Midterm BADM 2301

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

The Facebook and Cambridge Analytica scandal occurred in ________; the problem started in _________. a. 2016; 2010 b. 2016; 2017 c. 2018; 2010 d. 2018; 2017

2018; 2010

Q: More than ________ percent of all online content is written in English. a. 25 b. 50 c. 75 d. 90

50

Q: A(n) ________ string is known as a _______. a. 4-bit; byte b. 4-byte; bit c. 8-bit; byte d. 8-byte; bit

8-bit; byte

Q: ______ uses rows and columns to manipulate primarily numerical data. a. A spreadsheet b. Data management c. Desktop publishing d. Word processing

A Spreadsheet

______ issues involve the authenticity, fidelity, and correctness of information that is collected and processed. a. Accessibility b. Accuracy c. Privacy d. Property

Accuracy

Q: ______ causes pop-up advertisements to appear on your screen. a. Adware b. Marketware c. Spamware d. Spyware

Adware

Q: The ________ layer of TCP/IP enables client application programs to access the other layers a. Application b. Internet c. Network interface d. Transport

Application

Q: _______ software is a set of computer instructions that provides specific functionality to a user. a. Programming b. Operating system c. Systems d. Application

Application

________ is an example of efficiency. a. Automating order entry b. Increasing customer satisfaction c. Improving product quality d. Reducing employee turnover

Automating order entry

__________ is an incremental approach that focuses on reducing variation in the process outputs by searching for the root causes of the variation in the process itself or among process inputs. a. BPC b. BPI c. BPM d. BPR

BPI

Many organizations find ________ too difficult, too radical, too lengthy, and too comprehensive a. BPC b. BPI c. BPM d. BPR

BPR

Q: XYZ Inc. scanned the fingerprints of all of their employees and now uses these fingerprints to authenticate their employees and grant them access to different areas of the company's facilities. XYZ Inc. is utilizing which type of technology? a. Cookies b. Intellectual property c. Biometrics d. Malware

Biometrics

Q: _________ is an access control. a. A company gate b. Biometrics / Encryption c. A firewall d. RFID

Biometrics / Encryption

Q: Bandwidth is stated in ________ per second. a. Beeps b. Bits c. Blips d. Bytes

Bits

Q: Users access the web primarily through ________. a. Browsers b. Hyperlinks c. Hypertext d. URLs

Browsers

Q: Registers are part of the ________ and are a type of ________ storage. a. ALU; primary b. ALU; secondary c. CPU; primary d. CPU; secondary

CPU; primary

Q: ______ is/are a type of high-speed memory that enable(s) the computer to temporarily store blocks of data that are used more often. a. Cache Memory b. RAM c. Registers d. ROM

Cache Memory

Q: ________ is a cable medium. a. Coaxial b. Microwave c. Radio d. Satellite

Coaxial

Q: _______ refers to efforts by two or more entities who work together to accomplish certain tasks. a. Collaboration b. A virtual team c. A workgroup d. Workflow

Collaboration

Q: ________ provide(s) for the flow of data from external computer networks to ________ and then to computer networks. a. Communication technologies; output technologies b. Communication technologies; the CPU c. Output technologies; communication technologies d. The CPU; communication technologies

Communication technologies; the CPU

Q: _______ controls secure the movement of data across networks. a. Access b. Communications c. Physical d. Useful

Communications

_______ involves companies providing standard specifications for different consumer groups. a. Configured mass customization b. Consumer segmentation c. Mass customization d. Mass production

Consumer Segmentation

Q: A ____ is a statutory grant that provides the creators or owners or intellectual property with ownership of the property for a designated period. a. Copyright b. Patent c. Trade secret d. Trademark

Copyright

Q: ________ refers to malicious acts in which attackers use a target's computer systems to cause physical, real-world harm or severe disruption, often to carry out a political agenda. a. SCADA Attack b. Cyberterrorism c. Espionage d. Identity Theft

Cyberterrorism

Q: A(n) _________ is located between two firewalls. a. Anti-malware system b. DMZ c. ERP d. Spamware dector

