WGU C724 Information Systems Management
An advantage to prototyping is that the user gets to do what?
"Test drive" the system before it is implemented
b and d
(Choose 2 answers) In order for a business to develop a global information system, it is important to understand the business drivers that are necessary to conduct business successfully in the global market. Examples of business drivers that a company can control include: a.) Economic conditions b.) Excellent marketing c.) Customer support d.) Trade relations
Bluetooth is a wireless protocol that connects nearby devices with peripherals at _________________.
2.4Ghz
How many layers are in the standard OSI model?
7- physical, data, network, transport, session, presentation, application
Growth
A business offers a marketing service that is offered by many other businesses in the local area. It is a highly competitive industry. The business finds an investor who gives the business enough money to expand the business into all 50 states in a short period of time. This business is using the strategy of WHAT? a.) Product differentiataion b.) Synergy c.) Growth
Visual flowchart representation of the decision and outcomes but does not use roots in the model
A decision tree analysis tool presents a WHAT? a.) Visual flow chart representation of the decision and outcomes and includes use roots in the model b.) Text based flow chart representation of the decision and outcomes but does not use roots in the model c.) Visual flowchart representation of the decision and outcomes but does not use roots in the model
Cultural Particularism
A societal norm that emotionally ties people to local brands or habits.
What is a social media activity that should be avoided by job seekers?
Any post or activity that represents discriminatory behavior.
Security policies are output from an organization's risk assessment process, which cover an organization's need for various levels of security. Auditing is an example of a security policies control. Which of the following is FALSE regarding auditing?
Auditing can only be used by the accounting department.
Action-specific verbs
Because feedback is not readily available with written communication, the content must be accurate and contain sufficient detail. Which of the following is most likely to increase the audience understanding of written communication? a.) Action-specific verbs b.) Acronyms c.) Technical terms
What is another name for a network host?
Data terminal equipment
Which of the following is a primary role of information systems managers?
Decision Making - one of the primary roles of management.
How does executive management use Executive Support Systems (ESS)?
ESS Provide High-Level Information in KPI Format - ESS compile critical data into key performance indicators for executive level monitoring and decision making.
The fundamental tenets of responsibility, accountability, and liability for all businesses and its citizens to follow
Ethical principles often form the foundation for legal regulations. Governmental agencies create these legal regulations to define which of the following? a.) The fundamental tenets of responsibility and accountability, but not liability as this is a legal issue. b.) The fundamental tenets of responsibility, accountability, and liability for all businesses and its citizens to follow. c.) The fundamental laws of responsibility, accountability, and liability for all businesses and its citizens to follow.
Instagram, Pinterest, and Snapchat have experienced significant user growth, but still trail __________________________________ in number of users and user engagement.
Facebook - still the most common social media site in the United States with 58% of adults and 71% of teens (ages 13 to 17) using the site.
Foreign Key
Field that is a primary key to another table.
Access to information
Handheld smart devices have increased productivity because, most importantly, they allow WHAT from anywhere? a.) Communication b.) Access to information c.) Collaboration
ABC Playground Company has been asked to build a new playground for a local elementary school. The project must be completed before the first day of school. What would increase the likelihood of finishing the project on time?
Have the most experienced workers complete tasks on the critical path
Network
In MIS, the WHAT component consists of hubs, communication media, and network devices and can be wired or wireless? a.) Infrastructure b.) Hardware c.) Network
optical character recognition (OCR)
Input devices and methods have included now-archaic punch cards or magnetic readers
What are the basic activities of information management?
Input, processing, and output
What's the difference between ICR and OCR
Intelligent character recognition (ICR) is an intelligent or advanced form of Optical Character Recognition (OCR)
Which of the following statement is TRUE concerning safe harbor?
It is a self-regulation component.
Why do users fail to adopt new information systems?
Lack of training or acceptance for new system.
Data dictionary
Metadata is data about the data, and it is the necessary information needed to understand and use data effectively. Where would the metadata about Customer and Product tables be stored? a.) DBMS b.) Database c.) Data dictionary d.) ERD (Entity-relationship Diagram)
The systems analyst is required to do which job?
Prepare and explain written reports and keep stakeholders updated
By advertising and selling physical products online, e-commerce allows customers to achieve all of the following, except:
Previewing and examining the projects.
Which of the following concept dictates that personnel should be given access on a need-to-know basis?
Principle of Least Privilege
Which of the following best describes the RAD methodology?
RAD (Rapid Application Development) focuses on software development with limited emphasis on planning.
SQL
Relational databases use WHAT to administer and manage databases? a.) C++ b.) Fortran c.) SQL
Social engineering is a method used by hackers to develop a ________________________________________________ to trick employees into revealing confidential information or passwords.
