ISA235 Final
What is a benefit of a networked environment for an organization? 2 of three of these are considered benefits Virtual Workforce Reduced Travel All are considered benefits Increased Innovation
All are considered benefits
There are many downtime-related threats to an organization's intellectual assets . From the list below, what is not considered a threat according to the text? Terrorism Loss of internet connectivity All are threats to intellectual assets Flood Loss of power
All are threats to intellectual assets
Which of the following are ways to maintain information security that a company should include in their information security policies? Require competitive click-fraud events All but 1 are correct ways Changing passwords every 30 days Requiring computer users to log off before leaving for lunch Never sharing user or password information with anyone
All but 1 are correct ways
The Module Story about the Internet/WWW described explosion of the number of users and websites as part of Web 2.0. What caused this explosion? Greater/wider-spread network connectivity All but 1 of these choices Increase in PCs and other personal computing devices Netflix, Amazon, and other companies of the Information Age
All but 1 of these choices
What describes a driver of the Information Age? Information collected from multiple sources that analyzes patterns, trends, and relationships for strategic decision making Skills, experience, and expertise, coupled with information and intelligence, which creates a person's intellectual resources Information converted into an encrypted state All but 1 of these choices Raw facts that describe the characteristics of an event or object
All but 1 of these choices
All are benefits of Prototyping except: evolved through iteration All of these are benefits accelerates the speed through the SDLC tends to detect errors earlier
All of these are benefits
Why is estimating future growth a challenge for most companies? Growth can occur if the company acquires new markets. All of these are correct Growth can occur if the company acquires new products. Growth can occur if the company acquires new customers.
All of these are correct
What is a firewall expected to accomplish? detects computers communicating with the Internet without approval examines each message that wants entrance to the network blocks messages without the correct markings from entering the network All of these are correct.
All of these are correct.
Which of the following occurs during data cleansing? All of these are correct. Populate missing data Clean inaccurate data Clean redundant records Only two of these choices are correct
All of these are correct.
The most secure procedures combine which of the following authentication and authorization techniques? Something the user knows, such as a user ID and password Something that is part of the user, such as a fingerprint or voice signature Something the user has, such as a smart card or token Two of these are correct All of these choices
All of these choices
What are the three advantages of using blockchain technology? Immutability. Digital trust. Internet of Things integration. All of these choices are correct.
All of these choices are correct.
Which of the following is a cost of downtime in addition to lost revenue? Loss in financial performance Damage to reputation All of these choices are correct. Legal expenses
All of these choices are correct.
When building a scalable Infrastructure system that can support new company developments, what are the key factors to consider? Analyzing the accessibility and availability of competitor systems Understanding competitor products and services Anticipating expected and unexpected growth Organizing and deploying additional resources You Answered All but 1 of these are correct.
Anticipating expected and unexpected growth
What area of information security focuses on preventing identity theft? Authentication and authorization Prevention and resistance Access and authorization Detection and authorizing
Authentication and authorization
Susan wants to log into the HR system to enter her boss' time for the week. After she successfully logs in, she clicks on the 'Time Entry' button and the system gives her an error preventing her from adding a new time sheet for her boss. What concept below describes this protection technique? Authorization Encryption Authentication Two of these are correct
Authorization
____________ is the process of computerizing manual tasks, making them more efficient and effective and dramatically lowering operational costs. Business Process Modeling Workflow Streamlining Automation
Automation
What is information collected from multiple sources such as suppliers, customers, competitors, partners, and industries that analyzes patterns, trends, and relationships for strategic decision making? Knowledge Suppliers Intelligence Business Intelligence Strategy
Business Intelligence
What involves graphically representing the processes that capture, manipulate, store, and distribute information between a system and its environment? Business Predictive modeling Business Process Modeling Storyboarding SDLC
Business Process Modeling
During the Analysis phase, what refers to the specific business requests the system must meet to be successful? Sign-off Conversion Details Business Requirements COBIT
Business Requirements
__________ is a standardized set of activities that accomplishes a specific task. Business Strategy Knowledge Process Business Process Business Outcome
Business process
What is a graphic description of a process, showing the sequence of process tasks, that is developed for a specific purpose and from a selected viewpoint? Business process matrix Business process Business process engineering Business process model
Business process model
John and Jenny have been saving for two years to take their six children on a vacation to Disneyworld. They are surprised to find out that airline tickets are far more expensive than they had anticipated. They decide to try to find cheaper tickets on Priceline.com where they are allowed to set their own price they are willing to pay for the airline tickets. What form of ebusiness model are John and Jenny using? B2C C2B B2B CBC C2C
C2B
What is an artificial intelligence program that simulates interactive human conversation by using key precalculated user phrases and auditory or text-based signals? Chatbot. Intelligent virtual agent. IoT Integrated Voice Recognition
Chatbot.
