MIS Midterm
Laws and regulations have thoroughly addressed concerns about privacy and data management in private organizations and federal agencies. True False
False
Never send sensitive personal data such as credit card numbers, bank account numbers, or passwords via text or IM; only send them through Web sites that don't begin with https or cause a padlock icon to appear in the Address bar or status bar. True False
False
New technology innovations rarely influence an organization's information system strategic plan since it is so strongly determined by corporate strategy. True False
False
RAM stands for random access memory, a form of memory that holds its contents even if the current is turned off or disrupted. True False
False
Solid state storage devices (SSDs) store data in hard disk drives or optical media rather than memory chips. True False
False
Suppose a manager wishes to analyze historical trends in sales. He would use the online transaction processing (OLTP) system. True False
False
The American Recovery and Reinvestment Act Title XIII helped establish the National Fraud Alert system to help prevent identity theft. True False
False
The sql query below will only return the product ID and the total inventory for any product whose total on had value is greater or equal to 5. SELECT product_id , total_on_hand + total_on_order FROM retail.inventory WHERE total_on_hand <= 5 True False
False
The sql statement SELECT * FROM retail.inventory will return only half of the column from the inventory table. True False
False
Today, due to security concerns, most organizations avoid the database approach to data management, where multiple information systems share a pool of related data. True False
False
Two collections of attributes can have a common primary key. True False
False
Users still need help from the IT function of the organization to create customer reports using modern reporting tools. True False
False
When you receive a text message that there is a problem with your bank account and you are required you to click on a link to submit some information, you are likely facing a vishing attack. True False
False
A database management system (DBMS) serves as an interface between an application program and a database. True False
True
A database must reflect the business processes of an organization. True False
True
Downloading games from unknown websites can be risky. The software may be a Trojan horse. True False
True
In many cases, good ethics can mean good business and improved profits True False
True
It is possible to restrict access to data depending on the database user's privileges. True False
True
One of the primary roles of a senior IS manager is to provide subordinates with leadership and direction that will help the organization achieve its goals. True False
True
Secondary storage can store large amounts of data, instructions, and information more permanently than allowed with main memory. True False
True
Software as a Service (SaaS) allows businesses to subscribe to Web-delivered business application software by paying a monthly service charge or a per-use fee. True False
True
Some organizations choose to practice a form of Internet censorship by installing Internet filters on their employees' computers to prevent them from viewing sites containing pornography or other objectionable material. True False
True
Sometimes a database can contain "bad data," meaning incomplete, incorrect, inaccurate, or irrelevant records, which can be corrected or deleted through data cleansing. True False
True
The American Recovery and Reinvestment Act Title XIII includes strong privacy provisions for electronic health records (EHRs). True False
True
The GDPR obligates organizations that operate in the European Union to obtain the consent of the people they collect information about. True False
True
The data for BI (business intelligence) comes from many sources. True False
True
There are laws that require businesses to prove that their data are secure. True False
True
U.S. federal law permits employers to prevent viewing of pornography in the workplace by employees. True False
True
When a computer security incident occurs, it is recommended that the organization NOT reveal all they know in public forums. True False
True
If 10 users can run programs at the same time on the same computer, it is known as multitasking. True False
False
With the launch of Windows 10, Microsoft announced that it would publish ongoing, incremental upgrades instead of releasing new versions of the software every few years. However, IS professionals can opt out of frequent updates if they believe that making minimal changes will ensure reliable operations. True False
True
You are given the database information: retail.inventory, retail represent the database schema and inventory represent the table from the retail schema. True False
True
You work at a call center of a large bank, where you answer credit card services-related questions from customers. Lately, you have noticed an increased number of customers enquiring whether your organization initiated a call about their account. There might be a vishing scam in progress. True False
True
Your friend has a Mac that runs OS X. If she needs to run a Windows app on it, she can set it up to run Windows also. True False
True
Although Roberta had signed a form preventing her doctor from sharing her personal medical records with the company she worked for, she later discovered that the doctor's office had, in fact, shared her data with her health insurance provider and her employer, which caused her to be terminated. Because the doctor's practice violated its own privacy policy, she was able to file a lawsuit under the ________. a. Health Insurance Portability and Accountability Act b. Health and Medical Records Privacy Act c. Gramm-Leach-Bliley Act d. none of these answers
a. Health Insurance Portability and Accountability Act
Which component of Leavitt's Diamond defines roles, responsibilities, and lines of authority among members of the organization, which must be understood and accepted for the organization to operate successfully? a. structure b. technology infrastructure c. people d. processes
a. Structure
_____ encompasses all the activities required to get the right product into the right consumer's hands in the right quantity at the right time and at the right cost, from acquisition of raw materials through customer delivery. a. Supply chain management b. Value chain management c. Inventory management d. Customer management
a. Supply chain management
Felicity, who works at a bank, opens multiple credit card accounts for customers without their authorization in order to improve her customer sales, and thus her apparent job performance. This behavior is explicitly forbidden by bank policies and the instructions her manager gave her. Which statement is true in this situation? a. The bank can be held responsible for Felicity's behavior despite its ethical policies. b. The bank cannot be held responsible for Felicity's actions since they were contrary to bank policies. c. This situation demonstrates how bad organizational ethics can lead to bad business results. d. The principle called respondeat superior, meaning "let the master answer," does not apply.
