MIS 204-Midterm Part 2-MIS Concepts
One type of malware unknowingly gets installed on a computer and then listens for commands from a central controlling computer. Which of the following is that type of malware? Virus Worm Trojan Bot
bot
A good project manager need not pay attention to the needs and concerns of the users, how they actually work, and how information flows among them. TRUE FALSE
false
A management information system is an application that stores data. TRUE FALSE
false
A project manager who mitigates the risk factors of a project is one who attempts to avoid those risks altogether. TRUE FALSE
false
Cloud computing is only used for business applications. TRUE FALSE
false
Command-line interfaces typically are icon-driven interfaces. They use pictures and symbols (icons) to indicate different functions the computer can perform. To select a function, the user uses a mouse to move the cursor, then clicks on that specific icon (with a touch screen, the user simply touches the icon on the screen). TRUE FALSE
false
Commercial-off-the-Shelf Software (COTS) generally delivers all the exact needs that a company has for the software they are purchasing. TRUE FALSE
false
Knowledge management takes explicit knowledge, transforms it, and then stores it as tacit knowledge. TRUE FALSE
false
Mitigated risk factors mean that the risk factors are becoming more severe. TRUE FALSE
false
Most computers, tablets, and phones have operating systems. However, game platforms such as Xbox, PlayStation, and Wii do not have operating systems. TRUE FALSE
false
New Information Systems will always result in reduced operating costs after implementation. TRUE FALSE
false
One gigabyte equals 10,000 megabytes.
false
Public and private keys are the same in public key encryption scheme. TRUE FALSE
false
Rapid application deployment is a relatively new concept for developing systems. It is a series of development methodologies that are both iterative and incremental in nature. TRUE FALSE
false
Scope-creep occurs when the scope of the project gradually decreases over time. TRUE FALSE
false
Software are the physical components that make up the system such as the processor, physical storage (hard drive), memory (RAM), and the network card. TRUE FALSE
false
The speed of a network is determined by how many devices are connected to it. TRUE FALSE
false
The speed of a network is determined by the fastest device on the network. TRUE FALSE
false
When planning a project, it is preferable to create a schedule that is very aggressive. TRUE FALSE
false
Because of its design, when one node on the Internet goes down the traffic is able to be rerouted through other nodes on the network. In this way the Internet is designed to be both ______ and ______. Distributed; hardened Fault-tolerant; redundant Robust; redundant Compatible; flexible
fault-tolerant; redundant
A(n) _______ is a device that controls the flow of data into and out of a network, allowing sanctioned traffic and denying prohibited traffic. Web crawler Trojan Firewall Intrusion detection system
firewall
Companies that provide Internet connectivity to businesses, universities, and other organizations are called ______. Internet poviders Internet service providers Broadland connections Subscription services
internet service providers
What is "articulation work"? It is the work required to link people with the computer system It is the work you do in order to do your work It is the work you do to coordinate tasks with others It is the work you do to access resources
it is the work you do in order to do your work
A _________ implementation involves placing the new system into production to run concurrently with the existing system for a period of time. During this period, the new system is evaluated and any problems that arise are fixed before the old system is turned off. Parallel Pilot Phased direct
parallel
Which of the following adoption strategies brings components or modules of the new system online one at a time? In this scenario, each individual component is brought online and tested before the old module is retired. Direct Phased Pilot Parallel
phased
Which of the following adoption strategies involves placing the new system into production for a small group of users while the old system is left in place for the majority of users? Direct Phased Pilot Parallel
pilot
The phenomena that worker/capital output has not increased in line with the increased performance capabilities of information technology is called the: Moore's law Macroeconomics Magic bullet theory Productivity paradox
productivity paradox
Which of the following are NOT one of the four categories of "failure factors" most commonly found as a reason for IT project failures? Project sponsorship Scheduling Development process management Stakeholder management
project sponsorship
Entering a randomly generated string of numbers in addition to your username and password is an example of ______. Second factor authentication Secure transfer protocol Public key infrastructure Encryption
second factor authentication
Which of the following is NOT an important factor in determining the value of information? Accuracy Speed Timeliness Accessibility
speed
Individuals who have an interest in the outcome of a system development project are called __________________. Stakeholders Partners Users Owners
stakeholders
All of the costs associated with the design, development, testing, implementation, documentation, training, and maintenance of a software system is called the _____________________. Total cost of ownership Compliance cost Project scope Operating cost
