MIS Midterm

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

_____ is typically used to temporarily hold small units of program instructions and data immediately before, during, and after execution by the central processing unit (CPU). a. A register b. The motherboard c. Main memory d. The control unit

A register [CH 4]

How is scalability in a server achieved? a. By adding processors b. By adding memory c. By adding hard drives d. By adding files

By adding processors [CH 4]

Which term describes the range of allowable values for a data attribute? a. Concurrency control b. Domain c. File d. Schema

Domain [CH 5]

True or False: To date, semiconductor fabricators have been able to make ICs (integrated circuits) that hold up to several million electronic components in an area the size of a fingernail.

False (severall *B*illion) [CH 4]

True or False: Information consists of raw facts.

False [CH 5]

True or False: Enterprise information systems are also known as collaborative systems.

False [CH1]

Which amendment protects Americans' rights to freedom of religion, freedom of expression, and freedom to assemble peaceably? a. First b. Second c. Third d. Fourth

First [CH 3]

Which amendment protects Americans from illegal searches and seizures? a. First b. Second c. Third d. Fourth

Fourth [CH 3]

A(n) __________ is software that can be used to block access to certain Web sites that contain material deemed inappropriate or offensive. a. grid b. Internet filter c. safety-critical system d. fence

Internet filter [CH 3]

Which term refers to an organization's business processes that are essential to continued operations and goal attainment within the organization? a. Asymmetric processes b. Failover processes c. Mission critical processes d. Next-generation plans

Mission critical processes [CH 2]

Which term describes a structured set of related activities that takes input, adds value, and creates an output for the customer of that process? a. Procedure b. Process c. Structure d. Standard

Process [CH1]

Which term refers to a description that defines the logical and physical structure of the database by identifying the tables, the attributes in each table, and the relationships between attributes and tables? a. Data item b. ER diagram c. Schema d. File

Schema [CH 5]

Which term is used to describe the information systems and solutions built and deployed by departments other than the information systems department? a. Personal information systems b. Shadow IT c. Freelanced structure d. Enterprise information systems

Shadow IT [CH1]

Which act protects the records of financial institutions' customers from unauthorized scrutiny by the federal government? a. The Fair Credit Reporting Act b. The Right to Financial Privacy Act c. The Health Insurance Portability and Accountability Act (HIPAA) d. The American Recovery and Reinvestment Act Title XIII

The Right to Financial Privacy Act [CH 3]

True or False: In a security incident, the primary goal must be to regain control and limit damage, not to attempt to monitor or catch an intruder.

True [CH 2]

True or False: A written defamatory statement is libel.

True [CH 3]

True or False: In a typical computer configuration, secondary storage has a much larger capacity than the volatile random access memory.

True [CH 4]

True or False: The ideal goal is a power usage effectiveness (PUE) of 1.0, which would indicate that all the power goes to running the computers.

True [CH 4]

True or False: The programming language syntax dictates how the symbols, keywords, and commands should be combined into statements capable of conveying meaningful instructions to the CPU.

True [CH 4]

True or False: The technology infrastructure forms the foundation of every computer-based information system.

True [CH1]

Clock speed is measured in __________. a. nanometers (nm) b. bytes (B) c. gigahertz (GHz) d. kilohertz (KHz)

gigahertz (GHz) [CH 4]

When choosing from various types of flat-panel displays, choose a(n) _______ for the lowest power consumption. a. organic light-emitting diode (OLED) display b. liquid crystal display (LCD) c. plasma display d. light-emitting diode (LED) display

organic light-emitting diode (OLED) display [CH 4]

Quantum computers are based on __________. a. quertz b. qubits c. gigabytes d. nanometers

qubits [CH 4]

Which term refers to the process of detecting and then correcting or deleting incomplete, incorrect, inaccurate, or irrelevant records that reside in a database? a. Concurrency control b. Data cleansing c. Data normalization d. Data governance

Data cleansing [CH 5]

Which term describes a large group of computers that are controlled from one or more remote locations by hackers without the knowledge or consent of their legitimate owners? a. Intrusion detection system (IDS) b. Virtual private network (VPN) c. Botnet d. Proxy server

Botnet [CH 2]

Which professional often specializes in a particular functional area? a. Web developer b. Software developer c. Business analyst d. IS security analyst

Business analyst [CH1]

Check My Work Compared with the traditional licensing model in which users purchase and install software, SaaS _____. a. provides more reliable access in areas with no Internet service b. offers less expensive upgrades and new releases c. can be accessed from fewer devices per license d. requires more maintenance on the part of customers

offers less expensive upgrades and new releases [CH 4]

