CASE software classifications? Methods, diagrams, and users Tools, workbench, and environment Analysis, design, and documentation

Tools, workbench, and environment (Page 61)

Public Exchanges

Trading venues open to all interested parties (many sellers and many buyers) that use a common technology platform

Service Provider

Traditional retailers such as tire shops and grocery stores sell both goods and services. The online equivalent is much the same, where Amazon.com offers goods that are purchased and shipped, and digital services such as Amazon Web Services, where online storage space and processing power is rented, or paid as an ongoing subscription. Other examples include the many options and utilities provided by Google Apps.

You are testing a new system implementation. What are the three elements of the testing phase? Unit, system, and acceptance testing Unit, system, and conversion testing Unit, system, and configuration testing

Unit, system, and acceptance testing (Page 58)

_____ testing requires a formal meeting with several users, which includes an interview and observation or screen-sharing. Output Usability Benchmark

Usability (Page 59)

Rolling code (hopping code)

Used in keyless entry systems to prevent replay attacks, where an eavesdropper records the transmission and replays it at a later time to cause the receiver to 'unlock'. Such systems are typical in garage door openers and keyless car entry systems

What is a data mart business application?

Used to analyze a business unit, or a single unit

System implementation success depends on a number of factors, but true system success is measure by which factor below? Data quality System performance User adoption rates Query speed

User adoption rates (Page 59)

A car dealership has been receiving complaints from its customers about its inflexible repair system in which customers who drop off their cars the previous evening are not properly placed in the queue and tend to be placed behind those who drop their cars the morning of the scheduled repair. It needs technical staff members who understand the scheduling drop-off operation so it can determine and articulate precise customer needs to the programmers who would then build the code behind the system. What type of challenge is this?

User requirements

What are user requirements in the SDLC process? User requirements means getting users to define the system GUI. User requirements means documenting all user needs, wants, and requirements. User requirements means interviewing users to define process.

User requirements means documenting all user needs, wants, and requirements. (Page 55)

Object-oriented systems development

Uses the object as the unit of design, and is based on the concepts of class and inheritance. For example, numerous automobiles belong to the class of automobiles, and numerous trucks belong to the class of trucks, but both inherit the property of vehicle from the vehicle class

What is a secure tunnel through the internet using a public infrastructure?

VPN (virtual private network)

Amanda has been asked to regularly extract and process databases from many sources into a data warehouse, which will be used by several divisions within the company. Which type of data should Amanda recognize is prevented by her data warehouse design?

Variable

How are WAN networks interconnected?

Via the Internet, private networks, and the public switched telephone network

What is WAN?

WAN stands for wide area network, and typically connects LANs or smaller networks across large distances.

Although WPA has been a secure encryption protocol for wireless networks, it is being replaced by a standard that offers an even stronger security as the latest Wi-Fi encryption protocol. What is the name of the new standard?

WPA2

What is the meaning of the waterfall methodology in software development? Waterfall means the development team spends most of the project time on planning and specification. Waterfall means that there is a fast project development process with difficulty when it comes to predicting costs. Waterfall means that each stage must be completed before starting on the next development stage.

Waterfall means that each stage must be completed before starting on the next development stage. (Page 56)

Private Industrial Networks

Web networks allowing 360 to collaborate

Why are webinars a great source of technical information for IT professionals? Webinars are web based meetings that cover a variety of topics. Webinars are face-to-face technology expos. Webinars are free for anyone to join.

Webinars are web based meetings that cover a variety of topics. (Page 61)

- CPU -Memory

What are the components found on a computers motherboard?

Volume, variety, and velocity

What are the three V's used to describe Big Data?

1NF, 2NF, 3NF

What are the three norms in normalization?

G2B, G2C, G2G

What are three models of e-business. Choose 3 G2D G2B G2G G2E G2C G2S

Is one record or data set in a row

What are tuples and how are they used in databases?

Presentation and staging

What are two key elements that make up the data warehouse?

clickstream records where a user clicks on a webpage

What best describes the meaning of clickstream?

B. Differentiation

What business strategy is a large computer company using if it offers products with several appearances and screen interfaces? A. Cost Leadership B. Differentiation C. Loss Leadership D. Focus

B. It can lead to feature creep

What can happen when the project requirements are not clearly defined? A. It can lead to a lack of business requirements B. It can lead to feature creep. C. It can lead to missing user training documentation D. It can lead to insufficient design alternatives

Velocity means ability to execute data integrity.

What do people mean by velocity when describing Big Data?

C. Podcasting

What e-Business tool converts an audio broadcast to a file that can be played on a digital music player? A. Videoconferencing B. Instant Messaging C. Podcasting D. Webinar

Data marts are used to analyze a business unit.

What is a data mart business application?

C. It leads to a loss of confidentiality

What is a drawback of outsourcing system development projects? A. It increases operation expenses for head count B. It leads to a decrease in project quality C. It leads to a loss of confidentiality D. It increases the time needed to market for products

D. The field must have unique values

What is a requirement of a field when it is in a table and is defined as the primary key? A. The field must have numeric values B. The field must appear in another relation C. The field must have duplicated values in the relation D. The field must have unique values

Object oriented databases contain multimedia files or executable code in records or fields.

What is an object oriented database?

D. Collective Information

What is business intelligence? A. Knowledge B. Technology C. Data sources D. Collective Information

C. A blend of computers and wireless telecommunications technologies.

What is telematics? A. A form of telecommunication technology that is used to identify and track assets via radio frequency. B. A telecommunication chip embedded in store shelving to help retailers. C. A blend of computers and wireless telecommunications technologies. D. A telecommunications device that allows goods and services to be purchased wirelessly

Data integrity is a process to ensure data is not corrupted.

What is the best definition of data integrity?

The flat file design is a single table database.

What is the best description of a flat file database?

An entity exists in itself

What is the definition of an entity in a database?

D. Data is processed to get information

What is the difference between data and information as they relate to business functions? A. Data is related to hardware but info is not related B. Data is stored but information is not stored C. Data comes from info D. Data is processed to get information

A. Information is processed data

What is the difference between data and information in information systems? A. Information is processed data B. Data contains numbers where information contains text C. Information and data are synonymous D. Data is written reports where info is the raw numbers

data mining and analytics are interchangeable, both are processes to identify new patterns in data

What is the difference between data mining and analytics?

Data mining examines and reveals patterns in a structured DBMS, while web mining discovers patterns in a less structured format, such as the Internet.

What is the difference between data mining and web mining?

A. Product or service limitations

What is the main challenge to growth that is encountered when e-business is used? A. Product or service limitations B. Poor social media presence C. Underdeveloped user interface D. Inability to adhere to taxation rules or regualtions

C. Electronic communications privacy act

What is the most recent federal bill that addresses computer monitoring of employees? A. Sarbanes oxely act B. Homeland security act. C. Electronic communications privacy act. D. USA PATRIOT act

A. TCP/IP

What is the primary networking standard used to communicate over the internet? A. TCP/IP B. XBRL C. HTTP D. URL

A. It provides relational integrity for the database

What is true of a relational database? A. It provides relational integrity for the database B. It allows for the creation of data marts C. It compiles the metadata about the data elements in the data model D. It creates an indirect backup of data in the database

Predictive analytics

What item below is considered a category of business intelligence?

A. RPM

What measures computer speed? A. RPM B. CPU C. Hard disk size D. Network interface card

application software

What software allows computer users to perform activities, functions or tasks? routing, application, or operating?

B. It would decrease errors in medicaitons

What would be the impact of a hospital using a medication system that automatically distributes prescriptions in the hospital pharmacy? A. It would reduce the total number of medicines prescribed. B. It would decrease errors in medications C. It would increase employee safety D. It would improve customer satisfaction

Software engineers and information systems analysts follow standards, such as the SDLC and waterfall methods, as well as other software and system development tools to ensure program success. Another important tool used in designing complex systems is modeling. A standard modeling tool used in systems design is Unified Modeling Language (UML). Can you explain the benefit of systems logical modeling and how UML is applied?

When developing a system or a product, the development team should strive to model and test systems against requirements and assumptions before committing to design and production. By modeling the system using tools like UML, inputs, processes, data, and outputs are visualized and edited or redefined before moving to the design phase. This helps the team optimize the system design. (Page 57)

-Manage Incoming data -catalog data

When looking at the evolution of software, databases have grown in features and popularity. What do databases management system (DBMS) applications do for business?

Data Integrity

When there are mistakes or errors in the data, it is a violation of the ............ rule.