a. The bank can be held responsible for Felicity's behavior despite its ethical policies.
How do fair information practices in the United States and the European Union differ? a. Unlike the EU, the U.S. has no single, overarching national data privacy policy. b. Unlike the U.S., the EU has implemented numerous data privacy laws. c. Unlike the EU, the U.S. addresses potential abuses by private industry but not by the government. d. Unlike the U.S., the EU divides their data privacy laws into three ares: financial, health related, and child specific.
a. Unlike the EU, the U.S. has no single, overarching national data privacy policy.
Which of the following activities does the USA Patriot Act define? a. cyberterrorism b. identity theft c. credit card fraud d. transmitting virus programs
a. cyberterrorism
Raw facts such as a social security number or catalog item number for a shirt are known as _____. a. data b. knowledge c. information d. entities
a. data
Walter mentions to his manager that it would simplify the maintenance of their firm's relational database if changes made to data attributes in a single table would automatically be made throughout the database. What would best achieve this? a. data normalization b. selecting c. data cleansing d. concurrency control
a. data normalization
A hospital system that wants to utilize big data can use HIPAA regulations to help them _____. a. identify which data needs to be protected from unauthorized access b. find nuggets of data that are relevant to the decision making at hand c. choose a subset of data to store d. process unstructured data into a usable form
a. identify which data needs to be protected from unauthorized access
A successful IS manager recognizes that sustaining a competitive advantage _____. a. means evolving to account for changes in customer needs b. requires little effort compared with initially gaining that advantage c. is outside the IS department's roles in most organizations d. primarily involves consistency in product and service offerings
a. means evolving to account for changes in customer needs
Bubba creates a web application that allows his coworkers to generate reports providing information on sales, costs, and inventory that they need for their job functions without assistance. Bubba has developed a(n) _____. a. personal information system b. workgroup information system c. enterprise information system d. interorganizational information system
a. personal information system
A collection of characteristics that belong to a single person, place, or thing for which data is maintained is a(n) _____. a. record b. file c. attribute d. character
a. record
Kennedy's company is adopting a service-oriented architecture approach to software development. This means that _____. a. their software will be flexible enough to allow the addition of new services b. their software will consist of many program modules that do not share information c. they have decided not to build or adopt microservices in the future d. they can build software without creating application programming interfaces
a. their software will be flexible enough to allow the addition of new services
High-quality data on the operations of the business is the primary ingredient of any effort to improve _____. a. worker efficiency or service quality b. competitive advantage c. customer experiences or satisfaction d. IS security
a. worker efficiency or service quality
Because they must deal with large quantities of data from so many different sources, IS employees at financial institutions may be at increased risk of failing to comply with government regulations designed to prevent money laundering, such as the _____. a. Sarbanes-Oxley Act b. Bank Secrecy Act c. HIPAA d. PCI Data Security Standard
b. Bank Secrecy Act
How is data governance different from data management? a. Data management is the core component of data governance. b. Data governance is the core component of data management. c. Data management involves defining processes, whereas data governance does not. d. Data governance involves defining processes, whereas data management does not.
b. Data governance is the core component of data management.