A wholesaler should be most threatened by: Sustaining technology Mass customization Disintermediation Network effect Clickstream data
Disintermediation
_________ is a new way of doing things that initially does not meet the needs of existing customers. Disruptive technology Innovator's dilemma Sustaining technology Digital Darwinism
Disruptive technology
_____________________________________provides enterprise-wide support and data access for a firm's operations and business processes. Enterprise systems Enterprise Application Integration Middleware Business Intelligence
Enterprise systems
___________is the confirmation or validation of an event or object. Fact or Data Information Information Technology Business Intelligence
Fact or data
A global positioning system (GPS) consists of only hardware that provides location information for display on a multidimensional map. T or F
False
Absolute information security is achievable True False
False
Each stage of the value chain accumulates costs and reduces the value of the product T or F
False
Supply chains are sets of interlinked business processes. T o F
False
Technology solves business problems
False
The goal of single-factor authentication is to make it difficult for an unauthorized person to gain access to a system because if one security level is broken, the attacker will still have to break through additional levels T or F
False
The three primary information security areas are 1) authentication and authorization, 2) policies and protections, and 3) detection and response T or F
False
Unified Communication represents the maximum amount of data that can pass from one point to another in a unit of time. T or F
False
Virtualization is a collection of computers, often geographically dispersed, that are coordinated to solve a common problem T or F
False
When disruptive technology is first introduced in the market, it tends to provide us with better, faster, and cheaper products T or F
False
When processes formerly done by people are moved to computers that perform the work through software, the activities are said to be systematized.
False
In our class day where we discussed the case Coronavirus exposes America's broadband problem, we uncovered the principle players (or Actors) involved in the problem of delivering reliable internet service. Which is the following was not among those discussed FCC Rural Business Owners Financial Services Firms Local Government Telecom/Cable companies
Financial Services Firms
_____________ takes advantage of the available 75% of unused processing power of a computer and links thousands of individual computers around the world creating a(n) _______ that can process intensive tasks. Cloud computing; virtual operating system Cloud computing; wireless mesh Grid computing; virtual supercomputer Grid computing; physical computer
Grid computing; virtual supercomputer
Dividends at Miami can reduce its costs using ebusiness to streamline its business processes. Which of the following does not represent an example of Dividends reducing its costs through ebusiness? Using AI for processing applications for job candidates Creating an App for salad line orders Hiring more workers for the salad line Inventory software which orders supplies when low thresholds are reached
Hiring more workers for the salad line
Your boss wants to know the best-selling product from the previous quarter. This is an example of which core driver of the information age? Knowledge Business Intelligence Information Data
Information
Francis works in the human resources division of a large oil and gas company in Texas. Francis's tasks include maintaining payroll and vacation records, employment histories, and benefit information along with ensuring the security of all sensitive employee information. Which MIS infrastructure is most important to Francis? Sustainable MIS infrastructure Virtualized MIS infrastructure Information MIS infrastructure Agile MIS infrastructure
Information MIS infrastructure
Janet is a financial aid counselor at a local community college and she shares an office with her three coworkers. Janet feels safe in her office environment and frequently leaves her username and password on a sticky note next to her computer. Without realizing it Janet is creating the potential for which type of information security breach to occur? Viruses and worms to spread through the college system Insiders to hack into the college system Phishing Scam Two of these are correct All of these choices
Insiders to hack into the college system
What allows separate systems to communicate directly with each other, eliminating the need for manual entry into multiple systems? Integration intelligence data interchange business intelligence
Integration
In the Module 6 story, we explored why a relational database (RDMS) a better choice over an Excel spreadsheet in supporting more complex business information needs. Which one of these is not a reason? It's flexible It optimizes the amount of bandwidth It can scale Eliminate information redundancy by recording each piece of information in only one place
It optimizes the amount of bandwidth
Critical success factors are fundamentals deemed essential for successful business where _________ measure the progress of those elements. Effectiveness metrics Return on Investment Efficiency metrics Key performance indicators
Key performance indicators
_____________________ a security strategy that administers and enforces corporate epolicies for applications on mobile devices. Mobile application management. Enterprise mobility management. Mobile information management. Types of data you can store Mobile device management.