Relationship
Prices for goods have changed slowly, due primarily to which of the following?
Relatively slow methods of communication.
Star network
Router in middle of each computer connected to the router/hub.
Field
Sarah is a sales associate at a major bookstore. A customer calls the store to order a book, but he could only remember part of the book title. So, Sarah logs into the bookstore's DBMS and searches the book title WHAT for a listing of the book? a.) Record b.) Field c.) Metadata d.) Table
How many methods are there to increase user adoption and lower the cost of a system, post implementation?
Six - Usability Testing, Benchmarking, User Communication, Forming Internal User Group, Planning, Leveraging Existing Resources
The six formal steps that need to be followed to develop an information system is known as what?
System development life cycle
Which of the following statements regarding e-commerce is true?
The omnichannel model has replaced the e-commerce model.
System development life cycle
The six formal steps that need to be followed to develop an information system is known as what? a.) Program specifications b.) System development life cycle c.) System analytical cycle
What is the purpose of a general MIS evaluation?
To Analyze System Performance
A Web browser is required to surf the Internet. What other protocol is needed by a client computer to request a Web site via HTTP or HTTPs?
URL (uniform resource locator)
Cloud computing and __________________________________ are enabling new Internet utilization business models.
Web 2.0
Scrum software development methodology
form of agile software development that recognizes that customer needs and wants can change throughout the project. Unexpected changes and challenges, which cannot be addressed with the traditional waterfall SDLC model, can be quickly addressed
False
True or false. A business ecosystem is a network-based strategy that is a tight collection interdependent industries that provide related services and products. a.) True b.) False
False
True or false. A software analyst acts as a change agent by using design and analysis techniques to solve organizational problems using information technology. a.) True b.) False
True
True or false. Easy access to information is both an advantage and disadvantage to information management. a.) True b.) False
False
True or false. Examples of competitive forces include new market entrants, substitute products, and customer rivalry. a.) True b.) False
True
True or false. Hardware and software are examples of information technology. a.) True b.) False
True
True or false. Point-of-sale cash registers at a fast-food restaurant are an example of an information system. a.) True b.) False
False
True or false. Telephones are an example of how information systems are used in business. a.) True b.) False
False
True or false. The CIO (Chief Information Officer) is the top position and driving force in an organization that all others report to. a.) True b.) False
False
True or false. The first step before establishing global information system strategies is to determine the technology needed. a.) True b.) False
False
True or false. The key role of the CDO (Chief Data Officer) is to maintain security of IT systems. a.) True b.) False
B and C
(Select all that apply). If we intentionally harden our individual security, we can make it more difficult for criminals to steal our information assets. Which of the following recommendations will harden our individual security? a.) Make account access or changes easier b.) Manage the retention and disposal of potentially sensitive information c.) Randomize behavior
A and B
(Select all that apply). Organizations need to implement controls that will help them mitigate risks due to technological factors. Which of the following are controls to counteract risks due to the use of computers for business operations? a.) Disallowing employees to share access with other employees or customers b.) Adopting email policies and equipment to limit spam and malware on computer systems c.) Implementing an auditing control to mitigate risk from collusion
a and b
(Select all that apply). People access the Internet all the time. What is considered acceptable online conduct? a.) Be careful with the sites you visit. b.) Check content before you download it. c.) Email chain letters to friends.
A and B
(Select all that apply). What are some of the actions that savvy users do to protect their privacy? a.) Delete cookies from the computer periodically b.) Enable popup blockers c.) Do not use anonymous browsing
a and b
(Select all that apply). What can individuals do to protect their computer systems? a.) Create a computer system recovery point. b.) Do not use abandoned jump drives. c.) Do not allow automatic updates.
What is the typical broadband data speed of a 4G network?
100,000 kbps
Using the IP address of 142.212.25.1, which two bytes are managed and assigned by the Internet Service Provider?
142 and 212 - the ISP determines/manages the 1st 2 bytes
What is the primary difference between a 1G cellular network and the current 4G network?
1G enabled mobile voice telecommunication while 4G offers voice, data and video.
Using the IP address of 142.212.25.1, which two bytes are managed and assigned by the computer administrator to each individual host on the network?
25 and 1. The last two bytes are assigned to and managed by the client. The first two bytes are assigned to and managed by the ISP
Which of the following best describes the classical model in management decision making? a- the classical model supports motivational theory b- the classical management model supports collaborative decision making c- the classical management model supports planning and controlling
?
When installing a wireless network, it is important to know the number of ____________, and the best access point locations.
