MIS Exam 1

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

During the early formation of the United States, mini influential writings criticizing British rule were published without the real names of their authors. These publications represented a form of

Anonymous expression

Autumn develops a strategic plan that will allow her organization to take advantage of opportunities and trends by

Being proactive

To successfully fight computer crime in a court of law, prosecutors and victims depend on a properly handled

Computer forensics investigation

How is data governance different from data management?

Data governance is the core component of data management

Hailey needs to query her firm's Database, Jeff needs to generate a report for his next project status meeting, and Karen needs to make some modifications to update the data in the database. Which of the following tools can they all used to complete their assigned task?

Data manipulation language

The following DBMS query is an example of what resource provided with a DBMS? SELECT * FROM Employee WHERE job_classification-"C2"

Data manipulation language

A companies risk assessment process can consider numerous threats to the computers and networks. Which of the following should an organization identify as loss events or threats to assess?

Distributed denial of service attack, email attachment with harmful worm, harmful virus. (All of the above)

Are people who work directly with information systems to get results

End users

You might be a successful information systems worker if you

Enjoy learning new techniques and enjoy working with people

An IS manager is focusing on the people component of Levitt's diamond when he or she

Ensures that the IS helpdesk is available during work hours

Which type of information system to organizations used to find structured interactions among employees or between the organizational an external customers, suppliers, or business partners?

Enterprise information system

Laws and regulations have thoroughly address concerns about privacy and data management and private organizations and federal agencies. T/F

False

The SQL query below will only return the product ID and the total inventory for any product whose total on hand value is greater or equal to five. T/F SELECT product_id ,total_on_hand + total_on_order From retail.inventory WHERE total_on_hand <=5

False

The SQL statement SELECT * FROM retail.inventory Will return only half of the column from the inventory table. T/F

False

To collections of attributes can have a common primary key. T/F

False

Today due to security concerns most organizations avoid the database approach to data management or multiple information systems share a pool of related data. T/F

False

Users still need help from the IT function of the organization to create custom reports using modern reporting tools. T/F

False

When you receive a text message there is a problem with your bank account and you were required to click on a link to submit some information, you are likely facing a vishing attack. T/F

False

Which amendment protects Americans right to freedom of religion, freedom of expression, and freedom to assemble peacefully?

First

Americans rights to freedom of religion, freedom of expression, and freedom to assemble peacefully are protected by the

First amendment

And IS manager recommends that his organization invest in improving it's customer information system so I asked more clearly defined the target market and improve service to that market. Which business strategy does this represent?

Focus

What is Hadoop and what two primary components make up the Hadoop computing environment?

Hadoop There's an open source software framework including several software modules that provide a means for storing and processing extremely large data sets. Two primary components are a data processing component and a distributed file system

In which step of the ethical decision making process is it essential to communicate well with all stakeholders and have someone they trust and respect explain why things are changing and how this will benefit them?

Implement the decision

A database system that stores entire database and random access memory is known as a

In memory database

Which element is not part of the CIA triad?

Integration

Hey successful IS manager recognizes that sustaining a competitive advantage

Means evolving to account for changes in customer needs

Pam your new marketing manager is exploring the purchase of tens of thousands of email addresses from a legitimate source for the purpose of sending product information to the masses. She has asked your opinion. Would you agree or disagree with her idea? Why or why not?

No, because it is illegal the legitimacy of the emails could be an issue and your reputation could suffer greatly.

A type of memory who's contents or not lost if the power is turned off or interrupted is said to be

Non-volatile

Compared with the traditional licensing model in which users purchase and install software, SaaS

Offers less expensive upgrades and new releases

Ethical business practices

Often raise and organizations priority with suppliers another business partners

These days the biggest threats to IT security are from

Organized groups that have ample resources including money and sophisticated tools to support their efforts

While conducting a security self-assessment of his personal laptop use, van realizes that he's putting himself at risk by

Putting off installing available software updates that he has been notified about

A collection of characteristics that belong to a single person, place, or thing for which data is maintained is a

Record

Big data veracity is a measure of

The accuracy completeness and currency of the data

The GDP our obligates organizations that operate in the European Union to obtain consent of the people they collect information about. T/F

True

US federal law permits employers to prevent viewing of pornography in the workplace by employees. T/F

True

High quality data on the operations of the business is the primary ingredient of any effort to improve

Worker efficiency or service quality

Describe the electronic product environmental assessment tool (EPEAT)

A system that enables purchasers to evaluate compare and select electronic products based on a total of 51 environmental criteria.

Describe two major perspectives on the role information systems play in supply chain management activities

A traditional view of information systems holds that organizations use information systems to control and monitor processes and to ensure effectiveness and efficiency. A more contemporary view however holds that information systems are often so intimately involved that they are part of the process itself.