Which of these options is the most current variety of RAM that Emma can order for her computer? a. SDRAM b. DDR4 c. DDR3 d. DRAM

DDR4 [CH 4}

_____ are used to grade standardized tests, including the SAT and GMAT tests, and to record votes in elections. a. Magnetic ink character recognition (MICR) devices b. Optical mark recognition (OMR) systems c. Optical character recognition (OCR) systems d. Speech recognition devices

Optical mark recognition (OMR) systems [CH 4]

Which term refers to the process of assessing security-related risks to an organization's computers and networks from both internal and external threats? a. Disaster recovery planning b. Computer forensics analysis c. Business continuity planning d. Risk assessment planning

Risk assessment planning [CH 2]

Which term refers to a process for predicting future values based on certain potential events? a. Visual analytics b. Data mining c. Monte Carlo simulation d. Scenario analysis

Scenario analysis [CH 6]

True or False: A data steward is typically a non-IS employee.

True [CH 5]

The process of converting human-readable data into machine-readable form is called _____. a. data conversion b. data entry c. source data automation d. data input

data entry [CH 4]

Adrian works for a company that relies on computers to run applications that perform intensive data calculations, to manage email, printing, and security for employees, and to provide massive data storage and retrieval capabilities. Which class of general-purpose computer systems can fulfill all of these business needs? a. single-user portable computers b. multiple-user computers c. embedded computers d. single-user nonportable computers

multiple-user computers [CH 4]

Which type of end user license requires that a single copy of the software reside on a file server? a. general public b. individual/multiuser c. network/multiuser d. single-user

network/multiuser [CH 4]

Which process defines the roles, responsibilities, and processes for ensuring that data can be trusted and used by the entire organization, with people identified and in place who are responsible for fixing and preventing issues with data? a. Data cleansing b. Data normalization c. Data governance d. Concurrency control

Data governance [CH 5]

Which term refers to the process of organizing the data in a relational database to eliminate data redundancy and ensure data dependencies make sense? a. Data cleansing b. Data normalization c. Data governance d. Concurrency control

Data normalization [CH 5]

Which term describes a large database that holds business information from many sources in the enterprise, covering all aspects of the company's processes, products, and customers? a. Data warehouse b. Data mart c. Data lake d. NoSQL database

Data warehouse [CH 6]

Which term describes a well-designed, organized, and carefully managed collection of data? a. Model b. ER diagram c. Schema d. Database

Database [CH 5]

What measure primarily determines the quality of a printer? a. Number of horizontal and vertical pixels b. Pages printed per minute (ppm) c. Dots printed per inch (dpi) d. Frame rate

Dots printed per inch (dpi) [CH 4]

Which model identifies the data entities and data attributes of greatest interest to the organization along with their associated standard data definitions, data length and format, domain of valid values, and any business rules for their use? a. Database management system (DBMS) model b. Entity-relationship (ER) diagram model c. Enterprise data model d. Relational database model

Enterprise data model [CH 5]

Electronic data interchange (EDI) is an example of which type of information system? a. Personal information system b. Workgroup information system c. Enterprise information system d. Interorganizational IS

Enterprise information system [CH1]

Which term refers to software and/or hardware that monitors system and network resources and activities and notifies network security personnel when it detects network traffic that attempts to circumvent the security measures of a networked computer environment? a. Intrusion detection system (IDS) b. Virtual private network (VPN) c. Proxy server d. Botnet

Intrusion detection system (IDS) [CH 2]

True or False: In many cases, good ethics can mean good business and improved profits.

True [CH 3]

The image collection on your hard drive totals 500 million bytes in size. A 2-gigabyte storage device will be adequate to store those photos. a. True b. False

True [CH 4]

True or False: A workstation is typically more expensive than the average desktop computer.

True [CH 4]

True or False: Software as a service is a software distribution model under which a third-party provider hosts applications and makes them available to subscribers over the Internet.

True [CH 4]

Which term describes a collection of similar entities? a. File b. Folder c. Model d. Schema

File [CH 5]

Which term describes the result of a successful cyberattack that makes it impossible for an organization to operate in an effective manner for several hours or days? a. Failover b. Business disruption c. Data breach d. Exploit

Business disruption [CH 2]

Which term refers to the deployment of malware that secretly steals data in the computer systems of organizations? a. Ransomware b. Cyberespionage c. Botnet d. Zero-day attack

Cyberespionage

Which term refers to a collection of instructions and commands used to define and describe data and relationships in a specific database? a. Structured Query Language (SQL) b. Concurrency control language (CCL) c. Data definition language (DDL) d. Data manipulation language (DML)

Data definition language (DDL) [CH 5]

Which term describes the set of principles about what is right and wrong that individuals use to make choices to guide their decisions? a. Laws b. Ethics c. Mission d. Values

Ethics [CH 3]

True or False: A security policy outlines how to achieve an organization's security requirements.