? (Users? or Routers? - NOT Hubs)
With GDSS, users can meet in one location, but collaboration can happen remotely
A GDSS differs from traditional DSS in what way? a.) With GDSS, users can meet in one location, but collaboration can happen remotely. b.) With GDSS, users are interacting simultaneously, but cannot do it remotely. c.) With GDSS, users meet in person in one location, and collectively participate in the decision-making process.
To implement future changes
A GIS is an example of a semi-automatic decision support system. Which of the following is NOT a benefit of the GIS to the county administrators? a.) To change ordinances b.) To enact legislations c.) To act, redirect, and redistribute funds d.) To implement future changes
Organizations can exchange data and files through cloud computing or a VPN. Which of the following is an advantage of a VPN, but not an advantage of cloud computing?
A VPN provides more secure access than cloud computing.
Schema
A WHAT is a planned design structure of a database? a.) Attribute b.) Schema c.) Field d.) Foreign key
URL
A Web browser is required to surf the Internet. What other protocol is needed by a client computer to request a Web site via HTTP or HTTPs? a.) DNS b.) FTP c.) Telnet d.) URL
What role should a change agent play when implementing a new information system?
A change agent identifies positive improvements and helps train and motivate users.
ERD
A database schema can be represented by which model? a.) ERD (Entity-relationship Diagram) b.) Data Repository c.) Foreign Keys
Levels
A decision tree tool is not viable when data contains a different number of WHAT? a.) Layers b.) Branches c.) Levels
EIS
A digital dashboard displays charts and graphs with up-to-the-minute performance indicators on sales, profit, expenses and inventory. This is an example of a(n) WHAT? a.) EIS b.) DSS c.) MIS d.) TPS
Which of the following best defines a digital signal?
A digital signal is a discrete, non-continuous electrical waveform.
Recover and protect business operations
A disaster recovery plan (DRP) is a document of procedures to do what? a.) Reimburse company for infrastructure damages b.) Keep employees safe during natural disasters c.) Recover and protect business operations
What is the relationship of a feasibility study to an information system development project?
A feasibility study is an analysis to determine if a proposed system is possible - usually completed in the systems analysis phase of a proposed program, and evaluates cost, return on investments, and the likelihood of project success.
Primary Key
A field that uniquely identifies a record, such as customer ID or student ID.
DSS
A financial consultant can use a(n) WHAT to help his/her clients select investment choices and make informed financial decisions? a.) MIS b.) TPS c.) EIS d.) DSS
What is a denial of service attack?
A hacker attempt to tie up network host resources making them unavailable.
A customer relationship management (CRM) system
A husband and wife open up a small winery on their personal property and become small-business owners. In setting up their new business, they purchase an iPad and a third-party cash register system that is designed for small-business owners. When new customers purchase bottles of wine at the winery, the customers are asked for their email addresses. The business owners would like to be able to market to these customers based on the type of wine that they like to purchase. Which of the following types of systems could be the first system that these small-business owners implement to assist with their marketing efforts? a.) A customer relationship management (CRM) system b.) An enterprise resource planning (ERP) system c.) Management information system (MIS)
Business can be resumed quickly and effectively after a disaster
A properly implemented disaster recovery plan (DRP) provides businesses with what kind of assurance? a.) Backups for operational databases will be functional after a disaster. b.) Business can be resumed quickly and effectively after a disaster. c.) Business operations will recover immediately after a disaster.
What is a radio frequency survey?
A radio frequency survey is a signal strength detection process to identify the best wireless access point locations.
A secure platform for internal use
A reliable intranet connection provides organizations and their suppliers and vendors with WHAT? a.) A secure platform for outside consumers to place orders b.) A secure platform for internal use c.) A secure platform to conduct business on the cloud
Different networks
A router connects data links from a single network and transmits data packets between WHAT? a.) Hubs installed between switches b.) Single subnets on the same network c.) Different networks
Input
A scanner is a(n) WHAT device that works similarly to a copy machine? a.) Output b.) Input c.) Touch
Infrastructure as a Service (IaaS)
A service provider provides a cloud fabric, or pooled services, including server space, servers, storage, and all other aspects of the computing platform, with the exception of the operating system and applications, which the client organization would install and manage.
Unified modeling language (UML) is a general-purpose modeling language designed to provide what?
A standard method to represent the design of a system
Executive information system
A system that facilitates and supports senior managerial decisions.
Dashboard
A system that is often the culmination of information from many data sources, allowing management to drill down into analyses is known as a WHAT? a.) Information system b.) Dashboard
Dashboard
A system that is the culmination of information from many data sources, allowing management to perform a thorough analysis.
What is the overall job function of a systems analyst?
A systems analyst focuses on analysis, design, and implementation.
Why must a systems analyst be a good communicator?