C. Network Operating System

Which type of software manages the users and contains an array of programs that ensure that data is being transmitted to the correct user, computer, or other devices? A. Device B. Utility C. Network Operating System D. Open-source system

Database administrator

Who is responsible for acquiring, organizing, and distributing information for the organization?

They display data in a structured format.

Why are DBMS reports a valuable database tool in helping managers make business decisions?

Data warehouses can be mined or analyzed for trends or patterns

Why are data warehouses beneficial to business managers?

Data governance

Which answer below defines the policies and processes to manage and maintain the data integrity and security of a government agency?

B. Location-based services

Which application is utilized by GPS and GIS? ch 16 A. Automatic vehicle location B. Location-based services C. Edge mapping D. Mapping densities

D. Plunge

Which conversion implementation should a company use if it plans to discontinue using the legacy payroll system on Friday and begin using a new payroll system on Monday? A Phased B. Pilot C. Parallel D. Plunge

D. Gathering the business requirements

Which investigative activity must occur during the analysis phase of this project? A. Designing the technical architecture B. Setting the projet scope C. Defining the system to be developed D. Gathering the business requirements

C. A data flow diagram

Which investigative tool is used during the analysis phase of systems development to guide process improvement? A. An entity-relationship diagram B. A brainstorming diagram C. A data flow diagram D. A flow chart

B. Usability

Which method measures the ease with which people perform transactions or find information? A. Transaction speed B. Usability C. Accuracy D. Response time

B. WiMAX or C. Wi-Fi

Which networking standard is used by businesses to transfer information through radio waves over distances up to several miles? A. RFID B. WiMAX C. WiFi D. NFC

Joe is extracting information from existing data to better understand his customers and identify potential risks.

Which of the following is an accurate example of why a business should use predictive analytics?

Query language

Which of the following is used to retrieve specific stored data from a database?

utility

Which of the following items is a type of system software? Routing, utility or DBMS?

A. Scope creep

Which risk is reduced when the investigation step is well executed during the planning and analysis phases of systems development? A. Scope creep B. System obsolescence C. End user training failure D. Continual maintenance

B. Firewall

Which security technique helps protect systems by examining each message as it enters the system and blocking improper or unauthorized messages? A. Biometric security B. Firewalls C. Encryption D. Antivirus software

B. Encryption

Which security technique uses private key and public key pairs to protect sensitive information? A. Antivirus software B. Encryption C. Firewalls D. Biometric Security

B. Extranet

Which solution would allow a company to host a computing service on an internal network and restrict it to employees within the organization? A. Exchange server B. Extranet C. Private Cloud D. Virtual private network

C. VoIP

Which technology allows businesses to use network phone software to make calls to other network users? A. Token Ring B. Frame relay C. VoIP D. ATM

D. Prototyping

Which term is used to describe an iterative approach to building a system? A. Sketching B. Scrum C. Waterfall D. Prototyping

B. Microcomputer

Which type of computer system would an employee need to complete a project requiring a spreadsheet? A. File server B. Microcomputer C. Mainframe D. Midrange System

B. B2B

Which type of ecommerce model is used when a company sells tires to automobile companies? A. G2B B. B2B C. C2C D. C2B

A. Autonomic

Which type of emerging computing technology allows a computer to diagnose its own failure and develop a workaround that enables the computer to continue to function? A. Autonomic B. Auto-correction C. Alternative D. Avatar

C. Spreadsheet

Which type of software application is most effective for analyzing small to medium numbers? A. Database B. Web browser C. Spreadsheet D. Word processor

Relational databases have simpler table relationships than hierarchical databases.

Why did relational database models replace hierarchical database models in business applications?

B. It supports change through iteration

Why would a company consider using a prototype when converting an existing order entry system to a web-based system? A. It detects errors after development B. It supports change through iteration C. It ensures managerial participation D. It creates a secure system

A. It provides many personal productivity programs

Why would a school admin choose to utilize Microsoft Office? A. It provides many personal productivity applications. B. It integrates all department and functions into a single IT system. C. allows multiple computer to run on a single machine. D. permits transmission of business info.

A. It permits secure transmission of business information

Why would a vendor choose to utilize electronic data interchange (EDI)? A. It permits secure transmissions of business information B. It provides many personal productivity applications. C. It allows multiple computers to run on a single machine. D. It integrates all dept functions into a single IT system

Which telecommunications protocol is used to connect devices in a wireless local area network (LAN)?

Wi-Fi

Wired Equivalent Privacy (WEP)

Wi-Fi security algorithm (64bit) - Retired 2002

Wireless access point

Wired internet extention

What does WSN stand for?

Wireless Sensor Networks

Wireless repeater

Wireless internet extension

Which two network devices boost Wi-Fi strength for wireless devices in area of low signal quality?

Wireless repeater / wireless bridge

Bluetooth

Wireless technology standard for exchanging data over short distances (using short-wavelength UHF radio waves in the ISM band from 2.4 to 2.485 GHz[4])

What is Advanced Data Analysis?

With the increasing use of computer-based information systems, an ocean of data has been collected, stored, and made available for a wide array of analyses.

Advanced Data Analysis

With the increasing use of computer-based information systems, an ocean of data has been collected, stored, and made available for a wide array of analyses. These analyses may be general or specific, potentially very intricate, and may expose information or nonobvious relationships and connections, leading to breaches of privacy and trust.

What is mobile information availability?

With the increasing use of mobile computing platforms connected to the Internet, including smartphones and tablets, more information input and output is available to more people in more places.

Mobile Information Availability

With the increasing use of mobile computing platforms connected to the Internet, including smartphones and tablets, more information input and output is available to more people in more places. This availability of information allows benefits, such as localization and personalization, but direct and specific invasions of privacy require faster reputation management and for information controls in more places.

A WBS is developed at the beginning of a project to identify activities required to complete a project. What does WBS stand for? Work baseline system Work and business system Work breakdown structure

Work breakdown structure (Page 57)

Why are good writing skills critical to the system analyst function? Writing skills are essential because new ideas are shared in writing. Writing skills are essential as the primary method of communication. Writing skills are essential for documentation requirements.

Writing skills are essential for documentation requirements. (Page 60)

Product ID

You have created a database to store the products sold in a department store so they can be managed, updated, and manipulated more easily. The store manager wants to create a query to show the items that are selling today. Which would be an appropriate field to sort the data?

Forecasting

You were hired by a company to administer survey questionnaires to customers entering a major shopping mall. The data mining software is capable of .............. consumers' future purchases based on the items they had bought in the past.

associations

You were hired by a company to administer survey questionnaires to customers entering a major shopping mall. The data mining software is capable of identifying .................... based on the customers' shopping habits; for instance, how often did the customers buy socks when they buy a new pair of sneakers.

classifications

You were hired by a company to administer survey questionnaires to customers entering a major shopping mall. The data mining software is capable of sorting the respondents into ........... based on their age, gender, education level, and household income.

false

[True/False] Clickstream applications can provide online retailers with information such as the web pages that the user visits and/or the products that the they are interested in. Many online retailers, such as Amazon.com and ebates.com, use the information collected from the clickstream applications to monitor and track their customers' spending habits.

False

[True/False] Companies that have more than 1,000 employees with a diverse product portfolio are too small to benefit from a data warehouse application.

True

[True/False] During data cleansing and normalization, the structure of some tables will be affected. For instance, a big table could be broken into several, smaller tables or a few small tables could be combined into a big table.

False

[True/False] Healthcare companies and hospitals cannot destroy their patients' records; they must keep their data forever, just in case they need to retrieve information for potential malpractice lawsuits from their patients.

false

[True/False] On the Internet, relational databases are connected to web-enabled forms to capture data automatically and allow for instant data retrieval for real-time online processing. Relational databases are useful in business because they handle large amounts of data that have been downloaded and stored in multiple locations from the Internet.

false

[True/False] Organizational information policy stipulates that all printed documents in an organization should be destroyed immediately.

False

[True/False] Supply Chain Management (SCM) is a popular analytics application. A company's supply chain is a network of business processes that includes procuring raw materials, producing and manufacturing the goods, marketing the products to potential customers, and finally, distributing the finished products to the customers.

False

[True/False] Web-based databases allow users to access data only from their office computers, via the business internet connection.

Financial, business process, customer, and learning and growth are organizational dimensions of _____. Choices: a balanced scorecard business performance management business process management

a balanced scorecard (Page 64)

What is a business ecosystem?

a collection of loosely coupled, interdependent industries that provide related services and products across many industries.