Which is a true statement regarding self-service BI and analytics?

A well-managed program allows technology professionals to retain ultimate data governance

Your company has acquired joggers POC a smaller company. The integration of the information systems can take up to six months and until then joggers PLC workers will continue following their policies. You have been Tasked with ensuring that their IT practices will be safe and lead to a secure system. What advice would you give your manager regarding information security?

Authentication message being placed on sure that only does verify the access information can do so. A firewall should also be installed and share the security of the organizations access policy.

Which of the following is a provision of the USA patriot act?

Authorization of snack and peak warrants for law-enforcement agencies

Because they must deal with large quantities of data from so many different sources, I asked employees at financial institutions maybe at increased risk of failing to comply with government regulations designed to prevent money laundering, such as the the

Bank secrecy act

A slight majority 52% of 700 CIOs surveyed reported that there I S organization is viewed as a a

Business partner or peer

Assessing damage following a computer incident, investigating the unauthorized disclosure of corporate confidential data, and confirming or evaluating the Impact of industrial espionage are tasks most appropriate for

Computer forensics

What discipline combines elements of law in computer science to identify collect, examine and preserved at it from a computer systems networks and storage devices in a manner that preserve the integrity of the data gathered so that it is admissible evidence in a court of law?

Computer forensics

Because Marcus works within an I S organization viewed as a cost center in service provider buy the rest of his organization, one of his major goals is to

Consolidate IS resources and eliminate redundant functions

A Senior IS manager implements a vendor managed inventory system that reduces both the administrative costs of managing inventory in inventory holding costs. What business strategy does this represent?

Cost leadership

A high-level IS manager has his firm utilize sophisticated information systems to digitally design its products so that design defects can be detected and removed early in the process, reducing development costs. What business strategy does this represent?

Cost leadership

I seen your I S manager decides to invest in an information system that will reduce subcontractor labor cost for her organization by facilitating relocation of tools and materials to more optimal locations while rearranging workflows. What business strategy does this represent?

Cost leadership

Which of the following activities does the USA patriot act define?

Cyberterrorism

Raw fax such as a Social Security number or catalog item number for a shirt are known as

Data

Walter mentions to his manager that it would simplify the maintenance of their farms relational database if Changes made to data attributes in a single table would automatically be made throughout the database. What would best achieve this?

Data normalization

A tier 3 or 4 Data Center would be most necessary for an organization with which characteristic?

Dependent on computers to manage manufacturing operations

And upper level I asked manager propose that his organization implement a system to consolidate shipping and exception data from multiple carriers so that consumers know when they purchase will ship and when it will arrive. What business strategy does this represent?

Differentiation

Never send sensitive personal data such as credit card numbers, bank account numbers, or passwords via text or IM; only send them through websites that don't begin with HTTPS or cause a padlock icon to appear in the address bar or status bar. T/F

False

New technology innovation is rarely influence in organizations information system strategic plan since it is so strongly determined by corporate strategy. T/F

False

REM stands for random access memory form a memory that holds its contents even if the current is turned off or disrupted. T/F

False

Solid-state storage devices SSDs store data in hard drives or optical media rather than memory chips. T/F

False

Suppose a manager wishes to analyze historical trends in sales. He would use the online transaction processing OLTP system. T/F

False

The American recovery and reinvestment act title XIII helped establish the national fraud alert system to help prevent identity theft. T/F

False

A DaaS Arrangement can be especially cost effective for businesses that

Have fluctuating needs for database storage capacity

Although Roberta had signed a form preventing her doctor from sharing a personal medical records with the company she worked for, she later discovered that the doctors office had, in fact, shared her data with her health insurance provider in her employer, which caused her to be terminated. Because the doctors practice violated its own privacy policy, she was able to file a lawsuit under the

Health insurance portability and accountability act (HIPAA)

Rigorous management processes are needed to govern data in order to

Inform key business decisions with high-quality data

High quality data can increase sales by facilitating cross-selling which involves

Inviting customers to purchase an item related to what they are primarily interested in

Violating the European Union general data protection regulations and guidelines will most likely increase a successful cyber attacks

Legal consequences

Carsons supervisor has asked him to review a variety of affordable computers for possible purchase for their companies employees. Which of the following should Carson NOT consider buying?