DMZ

Q: _______ extends word processing software to allow production of finished, camera-ready documents, which may contain photographs, diagrams, and other images combined with text in different fonts. a. A spreadsheet b. Data management c. Desktop publishing Word processing

Desktop publishing

Q: If you have to speak into your phone to unlock it, this is an example of something the user _________. a. Does b. Has c. Is d. Knows

Does

Q: Moore's law states that microprocessor complexity would ________ approximately every 18 months. a. Double b. Triple c. Quadruple d. Quintuple

Double

Q: _______ refers to learning supported by the web; ________ refers to any learning situation in which teachers and students do not meet face to face. a. Distance learning; e-learning b. Distance learning; long-distance learning c. E-learning; distance learning d. E-learning; long-distance learning

E-learning; distance learning

Q: _______ is the largest-volume application running over the Internet. a. Chat b. E-mail c. FTP d. Voice communication

Email

Q: _______ is a common LAN protocol. a. Ethernet b. Fiber c. Internet d. Twisted-pair

Ethernet

_______ is the third stop in the general framework for ethics. a. Act and reflect on the outcome of your decision b. Evaluate alternative actions c. Get the facts d. Make a decision and test it e. Recognize an ethical issue

Evaluate alternative actions

Q: ________ offer limited accessibility to the ________ of participating companies. a. Extranet; internets b. Extranet; intranets c. Intranets; extranets d. Intranets; internets

Extranet; intranets

The debate over CEO salaries being so much higher than other employees is an issue addressed by the ______ approach. a. common good b. deontology c. fairness d. rights e. utilitarian

Fairness

Q: Which of the following Internet services is typically NOT available in rural areas? a. Dial-up b. Fiber optic c. Satellite d. Wireless

Fiber Optic

Q: _______ cables are made of glass. a. Coaxial b. Fiber-optic c. Microwave d. Twisted-pair

Fiber-Optic

Q: A(n) _________ is a system that prevents a specific type of information from moving between untrusted networks and private networks. a. Anti-malware system b. DMZ c. ERP d. Firewall

Firewall

Q: The ________ allows users to directly control the hardware by manipulating visible objects and actions that replace complex commands. a. AS b. OS c. ERP d. GUI

GUI

Organizations use Porter's competitive forces model to design ______ strategies; they use the value chain model to identify __________ activities to make the greatest impact. a. general; general b. general; specific c. specific; general d. specific; specific

General; Specific

Q: _______ defines how messages are formulated and how their receivers interpret them. a. DSL b. HTTP c. SMTP d. TCP/IP

HTTP

Q: Your student ID is an example of something the user _________. a. Does b. Has c. Is d. Knows

Has

Q: _______ is NOT an advantage of twisted-pair wire. a. Availability b. Cost c. Easy to work with d. High bandwidth

High bandwidth

Q: Suppose you have a primary location in New York City where you main corporate servers are located. Just in case something happens in New York City, you have backup servers that are updated every minute in Chicago. This is an example of a _________ site. a. Cold b. Hot c. Medium d. Warm

Hot

Q: You open an e-mail from your friend that looks a little odd, but you figure your friend would never send you anything bad. This is _________ and is an _________ mistake. a. Human error; intentional b. Human error; unintentional c. Social engineering; intentional d. Social engineering; unintentional

Human error; unintentional

Q: 135.62.128.91 is an example of an ________ address. a. IPv2 b. IPv4 c. IPv6 d. IPv8

IPv4

Q: A(n) ________ is a company that provides Internet connections for a fee. a. ISP b. IXP c. NAP d. NSP

ISP

Q: The complexity of software has ________ over time; the potential for software bugs has ________. a. Decreased; increased b. Increased; increased c. Increased; decreased d. Decreased; decreased

Increased; increased

________ is an example of effectiveness. a. Automating order entry b. Increasing customer satisfaction c. Reducing production time by one day d. Using RFID to track products

Increasing customer satisfaction

The IS function has become __________ strategic within organizations, so a growing number of CIOs are coming from __________. a. decreasingly; within the IS department b. decreasingly; other business units c. increasingly; within the IS department d. increasingly; other business units