Mobile application management.
Cameron owns SDS Pizza in town. Recently, Cameron has noticed several customer complaints about charging errors. Cameron decides to investigate the errors in his business payment process and finds that most of the inaccuracies occur during order taking. Cameron decides to implement an electronic ordering system to help improve order efficiency and effectiveness. What method did Cameron follow to solve his charging issues? Moved directly to implementing the To-Be process without analyzing the As-Is process Modeled the As-Is process, fixed the errors, and then created the To-Be process Moved directly to implementing the As-Is process without analyzing the To-Be process Modeled the To-Be process, fixed the errors, and then created the As-Is process Cannot answer with the information given
Modeled the As-Is process, fixed the errors, and then created the To-Be process
Constance Abramowitz manages the service department at Guido's Transmission Sales and Service in Binghamton, New York. Which of the following is an example of information that Constance would be using to successfully perform her job? On Saturday, December 9, Guido's Transmission Service had many more walk-in customers during the morning than during the afternoon hours. The price of a new Ford Fiesta with standard transmission is $16,000 Poppy Mitchell's customer number is 71449. Andreasen Sprockets is supplier number 13990334. All of these choices
On Saturday, December 9, Guido's Transmission Service had many more walk-in customers during the morning than during the afternoon hours.
What is the application of knowledge, skills, tools, and techniques to project activities to meet project requirements? Scope None of these Project Management software Project management
Project management
_________________________ uses ________________________ to identify objects wirelessly over short distances. RFID, bluetooth RFID, electronic tags and labels GPS, satellites GPS, bluetooth
RFID, electronic tags and labels
Lee's deli grocery is outsourcing their customer online order processing process to Salesforce.com. Lee's deli currently uses the cloud service including hardware infrastructure, operating systems, and business application programs. Salesforce.com is an example of which of the following cloud services? VaaS CDN IaaS PaaS SaaS
SaaS
What kind of decisions are made when you have a few established processes to help evaluate potential solutions, but not enough to lead to a definite recommended decision? Semi-structured decisions Structured decisions Unstructured decisions Analytics
Semi-structured decisions
Which of the following best describes Web 1.0? intelligent applications machine-based learning Static text-based information websites All are characteristics of Web 1.0
Static text-based information websites
What improves business process efficiencies by simplifying or eliminating unnecessary steps? Workflow Streamlining Automation Reengineering
Streamlining
The way a business can monitor the whole organization bu viewing multiple inputs being processed and transformed to produce outputs while gathering feedback. Systems Thinking Competitive Advantage Strategy The 5 Forces
Systems thinking
What technology does Dr M refer to as the Mother of all Disruptive Technology because of how it has fundamentally changed the way business is done? None of these Business Intelligence The Internet Artificial Intelligence
The Internet
Which of the following types of employees at Kroger will be likely to need data with the finest granularity? The Chief Operating Officer The Chief Information Officer The Oxford Store Manager The Chief Executive Officer
The Oxford Store Manager
What is clickstream analytics? The process of collecting, analyzing and reporting aggregate data about which pages a website visitor visits—and in what order. A two-dimensional representation of data in which values are represented by colors. Uses clickstream data to determine the efficiency of the site for the users and operates at the server level. Uses clickstream data to determine the effectiveness of the site as a channel-to-market.