American's rights to freedom of religion, freedom of expression, and freedom to assemble peaceably are protected by the _____. a. Fourth Amendment b. First Amendment c. COPPA d. HIPA
b. First Amendment
Which element is not part of the CIA triad? a. Integrity b. Integration c. Confidentiality d. Availability
b. Integration
Business analytics certifications in high demand include _____. a. AJAX, C#, and Sharepoint b. SAP Business Objects, Hadoop, and Ruby on Rails c. Cisco, LINUX/UNIX, and CISSP d. .NET, PHP, and Java
b. SAP Business Objects, Hadoop, and Ruby on Rails
Which of the following is a provision of the USA PATRIOT Act? a. termination of the bulk collection of telephone records and Internet metadata b. authorization of "snack and peak warrants" for law enforcement agencies c. gathering of foreign intelligence from non-Americans outside the U.S. d. requirement for judicial authorization within 72 hours after surveillance of U.S. citizens begins
b. authorization of "snack and peak warrants" for law enforcement agencies
Autumn develops a strategic plan that will allow her organization to take advantage of opportunities and trends by _____. a. staying focused on costs b. being proactive c. reacting passively d. remaining in state of flux
b. being proactive
Assessing damage following a computer incident, investigating the unauthorized disclosure of corporate confidential data, and confirming or evaluating the impact of industrial espionage are tasks most appropriate for _____. a. managed security service providers b. computer forensics c. the CIA security triad d. a security dashboard
b. computer forensics
A high-level IS manager has his firm utilize sophisticated information systems to digitally design its products so that design defects can be detected and removed early in the process, reducing development cost. What business strategy does this represent? a. high standards b. cost leadership c. differentiation d. focus
b. cost leadership
A senior IS manager decides to invest in an information system that will reduce subcontractor labor costs for her organization by facilitating relocation of tools and materials to more optimal locations while rearranging workflows. What business strategy does this represent? a. high standards b. cost leadership c. differentiation d. focus
b. cost leadership
A senior IS manager implements a vendor-managed inventory system that reduces both the administrative costs of managing inventory and inventory holding costs. What business strategy does this represent? a. high standards b. cost leadership c. differentiation d. focus
b. cost leadership
Haley needs to query her firm's database, Jeff needs to generate a report for his next project status meeting, and Karen needs to make some modifications to update the data in the database. Which of the following tools can they all use to complete their current task? a. data dictionary b. data manipulation language c. data definition language d. These tasks require different tools.
b. data manipulation language
An IS manager is focusing on the people component of Leavitt's Diamond when he or she _____. a. delegates the responsibility for creating new procedures b. ensures that the IS help desk is available during work hours c. selects new IS software and service providers d. clarifies the changes in employee roles related to a new IS
b. ensures that the IS help desk is available during work hours
A DaaS arrangement can be especially cost effective for businesses that _____. a. host their own physical backup and recovery b. have fluctuating needs for database storage capacity c. require unusual data security processes be enforced d. prefer to build and maintain their own data centers
b. have fluctuating needs for database storage capacity
In which step of the ethical decision-making process is it essential to communicate well with all stakeholders and have someone they trust and respect explain why things are changing and how this will benefit them? a. evaluate the results b. implement the decision c. choose an alternative d. identify alternatives
b. implement the decision
A type of memory whose contents are not lost if the power is turned off or interrupted is said to be _____. a. unarbitrary b. nonvolatile c. inaccessible d. nonadjacent
b. nonvolatile
CPU clock speed is the predetermined rate at which the processor _____. a. processes instructions b. produces a series of electronic pulses c. produces a number of files d. loads memory pages
b. produces a series of electronic pulses
Amazon's decision to explore the possible use of delivery drones to gain a real competitive advantage over competitors who rely on less efficient ground transportation is an example of _____. a. inbound logistics b. strategic planning c. procurement d. human resource management
b. strategic planning
Government entities may pressure upstream Internet service providers to _____. a. immediately take down particular hosted material b. track and monitor the Internet activities of individuals c. deregister domains because of their hosted content d. accept defamation or copyright infringement claims
b. track and monitor the Internet activities of individuals
Why would Claire, who has a Certified Information Systems Security Professional credential, object to shadow IT efforts at her company? a. Issues can arise over the responsibility to fix shadow IT solutions when they break. b. Shadow IT provides the opportunity to evaluate and test many more information system initiatives. c. Shadow IT systems and processes may lack necessary levels of security required to meet compliance standards. d. Shadow IT delays testing of quick solutions to business needs.
c. Shadow IT systems and processes may lack necessary levels of security required to meet compliance standards.