A systems analyst must be able to communicate system capabilities and benefits - and must arbitrate issues that come up during the project.
Business
A systems analyst should try to have an understanding of WHAT processes? a.) Management b.) Change c.) Business
Balanced scorecards are often used in business. What is a balanced scorecard?
A tool used by management to track and monitor staff and organizational activities - a BPM tool.
Hierarchical
A tree-like structure database is WHAT type of database? a.) Hierarchical b.) Flat file c.) Relational
Gantt chart
A visual view of tasks scheduled over time; used for planning projects.
Several independent parties or governing bodies work together to define the rules that help to manage effective network communications. Which of the following is NOT one of the governing bodies that recommend and decides on telecommunications standards?
ARPANET- The 3 governing bodies are: IOS (International organization for standardization), IEEE (Institute of Electrical and Electronics Engineers), IETF (internet engineering task force)
The division between brick-and-mortar and online operations has been erased
According to the omnichannel model, inventory volume is reduced and operations become leaner and better able to react to changes in demand because of which of the following reasons? a.) Focus is on maximizing multi-channel strategy. b.) Warehouses filled with inventory become hybrid warehouses. c.) The division between brick-and-mortar and online operations has been erased. d.) Physical retail storefronts now become distribution centers.
Consult legal counsel and retain documentation of all stolen information.
Accountability - the application of responsibility, or an obligation to accept responsibility. You accepted the responsibility of a student, and you thereby are accountable for your actions as a student.
Which of the following is NOT a typical option for creating an e-commerce presence?
Acquiring an e-commerce presence from another firm.
Because feedback is not readily available with written communication, the content must be accurate and contain sufficient detail. Which of the following is most likely to increase the audience understanding of written communication?
Action-Specific Verbs - Avoid acronyms and highly technical terms in written communication. Use short paragraphs & action-specific verbs.
Which of the following actions is the hardest, but most desirable in individuals and businesses?
Actions that are both legal and ethical.
Which of the following statements is FALSE about our actions that are ethically acceptable?
Actions that are ethically acceptable are also socially and legally acceptable.
Although teen usage of social media exceeds that of adults, what adult demographic group is experiencing an increased use of social media, with 31% of members of that age group reportedly using social media?
Adults ages 65 years and older.
Ten
After analyzing management behavior, Henry Mintzberg identified HOW MANY roles performed by organizational managers? a.) Five b.) Three c.) Ten
Understand the methods that criminals use to steal personal information
After people determine what kind of assets are irreplaceable and how vulnerable they are, what do people do next to protect against the risk of identity theft? a.) Understand the methods that criminals use to steal personal information. b.) Consult legal counsel and retain documentation of all information that might be stolen. c.) Notify the credit bureaus to be sure they have record of your credit card accounts.
Which of the following customer attributes is not helpful for accurately pricing goods to increase profit margins?
Age
What should be defined when giving an oral presentation?
All technical acronyms and terminology
Customer Relationship Management (CRM)
Allows for personalized communication to customers.
Which of the following describes the Freedom of Information Act (FOIA)?
Allows individuals to examine government records as long as it does not cause an invasion of privacy.
Database Management System
Allows multiple departments to access, analyze, and modify data that is stored in one central location.
Besides e-tailing, which of the following e-businesses utilizes its supply chain to be a platform for many others and also continuously innovates into other e-business services?
Amazon - they are continuously innovating into other areas to utilize their supply chain to be a platform for many others, and to expand into other e-business services.
The most widely used channel for business
Among all the connections - Internet, intranet, and extranet - the Internet is WHAT? a.) A type of extranet for suppliers doing business b.) The second most widely used channel for business c.) The most widely used channel for business
Business ecosystem
An IT services company, a digital marketing company, and a photographer recognize that each party brings a unique skillset to the small and medium-size businesses that they service, so they decide to work together. These three companies work together to make it easy for a business to hire all three of these companies to do work for their business. This is an example of a WHAT? a.) Virtual company b.) Business ecosystem c.) Network economics
Google search
An application that enables users to search for facts or information using voice commands is called? a.) Ask.com b.) Google search c.) Mozilla
Field
An attribute of an entity, such as name, address, or student ID.