What is the work breakdown structure (WBS)?

a comprehensive list of all activities needed to complete a project.

What is a grey-hat?

a computer hacker with the skills and intent to help organizations protect their networks and systems from others, but whose services may come at a price, or can be sold to the highest bidder.

What is UML

a general purpose modeling language (unified modeling language)

What is denial of service?

a loss of access created by cut cables or power services, malware (see below), hoaxes, bots and botnets (i.e. a computer or groups of hijacked computers used to attack others, often without notice to their owners), smurf attacks, SYN floods, DNS poisoning, or outright hijacking and/or redirection of services.

What is a private industrial network?

a major corporation in the industry that can provide leadership and resources to the smaller counterparts.

What is UML?

a modeling language used to help model systems

What is OLAP (online analytic processing)

a multidimensional database that is used for analyzing business data to discover and gather business intelligence

What is the definition of data integrity?

a process to ensure data is not corrupted

A reliable intranet connection provides organizations and their suppliers and vendors with __________________________________

a secure platform for internal use

What is a radio frequency survey?

a signal strength detection process to identify the best wireless access point locations.

The advantage of using Internet communication tools is the easy access to _______ information and resources. relevant accurate abundant

abundant (Page 61)

What is the system that tracks and processes company revenues, purchases, and payroll?

accounting and finance

When conducting presentations, technical ______ should be avoided if possible and defined when required. acronyms synonyms dictionaries

acronyms (Page 60)

Because feedback is not readily available with written communication, the content must be accurate and contain sufficient detail. Which of the following is most likely to increase the audience understanding of written communication?

action specific verbs

What customer attribute is not helpful for accurately pricing goods to increase profit margins?

age

Collaborative, self organized, cross functional teams used to develop software systems represent the _____ methodology. Choices: RAD agile prototypes

agile (Page 56)

Scrum is a type of _____ software development methodology in which there is emphasis on planning. Choices: end user RAD agile

agile (Page 56)

What are used in most cases to look for relationships, patterns, and trends.

algorithms

Total cost of ownership (TCO) is a useful strategy when evaluating information systems costs and benefits. What does TCO entail?

all aspects of cost from the inception to decommissioning, along with associated maintenance, upgrades, support, and training.

What is the IoT (internet of things)

all devices connected to the internet with sensors to be automatically re-filled or serviced when needed

What is a key benefit to business organizations for using a relational database?

allow easy access to information

How does the use of internet-based technologies help businesses?

allow for distribution of information with external business entities, allow mobile and external resources to access information which allows for better communication with business partners and a good use of information technology

What is one way to define user requirements?

allowing users to experiment with the system during development.

Fountain Model

allows for activity overlap, such as the need for a system design prior to coding or hardware acquisition.

User communication

allows users to provide input through various communications methods, including meetings. This communication allows users to share best practices, experiences, and tips that may help other users.

chief executive officer (CEO)

also called president or managing director, is responsible for the success or failure of the company, creating the company culture, selecting the senior management team, setting strategy and vision, and selecting projects to fund. In larger companies, this position deals with high-level strategies and overall business growth planning.

Bloggers

also known as social media copywriters develop engaging and factual online content using relevant keywords, intended to attract followers to the organization. A bachelor's degree is usually preferred, but not required for this position.

What is the relationship of a feasibility study to an information system development project?

an analysis to determine if a proposed system is possible, evaluates cost, return on investments, and the likelihood of project success.

Executive information systems (EIS)

are a specific class of DSS that support the strategic decision-making process of top-level executives. These systems incorporate summarized information from decision support systems and management information systems, along with external factors to forecast and analyze trends. An example of an executive information system is a digital dashboard,

online analytical processing (OLAP)

are analytical, fixed databases containing data that are used for making decisions.

Fourth generation environments

are based upon fourth-generation languages, which focus on specific types of interface-driven applications.

Toolkits

are collections of tools to perform system integration.

Structures systems models

are methodical and process-oriented, moving from the general level to the specific level through a series of processes.

Data

are more than just raw material; they are facts that are a valuable organizational resource that must be well managed to benefit all end users in an organization.

Semi structured decisions

are ones in which only a portion of the problem can be solved using an established procedure. Middle managers more commonly make semi-structured decisions.

Application Software

are programs that are commonly used by end users as a means of increasing their productivity by directly applying them to specific tasks inherent in the work they are responsible for accomplishing. Examples of application software include word processors, electronic spreadsheets, and presentation software.

Web developers

are responsible for creating and maintaining a company's website. This includes layout design, programming, and website usability studies.

Information security analysts

are responsible for the security of a company's network, data, and information. ......... must determine where a company might be vulnerable to a cyber attack and install or recommend protection against these threats, such as firewalls, data encryption programs, and changes to training or operational policy.

Corporation

are separate legal entities created to represent the capital investments and somewhat or completely encapsulate the risks, liabilities, and debts of a single owner or many shareholders. A disadvantage to incorporating includes double taxation (the corporation's revenue is taxed and then the investor's corporate income is taxed), however this disadvantage is offset by an investor's limit of liability, which is merely the amount of their investment in the corporation.

Integrated environments

are the most common and are suitable for the entire system development life cycle (SDLC) from analysis to maintenance.

Process centered environments

are the most resourceful category due to the capability of specifying analysis and design, as well as the formal software control process.

Information system specialists

are the people who develop, operate, and maintain the systems. Specialists include programmers, systems analysts, testers, computer operators, and other managerial IS personnel.

End users

are the people who directly interact with the IS on a regular basis (e.g., daily) and use the information produced to get their work done.

Geographic information systems (GIS)

are tools used by management to make decisions based upon the geographic distribution of people or resources.

Language centered environments

are useful for research and development or prototyping projects, having a single language basis.

Risk _____ measures the level of risk by analyzing the likelihood of occurrence and the impact to the business if the event occurs. identification assessment management

assessment (Page 59)

Descriptive analytics

assists management in gaining insight from historical data through scorecards and reporting.

One network-based strategy is that of virtual companies that can do what?

associate with other companies, without being physically tied to them

If Apple Computer and Mitsubishi-Hitachi began a global joint venture, where would the information system development likely take place?

at multiple locations and then handed off to the next division or location as the day ended.

When streaming data or voice, which type of switched network is used?

circuit switch

For an individual or a business, data can be uploaded to the internet in many forms. What data should not be communicated on the internet?

banking transactions must be encrypted to be safely communicated over the internet

Why has cloud computing become more popular?

because users have more flexibility than they do with VPN

The measurement function of business intelligence creates a hierarchy of what?

benchmarking and metrics

What is an alternative tool that requires a group of users to collectively review and analyze the alternative, prior to making a decision.

brainstorming

What does data normalization do?

breaks a big table into several smaller tables, which will in turn modify the structure of the existing or any new tables

Why is providing user support after system production a challenge?

budgets are reduced, and the implementation team takes on new tasks.

The testing stage of a sequential SDLC model in software development focuses on finding _____. Choices: loops bugs improvements

bugs (Page 56)

Database administrators (DBA)

build databases to store data to meet business needs. This is a growing profession because data are a tremendous business asset. The .... designs the databases, ensures that the databases operate efficiently, maintains data security, and applies upgrades as needed.

A systems analyst should try to have an understanding of _________________ processes.

business

When using the balanced scorecard method, quality would fall under what measurement?

business process

Businesses uses databases for many reasons, so it is important to understand their basic fundamentals such as...

businesses use databases to store employee, customer, and product data to help them automate processes and get useful information for quicker decision making. Can also lead to business intelligence when combined with market, economics, and other government regulations.

Whats the downside of wireless networks?

but the downside of wired networks is the large amount of cable required on the premises, which is awkward and often expensive to map, manage, and maintain.

What is considered when determining the target audience of e-commerce?

buyer profiles, behaviors, and demographics

How are portable decision support systems utilized?

by employees who travel a lot for business

What is a series of human or user Web visitor page requests?

clickstream

The term "generations" is used to describe changes in which type of technology?

cellular wireless standards

Transmission Control Protocol/Internet Protocol (TCP/IP)

can be shortened to IP, and is the standard communication rule of the Internet. Internet Protocol governs Internet data network rules.

CTO

chief technology officer

Pretexting

creating a believable scenario (e.g. whether innocuous or serious) for the purpose of obtaining information. For example, a user receives an official looking email that alerts them to recent successful phishing attacks, and asks them to respond with their credentials in order to ensure their validity.