The process of collecting, analyzing and reporting aggregate data about which pages a website visitor visits—and in what order.
In our Zillow activity, we discussed where dirty data lurks and why it happens. Which of the following does not represent a reason for dirty or low-quality data? They are all reasons for low-quality data Different systems have different data entry standards and formats. Third-party and external data contain inaccuracies and errors. Online customers intentionally enter inaccurate data to protect their privacy
They are all reasons for low-quality data
How do sustaining technologies lead to future growth from existing investments? They enable the company to raise prices on existing products. They enable a company to open new markets and destroy old ones. They produce improved products in an established market. They position companies expecting future growth from new investments.
They produce improved products in an established market.
A blockchain is a type of distributed ledger, consisting of blocks of data that maintain a permanent and tamper-proof record of transactional data. T or F
True
A protocol is a standard that specifies the format of data as well as the rules to be followed during transmission. T or F
True
A tunnel is a virtual, private pathway over a public or shared network from the virtual private network (VPN) client to the VPN server. T or F
True
Changing schools, including transferring course credits and losing the personal relationships with fellow students is an example of high switching costs T or F
True
Data models are logical data structures that detail the relationships among data elements by using graphics or pictures. T or F
True
Encryption scrambles information into an alternative form that requires a key or password to decrypt. T or F
True
Improving the efficiency and effectiveness of its business processes improves a firm's value chain. T or F
True
Information technology's primary role in supply chain management is creating the integrations or tight process and information linkages between functions within a firm—such as marketing, sales, finance, manufacturing, and distribution—and between firms. T or F
True
Open source refers to any software whose source code is made available free (not on a fee or licensing basis, as in e-business) for any third party to review and modify T or F
True
Sample bias problem with using incorrect training data to train the machine T or F
True
The basic connectivity of the Internet is governed by protocols that are defined according to an arrangement called TCP/IP Protocol architecture. T or F
True
Within a data warehouse model, the internal databases could include marketing, sales, inventory, and billing. T or F
True
Which of these characteristics support an agile MIS infrastructure? accessibility, availability, maintainability portability, reliability, scalability, usability backup and recovery plan, disaster recovery plan, business continuity planning Two of these choices are correct grid computing, cloud computing, and virtualization
Two of these choices are correct
What is an activity-based process in which each phase in the SDLC is performed sequentially from planning through implementation and maintenance? RAD methodology Waterfall methodology Service-oriented methodology Agile methodology
Waterfall methodology
What does a business continuity plan typically include? How frequently the system backup is performed Which systems and business processes are critical and the maximum amount of time the company can continue to operate without functioning systems Where a hot site is located How quickly the system recovery needs to be performed
Which systems and business processes are critical and the maximum amount of time the company can continue to operate without functioning systems
Chloe needs to log into the HR system to update the employee headcount figures. She types in her User ID and Password in the sign-on page of the HR application. What concept below describes this protection technique? Intrusion Detection Encryption Authorization Authentication
authentication
in the required reading, Human values in the loop : Design principles for ethical AI, Deloitte described 3 core principles when thinking about the ethical use of AI. Which one of these is not a principle? Autonomy Bias Impact Justice
bias
Most people request real-time data without understanding that continual __________ is one of its biggest pitfalls. cleaning change information scaling standardizing
change
An MIS infrastructure is characterized as _________________ and ___________________. business continuity planning; back-up clients; servers dynamic; static hardware; software-as-a-service
clients; servers
A system is a/are ______________ that link to achieve a common purpose. Systems thinking is a way of monitoring ________________. computing concepts, a division within the sales role collection of parts, an individual piece of the system None of the above collection of parts, the system as a whole computing concepts, an individual piece of the system
collection of parts, the system as a whole
___________sources capital for a project by raising many small amounts from a large number of individuals, typically via the Internet. Explicit knowledge Crowdfunding Crowdsourcing Tacit knowledge
croudfunding
A company can create a __________ that would detail the process for recovering information or a system in the event of a catastrophic disaster. management recovery plan. disaster recovery plan two of these are correct business continuity plan
disaster recovery plan
_______________________ scrambles information into an alternative form that requires a key or password to decrypt the information Content filtering Encryption 2-factor authentication None of these Spyware
encryption
DNS allows dynamic IP address allocation so users do not have to have a preconfigured, or manually assigned, IP address to use the network
false
What refers to the level of detail in the model or the decision-making process? Digital dashboard None of these are correct Visualization Granularity
granularity
The primary difference between a data warehouse and a data mart is a data warehouses ____________________where data marts _________________. make quick decisions, make slow decisions. tackle ethical issues, tackle hypothetical issues. have a more organization-wide focus, have functional focus. have a physical focus, have logical focus.
