IS 130 Final Exam
LTE is ________ cellular technology.
4G
_________ is a communications control.
A Firewall
_________ controls restrict unauthorized individuals from using information resources.
Access
The top technology job is _________.
CIO
_________ is a legal form of cybersquatting.
Domain Tasting
Which of the following reduces buyer power?
Loyalty Programs
You get a new smartphone and throw your old one away without erasing all your data. This is _________ and is an _________ mistake.
a human error; unintentional
BI systems provide computer-based primarily support _________.
middle managers
A device can be wireless but not mobile.
true
_________ is an incremental approach that focuses on reducing variation in the process outputs by searching for the root causes of the variation in the process itself or among process inputs.
BPI
A ________ is a group of eight _______
Byte, bits
________ refers to the maximum number of times an instance of one entity can be associated with an instance in the related entity.
Cardinality
Considering the following tables, ________ is a foreign key.
Class Table: PID
_________ are the main threat to privacy on the internet.
Cookies
Which of the following has the strategy "I can sell at a lower price than you can"?
Cost leader
Which of the following is NOT an organizational response to business pressures?
Creating a digital divide
________ support all managers of the organization by providing rapid access to timely information and direct access to structured information in the form of reports.
Dashboards
The ________ provide(s) information on each attribute and why the attribute is needed in the database, who uses it, and how it should be updated.
Data Dictionary
Suppose that you believe that killing someone is wrong even if it is self-defense. This is an example of the _________ approach.
Deontology
________ attempt to duplicate work of human experts by applying reasoning capabilities, knowledge, and expertise within a specific domain.
ES (Expert Systems)
_________ is an access control.
Encryption
________ deals with more objective, rational, and technical knowledge.
Explicit knowledge
Anybody can get on the Dark Web pretty easily.
False
BPI delivers the same huge performance gains promised by BPR.
False
Effectiveness focuses on progressing from one activity to another without delay or without wasting money or resources.
False
Organizations can adopt BPM to sustain BPR efforts over time
False
Primary activities do not add value directly to the firm's products or services.
False
Support activities create value for which customers are willing to pay.
False
There is nothing we can do to prevent ransomware; we just have to pay the fee if it hits us.
False
The ________ manages all systems throughout the organization and the day-to-day operations of the entire IS organization.
IS Director
________ is organized so that it has meaning and value to the recipient.
Information
________ refer to an elementary description of things, events, activities, and transactions that are recorded, classified, and stored but are not organized to convey any specific meaning.
Information
Satellite telephone services are provided through ________ satellites.
LEO
________ satellites have the shortest orbital life.
LEO
_________ is the current strategy for many manufacturers where a company produces a large quantity of items but customizes them to match the needs and preferences of individual customers.
Mass customization
________ are a set of core data that span the enterprise information systems.
Master data
_______make tactical decisions, which deal with activities such as short-term planning, organizing, and control.
Middle Managers
Suppose your university automatically logs you off of a university computer after 15 minutes of disuse. This is an example of a(n) _________ control.
Physical
The best-known framework for analyzing competitiveness is ________'s competitive forces model.
Porters
The ________ key is an identifier field that uniquely identifies a record.
Primary
_________ is an example of a support activity for most firms.
Product and technology advancement
________ is a traditional function of the MIS department.
Providing technical services
Which of the following is FALSE of QR codes?
QR codes are larger than bar codes because they store information both horizontally and vertically.
________ is the most popular query language used for interacting with a database.
SQL
_________ is a deliberate act that involves defacing an organization's website, potentially damaging the organization's image and causing its customers to lose faith.
Sabotage
In the ________, organizations sell their products or services to other organizations electronically from their own private e-marketplace website or from a third-party website.
Sell-side Marketplace
________ is a wireless network proposal that creates long-distance wireless internet connections; it uses the lower-frequency "white spaces" between broadcast TV channels.
Super Wi-Fi
A(n) ________ creates the computer code for developing new systems software or maintaining existing systems software.
Systems Programmer
_______ is the cumulative store of subjective or experiential learning
Tacit knowledge
Cable and DSL modems offer broadband access.
True
Consumers typically respond negatively to dynamic pricing.
True
Dynamic pricing is personalized pricing.