Increasingly; other business units

Q: _______ occur(s) when an attacker either threatens to steal, or actually steals, information from a company and then demands payment for not carrying out a particular act. a. Alien Software b. Espionage c. Information Extortion d. SCADA Attacks

Information Extortion

Car and technology companies are currently competing over who can offer the first self-driving car. This is an example of a(n) ____________ strategy. a. cost leader b. customer oriented c. differentiation d. innovation e. operational effectiveness

Innovation

Q: Speech-recognition software is a(n) ________ technology. a. OS b. Input c. GUI d. Output

Input

Q: _______ accept(s) data and instructions and convert(s) them to a form that the computer can understand. a. Input technologies b. Primary storage c. Output technologies d. The CPU

Input Technologies

An/The ________ is a network of networks. a. Externet b. Extranet c. Internet d. Intranet

Internet

Q: The ________ functions as a transport mechanism; the ________ is an application. a. Internet; intranet b. Internet; World Wide Web c. World Wide Web; Internet World Wide Web; Intranet

Internet; World Wide Web

You decide to specialize in marketing for your first career. You take an entry-level position at XYZ Corp. This means you are a __________ a. clerical worker b. knowledge worker c. lower-level worker d. middle manager

Knowledge Worker

Q: Typing in your password to access a system is an example of something the user _________. a. Does b. Has c. Is d. Knows

Knows

Q: A network that is restricted to a single building is a ________. a. LAN b. MAN c. PAN d. WAN

LAN

Q: NICs allow devices to physically connect to the _______'s communications medium. a. LAN b. MAN c. PAN d. WAN

LAN

_______ is a legal concept that gives individuals the right to recover the damages done to them by other individuals, organizations, or systems. a. Accountability b. Answerability c. Liability d. Responsibility

Liability

Q: _____ are relatively large computers used in large enterprises for extensive computing applications that are accessed by thousands of users. a. Mainframes b. Microcomputers c. Microprocessors d. Supercomputers

Mainframes

________ is the current strategy for many manufacturers where a company produces a large quantity of items but customizes them to match the needs and preferences of individual customers. a. Configured mass customization b. Consumer segmentation c. Mass Customization d. Mass production

Mass Customization

Q: _______ are the smallest and least expensive category or general-purpose computers. a. Mainframes b. Microcomputers c. Microprocessors d. Supercomputers

Microcomputers

Q: Which of the following is NOT a trend in hardware? a. Faster b. More expensive c. More powerful d. Smaller

More expensive

Q: Which of the following is NOT an OS? a. Apple Mac OS X b. Google Chrome c. Linux d. Mozilla Firefox

Mozilla Firefox

Q: ________ is an operating model under which ISPs must allow customers equal access to content and applications, regardless of the source or nature of the content. a. Internet access equality b. Internet access neutrality c. Network equality d. Network neutrality

Network Neutrality

Q: The ________ provides an interface between the user and the hardware. a. AS b. ERP c. OS d. NUI

OS

Q: The ________ concept refers to a group of computing products that work together. a. Open systems b. Piracy block c. Anti-bug d. Open source

Open Systems

Q: _______ present(s) data and information in a form people can understand. a. Communication technologies b. Input technologies c. Primary storage d. Output technologies

Output technologies

Q: A(n) ________ is a group of programs with integrated functions that has been developed by a vendor and is available for purchase in a prepackaged form. a. GUI b. Open System c. OS d. Package

Package

Q: _______ allows users to maintain checkbooks, track investments, monitor credit cards, and bank and pay bills electronically. a. Communications b. Personal finance c. Personal information management d. Web authoring

Personal Finance

Q: Sarah received an email that claimed to be from her bank. The email asked her to provide her password. Sarah later found out that the email was not from her bank and that she had given sensitive information to someone who gained access to her accounts. This is an example of a ____________. a. Phishing attack b. Worm c. Trojan horse d. Denial of service attack

Phishing Attack

Q: Suppose your university automatically logs you off of a university computer after 15 minutes of disuse. This is an example of a(n) _________ control. a. Access b. Communication c. Physical d. Useful

Physical

Q: You purchased a copy of Microsoft Office and give a copy to a friend so he/she doesn't have to buy it too. This is _________ and is _________. a. Piracy; legal b. Piracy; illegal c. Social engineering; legal d. Social engineering; illegal

