IS 130 Final Exam

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

LTE is ________ cellular technology.

4G

_________ is a communications control.

A Firewall

_________ controls restrict unauthorized individuals from using information resources.

Access

The top technology job is _________.

CIO

_________ is a legal form of cybersquatting.

Domain Tasting

Which of the following reduces buyer power?

Loyalty Programs

You get a new smartphone and throw your old one away without erasing all your data. This is _________ and is an _________ mistake.

a human error; unintentional

BI systems provide computer-based primarily support _________.

middle managers

A device can be wireless but not mobile.

true

_________ is an incremental approach that focuses on reducing variation in the process outputs by searching for the root causes of the variation in the process itself or among process inputs.

BPI

A ________ is a group of eight _______

Byte, bits

________ refers to the maximum number of times an instance of one entity can be associated with an instance in the related entity.

Cardinality

Considering the following tables, ________ is a foreign key.

Class Table: PID

_________ are the main threat to privacy on the internet.

Cookies

Which of the following has the strategy "I can sell at a lower price than you can"?

Cost leader

Which of the following is NOT an organizational response to business pressures?

Creating a digital divide

________ support all managers of the organization by providing rapid access to timely information and direct access to structured information in the form of reports.

Dashboards

The ________ provide(s) information on each attribute and why the attribute is needed in the database, who uses it, and how it should be updated.

Data Dictionary

Suppose that you believe that killing someone is wrong even if it is self-defense. This is an example of the _________ approach.

Deontology

________ attempt to duplicate work of human experts by applying reasoning capabilities, knowledge, and expertise within a specific domain.

ES (Expert Systems)

_________ is an access control.

Encryption

________ deals with more objective, rational, and technical knowledge.

Explicit knowledge

Anybody can get on the Dark Web pretty easily.

False

BPI delivers the same huge performance gains promised by BPR.

False

Effectiveness focuses on progressing from one activity to another without delay or without wasting money or resources.

False

Organizations can adopt BPM to sustain BPR efforts over time

False

Primary activities do not add value directly to the firm's products or services.

False

Support activities create value for which customers are willing to pay.

False

There is nothing we can do to prevent ransomware; we just have to pay the fee if it hits us.

False

The ________ manages all systems throughout the organization and the day-to-day operations of the entire IS organization.

IS Director

________ is organized so that it has meaning and value to the recipient.

Information

________ refer to an elementary description of things, events, activities, and transactions that are recorded, classified, and stored but are not organized to convey any specific meaning.

Information

Satellite telephone services are provided through ________ satellites.

LEO

________ satellites have the shortest orbital life.

LEO

_________ is the current strategy for many manufacturers where a company produces a large quantity of items but customizes them to match the needs and preferences of individual customers.

Mass customization

________ are a set of core data that span the enterprise information systems.

Master data

_______make tactical decisions, which deal with activities such as short-term planning, organizing, and control.

Middle Managers

Suppose your university automatically logs you off of a university computer after 15 minutes of disuse. This is an example of a(n) _________ control.

Physical

The best-known framework for analyzing competitiveness is ________'s competitive forces model.

Porters

The ________ key is an identifier field that uniquely identifies a record.

Primary

_________ is an example of a support activity for most firms.

Product and technology advancement

________ is a traditional function of the MIS department.

Providing technical services

Which of the following is FALSE of QR codes?

QR codes are larger than bar codes because they store information both horizontally and vertically.

________ is the most popular query language used for interacting with a database.

SQL

_________ is a deliberate act that involves defacing an organization's website, potentially damaging the organization's image and causing its customers to lose faith.

Sabotage

In the ________, organizations sell their products or services to other organizations electronically from their own private e-marketplace website or from a third-party website.

Sell-side Marketplace

________ is a wireless network proposal that creates long-distance wireless internet connections; it uses the lower-frequency "white spaces" between broadcast TV channels.

Super Wi-Fi

A(n) ________ creates the computer code for developing new systems software or maintaining existing systems software.

Systems Programmer

_______ is the cumulative store of subjective or experiential learning

Tacit knowledge

Cable and DSL modems offer broadband access.

True

Consumers typically respond negatively to dynamic pricing.

True

Dynamic pricing is personalized pricing.

True

Organizations can use Big Data to microsegment customers.