(Example of dumpster diving)What is pretexting?

creating a believable scenario (whether innocuous or serious) for the purpose of obtaining information. For example, a user receives an official looking email that alerts them to recent successful phishing attacks and asks them to respond with their credentials in order to ensure their validity.

Values and behaviors that contribute to the social and psychological well-being of an organization are examples of what organizational feature?

culture

Although eye contact is important for good communication, this can imply disrespect or aggression in some ______. teams organizations cultures

cultures (Page 60)

What is an intangible benefit when evaluating information systems cost and benefits?

customer satisfaction

Information systems accept _______________ as input.

data

There are six analytical functions used by business intelligence systems, including production reports, parameterized reports, and _____. Choices: dashboards algorithms technology

dashboards (Page 64)

One of the advantages of information systems for businesses is to take raw data and turn it into information, and then transform that information into knowledge. The number of people in Florida below the poverty line is an example of

data

What is the best reason to implement a database for a growing business?

data access

Who is in charge of determining and monitoring the employees' access to the company's DBMS?

data administrator

What occurs during the transformation step in ETL?

data cleansing

Where would metadata about customer and product tables be stored?

data dictionary

What defines the policies and processes to manage and maintain the data integrity and security of a government agency?

data governance

What is data integrity?

data is accurate and consistent through its use and application time

What are the benefits of partitioning when maintaining a data warehouse database?

data manageability

What tools and techniques does business analytics consist of?

data mining, modeling, statistics, OLAP

What are the categories of business intelligence?

data mining, predictive analytics, OLAP

What is another name for a network host?

data terminal equipment

What enables analytics of operational data from various sources?

data warehouse

What is the relationship between business intelligence and a data warehouse?

data warehouse analysis leads to business intelligence

Information systems accept _____ as input and process it into ______ as output.

data,information

Who is responsible for checking on an employees' access to the company's database?

database administrator

How can database applications help managers respond to changing market conditions?

database applications enable businesses to store and analyze essential sales data

Companies must maintain _______________ by keeping their data safe from unauthorized changes.

database integrity

What is an object oriented database?

databases that contain multimedia files or executable code in records or fields.

Product requirements

define the criteria which must be met by the product. Examples of product requirements might describe what the product should do, how it should look, how long it should last, how easy it should be to use, as well as a variety of other requirements.

Project requirements

define what resources are needed for project completion and how the project will be implemented.

Why is project management essential for managing information technology?

delivering quality systems on time, managing the budget, and planning for the unexpected

What is the act of bringing a network host down?

denial of service

Big data

describes a very large depository or distributed data sets that are too complex or voluminous for traditional data processing systems to manage.

Design quality

describes the integrity, maintainability, and reusability of the system design.

What are benefits of using SDLC when implementing an information system program?

detailed staged process, ability to monitor large projects

Social media marketing coordinators

develop content and post messages on social media sites, often under the supervision of the social media marketing manager. This position does not necessarily require a college degree; however, communication, blogging, and video editing skills are essential.

Social media strategists

develop public profiles for businesses in order to enable interaction with customers about existing and new products and services. ------------- usually possess a bachelor's degree and experience in social media marketing.

Business strategy is how a business achieves its goals and outperforms its competitors. Strategic Information Systems (SIS) are used to help companies accomplish business strategies. Some of the initiatives for implementing an SIS include:

differentiating products, customer lock-in, and barrier to competitors

What is a key factor to consider when evaluating system alternative?

economic, compatibility, limitations

Social media marketing managers

direct the development and implementation of social media marketing strategies, in order to drive audience participation and promote brand loyalty and growth. -------------------- usually hold a bachelor's or advanced degree, and have digital marketing experience and excellent communication skills.

What is the process of transferring data that does not need to be transformed to the data warehouse?

direct-move

The intelligence phase in the decision making process consists of the ____________________, identification, and understanding of the problem.

discovery

Incremental model

divides the product into sections which are user-tested at each stage, resulting in fewer errors in the completed system.

What is the definition of a partition in database concepts?

dividing database for manageability

What step in system implementation documents all system specifications

documentation

A process description tool _____ the details of a function and represents the processing steps in a logical format. Choices: limits documents codes

documents (Page 57)

The total number of days that the project has to be completed from start to finish is call the project _____. Choices: duration progress

duration (Page 57)

What is both an advantage and disadvantage to information management?

easy access to information

What are reasons to normalize a database?

eliminates data redundancy, reduces data complexity

There is a higher chance of failure in information system projects if ________________ do not use and leverage the system on behalf of their organization.

employees

LinkedIn posts and profile information is typically about what?

employment and occupation related

Big data analytics

enables a business to recommend products or services to customers based upon analysis of customer preferences, purchase history, and Internet search history.

Who does good IT planning help an enterprise achieve a competitive advantage?

enables faster response to market dynamics due to new entrants, new products, supplier chain, or customer

How does Web 2.0 sites create a virtual online community?

enabling collaboration and interaction among users

The digital age and technological advances made convergence possible by

enabling networks to carry digital signals, which are discrete, binary noncontinuous waveforms.

What method uses 4th generation computer languages?

end user development

What does EMS (energy management system) manage?

energy usage and reduces the operating costs in an organization

Availability

ensures that access to resources is unimpeded.

Integrity

ensures that data is produced and modified in the correct way.

Confidentiality

ensures that only authorized personnel are admitted access.

Internal and external elements that effect various parts of an organization, for instance the government, competitors, customers, and suppliers, are examples of what organizational feature?

environment

A company wants to "increase bakery production capacity" for its bakery production line. It has identified three alternative methods to do this, but also recognizes that the potential profit from each alternative is dependent on a strong or weak economy. The variations of the economy are examples of _____. Choices decisions events alternatives

events (Page 65)

Function-oriented evaluation

examines the performance of data, hardware, software, networks, and human resources.

Instagram, Pinterest, and Snapchat have experienced significant user growth, but still trail _________________ in number of users and user management.

facebook

What are needed for information systems infrastructure?

facilities

What is the required mediums for communications

fiber optics, ethernet, radio frequency

Sarah is a sales associate at a major bookstore. A customer calls the store to order a book, but he could only remember part of the book title. So, Sarah logs into the bookstore's DBMS and searches the book title _______________ for a listing of the book

field- describes one piece of information for each record.

What are software patches?

fix bugs, are expensive and time consuming

Benefits of database normalization

flexibility, consistency, and organization

Decision support systems (DSS)

focus on supporting all phases of specific decision-making processes and procedures for arriving at a solution. DSS support the entire decision-making process, but the actual decision is ultimately made by a human.

CRM (customer relationship management

focused marketing efforts, better customer experiences, automated reporting, and better cooperation to respond to customer needs. For a new business, to collect customer information online and at the register and to consolidate and merge the information to better serve customers. Your boss asks you to collect zip codes for every customer who purchases something in your store and then generate a report to show where they all come from so he can market to the low zip code areas.

classical model

focuses on rules and procedures to maximize productivity. Social needs of employees are not considered; instead, the focus is on centralized decision making and profit maximization.

Computer based actions

include those actions that require the use of a computer to apply. Several tactics and strategies exist, though each is derived from behavioral actions, strategies, and tactics. Awareness, understanding threats, minimizing or eliminating risks of loss, and acting to ensure fraud and abuse is limited or eliminated will reduce the potential for impact from computer-related sources.

Data administration

includes maintaining data integrity, recovering corrupted information, and managing users and group access to the data.

System quality

includes supportability and testability.

Run-time quality

includes system availability, manageability, operability, performance, reliability, scalability, and security.

Data Administration

including maintaining data integrity, recovering corrupted information, and managing users and group access to the data.

The number of people in Florida with incomes below the poverty line increased in the city of Tampa between 2010 and 2015 is an example of _______________________ .

information

What is the application of management techniques to collect, communicate, and process information in order to make better management decisions?

information management

Who is responsible for the risk and vulnerability assessment to prevent security breaches of company or government data?

information security analyst

What accepts data as input?

information systems

The shipping clerks at ABC Logistics complained to their supervisor that they experienced delays in uploading shipping and tracking information at certain times of the day. The network provider was contacted, who advised management at ABC that a faster fiber-optic connection was now available at a discounted rate. This type of network connectivity would greatly improve Internet speed. This is an example of___________________.

information technology management

The learning and growth perspective measures the ability of the organization to _____ in order to continue to add value to the organization. Choices innovate change scale

innovate (Page 64)

Network and computer system administrators

install and repair computer systems, as well as identify and fix network issues.