Piracy;Illegal

Q: _______ temporarily store(s) data and program instructions during processing. a. Input technologies b. Primary storage c. Secondary storage d. The CPU

Primary Storage

Q: Intellectual property is NOT protected under _________ laws. a. Copyright b. Patent c. Privacy d. Trade secret

Privacy

Q: ________ is an advantage of telecommuting. a. Connection b. Productivity c. Promotion Time d. Visibility

Productivity

Q: The developer keeps the source code private with ________ software. a. Open b. Open source c. Pirated d. Proprietary

Proprietary

Q: Your computer crashes in the middle of you writing a term paper. You lose the paper because you had not saved a copy yet. You lost your paper because it was in ________. a. Binary form b. RAM c. ROM d. The CPU

RAM

_________ is the first step in the general framework for ethics. a. Act and reflect on the outcome of your decision b. Evaluate alternative actions c. Get the facts d. Make a decision and test it e. Recognize an ethical issue

Recognize an ethical issue

Q: ________ store(s) data and program instructions for future use. a. Primary storage b. Output technologies c. Secondary storage d. The CPU

Secondary Storage

Q: ________ is an attack in which the perpetrator uses social skills to trick or manipulate legitimate employees into providing confidential company information such as passwords. a. Espionage b. Malware c. Profiling d. Social engineering

Social Engineering

Q: A(n) ________ guides the user through computer applications by using cartoon-like characters, graphics, animation, and voice commands. a. Application interface b. GUI c. OS d. Social Interface

Social Interface

Q: _________ is pestware that users your computer as a launch pad for unsolicited e-mail, usually advertising for products and services. a. Adware b. Marketware c. Spamware d. Spyware

Spamware

Q: ____ collects personal information about users without their consent. a. Adware b. Marketware c. Spamware d. Spyware

Spyware

Q: Which of the following is the correct order for the class of computers from most powerful to least powerful? a. Supercomputers, mainframe computers, microcomputers, laptop/notebook computers, tablet computers, wearable computers b. Supercomputers, mainframe computers, microcomputers, tablet computers, laptop/notebook computers, wearable computers c. Supercomputers, microcomputers, mainframe computers, laptop/notebook computers, tablet computers, wearable computers d. Supercomputers, microcomputers, mainframe computers, tablet computers, laptop/notebook computers, wearable computers

Supercomputers, mainframe computers, microcomputers, laptop/notebook computers, tablet computers, wearable computers

Managing information systems in modern organizations is difficult and complex task. Which of the following factors does NOT contribute to this? a. Both end users and IT employees have responsibility for systems b. Business people are customers of the IT department c. If technology is not working, many firms cannot function. d. Technology is getting cheaper to acquire, operate, and maintain.

Technology is getting cheaper to acquire, operate, and maintain

Q: ________ manipulate(s) the data and control(s) the tasks performed by the other components. a. Communication technologies b. Input technologies c. Output technologies d. The CPU

The CPU

Q: ________ performs the actual computation or "number crunching" inside any computer. a. A bit b. The ALU c. The Control Unit d. The CPU

The CPU

Q: A(n) _________ to an information resource is any danger to which a system may be exposed. a. Exposure b. Risk c. Threat d. Vulnerability

Threat

Q: If you shift your risk by using other means to compensate for the loss like purchasing insurance, you have implemented a risk _________ strategy. a. Acceptance b. Avoidance c. Limitation d. Transference

Transference

Q: _______ cables are made of copper. a. Fiber-optic b. Microwave c. Radio d. Twisted-pair

Twisted-pair

Q: _______ is a private network that uses a public network to connect users. a. DoS b. ERP c. RFID d. VPN

VPN

Q: ______ reality is a term that refers to information technologies that use software to provide a realistic, three-dimensional, computer-generated environment that replicates sight, touch, hearing, and in some cases, smell. a. Augmented b. Computer c. Virtual d. Wearable

Virtual

Q:____ is a remote attack requiring user action. a. DoS b. A logic bomb c. A Trojan horse d. Virus