True

The overall impact of the web is to increase competition which generally diminishes a firm's profitability

True

________ allows you to read a voice mail message in your e-mail inbox.

UC

With VoIP, your digital voice signals are converted to analog, sectioned into packets, and then sent over the Internet.

WWW; client/server

If someone simulates a valid wireless access point to get people to provide usernames, passwords, and account numbers without that person's knowledge, this is ________.

an evil twin attack

A(n) _________ is a software package that attempts to identify and eliminate viruses and worms.

anti-malware system

Sell-side marketplaces are similar to the _________ model; _________ auctions are the key mechanism.

b2b forward

A(n) ________ focuses on designing solutions for business problems and interfaces closely with users to demonstrate how IT can be used innovatively.

business analyst

Group purchasing is a common technique in a ________.

buy-side marketplace

A(n) ________ forecasts technology trends and evaluates and experiments with new technologies.

emerging technologies manager

The debate over CEO salaries being so much higher than other employees is an issue addressed by the _________ approach.

fairness

GEO satellites run the GPS system.

false

Smartphones are sensors that can be used for electronic surveillance.

false

Super Wi-Fi is super-fast Wi-Fi technology.

false

Tracking cell phones is illegal.

false

With VoIP, your digital voice signals are converted to analog, sectioned into packets, and then sent over the Internet.

false

The Internet backbone is a ________ network.

fiber optic

The Sarbanes-Oxley Act requires publicly held companies to implement _________ controls; it was passed to address the _________ crisis.

financial; Enron

Organization's use Porter's competitive forces model to design _________ strategies; they use the value chain model to identify _________ activities to make the greatest impact.

general; specific

The IS function has become ________ strategic within organizations, so a growing number of CIOs are coming from _________.

increasingly; other business units

________ consists of 32 bits.

ipv4

Typing in your password to access a system is an example of something the user _________.

knows

Databases ________ redundancy; this means ________.

minimize; the same data are stored in multiple locations

Normalization is a method for analyzing and reducing a relational database to its most streamlined form to ensure ________ redundancy, ________ data integrity, and optimal processing performance.

minimum; maximum

IT makes managers ________ productive and ________ the number of employees who can report to a single manager.

more; increases

_____ is an operating model under which ISPs must allow customers equal access to content and applications, regardless of the source or nature of the content.

network nuetrality

You decide to integrate your supply chain to cut down production time. This is an example of a(n) _________ strategy.

operational effectiveness

Online advertisers have traditionally favored _________ to increase the number of people who look at an ad.

placing more ads on each web page

As the principal of a local high school, you want to install a wireless WAN to give students better, more secure access to the Internet. You request bids from a few local service providers to get the best price. This is an example of a _________ auction.

reverse

Data ________ refers primarily to problems with the media on which the data are stored.

rot

You recently inherited an Alvin and The Chipmunks "A Chipmunk Christmas" record. Since you don't have a record player, you need to find a way to convert the record into a CD. This is an example of data ________.

rot

Big Data facilitates dynamic pricing.

true

Content that is illegal in one country can still be legal in other countries.

true

Data aggregators can collect public and non-public information to create digital dossiers.

true

Download speed is much faster than upload speed when defining the term broadband.

true

If a hacker enters a building with an official-looking ID badge. This is considered social engineering.

true

In peer-to-peer processing, every computer is a server.

true

Modern smartphones exhibit a process called dematerialization.

true

Privacy rights apply to individuals, groups, and institutions.

true

Satellite TV runs using GEO satellites.

true

The public's right to know supersedes the individual's right of privacy.

true

The web makes disintermediation easier, particularly for online services.

true

Viral marketing refers to online, word-of-mouth marketing and is closely related to using social media for marketing purposes.

true

You buy the right to use software, not distribute it.

true

A ________ relationship exists when an association is maintained within a single entity.

unary

Knowledge management is a process that helps organizations manipulate important knowledge that comprises part of the organization's memory, usually in a(n) ________ format.

unstructured

_________ exchanges connect buyers and sellers in a given industry.

verticle

In ________, recipients of your marketing notices send information about your product to their friends.

viral marketing


Ensembles d'études connexes

State and Local Government CO1 Multiple Choice

View Set

Marketing 300 Chapter Review 6-9 exam II

View Set

Chapter 13 - Managing Diversity and Inclusion

View Set