False [CH 2]

True or False: Integrity refers to the assurance that data can be accessed when and where needed, including during times of disaster recovery operations.

False [CH 2]

True or False: The Foreign Intelligence Surveillance Act (FISA) requires the government to obtain an individualized court order before it can intentionally target a U.S. person anywhere in the world to collect the content of his/her communications.

False [CH 3]

True or False: Cache memory is available in two forms: level 1, which is found on the CPU chip, and level 2, which can be accessed over a high-speed dedicated interface.

False [Ch 4]

Which term refers to a system of software, hardware, or a combination of both that stands guard between an organization's internal network and the Internet, and limits network access based on the organization's access policy? a. Vector b. Firewall c. Virtual private network (VPN) d. Botnet

Firewall [CH 2]

Which term describes the use of a collection of computers, often owned by multiple individuals or organizations, that work in a coordinated manner to solve a common problem? a. Green computing b. RAID technology c. Multiprocessing d. Grid computing

Grid computing [CH 4]

Which term refers to a virtual server program that controls the host processor and resources, allocates the necessary resources to each virtual machine, and ensures that they do not disrupt each other? a. Software as a service b. App c. Kernel d. Hypervisor

Hypervisor [CH 4]

Which term refers to a facility that houses a large number of servers in the same room, where access to the machines can be controlled and authorized support personnel can more easily manage and maintain the servers? a. Enterprise b. Semiconductor fabrication plant c. Server farm d. Grid computing

Server farm [CH 4]

True or False: The American Recovery and Reinvestment Act Title XIII includes strong privacy provisions for electronic health records (EHRs).

True [CH 3]

True or False: A collection of attributes about a specific entity is a record.

True [CH 5]

Which term can be defined as the extensive use of data and quantitative analysis to support fact-based decision making within organizations? a. Business intelligence b. Analytics c. NoSQL d. Warehousing

Analytics [CH 6]

True or False: An attribute is a characteristic of an entity.

True [CH 5]

Which three terms are referenced in the CIA security triad? a. Confidentiality, integrity, and auditability b. Confidentiality, integrity, and availability c. Certainty, integrity, and authenticity d. Certainty, integrity, and auditability

Confidentiality, integrity, and availability [CH 2]

Which term refers to a graphical representation that summarizes the steps a consumer takes in making the decision to buy your product and become a customer? a. Word cloud b. Conversion funnel c. Visual analytics d. Regression analysis

Conversion funnel [CH 6]

The role of the __________ is to employ an IS department's equipment and personnel to help the organization attain its goals.

Chief Information Officer [CH1]

Which term describes a definition of the relationships among the members of an organization including their roles, responsibilities, and lines of authority necessary to complete various activities? a. Process b. Procedure c. Structure d. Workgroup

Structure [CH1]

__________ encryption algorithms use the same key for both encryption and decryption.

Symmetric [CH 2]

Which term refers to the unintended release of sensitive data or the access of sensitive data by unauthorized individuals, often resulting in identify theft? a. Attack vector b. Business disruption c. Data breach d. Exploit

Data breach [CH 2]

Which term refers to a preliminary data processing stage used to identify patterns in the data and answer questions about who, what, where, when, and to what extent? a. Descriptive analysis b. Predictive analysis c. Optimization d. Regression analysis

Descriptive analysis [CH 6]

Which type of server stores and provides access to programs that meet the needs of an entire organization? a. System b. Enterprise c. File d. Web

Enterprise [CH 4]

True or False: A thick client is a low-cost, centrally managed computer with no internal or external attached drives for data storage

False [CH 4]

Computer __________ is a discipline that combines elements of law and computer science to identify, collect, examine, and preserve data from computer systems, networks, and storage devices in a manner that preserves the integrity of the data gathered so that it is admissible as evidence in a court of law.