total cost of ownership
A common form of malicious activity is to compromise a computer on the Internet and use it to deliver attacks against other machines. TRUE FALSE
true
A debit card is a simplistic form of two-factor authentication. TRUE FALSE
true
A firewall can restrict traffic from a specific application. TRUE FALSE
true
A firm that purchases a commercial-off-the-shelf (COTS) information system benefits in getting a standardized system without having to absorb development costs but risks getting a system that does not align with the firm's businesses processes and existing technologies. TRUE FALSE
true
According to Nicholas Carr, information systems do not provide a sustainable competitive for three reasons. One of the three reasons is because information systems are substitutable. TRUE FALSE
true
As Amdahl's Law indicates, the slowest component on a network determines the network speed. TRUE FALSE
true
Before developing an information system, the company should distinguish between needs and wants that the new system should address. TRUE FALSE
true
Business and technology roles are slowly beginning to overlap. TRUE FALSE
true
Data, in and of itself, does not convey information. TRUE FALSE
true
Enterprise Resource Planning (ERP) systems are designed to integrate and manage all of the different business units that comprise an organization such as human resources, accounting, manufacturing, finance, and supply-chain management. TRUE FALSE
true
Firms that build their own information systems have more control over its features, performance capabilities, costs, and design. TRUE FALSE
true
Firms that build their own information systems risk building a system that may be incompatible with other systems developed outside the firm. TRUE FALSE
true
Getting buy-in from top management or having a senior manager act as a project champion are two ways of effectively managing stakeholders. TRUE FALSE
true
Google Docs is an example of a cloud application. TRUE FALSE
true
Hackers use encryption to hide their activities. TRUE FALSE
true
Having access to the right information at the right time can often mean the difference between success and failure. TRUE FALSE
true
Implementing information systems MAY produce a sustainable competitive advantage when done in conjunction with other organizational changes, such as pricing power, barriers to entry, or product differentiation. TRUE FALSE
true
Information technology and information systems are, by nature, part of a company's infrastructure. Thus, they are difficult to exploit for competitive advantage. TRUE FALSE
true
Information that is inaccurate causes organizations to draw incorrect conclusions. TRUE FALSE
true
Knowledge management systems (KM) are used by organizations to capture and exploit the expertise of their employees. TRUE FALSE
true
Moore's law predicts that computing power will double every 18 months. TRUE FALSE
true
One of the original key objectives of the of the early Internet was to allow incompatible subnetworks to communicate. TRUE FALSE
true
Operating systems are complex suites of programs that tell the computer how to operate. TRUE FALSE
true
Organizations develop or buy information systems to help ensure that their management personnel have access to accurate and timely information. TRUE FALSE
true
Some estimates indicate that almost one in every three Information and Systems Technology projects fail altogether. TRUE FALSE
true
The human element is typically the weakest element in any security setup. TRUE FALSE
true
The predecessor to the internet was called ARPANET. TRUE FALSE
true
Top top-level domain originally indicated the type of entity that hosted the website. Top level domains include .com, .edu, and .org. TRUE FALSE
true
When a VPN is established, a virtual tunnel is created between the client computer and the private network that is encrypted. TRUE FALSE
true
When stakeholders are poorly managed, they react in ways that hamper the ability to bring the project to a successful conclusion. TRUE FALSE
true
With regards to new technologies, Nicholas Carr says that a company should focus on vulnerabilities, not opportunities. TRUE FALSE
true
You can filter results from the LionSearch tool by whether or not they are available online. TRUE FALSE
true
Which of the following is TRUE about LionSearch? You cannot search for music Search results are limited to digital holdings You must know a title or the author before you begin your search You can search records for ISBN, language, DOI, for example.
you can search records for ISBN, language, DOI, for example
The law that states a network's speed is determined by its slowest component is called ______ Law. Moore's Amdahl's The last mile Metcalf's
Amdahl's
Which executive in an organization is responsible for protecting the data within a company as an asset of the firm? Chief security officer (CSO) Chief technology officer (CTO) Chief information officer (CIO) Chief data officer (CDO)
Chief data officer (CDO)
The executive in an organization that would be responsible for aligning the company's technology infrastructure with its goals. Chief security officer (CSO) Chief technology officer (CTO) Chief information officer (CIO) Chief data officer (CDO)
Chief information officer (CIO)
Which executive in an organization is responsible for the physical security within a firm? Chief security officer (CSO) Chief technology officer (CTO) Chief information officer (CIO) Chief data officer (CDO)
Chief security officer (CSO)