While enrolled in a traditional course at a university, you and your instructor can communicate synchronously, face-to-face, in the classroom. However, you can also communicate with your instructor synchronously outside the classroom using which internet application?

instant message

What are the four phases of the decision-making process with respect to decision support in organizations? Choices: intelligence, design, choice, and implementation OLAP, DSS, GDSS, and MSS problem definition, alternative analysis, design, and implementation

intelligence, design, choice, and implementation (Page 63)

What is a benefit of an extranet?

interact with suppliers, often via an SCM

What type of data is included in executive support systems? (ESS)

internal enterprise data, as well as external data from financial, industry, and trade databases

Among all the connections- internet, intranet, and extranet- which is the most widely used channel for business?

internet

Structured decisions

involve an established procedure, are repetitive and routine, and, therefore, can be handled in the same manner each time. Line-level managers and non-management employees typically make structured decisions.

Normalization

involves correctly defining keys, tables, columns, and relationships. Flowcharting during the design phase might avoid inconsistencies in the database.

Acceptance testing

involves end user evaluation and review of the system in order to demonstrate that the system is ready for operation. The goal of testing is to ensure and improve the quality and reliability of the system.

Planning

involves identifying and preparing for future needs in order to prepare and budget for future upgrades and modifications.

work breakdown structure (WBS)

is a broken down list of all deliverables showing what the customer will get at the end of a project.

chief information officer (CIO)

is a business leader who analyzes internal business processes such as payroll and billing, reshapes the physical infrastructure and network purchases to meet business goals, and leads the workforce to implement critical IT internal projects. This position requires strong organizational and interpersonal skills. The job focus is strategic in nature: developing and implementing the corporate IT strategy. The .... must have a broad knowledge of IT.

Auditing

is a control known by quite a number of divisions and departments within an organization. to an accounting department implies that an impartial and independent third party will determine if policies and procedures have been followed, and whether fraud exists within the organization's finances.

Smartphone

is a converged device that combines a cellular phone device with a mobile computer platform.

online transaction processing (OLTP)

is a database design used for browsing and manipulating business transaction activity.

Prototyping

is a four-step process in which an experimental system is quickly and inexpensively built and provided to end users for evaluation, and is then refined based upon user feedback. The four steps of prototyping include identifying the user's basic requirements, developing the initial prototype, using the prototype, and revising and enhancing the prototype..

End user development

is a largely informal method of solutions development by end users, made possible by the availability of fourth-generation languages that enable end users to develop systems and solutions with little or no assistance from professional technical specialists.

Denial of service

is a means to disrupt, interrupt, or suspend services of an Internet host computer, not a wireless network.

Parallel adoption

is a method of system transfer in which the old system continues to operate for a period of time while the new system is implemented.

Voice over Internet Protocol (VoIP)

is a modern telecommunications technology that offers convergence between voice and data networks. VoIP is a type of broadband application, similar to video, in which voice calls are transmitted over the Internet. VoIP has rapidly replaced telephone voice traffic.

database server

is a powerful computer that stores the databases and DBMS to access and administer the database.

phishing

is a process by which a hacker posts or sends a message that appears to originate from a legitimate source. The ======= attempt requests personal information that can later be used to befriend the user in order to gain further access. The ========= message will often suggest that the recipient's account has been compromised and provide a link for the user to click to "log-in" and correct the problem. Users will then be directed to an authentic-looking fraudulent site, which captures login credentials in order to gain illegal access.

Predictive analytics

is a process in which statistics, historical data, and data mining produce models and forecasts about potential customer behavior and future business trends.

Integrated Development Environment (IDE)

is a programming environment that provides tools to developers to write code.

Secondary Storage

is accessed only through a system's input/output bus and is generally several orders of magnitude slower than primary storage technologies. On the other hand, costs per byte for ........... have historically been quite a bit less than primary storage technologies. Examples of ............. include magnetic hard disk drives, which are spinning magnetic disks with moving read and write heads, as well as newer, more modern solid state nonvolatile flash storage. ............. also includes removable media, such as magnetic floppy disks, optical discs (CDs & DVDs), and USB flash drives.

Core Competency

is an activity for which a business is a marketplace leader. This activity is central to how the employees of the business work.

Intelligent character recognition (ICR)

is an advanced form of OCR that enables the computer to learn several different fonts and handwriting styles in order to improve accuracy and recognition.

model

is an image of an item, system, or process that we create in order to imitate, follow, or duplicate whatever the model represents.

Scrum

is an incremental form of agile software development that recognizes that customer needs and wants can change throughout the project. Unexpected changes and challenges, which cannot be addressed with the traditional waterfall SDLC model, can be quickly addressed with the scrum model. Team members are often located within the end user's facility, regularly communicating with team members and the customer.

Rapid application development (RAD)

is an iterative alternative to the conventional waterfall model of software development.

electronic meeting system

is computer software that facilitates discussion and decision-making in an organization in which members may be geographically dispersed.

User quality

is concerned with system usability.

Data governance

is concerned with the management of data, including maximizing quality through effective utilization, availability, and protection. Knowing that data is merely unorganized and unstructured information, practices and policies may be created and applied generally.

Evaluation

is defined as the process of gathering and analyzing information in order to compare performance with predetermined objectives, and to determine whether the objectives were achieved.

database integrity

is ensuring that data within the database are correct, which includes keeping data safe from unauthorized changes, and ensuring data within are timely and consistent.

data quality audit

is executed to ensure that a database efficiently, consistently, and accurately accepts, stores, and produces information.

Crow's foot notation

is often used to describe the relationship between entities.

Total Cost of Ownership (TCO)

is one method for determining the economic feasibility of a system or project.

Feasibility study

is performed to determine whether the proposed system is a good investment, whether the necessary technology is available, whether the user's information specialists can manage the system, and whether the organization can adapt to the changes introduced by the new system.

Predictive analytics

is predictive modeling that utilizes statistical and machine learning techniques.

Open Source Software

is software whose source-code is freely available to developers and users. .............. is developed not by single users or companies, but by communities of connected users and groups.

Telecommunications

is technology that transmits and facilitates the transmission of information over distances, and is often used to connect multiple end users across physically remote locations.

Random Access Memory (RAM)

is temporary or short-term storage used by the processor.

Sniffing

is the act of eavesdropping on network traffic in order to acquire traffic data packets and decoding.

Hypertext Transfer Protocol (HTTP)

is the communications protocol at the foundation of all communication of the World Wide Web.

synergy

is the cooperation between several businesses to produce a better product or service than would be possible if each business worked independently.

strategic-oriented evaluation

is the determination of whether the information system outputs enable management to make strategic decisions that will help develop and achieve the future mission and vision of the organization.

chief operations officer (COO)

is the director of operations responsible for the oversight of internal operations on a day-to-day basis and for monitoring production quotas. The ... ensures that the limited resources are used to provide the maximum value for stakeholders. This role communicates the organization's mission statement to employees.

Open System Interconnection (OSI)

is the foundation for data communication protocols. OSI consists of seven layers and is an international standard that governs or guides the development of data communication protocols. The seven OSI layers are: application, presentation, session, transport, network, data link, and physical.

Conceptual data model

is the highest level model, containing the least amount of detail within the data. It maps the scope of the enterprise data architecture model and help support system and documentation requirements. This model is typically used in developing master reference data, such as in an enterprise-wide database.

Conceptual data models

is the highest level model, containing the least amount of detail within the data. this model maps the scope of the enterprise data architecture model and help support system and documentation requirements. This model is typically used in developing master reference data, such as in an enterprise-wide database.

Liability

is the legal state of being responsible. An example would be the CEO and CFO who have certified the accuracy and validity of financial documentation and who would be legally penalized should errors be found.

Microprocessor

is the most advanced integrated circuit and holds millions of integrated circuits in a semiconductor chip. They are programmable devices that process instructions and incorporate the four functions of a computer central processing unit (CPU), which includes fetch, decode, execute and store.

Internet of Things (IoT)

is the network of products (or things) that can be connected, communicate with each other and with the environment, and transfer data over a network. Examples include a sensor in an automobile that alerts the driver when the air pressure is low or a washing machine that is WI-FI enabled.

ETL

is the process associated with data warehouse updates and backup.

Systems analysis

is the process of analyzing an organizational problem that can be solved with an information system.

data cleansing

is the process of correcting or removing duplicated, incomplete, improperly formatted, inaccurate, or duplicated data from a database.

Telecommunication

is the process of exchanging information between various entities over electrical, electromagnetic, or digital networks.

Data mining

is the process of identifying hidden patterns and relationships in large databases and applying rules to that data in order to predict future behavior.