True
Organizations can use Big Data to microsegment customers.
True
The overall impact of the web is to increase competition which generally diminishes a firm's profitability
True
________ allows you to read a voice mail message in your e-mail inbox.
UC
With VoIP, your digital voice signals are converted to analog, sectioned into packets, and then sent over the Internet.
WWW; client/server
If someone simulates a valid wireless access point to get people to provide usernames, passwords, and account numbers without that person's knowledge, this is ________.
an evil twin attack
A(n) _________ is a software package that attempts to identify and eliminate viruses and worms.
anti-malware system
Sell-side marketplaces are similar to the _________ model; _________ auctions are the key mechanism.
b2b forward
A(n) ________ focuses on designing solutions for business problems and interfaces closely with users to demonstrate how IT can be used innovatively.
business analyst
Group purchasing is a common technique in a ________.
buy-side marketplace
A(n) ________ forecasts technology trends and evaluates and experiments with new technologies.
emerging technologies manager
The debate over CEO salaries being so much higher than other employees is an issue addressed by the _________ approach.
fairness
GEO satellites run the GPS system.
false
Smartphones are sensors that can be used for electronic surveillance.
false
Super Wi-Fi is super-fast Wi-Fi technology.
false
Tracking cell phones is illegal.
false
With VoIP, your digital voice signals are converted to analog, sectioned into packets, and then sent over the Internet.
false
The Internet backbone is a ________ network.
fiber optic
The Sarbanes-Oxley Act requires publicly held companies to implement _________ controls; it was passed to address the _________ crisis.
financial; Enron
Organization's use Porter's competitive forces model to design _________ strategies; they use the value chain model to identify _________ activities to make the greatest impact.
general; specific
The IS function has become ________ strategic within organizations, so a growing number of CIOs are coming from _________.
increasingly; other business units
________ consists of 32 bits.
ipv4
Typing in your password to access a system is an example of something the user _________.
knows
Databases ________ redundancy; this means ________.
minimize; the same data are stored in multiple locations
Normalization is a method for analyzing and reducing a relational database to its most streamlined form to ensure ________ redundancy, ________ data integrity, and optimal processing performance.
minimum; maximum
IT makes managers ________ productive and ________ the number of employees who can report to a single manager.
more; increases
_____ is an operating model under which ISPs must allow customers equal access to content and applications, regardless of the source or nature of the content.
network nuetrality
You decide to integrate your supply chain to cut down production time. This is an example of a(n) _________ strategy.
operational effectiveness
Online advertisers have traditionally favored _________ to increase the number of people who look at an ad.
placing more ads on each web page
As the principal of a local high school, you want to install a wireless WAN to give students better, more secure access to the Internet. You request bids from a few local service providers to get the best price. This is an example of a _________ auction.
reverse
Data ________ refers primarily to problems with the media on which the data are stored.
rot
You recently inherited an Alvin and The Chipmunks "A Chipmunk Christmas" record. Since you don't have a record player, you need to find a way to convert the record into a CD. This is an example of data ________.
rot
Big Data facilitates dynamic pricing.
true
Content that is illegal in one country can still be legal in other countries.
true
Data aggregators can collect public and non-public information to create digital dossiers.
true
Download speed is much faster than upload speed when defining the term broadband.
true
If a hacker enters a building with an official-looking ID badge. This is considered social engineering.
true
In peer-to-peer processing, every computer is a server.
true
Modern smartphones exhibit a process called dematerialization.
true
Privacy rights apply to individuals, groups, and institutions.
true
Satellite TV runs using GEO satellites.
true
The public's right to know supersedes the individual's right of privacy.
true
The web makes disintermediation easier, particularly for online services.
true
Viral marketing refers to online, word-of-mouth marketing and is closely related to using social media for marketing purposes.
true
You buy the right to use software, not distribute it.
true
A ________ relationship exists when an association is maintained within a single entity.
unary
Knowledge management is a process that helps organizations manipulate important knowledge that comprises part of the organization's memory, usually in a(n) ________ format.
unstructured
_________ exchanges connect buyers and sellers in a given industry.
verticle
In ________, recipients of your marketing notices send information about your product to their friends.
viral marketing