Forensics [CH 2]

What determines how many display devices can be attached to the computer? a. Graphics card b. Processor speed c. Ram size d. Secondary storage size

Graphics card [CH 4]

Which type of operating system is used in larger server or mainframe computers that support hundreds or thousands of people, all using the computer at the same time? a. Single computer with a single user b. Single computer with multiple simultaneous users c. Multiple computers with multiple users d. Special-purpose computers

Single computer with multiple simultaneous users [CH 4]

Which type of portable computer allows a user to roam the office, home, or factory floor, carrying the device like a clipboard? a. Smartphone b. Laptop c. Tablet d. Notebook

Tablet [CH 4]

Which term describes a set of interrelated components that work together to support fundamental business operations, data reporting and visualization, data analysis, decision making, communications, and coordination within an organization? a. Value chain b. Supply chain c. Information system d. Process chain

Information system [CH1]

Which type of information system enables the sharing of information across organizational boundaries? a. Personal information system b. Workgroup information system c. Enterprise information system d. Interorganizational IS

Interorganizational IS [CH1]

As part of a team that develops software using the SOA approach, Josie is helping to write an API set. Why is this an important task? a. It performs many specific, well-defined functions for users of the application. b. It is not important because the SOA approach does not require development of API. c. It can help manage security, enforce corporate strategies, and control mobile content streaming. d. It allows microservices written by other team members to communicate with one another.

It allows microservices written by other team members to communicate with one another. [CH 4]

Which general-purpose programming language is used to develop applications for Google's Android smartphone? a. Java b. Python c. C d. Perl

Java [CH 4]

Which term describes a system of rules that tells us what we can and cannot do? a. Law b. Ethics c. Mission d. Values

Law [CH 3]

Which term describes an organizational change model that organizations use to introduce new systems into the workplace in a manner that lowers stress, encourages teamwork, and increases the probability of a successful implementation? a. Leavitt's Triangle b. Porter's Value Model c. Leavitt's Diamond d. Enterprise Forces

Leavitt's Diamond [CH1]

Which term refers to enabling more than one program to run concurrently? a. Multitasking b. Multiprocessing c. Multithreading d. Multiuser

Multitasking [CH 4]

Which term describes an entity that can store and retrieve data that is modeled using some means other than the simple two-dimensional tabular relations used in relational databases? a. Data warehouse b. Data mart c. Data lake d. NoSQL database

NoSQL database [CH 6]

What measure primarily determines the quality of a screen image? a. Number of vertical pixels b. Number of horizontal pixels c. Number of horizontal and vertical pixels d. Size of the horizontal and vertical pixels

Number of horizontal and vertical pixels [CH 4]

Emma needs a monitor that will be easily viewable from multiple angles and will produce bright, sharp images. She's been advised that a(n) __________ monitor, which does not rely on a backlight, will give her the best performance. a. Plasma b. LCD c. OLED d. LED

OLED [CH 4]

Which term refers to eliminating columns in a table? a. Selecting b. Projecting c. Normalizing d. Reducing

Projecting [CH 5]

True or False: Data lifecycle management (DLM) is a policy-based approach to managing the flow of an enterprise's data, from its initial acquisition or creation and storage to the time when it becomes outdated and is deleted.

True [CH 5]

True or False: NoSQL databases do not require a predefined schema.

True [CH 6]

True or False: The educational requirements for being a data scientist are quite rigorous.

True [CH 6]

True or False: Video analysis is used to identify trends and patterns.

True [CH 6]

True or False: IT certifications may be used to differentiate between equally qualified job candidates.

True [CH1]

Which term describes a series of activities that an organization performs to transform inputs into outputs in such a way that the value of the input is increased? a. Value chain b. Supply chain c. Information system d. Process chain

Value chain [CH1]

Which professional designs and maintains Web sites, including site layout and function, to meet the client's requirements? a. Programmer b. Web developer c. Software developer d. System support analyst

Web developer [CH1]

Which type of information system supports teamwork and enables people to work together effectively, whether team members are in the same location or dispersed around the world? a. Personal information system b. Workgroup information system c. Enterprise information system d. Interorganizational IS

Workgroup information system [CH1]

Which term refers to an attack that takes place before the security community becomes aware of and fixes a security vulnerability? a. Botnet b. Ransomware c. Distributed denial-of-service (DDoS) attack d. Zero-day attack

Zero-day attack [CH 2]

During the meeting, one of the committee members asks how you will monitor the progress of the app's development and test its features along the way to ensure it does what you're expecting it to. What tool can you use to see how the app will perform on Android devices? a. Compiler b. Interpreter c. SDK d. IDE

SDK [CH 4]


Ensembles d'études connexes

Section 20.4: B & T lymphocytes and antigen-presenting cells are cells of the adaptive immune response

View Set

وسائل الحصول على ادله الاثبات شيت6 _2

View Set

Chapter 7: Strict Liability and Product Liability

View Set

Health Online- The Importance of Mental and Emotional Health and Building Healthy Relationships- Stress and Stress Management

View Set

CPA Exam - FAR - Area III - Leases

View Set