have a more organization-wide focus, have functional focus.
The factor that significantly contributed to people's needs to use information systems to make decisions is ______. the amount of information people must understand to make good decisions is increasing exponentially. the amount of information people must understand to make good decisions is decreasing exponentially. the amount of information people must understand to make good decisions has remained unchanged. impossible to answer because it depends on the industry.
he amount of information people must understand to make good decisions is increasing exponentially
What are the three pressures/challenges driving the need for sustainable MIS infrastructures? increases in ewaste, energy waste, and dynamic scaling increases in electronic waste, energy waste, and carbon emissions decreases in electronic waste(or ewaste), energy waste, and carbon emissions decreases in ewaste, energy waste, and carbon footprints
increases in electronic waste, energy waste, and carbon emissions
Which of the following is an example of a competitive strategy employed by a firm? advertising its products nationwide like its competitor organizations launching a unique product targeted at a section of consumers laying off staff in order to cut down costs during a recession period increasing the price of its product when raw material prices increase
launching a unique product targeted at a section of consumers
A data warehouse is a _____________________ collection of information, gathered from many different __________________ databases that supports business analysis activities and decision-making tasks. logical; operational logical; transactional physical; operational physical; transactional
logical; operational
___________ are measurements that evaluate results to determine whether a project is meeting its goals. Metrics ROI BPMN Best practices
metrics
_________ is the system that consists of nonproprietary hardware and software based on publicly known standards that allows third parties to create add-on products to plug into or interoperate with the system. Management system Knowledge system Open system Closed system
open system
What could cause employee performance to decrease when using is a cloud computing environment? decreased job stability decreased dynamic scaling required Internet connectivity limited Internet features
required Internet connectivity
Gender can be referred to in many ways (Male, Female, M/F, 1/0) in a data warehouse. Ensuring gender is referenced the same way is an example of information scaling. streamlining data points. standardizing protocols. standardizing information
standardizing information
Decision making in organizations occur at 3 levels. What level has an external focus on the industry with an emphasis on a multi-year view? None of the above Operational Strategic Managerial
strategic
According to the spotlight story on the Cloud in Module 6, _____________, _______________, and ________________ make cloud computing possible. server virtualization, hardware, software grid computing, hardware, software the Internet, server virtualization, Moore's Law the Internet, OS virtualization, Moore's Law
the Internet, server virtualization, Moore's Law
Why do relational databases use primary keys and foreign keys? to create physical relationships to create logical relationships to create an attribute to create an entity
to create logical relationships
Managers use ____________ information when making structured decisions at the operational level, such as when analyzing daily sales reports to determine how much inventory to carry. structured transactional supply side uncertain
transactional
___________ is the technique used to execute the business strategy SWOT Analysis Value chain The 5 forces model
value chain
The goal of ______________ is to identify processes in which the firm can add value for the customer and create a competitive advantage for itself, with a _______________ or cost advantage. seizing a cost advantage, primary value activities value chain analysis, product differentiation creating a focused strategy, supplier management creating a focused strategy, product differentiation value chain analysis, supplier management
value chain analysis, product differentiation
What allows users to access the WWW? HTTP web browser Web 3.0 HTML
web browser