Rationalization

is the process of minimizing or eliminating bottlenecks in processes and streamlining procedures.

Supply Chain

is the sequence of processes involved in getting raw materials for a product all the way to the production and distribution of a product into the hands of the customer.

Waterfall Model

is the traditional systems development method, so named because each stage must be completed before moving on to the next stage.

Computer aided software engineering (CASE)

is the use of computer methods to organize and manage software development in information systems.

Information Systems

is to get useful information to the right people within an organization to support decision making and operations. Effective information systems can help companies streamline business processes and planning, as well as help with data storage, data management and data security.

Quality of Service (QoS)

is used to measure performance for specific types of data communications and ensure that communications are effectively transmitted.

What is an advantage of a wireless LAN?

it allows visitors to access the internet

Why is WPA critical to wireless networks?

it is a tunneling encryption protocol that secures wireless data transmissions

What is considered to be low level security risk during system post implementation?

it is characterized by noticeable impact to the organization

How does a corporation benefit from a business intelligence program?

it provides automated data collection and reporting reducing labor cost

How does executive management use executive support systems (ESS)?

it provides high level information in KPI format for executive level monitoring and decision making.

What is the function of the data integration service in business intelligence?

it serves as the depository of all extracted data for the load function of the data warehouse

What is a good management technique for securing information?

keep passwords private, be alert to impersonators trying to get your information, and read privacy policies.

Understanding why the poverty line increased in the city of Tampa is an example of

knowledge

What is another term used to describe data mining?

knowledge discovery

Predictive analytics is predictive modeling that utilizes statistical and _____ learning techniques. Choices: machine computer software

machine (Page 64)

What is the main role of the chief security officer (CSO)?

maintaining corporate security, both physically and digitally

What are the responsibilities of a project manager?

make team assessments and evaluations, demonstrate leadership and have good communication skills, establish project milestone and deliverables

Define data integrity

making sure that all data values are correct, accurate, and consistent

Malware One high-profile example of a malware threat is SQL Injection, which uses vulnerabilities in the most popular type of database, SQL, to modify, delete, or steal information.

malicious software applications

What is malware?

malicious software applications, utilities, or merely code, which could be a virus, Trojan horse, worm, or spyware. Malware is spread through a variety of methods, either via direct download (intentional or not), as a part of another application or utility (e.g. Trojan horse), website visit (e.g. drive-by download), or merely by being connected to the Internet or affected network (e.g. worm).

chief financial officer (CFO)

manages the company's cash flow and evaluates and communicates financial risks. The ..... is the financial planner and is responsible for analyzing the company's financial strengths and weaknesses. This individual must be transparent and accountable, providing financial data and advice to stakeholders. The .... often works as a strategic partner with the CEO.

How are methods of data capture categorized?

manual or automated

There are multiple methods of data capture and they can be categorized as Hint, displayed below _____. import or export manual or automated digital or voice

manual or automated (Page 58)

Written communication can occur in the form of letters, electronic mail, memos, reports, and ______. presentations manuals aids

manuals (Page 60)

Most large corporations have several information systems to support their functional business areas. The system that processes raw metal into a car frame is______________.

manufacturing and production

Most large corporations have several information systems to support their functional business areas. The system that processes raw metal into car frame is...

manufacturing and production

Systems design models typically consist of diagrams, charts, and _____. Choices: input maps data

maps (Page 57)

physical data models

may exist within the logical data model, containing greater detail, such as database tables and key indexes.

Data dependency

means information stored in a database table determines other information stored in the same table.

Data Integrity

means that the data is accurate and consistent through its use and application time.

In systems modeling and design, the structured systems model is _________________

methodical and process oriented

Types of relationships in a relational database model

one-to-one, one-to-many

Freemium is not a new concept in doing business. What is true of freemium?

mobile phone apps and games, free product samples and trial versions offered to users, product quality and available features can be tightly controlled

What is the purpose of a network sniffer?

monitor network traffic

The internet has contributed to a complex network system. Businesses continue to grow and develop a need for more computer-enabled productivity which results in what?

more complexity due to the need for more systems and better improvements in their processing capabilities.

Wireless LAN networks are _____________

more scalable than wired networks.

Input devices

mouse, keyboard, touchscreens, voice recognition, microphones, scanner, etc.

computer systems analyst

must combine business knowledge with technical expertise. The primary responsibility of a systems analyst is to analyze a user's needs and determine the most efficient and effective solution.

What does network strategies involve?

network based thinking, pooling resources, and expanding contracts to be more successful and competitive

the IoT (internet of things) is a growing topic in business and a hot IT career field. What best describes IoT?

network of physical devices exchanging data in real-time with embedded chips to communicate performance over the internet.

Porter's 5 competitive forces include

new market entrants, substitute products, customers, suppliers, and competitive rivalry

Porters 5 competitive forces include

new market entrants, substitute products, customers, suppliers, and competitive rivalry

What are examples of competitive forces?

new market entrants, substitute products, customers, suppliers, competitive rivalry

What involves correctly defining keys, tables, columns, and relationships?

normalization

What takes place during the database design process to eliminate data redundancy?

normalization

Social Engineering

normally low tech attacks used to trick individuals into disclosing information, providing access, or changing their patterns. Examples include phishing, spear-phishing (i.e. targeted phishing), dumpster diving, baiting, tailgating, and quid pro quo.

What is social engineering?

normally low tech attacks used to trick individuals into disclosing information, providing access, or changing their patterns. Examples include phishing, spear-phishing (i.e. targeted phishing), dumpster diving, baiting, tailgating, and quid pro quo.

What is the difference between and object-oriented database model and a relational model?

object-oriented are designed to store audio or mixed media, while relational links tables of records

Spoofing

occurs when network access is obtained without authorization, and can occur on both wired and wireless networks. This type of hack can occur because protocols in some wireless communication networks do not provide authentication mechanisms.

behavioral model

of management recognizes that actual management behavior is less systematic or predictable than classical management theory would suggest.

What are tuples and how are they used in databases?

one record or data set in a row. A record in a row or table

asynchronous

one way communication, such as email and global overnight mail

Information technology is used everywhere: where you work, where you live, and where you play. Keeping track of financial information and making transfers at anytime, from home, without waiting in line is an example of what?

online banking

Information technology is used everywhere; where you work, where you live, and where you play. Keeping track of financial information and making transfers at anytime, from home, without waiting in line is an example of what?

online banking

Learning and research with a computer and the internet from anywhere, anytime is an example of what?

online learning

IT managers, project managers, and architects

organize, direct, coordinate, and plan IT-related activities, people, and projects within an organization.

Primary Storage

otherwise known as CPU cache and random access memory (RAM), are typically referred to as volatile flash memory, meaning that information storage is temporary and can only be stored until power is removed.

entity relationship diagram (ERD)

outlines the business processes and subsequent relationships and possible data requirements.

What does PSDN stand for?

packet switched data networks

What are 2 fundamental protocols that can describe modern telecom networks?

packet transmission and TCP/IP protocol

Two fundamental elements are used in modern networking infrastructure:

packet transmission and the TCP/IP protocol.

There are three popular methods of system implementation: direct, prototyping, and ______. Choices: waterfall parallel PERT

parallel (Page 58)

What are discussion actions that social media users can perform while immersed in an activity or current event?

participate, share, shape, and influence discussions

Why is partitioning done when administering relational database systems?

partitioning is done to improve performance

What information can be gained by sniffing a wireless network?

passwords and Login ID's

How do social media platforms play an increasing role in shaping events?

people can use this medium to influence reserved bystanders

When determining business benefits from implementing a strategic information system, several factors need to be considered. Businesses need to consider their business objectives, look at who their customers are, create justification for the project and then seek support. What would be the first step in determining benefits?

perform a strategic analysis

What is the typical data size of big data?

petabytes

Utility Software

programs perform periodic system maintenance activities, such as virus detection, storage space consolidation, backup and recovery, intrusion detection, and access authentication monitoring.

What are 3 levels of risks associated with system design and implementation?

project structure, size, and team technical background

Businesses, news networks, government agencies,and nonprofit organizations are all actively using social media to primarily do what?

promote and market their organizations

A ________ is a set of rules applied to data switched networks to ensure quality and accuracy of signal transmission and reception.

protocol

Manual keying is the simplest, but most _____ data capture method. scanned protracted accurate

protracted (Page 58)

What are e-Tailers?

provide a venue for the sale of physical goods, can be traditional brick-and-mortar retailers

Group decision support systems (GDSS)

provide interactive collaboration support for multiple decision makers at multiple geographic locations through digital communication and the use of numerous resources and tools.