Linux
An example of an open-source operating system would be WHAT? a.) OS X b.) Windows c.) Linux
Telephone service
An important downside to a converged computer network is that when it goes down, WHAT is disabled? a.) Electricity b.) Website c.) Telephone service
Prescriptive
Analytics includes data mining, process mining, business process modeling, complex event processing, predictive analysis, and WHAT analysis? a.) System b.) Backward c.) Prescriptive
No, a hypervisor is a computer software that enables network virtualization and is not necessary
Are hypervisors or hypervisor applications necessary in small businesses with simple networks? a.) No, a hypervisor is a computer software that enables network virtualization and is not necessary b.) Yes, hypervisor is another name for simple routers and are necessary c.) Yes, hypervisors enable data network links and are necessary
Project manager
As IT is deployed ubiquitously through the enterprise, what critical implementation role will continue to gain traction and demand? a.) Network engineer b.) Software engineer c.) Project manager
Data inconsistency
As a student taking classes, imagine if your name was misspelled in one class, but not the other, and the impact this would have on your student record. If the same attribute in related data files has different values, what is this an example of? a.) Data integrity b.) Data redundancy c.) Data inconsistency d.) Data quality audit
Liability
As the owner of a small business, which of the following would allow your clients to sue you in court for any mismanagement? a.) Responsibility b.) Accountability c.) Liability d.) Ethical principles
Data in motion
At any point in time, all data must be categorized as being in one of the three states. Data that are in main memory or RAM are categorized as being in which of the following three states? a.) Data in motion b.) Data in use c.) Data at rest
Data at rest
At any point in time, all data must be categorized as being in one of the three states. Data that are not being accessed by the CPU are considered to be in which of the following three states? a.) Data in use b.) Data at rest c.) Data in motion
Which of the following must be enforced to protect the organization's corporate data resources and to control access to the information assets?
Authentication and Authorization
There are multiple methods of data capture, categorized as manual or __________________________________________.
Automated
A tool used by management to track and monitor staff and organizational activities
Balanced scorecards are often used in business. What is a balanced scorecard? a.) A tool used by management to track and monitor staff and organizational activities b.) A type of dashboard that tracks goal attainment intervention c.) A methodology in business intelligence that only tracks organizational activities
Organizations are constantly encountering cyber-attacks from intruders. For instance, in late 2013, the security system of Target Stores, Inc., was compromised by which of the following type of attacker?
Black Hat - a computer hacker who acts with a criminal intent.
2.4 GHz
Bluetooth is a wireless protocol that connects nearby devices with peripherals at WHAT level? a.) 64 kbps b.) 2.4 MHz c.) 2.4 GHz
__________________________________________ is an alternative tool that requires a group of users to collectively review and analyze the alternatives, prior to making a decision.
Brainstorming
Which of the following is not a key factor to consider when evaluating a system alternative?
Brand
What must an effective business intelligence platform accomplish?
Business intelligence must help align the organization with business objectives.
Databases help businesses compile competitive transactional information, enabling management to react to changing market conditions and be more competitive
Business use databases for many reasons, so it is important to understand their basic fundamentals. Select one of the following answers about databases that is NOT correct. a.) Businesses use databases to store employee, customer, and product data to help them automate processes and get useful information for quicker decision making. b.) Databases help businesses compile competitive transactional information, enabling management to react to changing market conditions and be more competitive. c.) A database of company transactional and supply chain data, when combined with market, economics, and other government regulations, can lead to business intelligence.
Employee turnover
Businesses encounter losses as a direct result of exposure to security threats or risks. Which choice would NOT be a direct loss? a.) Employee turnover b.) Potential revenue c.) Critical operational information
Why is it imperative that modern businesses have a social media marketing strategy?
Businesses must have a social media marketing strategy to capture this new community of users and to address issues of social care.
Content provider
Businesses, such as newspapers and magazine publishers, can use which of the following models to provide news and reporting to readers? a.) Brokerage b.) Content provider c.) Advertising d.) Direct marketing
Which of the following is not considered when determining the target audience in e-commerce?
Buyer Location - important when companies are pricing their products, but it is not an important feature to consider when targeting the audience.
Which of the following is a disadvantage of buying digital goods online?
Buying digital goods online makes the buyer more prone to online fraud - Shopping online increases the chance of identity theft.
Previewing and examining the projects
By advertising and selling physical products online, e-commerce allows customers to achieve all of the following, except: a.) Interacting with the companies directly. b.) Previewing and examining the projects. c.) Maintaining operational efficiencies. d.) Receiving more information about the products.
How does the Internet help to improve a company's reputation?
By providing information about the company's vision, mission, and community efforts.
_________________________ is a project management technique that identifies critical tasks and helps reduce program delays.
CPM - Critical Path Method - helps visualize critical tasks and program end date.
What is the most important aspect of the critical path method (CPM) in project management?