Nettops

Is/are considered to be the most important element in computer-based information systems

People

Bubba creates a web application that allows his coworkers to generate reports providing information on sales, cost, and inventory that they need for their job functions without assistance. Bubba has developed a

Personal information system

CPU clock speed is the predetermined rate at which the processor

Produces a series of electronic pulses

Alli has noticed that people at her Company spend a lot of time researching the reasons for and correcting errors in the data they must use for their job functions. Usually when a mistake is discovered, it has already been propagated into multiple places, requiring a considerable cleanup effort. Alli realizes that improving the quality of the data at her firm will change this situation by

Raising productivity

After a successful Cybertek the fun spent on repairing affected systems, restoring loss data, and performing a post incident analysis are considered part of the

Recovery cost

Business analytics certifications in high demand include

SAP business objects, Hadoop, and Ruby on Rails

Why does the process of building software for safety critical systems take much longer and cost much more than building software for high-quality systems?

Safety critical systems are those whose failure may cause human injury or death. Software developers working on safety critical systems must be highly trained and experienced professionals. Extreme measures must be taken to identify and remove software defects from the earliest stages of development.

Hardware utilization can be improved biologically dividing the resources of a single physical server to create multiple logical servers. This approach is known as

Server virtualization

Why would Claire who has It's notified information system security professional credential, object to shadow IT efforts at her company?

Shadow IT systems and processes me like necessary levels of security required to meet compliance standards

Amazons decision to explore the possible use of delivery drones to gain a real competitive advantage over competitors who rely on less efficient ground transportation is an example of

Strategic planning

Which component of Levitt's diamond defines roles Responsibilities and lines of authority among members of the organization which must be understood and excepted for the organization to operate successfully?

Structure

Felicity who works at a bank opens multiple credit card accounts for customers without their authorization in order to improve her customer sales and thus her a parent job performance. This behavior is explicitly for bidden by bank policies and instructions for manager gave her which statement is true in this situation?

The bank can be held responsible for Felicity's behavior despite its ethical policies

Define Internet censorship and explain how it can be imposed at several different points between the speaker and his or her audience.

The control or suppression of the publishing or accessing of information on the Internet. Government entities may pressure upstream Internet service providers to limit access to certain websites. Websites reject the use of certain keywords and search engine searches and track and monitor the Internet activities of individuals.

A health insurance firm is hit by a successful cyber attack. The value of the assets stolen or damaged due to the cyber attack is considered

The direct impact of the cyber attack

One of the advantages of off the shelf software is that

The initial cost is lower because the software firm can spread the development costs ever many customers

Kennedy's company is adopting a service oriented architecture approach to software development. This means that

Their software will be flexible enough to allow the addition of new services

Describe to ethical dilemmas that often confront developers working on safety critical software.

They must carefully weigh cost and ease of use issues in developing a system that is safe and that also appeals to customers. Another key issue is deciding when sufficient software testing has been performed.

Government entities may pressure upstream Internet service providers to

Track and monitor the Internet activities of individuals

A database management system DBMS serves as an interface between an application program and a database. T/F

True

An employee who is about to be laid off by his organization since threatening emails to his boss stating he he is going to delete sensitive data. This employee can be charged under the computer fraud and abuse act. T/F

True

Downloading games from unknown websites can be risky. The software may be a Trojan horse. T/F

True

If an IS organization is viewed as a cost center/service provider, it's strategic planning process is typically directed in word and focused on determining how to do what it is currently doing but doing it cheaper, faster, and better. T/F

True

In many cases good ethics can mean good business and improved profits. T/F

True

It is possible to restrict access to data depending on the database users privileges. T/F

True

One of the primary roles of a senior IS manager is to provide subordinates with leader ship and direction that will help the organization achieve its goals. T/F

True

Secondary storage can store large amounts of data, instructions, and information more permanently than allowed with my memory. T/F

True

Software as a service allows businesses to subscribe to web delivered business application software by paying a monthly service charge or a per use fee. T/F

True

Some organizations choose to practice a form of Internet censorship by installing Internet filters on their employees computers to prevent them from viewing sites containing pornography or other objectionable material. T/F

True

The American recovery and reinvestment act title XIII include strong privacy provisions were electronica health records (EHRs) T/F

True

When a computer security incident occurs, it is recommended that the organization not reveal all they know in public forums. T/F

True

With the launch of windows 10 Microsoft and I said it would publish on going incremental upgrades instead of releasing new versions of the software every few years. However I asked professionals can opt out of frequent updates if they believe that making minimal changes well I'm sure reliable operations. T/F

True

You are given the database information: retail. Inventory, retail represent the database schema and inventory represent the table from the retail schema. T/F

True

Your friend has a Mac that runs OSX. If she needs to run a Windows app on it she can set it up to run windows also. T/F

True


Ensembles d'études connexes

CISSP-Topic 9, Business Continuity Planning

View Set

Exam 1 prep u practice questions (24, 25, 31)

View Set

Introduction to Romanticism Assignment

View Set

Principles of Econ - PREPARE Ch. 13 Questions

View Set

IN4MATX 43 - FINAL EXAM QUESTIONS

View Set