What discipline combines elements of law and computer science to identify, collect, examine, and preserve data from computer systems, networks, and storage devices in a manner that preserves the integrity of the data gathered so that it is admissible as evidence in a court of law? a. CIA implementation b. risk assessment c. computer forensics d. security policy
c. computer forensics
A tier 3 or 4 data center would be most necessary for an organization with which characteristic? a. small with few employees b. prepared to process manual customer orders manually c. dependent on computers to manage manufacturing operations d. impacted by long-term but not short-term business disruptions
c. dependent on computers to manage manufacturing operations
An upper-level IS manager proposes that his organization implement a system to consolidate shipping and exception data from multiple carriers so that consumers know when their purchase will ship and when it will arrive. What business strategy does this represent? a. high standards b. cost leadership c. differentiation d. focus
c. differentiation
You might be a successful information systems worker if you _________. a. prefer a slow-paced environment where technology rarely changes b. prefer to work only on the computer and are not interested in the business c. enjoy learning new techniques and enjoy working with people d. are good at book-keeping, like an accountant
c. enjoy learning new techniques and enjoy working with people
Which type of information system do organizations use to define structured interactions among employees or between the organizational and external customers, suppliers, or business partners? a. personal information system b. workgroup information system c. enterprise information system d. interorganizational information system
c. enterprise information system
A database system that stores the entire database in random access memory is known as a(n) _____. a. relational database b. HDFS database c. in-memory database d. NoSQL database
c. in-memory database
Rigorous management processes are needed to govern data in order to _____. a. evade external regulations that manage risk associated with financial data b. support haphazard or incomplete business processes c. inform key business decisions with high-quality data d. isolate data architecture management from security management
c. inform key decisions with high-quality data
Violating the European Union General Data Protection Regulation guidelines will most likely increase a successful cyberattack's _____. a. direct impacts b. recovery costs c. legal consequences d. reputation damage
c. legal consequences
Carson's supervisor has asked him to review a variety of portable computers for possible purchase for their company's employees. Which of the following should Carson NOT consider buying? a. laptops b. notebooks c. nettops d. tablets
c. nettops
Compared with the traditional licensing model in which users purchase and install software, SaaS _____. a. can be accessed from fewer devices per license b. provides more reliable access in areas with no Internet service c. offers less expensive upgrades and new releases d. requires more maintenance on the part of customers
c. offers less expensive upgrades and new releases
After a successful cyberattack, the funds spent on repairing affected systems, restoring lost data, and performing a post-incident analysis are considered part of the _____. a. direct impact b. business disruption c. recovery cost d. legal consequences
c. recovery cost
After completing a security self-assessment, Hal decides to improve his practices related to use of social media sites such as Facebook. How can he make his social media use safer? a. access social media sites via a VPN b. change his password to one that includes only numbers and is eight characters long c. review, understand, and if necessary adjust his privacy settings for these sites d. run his antivirus software just before he logs in to these sites
c. review, understand, and if necessary adjust his privacy settings for these sites
Hardware utilization can be improved by logically dividing the resources of a single physical server to create multiple logical servers. This approach is known as _____. a. real-time task scheduling b. multithreading c. server virtualization d. multiprocessing
c. server virtualization
The purpose of business intelligence is to _____. a. provide access to novel tools to end users b. reduce the cost of data processing c. support improved decision making d. improve employee morale
c. support improved decision making
Big data veracity is a measure of _____. a. the degree of organization or structure of the data b. the data's worth for decision making in a given scenario c. the accuracy, completeness, and currency of the data d. the rate at which data in an area is becoming available
c. the accuracy, completeness, and currency of the data
One of the advantages of off-the-shelf software is that ________________. a. an organization does not have to pay for features that are not required and never used b. the software always matches current work processes and data standards c. the initial cost is lower because the software firm can spread the development costs over many customers d. the software contains important features, thus eliminating the need for future modification and customization