CPM defines the critical and noncritical tasks
Information technology management
Casselberry College maintains secure logins for all of its students to access programs on the network, register for classes, and view their courses on the learning management system. Before they can login to the network, they must accept the user terms and conditions and promise to use the college computers responsibly. This entire process runs smoothly because of good WHAT? a.) Information management b.) Information technology management
Data auditor
Checking on the employee's appropriate access to the company's database is the responsibility of what role below? a.) Data auditor b.) Information policy administrator c.) Data administrator d.) Database administrator
Which of the following is a U.S. law stipulating what a website operator must include in a privacy policy?
Children's Online Privacy and Protection Act (COPPA) - also requires them to obtain parental permission from children under the age of 13 before collecting any information.
communicated business goal
Choose which practice aligns information technology with business objectives to manage project risk and system implementation. a.) communicated business goal b.) business process and value chain analysis c.) benchmarking products and services
What was stolen in the Chelsea Manning and Edward Snowden crimes?
Classified documents of the U.S. government - they stole hundreds of thousands of classified documents from the U.S. government.
North Americans are usually very straightforward and distrust evasive behavior. This characteristic is an example of a cultural difference in which of the following?
Communication Style - It is important to recognize cultural differences in communication style to prevent misunderstandings.
How are user expectations best managed during system implementation?
Communication and Training
Web 2.0 sites enable collaboration and interaction among users, creating a virtual online ______________________________________.
Community
Maintaining a social online presence has become the latest trend. Businesses can use which of the following models to connect online with their customers?
Community - Ex= Facebook, Google+, LinkedIn.
Database integrity
Companies must maintain WHAT by keeping their data safe from unauthorized changes? a.) Database reliability b.) Database integrity c.) Database Consistency
Software companies such as Microsoft frequently develop system updates. What should individuals do with these system updates?
Configure your computer system to receive these updates automatically.
The first Internet social media site was Six Degrees in 1997. Six Degrees was a social network site that allowed users to develop an online profile and, most importantly, to _____________________________ with other users.
Connect
Used
Consider all the different people who might have access to data in a financial organization, from the president to the managers to the tellers. In a financial DBMS, using data governance procedures, controlling who can have access to what data will affect how the data is WHAT? a.) Used b.) Collected c.) Stored
Businesses, such as newspapers and magazine publishers, can use which of the following models to provide news and reporting to readers?
Content Provider - As with traditional newspapers, cinemas, and video stores, online content providers rent or sell online access to digital content, such as music, news, video, and images. Examples include iTunes, Shutterstock.com, and Netflix.com.
Which of the following is not an effective telecommunication medium?
Copper building wire
What is the best definition of a core router?
Core routers connect large businesses to the Internet backbone.
Freemium is not a new concept in doing business. Which of the following statement regarding Freemium is false?
Core services and additional features are free of charge to users - Core services might be free, but additional features and services are usually available for an additional charge.
In which of the following business structures is an individual not held personally accountable for any liabilities, risks, and debts from business operations?
Corporations - A corporation is a separate legal entity created formally to represent the capital investments and encapsulate the risks, liabilities, and debts of a single owner or many shareholders. An individual does not share in the rewards and liabilities outside of the business arrangement.
Which of the following business structures depicts a legal entity that can encompass a big number of shareholders?
Corporations - a separate legal entity created formally to represent the capital investments and encapsulate the risks, liabilities, and debts of a single owner or many shareholders.
Which of the following actions will help us protect our computer against failure?
Create automatic backups on cloud storage.
Baiting
Criminals use low-tech attacks to steal sensitive information from individuals in public places. One method is called WHAT, which is leaving a jump drive unattended in a parking lot and waiting for someone else to pick it up and connect it to their home computer? a.) Pretexting b.) Pharming c.) Quid pro quo d.) Baiting
Phishing
Criminals use which method to send legitimate-looking emails to innocent victims, which direct them to a Website where they are asked to input personal information such as user logon and password? a.) Identity theft b.) Pharming c.) Social engineering d.) Phishing
Pharming
Criminals use which method to steal personal information by redirecting users to a legitimate, official-looking website? a.) Identity theft b.) Social engineering c.) Phishing d.) Pharming
Which of the following is NOT a process description tool?
Critical path
Automated reporting
Customer relationship management (CRM) is a strategy that companies use to handle customer interactions. One business benefit of a CRM system is WHAT? a.) Manage flow of goods b.) Automated reporting c.) Better internal communication
Business analytics consists of the tools and techniques used for the analysis and understanding of data, and include ________________________________________ modeling, statistics, and OLAP.
Data Mining
At any point in time, all data must be categorized as being in one of the three states. Data that are not being accessed by the CPU are considered to be in which of the following three states?
Data at Rest - data that are stored on secondary or tertiary storage (e.g., on a hard drive or portable media), and also data that are not being accessed by the CPU.