What is the key role of the CIO

provide vision and leadership for IT initiatives

What is a characteristic of a Net marketplace?

provides more focus on individual transactions versus lasting relationships

computer support specialist

provides technical support to customers and employees through direct interaction or telecommunications.

What is the variable in project management that must be monitored when managing information technology to ensure it is completed on time, within budget, according to specs, and with high quality and low risk?

quality

Social media has enhanced customer relationship management by enabling companies to best educate customers about new and existing products and services in ____________________.

real time

Spiral Model

recognizes the need to review or repeat earlier stages as the project progresses.

Business process

redesign involves the analysis, simplification, and redesign of organizational processes.

What can a GIS (Geographic Information System) be used for?

redirect/redistribute funds, build schools, approve commercial sites, demographic analysis to predict sales

It is a good practice to _________________ data that is backed up on a regular basis.

reduce

Software

refers to pre-packaged sets of coded instructions that end-users directly interact with, in order to indirectly communicate with the other major components of the information system to get tasks done.

Business intelligence (BI)

refers to the infrastructure used for warehousing, integrating, reporting, and analyzing business environment data. BI consists of databases, data warehouses, and analytical platforms.

Many risks to business operations exist, including the major categories of natural and man-made sources, and intentional and unintentional risks. Examples include

risks from flooding, lightning, power outages, and natural disasters, as well as theft, intrusion, sabotage, and accidental damage or destruction.

Referential Integrity

rules that ensure that the relationships of data between tables is consistent. rules prevent a user from adding a record to a table containing a foreign key unless there is a similar record in the linked table.

Moores Law

says that computing power and storage capacity will continue to increase or double approximately every two years.

What is the ability of a network to grow user and services without forklift upgrades?

scalability

Optical character recognition (OCR) is a semi-automated system that uses a _____ to read characters. touch screen scanner stylus

scanner (Page 58)

A _____________ is a planned design structure database

schema

What is included or defined in a project, including goals, deliverables, costs, and deadlines?

scope

What method can address unexpected changes or challenges that cannot be addressed effectively with SDLC?

scrum

May businesses require their employees use VPN to gain remote access to the corporate network. What is an advantage of VPN?

secured access

To be a strategic information system, an information system must ______________________ .

serve organizational goals

Domain Name Service (DNS)

server-based service that translates human language Web address or URL into an IP address, which is used.

Online community manager

serves as the liaison between the organization and the online community through message boards, social media, and email distribution groups, maximizing brand loyalty and website traffic. ---------- typically have a bachelor's degree and experience with video editing, Adobe tools (such as Photoshop), and website development.

The characteristics of a GDSS include ease of use, flexibility to incorporate different perspectives and decision-making styles, automated record keeping for future analysis, and _____ participant communication. Choices: simultaneous linear progressive

simultaneous (Page 65)

What is the description of a flat file database?

single table database

What is a flat file database?

single table with no structured relationships

What are characteristics of a net marketplace

small in comparison to private industrial networks, online platform host where transactions may take place between a seller and a buyer, provide more of a focus on individual transactions versus lasting relationships

What will soon surpass desktop computers accessing the internet?

smart phones

What portable device combines the functionality of the phone technology with the computing of a desktop or laptop?

smartphone

The output from area is used to create input for another, thereby lowering costs and generating more profit is what?

synergy

Social e-commerce has become an important internet tool for businesses to connect with their customers. Which of the following is not a benefit for companies to use social e-commerce as a business tool?

social e-commerce allows customers to shop and buy products online.

What is the method used by hackers to develop a relationship with users in order to extract information?

social engineering

What do you call the web-based applications that allow user content to be created and shared over the internet?

social media

Allowing people to connect and express themselves, from the comfort of their computers, when otherwise they may have been too shy or introverted to do so, is an example of what?

social networking

Various types of _____________________ enable companies to utilize their information systems hardware and networks more effectively.

software

Metrics and measurement tools are used to analyze _______. performance software codes complexity

software codes (Page 61)

What does the programming stage in the waterfall method of software development focus on?

software development, proving, and integration

chief security officer (CSO)

sometimes also called the chief information security officer (CISO), is the highest level executive concerned with the overall security functions and policies of a business. (Note that larger organizations may also have a CISO reporting to a ....). The .... identifies business protection goals, works with the other executives to identify and analyze risks, and prioritizes security needs. The .... works with vendors and consultants to ensure both physical and data security. The .... must have up-to-date knowledge and experience in information security because it is a rapidly changing field. Important traits for this position include good judgment and excellent planning ability. Depending on the organization, the .... may report directly to the CEO, the COO, the CIO, or some other C-level executive such as the chief risk officer (CRO).

information policy

specifies the rules for acquiring, distributing, standardizing, regulating, and organizing information.

What is meant by speed and amplification in social media?

speed is the ability to share information in seconds, and amplification is the re-posting news in a community.

According to the Henry Mintzberg model, a manager in an informational role acts as which of the following? Choices: spokesperson mediator leader

spokesperson (Page 63)

ERP (enterprise resource planning)

standardized business procedures that allow for more consistency within the business and remove redundancy. Typically uses one database to store all information needed by various business units and increases operational efficiency. Implementing this system and automate tasks so employees could do their jobs more efficiently.

Global business challenges are typically no worse than domestic business challenges except for the distance. What problem can be alleviated by knowing the challenges up front?

standards

Referential integrity

stops database inconsistency by creating relationships between tables using primary and foreign keys.

Risk management _____ include promoting a project management culture within an organization. methods strategies processes

strategies (Page 59)

Knowledge management systems (KMS)

strive to reach organizational goals by making the best use of corporate knowledge.

What kind of decisions involve an established procedure, are repetitive and routine, and can be handled in the same manner each time?

structured

What computer language is used with relational database applications?

structured query language

Iterative development models

such as Agile, develop system requirements and solutions through collaborative, self-organized, cross-functional teams. The agile model encourages adaptive planning and development, fast delivery, continuous improvement, and flexibility in response to change1.

System Software

such as an operating system, direct and control the hardware components of the IS.

leveraging existing resources

such as instruction manuals, white papers, and Internet forums, additional documentation and training can be developed with limited time and expense.

KM (knowledge management)

supportive, collaborative, culture that includes corporate learning to foster corporate efficiency and gain value from intellectual assets. Employees sharing of their expertise and best practices across business units.

Penny Dollar and Nickel Dollar stores decide to pool their markets to lower costs and hopefully generate more profits. This is referred to as __________________________.

synergy (cooperation of two or more companies, many times gained through the process of a merger to gain efficiency and growth)

What are the stages in the waterfall model?

system design, programming, testing, conversion, and production and maintenance

The six formal steps that need to be followed to develop an information system is known as what?

system development life cycle

A ______ uses analysis and design techniques to solve business problems, then develops and implements the systems using information technology. systems analyst programmer database administrator

systems analyst (Page 60)

What does Microsoft Visio enable?

systems analysts to create professional diagrams that simplify complex information through collaboration tools and data-linked diagrams

The _____ stage in the waterfall methodology focuses on defining the software architecture for the system. Choices: systems analysis systems design testing

systems design (Page 56)

Customer relationship management (CRM)

systems use technology to merge marketing with business processes to strengthen customer relationships and organize customer information.

Social media benefits to businesses are made possible because social media offers both location specific and time time specific ____________________ .

targeting

What is a component of a feasibility study?

technical and economic

Businesses face difficult decisions regarding their hardware needs. Constant changes in __________________ can lead to obsolescence.

technology

Businesses face difficult decisions regarding their hardware needs. Constant changes in ___________________________ can lead to obsolescence.

technology

What best describes what is included in a company's business intelligence infrastructure? Choices: the infrastructure required to access information for reporting the infrastructure required to warehouse, integrate, analyze, and report business data the infrastructure required to store, communicate, and share information

the infrastructure required to warehouse, integrate, analyze, and report business data (Page 64)

What is the most common SDLC analysis?

the integrated environments type of CASE tools

What is the biggest impact to global business?

the internet

Describe referential integrity

the process of building relationships between tables based on keys.