Virus

Q: _______ is an example of a human data-entry technology. a. A barcode scanner b. An optical mark reader c. A point-of-sale terminal d. Voice recognition

Voice Recognition

Q: A network between Mars and the Earth would be a ________. a. LAN b. MAN c. PAN d. WAN

WAN

Q: ________ allows users to design websites and publish them on the web. a. Communications b. Personal finance c. Personal information management d. Web authoring

Web authoring

Which of the following is an accessibility issue? a. How can we ensure that the information will be processed properly and presented accurately to users? b. How should we handle illegally copying copyrighted software? c. What information about oneself should an individual be required to reveal to others? d. What information does a person or an organization have a right to obtain, under what conditions, and with what safeguards?

What information does a person or an organization have a right to obtain, under what conditions, and with what safeguards?

Q: _______ allows users to manipulate primarily text with many writing and editing features. a. A spreadsheet b. Data management c. Desktop publishing d. Word processing

Word Processing

Q: _______ is the movement of information as it progresses through the sequence of steps that make up an organization's work procedures. a. Collaboration b. A virtual team c. A workgroup d. Workflow

Workflow

The IT _________ are/is the IT platform. a. components b. infrastructure c. personnel d. services

components

Your professor hand you a paper with the number 75 on it. This is _______. a. data b. information c. knowledge d. widsom

data

Which of the following is in the current order starting with the most elementary? a. data, information, knowledge b. data, knowledge, information c. information, data, knowledge d. information, knowledge, data

data, information, knowledge

Q: The price of hardware has ________ over time; the price of software has ________ over time. a. Increased; increased b. Decreased; decreased c. Increased; decreased Decreased; increased

decreased; increased

The correct order of the BPI phases is _______. a. analyze, control, define, measure, improve b. analyze, define, control, improve, measure c. define, analyze, measure, control, improve d. define, measure, analyze, improve, control

define, measure, analyze, improve, control

The NBA's use of virtual reality indicates they are using Porter's ________ strategy for competitive advantage. a. cost leadership b. differentiation c. innovation d. operational effectiveness

differentiation

Supplier power is high when buyers have ________ choices from whom to buy and low when buyers have ________ choices a. few; few b. few; many c. many; few d. many; many

few; many

If there are many alternatives to an organization's products or services, then the threat of substitution is _______; if there are few alternatives, then the threat is _____. a. high; high b. high; low c. low; high d. low; low

high; low

_______ industries experience the greatest threat from substitutes. a. information-based b. manufacturing c. product-based d. retail

information-based

_________ is organized and processed to convey understanding, experience, accumulated learning, and expertise as it applies to a current business problem. a. data b. information c. knowledge d. wisdom

knowledge

The internet makes customers _______ powerful; this is a _________ pressure a. less; market b. less; societal c. more; market d. more; societal

more; market

When you go through the checkout line at your local grocery store, this is a(n) ________ that could be processed by a(n) ______________. a. analysis; APS b. analysis; TPS c. transaction; APS d. transaction; TPS

transaction; TPS

The issues that came up in the Quizlet/Texas Christian University cheating scandal in 2018 highlighted the need for______. a. more Web-based study tools to be available to students of all socioeconomic backgrounds. b. universities to adapt to the changing nature of technology as it pertains to the ways in which students are learning c. widespread reform in terms of Internet access on college campuses d. colleges to revise their Codes of Conduct to eliminate the ambiguity in students using opensource study tools

universities to adapt to the changing nature of technology as it pertains to the ways in which students are learning


Ensembles d'études connexes

Chapter 25 Phosphates, Sulfates and related minerals

View Set

Combo with "Chapter 2 Test" and 11 others

View Set

220-1001-Exam-Dumps-220-1001-Braindumps-220-1001-VCE-220-1001-PDF-Exam-Questions-220-1001-Practice-Test: from www.passleader.com

View Set

BME 213 Ethics Final, BME 213 Midterm

View Set

math-Practice of rational numbers, irrational numbers etc.

View Set

Moses Copd with pneumonia case study

View Set

Precision, accuracy, reliability, validity

View Set

Rosetta Stone French Unit 5 Lesson 3

View Set