Flat file
Data files containing records with no structured relationships are WHAT type of database? a.) Hierarchical b.) Flat file c.) Relational
At any point in time, all data must be categorized as being in one of the three states. Data that are in main memory or RAM are categorized as being in which of the following three states?
Data in Motion - data that is being transferred over a network or are waiting in primary storage to be read or updated.
Corrupted
Data quality audits and data cleansing are important for managing data resources. What data below should be scrubbed so that they are consistent with the design of the database? a.) Audited b.) Normalized c.) Corrupted d.) Inconsistent
Data, Information, and Knowledge example
Data: The number of people below the poverty line in the region is 50,000. Information: The number of people below the poverty line increases between 2010 and 2018. Knowledge: The number of people below the poverty line has increased due to stagnating wages and cuts to social programs.
Text mining
Databases are used extensively on the Internet and in business to help managers make more informed decisions. WHAT is a popular business concept used on the Internet because it can sieve through a huge amount of unstructured data and transform it into a structured and organized format? a.) Data mining b.) Web mining c.) Text mining
GDSS
Decision makers at multiple geographic interactively collaborating depend on WHAT? a.) BPM b.) ESS c.) GDSS
Translating
Decision support systems (DSS) enable business performance management by doing WHAT to organizational strategies into operational targets? a.) Matching b.) Mapping c.) Translating
Which of the following would likely be a step in building a logical model of a system?
Defining what must be accomplished - but does not explain how it will be accomplished.
All of the following are discussion actions that social media users can perform while immersed in an activity or current event, except:
Delete - Only moderators or administrators can delete discussion posts.
(Select all that apply). What are some of the actions that savvy users do to protect their privacy?
Delete cookies from the computer periodically. Enable popup blockers.
The work breakdown structure (WBS) is a broken down list of project _________________________ required to complete a project.
Deliverables - the customer will get when the project is complete.
We need to intentionally harden our individual security to make it harder for criminals to steal our information assets by removing all paper trails to our important information. ___________________________________________ using a cross-cut shredder will help eliminate this possibility.
Destroying Sensitive Information
Standards
Developing international networks has a few problems today because of the variation in global computing WHAT? a.) Networks b.) Governance c.) Standards
Supply Chain Management (SCM)
Diane's Designer clothing wants to be the price leader in the clothing industry by cutting out the middlemen, renting warehouse space, producing easier clothing designs, and bringing products to market in less than three weeks defines what type of enterprise system? a.) Enterprise Resource Planning (ERP) b.) Customer Relationship Management (CRM) c.) Supply Chain Management (SCM) d.) Knowledge Management (KM)
EIS
Different types of information systems are based on the different levels of hierarchy in an organization. Which of the following represents the highest level of responsibility in an organization? a.) DSS b.) EIS c.) MIS d.) TPS
Which of the following is not a benefit of using SDLC when implementing an information system program?
Difficulty in Estimating Project Cost - SDLC does not provide a good project estimation. It does help control and monitor large projects.
Social media marketing managers usually hold a bachelor's or advanced degree, have ______________________________ marketing experience, and excellent communication skills.
Digital
Which of the following is NOT a legislation created to protect the integrity and confidentiality of information?
Digital Millennium Copyright Act (DMCA)
Traditionally printed material
Digital goods are available in electronic format. Which of the following is NOT an example of digital goods? a.) Traditionally printed material b.) Website templates c.) Software d.) Microsoft Word
Which of the following is a disadvantage for purchasing digital goods?
Digital goods are very difficult to return.
Musical DVDs
Digital goods refer to products that can be downloaded from the Internet. Which of the following is NOT an example of digital goods? a.) Streaming videos b.) Musical DVDs c.) Mobile apps d.) Video tutorials
Digital goods provide several benefits for e-commerce. Which of the following is not a benefit achieved from digital goods?
Digital goods require physical presence to acquire.
(Select all that apply). Organizations need to implement controls that will help them mitigate risks due to technological factors. Which of the following are controls to counteract risks due to the use of computers for business operations?
Disallowing employees to share access with other employees or customers. Adopting email policies and equipment to limit spam and malware on computer systems.
The intelligence phase in the decision-making process consists of the ___________________________________, identification, and understanding of the problem.
Discovery
The ____________ step, when managing systems implementation, consists of cataloging the system specifications in detail.
Documentation - documents all system specifications.
Votes
Due to its data capture and display ability, GIS can be a very beneficial tool for law enforcement. Which of the following data is least useful in a GIS to help fight crimes? a.) Locations b.) Traffic c.) Votes d.) Taxes
Normalization
During the database design process, WHAT takes place to eliminate data redundancy? a.) Normalization b.) Integrity review c.) Redundancy elimination
To be competitive in the marketplace, businesses should lure customers in by providing information on their websites that is _________________________________________________________________ driven.