When communicating, what is important for IT professionals to understand during the system development process?

the user knowledge and background of target audience

Why did relational database models replace hierarchical database models in business applications?

they are simpler table relationships than hierarchical databases

What is a disadvantage for purchasing digital goods?

they are very difficult to return

Why are data warehouses beneficial to business managers?

they can be mined or analyzed for trends or patterns

Digital goods provide several benefits for e-commerce. What is a benefit achieved from digital goods?

they can be purchased and downloaded instantly, they do not have a physical presence to acquire

What is a characteristic of a legacy or old analog network?

they carried continuous electronic waveforms

Why must a systems analyst be a good communicator?

they must be able to communicate system capacities and benefits.

dynamically optimized pricing

this tactic is used to set prices according to market pressures, including locality, demand level, competitors pricing, the time of the day, week, or year, and a customer's willingness to pay.

Five competitive forces

threat of new entrants, threat of substitute products or services, bargaining power of customers (buyers), bargaining power of suppliers, and intensity of competitive rivalry.

Enterprise resource planning systems (ERP)

tightly integrate functional areas such as accounting, finance, project management, inventory control, purchasing, human resources, customer retention, sales, and marketing into one single, comprehensive system.

SEO specialists

to boost website rankings through analysis, testing marketing techniques, and creating new social media and web content. ------------ typically hold bachelor's degrees and are experienced in HTML and CSS.

What is the primary purpose for publishing company information on the internet?

to educate stakeholders on the company's mission and vision, production information, and community efforts

What are reasons for providing company information on the internet?

to entice potential customers to shop, to educate stakeholders on product status, specifications, features and capabilities, and to inform customers of upcoming sales and events

What is the focus of a functional evaluation of a management information system?

to evaluate the quality and functionality of information and output

How does FedEx use big data?

to find flaws, fix processes, and boost efficiency of its production

Transaction processing systems (TPS)

to obtain routine production and exception reports in order to make structured decisions. Middle managers and business analysts require more sophisticated analytical tools and custom reports in order to make semi-structured decisions.

A decision support system (DSS) consists of four components, including data management, model management, knowledge management, and ______. Choices: network management user interface management process management

user interface management (Page 65)

Prescriptive analytics

uses optimization and simulation to recommend solutions and decisions to management.

Object oriented systems development

uses the object as the unit of design, and is based on the concepts of class and inheritance. Objects that belong to a class will all have similar features, and objects may inherit properties or conditions from other classes. For example, numerous automobiles belong to the class of automobiles, and numerous trucks belong to the class of trucks, but both inherit the property of vehicle from the vehicle class.

Data Retrieval

using queries, data is retrieved and combined.

Traits of a social media marketing manager

usually hold a bachelor's degree, have digital marketing experience, and excellent communication skills

How does social media enable distribution of information?

viral

Malware

virus infection

Utility software

virus software (Norton, anti virus)

Business intelligence reporting tools help to Hint, displayed below _____ data in many different ways and play an important role in decision making. Choices: extract visualize import

visualize (Page 64)

What are the 3 V's used to describe big data?

volume, velocity, variety

E-Commerce

was born out of the connection and facilitation of the trade of goods and services between buyers and sellers via computer networks, or the Internet.

Common Business Oriented Language (COBOL)

was the first computer software language for business applications

What application provided by the internet allows an online retailer to conduct business?

web enabled storefront

What is a rich site summary (RSS)?

webbed formats used by publishers

worm

website visit (e.g. drive-by download), or merely by being connected to the Internet or affected network

What is data inconsistency

what happens when the same attribute has different values because the data is stored in more than one location

Extranet

which allows an organization to communicate directly or provide specific resources to suppliers, customers, regulatory entities, and other external users.

Data Dictionary

which defines and manages the data types and structures that dictate how the database is organized.

Digital Dashboard

which displays charts and graphs showing up-to-the-moment performance indicators on sales, profit, expenses, and inventory on an executive's computer.

Web enabled storefront

which enables the facilitation of ecommerce, yet another channel for a business to conduct business through.

Program/Charter level policy

(aka strategic level) frameworks are documents that establish the security program, define specific or general risks that it will be responsible for handling, and specify its purpose, extent, objectives, responsibilities (including the command structure within the security department), and enforcement.

Pharming

A high-tech attack that is an act of using malicious code to redirect users to a website that mimics the appearance of an official page, but that merely collects sensitive information such as names, addresses, phone numbers, usernames and passwords, and security questions and answers. One particularly insidious example of pharming is DNS poisoning, which changes the DNS record for a specific site to redirect all requests and web access to another specific site, even without providing the user with a fraudulent phishing message.

Baiting

A low tech attack where an attacker depends on the victim's greed or curiosity to provide sensitive information. An example might be an intentionally dropped USB drive left openly in a busy parking lot. A victim, through greed or curiosity might take such a device and plug it into a corporate computer, perhaps attempting to identify or return it to its owner or merely to obtain the value of the materials contained, but receive malicious code.

Tailgating

A low-tech attack that allows unauthorized personnel access to sensitive or restricted areas merely by overtly or covertly following an authorized employee through a controlled access entry point. Organization entry points are often protected by electronic badge access, which may be circumvented by not allowing a door to close properly, or authorized personnel who are not observant, are ignorant of or not properly trained in information security, intentionally or unintentionally allowing an unauthorized person to enter an otherwise locked door.

Record

A set of related fields, also called a tuple, that describe one occurrence of an entity, such as a customer.

Vulnerabilities

A weakness in the technology, process and procedure, or people involved with any given information asset. Such ,,,,,,,,,,,,,,, may include weaknesses in the technologies used, including their configurations, and the security policies that are enforced or not within an organization.

Field

An attribute of an entity, such as name, address, or student ID.

Risks

The potential for loss, commonly associated with the monetary and non-monetary impact to such a ,,,,,,,,,,, as well as the probability of occurrence.

Utilitarian approach

This approach assesses the consequences and/or outcomes of an action to determine the greatest good or least harm for the greatest number, regardless of the justice or fairness of or to the individual.

Virtue approach

This approach values human behaviors that allow us to act in aspirational ways, including compassion, trustworthiness, honesty, generosity, kindness, autonomy, courage, obedience, and many more.

Fairness approach

This approach values individual moral rationality, otherwise referred to as the Golden Rule, or "do unto others as you would have them do unto you," asks society to reflect on the consistent treatment of others based on the desires of how an individual expects to be treated.

Rights approach

This approach values rights specified by society, which may be largely based on the analysis of other ethical approaches, and allows individuals to weigh decision choices based on legal or legislative precedent.

Zero Day Attack

a threat or attack that exploits known or unknown vulnerabilities in software. Software developers quickly patch vulnerabilities once known, though identifying these vulnerabilities takes time. Once found and fixed, developers must send patches to all affected or potentially affected users, which, unfortunately, does not occur consistently. In other cases, the public release of patches is used as a tool for malware authors to reverse engineer and easily attack those who have not updated their systems in time.

Issue specific policies

address specific issues or concerns that a security policy is needed, or even controversial areas where the company takes a given position on an issue. Examples include policies for:

Cyber Criminal

an individual or organization interested in exploiting computers and networks for the purpose of generating revenue. Note that organized crime has a very active presence in cybercrime.

Hacktivist

an individual or organization interested in vandalism, cyber-terrorism, or hacking for a stated cause or purpose.

Behavioral actions

are actions by which individuals may help to avoid data theft, but that may have little to do with the computer-based actions mentioned below.

Online Analytical Processing (OLAP)

are analytical, fixed databases containing data that are used for making decisions. Enables business to create new records, update records, and delete records providing real time information for decision making.

Ethics

are moral principles and concepts, rules of behavior, and often the underpinning of codes of conduct based on accepted standards of right and wrong.

Relational Database

are one of the most common database models in use today and are based upon the relational model of data, which is a method of structuring data using relationships, in rows and columns. It is a type of database that connects tables of records together with complex relationships.

Cookies

are small text files that are placed on a computer when a user visits a website, enabling the website to identify that user on future visits.

Multidimensional databases

are typically relational databases that store data in a cube and allow businesses to visualize data assets in multidimensions to see what is happening in real time.

Object Databases

are used when media or other types of files are required because multimedia files and diagrams or blueprints such as those generated by computer aided design (CAD)1 are more complex and not easily sorted by columns and rows. they are not hierarchical models.


Ensembles d'études connexes

Geometry - (Points, Lines, Planes, Rays, Segments)

View Set

HTML5 forms, usability, and accessibility

View Set

Chapter 5 GDP (Gross Domestic Production) Quiz

View Set

Final Exam Part 2 (Chapters 8 - 14)

View Set

Advanced Health Assessment Test 1

View Set

Week 5 Sherpath: Natural Events, Disasters, and Mass Casualties

View Set

Biology exam 2 Module HW/ Pre-assessment

View Set