c. the initial cost is lower because the software firm can spread the development costs over many customers
_____ are people who work directly with information systems to get results. a. System analysts b. Database administrators c. System developers d. End users
d. End users
Which amendment protects Americans' rights to freedom of religion, freedom of expression, and freedom to assemble peaceably? a. Second b. Third c. Fourth d. First
d. First
_____ is/are considered to be the most important element in computer-based information systems. a. Bandwidth b. Software applications c. Standard operating procedures d. People
d. People
A company's risk assessment process can consider numerous threats to the computers and networks. Which of the following should an organization identify as loss events or threats to assess? a. distributed denial-of-service attack b. email attachment with harmful worm c. harmful virus d. all of the above
d. all of the above
During the early formation of the United States, many influential writings criticizing British rule were published without the real names of their authors. These publications represented a form of _____. a. slander b. First Amendment expression c. incitement to crime d. anonymous expression
d. anonymous expression
A slight majority (52%) of 700 CIOs surveyed reported that their IS organization is viewed as a _____. a. cost center or service provider b. value chain c. game changer d. business partner or peer
d. business partner or peer
To successfully fight computer crime in a court of law, prosecutors and victims depend on a properly handled _____. a. security education initiative b. intrusion detection system c. corporate security risk assessment d. computer forensics investigation
d. computer forensics investigation
An IS manager recommends that his organization invest in improving its customer information system so as to more clearly define the target market and improve service to that market. What business strategy does this represent? a. high standards b. cost leadership c. differentiation d. focus
d. focus
Collaboration between two or more organizations that lowers costs and reduces manual effort among employees is enabled by a(n) _____. a. personal information system b. workgroup information system c. enterprise information system d. interorganizational information system
d. interorganizational information system
High-quality data can increase sales by facilitating cross-selling, which involves _____. a. delivering a generalized shopping experience to customers b. ensuring customers pay a fair, correct price for each product they purchase c. encouraging customers to buy a comparable but higher-end product d. inviting customers to purchase an item related to what they are primarily interested in
d. inviting customers to purchase an item related to what they are primarily interested in
Helen is 72 years old and is a retired school teacher on a fixed income. She would like to buy a new computer so that she can communicate via email, follow friends and family on social media, and occasionally access recipes and gardening tips from the Web. An important thing to consider is that Helen has arthritis in her hands, making it difficult for her to work with small buttons and gadgets. So, of the following options, her best choice is probably a(n) ________. a. smartphone b. e-book c. desktop d. nettop
d. nettop
Ethical business practices _____. a. create a negative discrepancy between employee and organizational values b. increase employee turnover when workers feel their actions are overly restricted c. are usually more expensive for a business over the long term than unethical ones d. often raise an organization's priority with suppliers and other business partners
d. often raise an organization's priority with suppliers and other business partners
While conducting a security self-assessment of his personal laptop use, Vann realizes that he is putting himself at risk by _____. a. upgrading his operating system too often b. installing both firewall and antivirus software at the same time c. purchasing new anti-malware software before it has been reviewed by other consumers d. putting off installing available software updates that he has been notified about
d. putting off installing available software updates that he has been notified about
Allie has noticed that people at her company spend a lot of time researching the reasons for and correcting errors in the data they must use for their job functions. Usually when a mistake is discovered, it has already been propagated into multiple places, requiring a considerable clean-up effort. Allie realizes that improving the quality of the data at her firm would change this situation by _____. a. increasing sales b. improving decision making c. facilitating innovation d. raising productivity
d. raising productivity
What do AT&T, Computer Sciences Corporation, Dell SecureWorks, IBM, Symantec, and Verizon have in common? a. they recently suffered massive data breaches b. they pioneered bring your own device policies c. they have reduced their security risk to zero d. they are managed security service providers
d. they are managed security service providers
A well-designed series of rules or algorithms is a key component of which stage of the ETL process? a. extract b. edit c. load d. transform
d. transform