Dynamic and Multimedia - appeals to the customer and draws them in deeper to the website.
What type of data is included in executive support systems (ESS)?
ESS data includes internal enterprise data, as well as external data from financial, industry, and trade databases.
How does executive management use executive support systems (ESS)?
ESS provide high-level information in Key Performance Indicator (KPI) format
Avoided
Effective written communication must be correct, simple, and accurate. Jargon and terminology should be WHAT? a.) Used b.) Explained c.) Avoided
Which of the following application provided by the Internet allows a business to transfer documents automatically without human intervention?
Electronic Data Interchange (EDI)
SMTP (Simple Mail Transfer Protocol)
Electronic communications has predominantly become the primary form of communications in first world countries. Which of the following protocol is used to manage and monitor the massive amount of emails that we receive every day? a.) Telnet b.) URL (Universal Resource Locator) c.) DDNS (Dynamic Domain Name System) d.) SMTP (Simple Mail Transfer Protocol)
Which of the following is a proactive technological measure that could help protect our privacy?
Email Encryption
LinkedIn provides employment recruiters with a global database of potential __________________________________________________.
Employees
There is a higher chance of failure in Information system projects if __________________________________ do not use and leverage the system on behalf of their organization.
Employees - must leverage the system on behalf of organization.
How do organizations confirm the identity of their employees before they are allowed access to the corporate data resources?
Employees must be authenticated.
Knowledge Management (KM
Employees sharing of their expertise and best practices across business units defines what type of enterprise system? a.) Enterprise Resource Planning (ERP) b.) Customer Relationship Management (CRM) c.) Supply Chain Management (SCM) d.) Knowledge Management (KM)
LinkedIn posts and profile information is typically more ______________________________________________ and occupation-related.
Employment
Encryption is an intrusive form of authentication
Encryption is the process of encoding useful information into a different format. Which of the following statements is NOT an accurate description of the encryption method? a.) Modern encryption methods maintain data integrity. b.) Encryption is an intrusive form of authentication. c.) Encryption can be performed using a mathematical formula.
_______________________________________ combine multiple tools or workbenches to support the complete software cycle.
Environments - CASE environments software is used to support complete software development cycles.
Which of the following is a set of regulations to protect Internet users from clandestine tracking and unauthorized personal data usage?
European Union's General Data Protection Regulation (GDPR)
____________________________ is defined as the process of gathering and analyzing information in order to compare performance with predetermined objectives, and to determine whether or not the objectives were achieved.
Evaluation
An organization's need for various levels of security
Every organization, big or small, must establish policies and procedures to secure and control their information assets. Security policies are output from an organization's risk assessment process. What do security policies cover? a.) An organization's need for one level of security. b.) An organization's need for a flat level of security. c.) An organization's need for various levels of security.
Airports or coffee shops, where criminals redirect users to a website that looks official and legitimate
Evil twins and pharming are two different examples of phishing. What's the best example of pharming and where it can occur? a.) Airports or coffee shops, where criminals offer free, trustworthy-looking Wi-Fi connections b.) Airports or coffee shops, where criminals hack into wireless network cards to retrieve passwords used c.) Airports or coffee shops, where criminals redirect users to a website that looks official and legitimate
What systems do upper management use for decision making?
Executive Support Systems (ESS) - provide dashboards to executive management with key performance indicators.
Group decision support systems (GDSS)
Executive management, who are interacting simultaneously in different locations to collectively participate in the decision-making process, use what type of decision-support system? a.) Simple decision support systems (DSS) b.) Group decision support systems (GDSS) c.) Executive support systems (ESS)
Which of the following is a disadvantage of using a VPN?
Expensive
One way to define user requirements is to allow users to _______________________________ with the system during development.
Experiment
The Golden Rule, or "do unto others as you would have them do unto you," belongs to which of the following ethical models for ethical behavior?
Fairness
[True/False] Commercial websites have domain names so that users can easily access the web pages by typing the domain names instead of the IP addresses into the URL. All domain names must have four parts, regardless of where the websites are located. Each part is written as a set of octets and is separated by a period.
False
[True/False] Every time we use a computer, we are exposed to the risk of getting a computer virus, even when we scan a photo onto a jump drive using a scanner or a printer.
False
[True/False] Process-centered environments are the least resourceful category due to the lack of capability of specifying analysis and design, as well as the formal software control process.
False
[True/False] Telegraph technology provided richer quality, more detailed, and a more reliable form of communication than the telephone.
False
[True/False] There are several business models that organizations can use to conduct business online. However, organizations can only use one model at a time to ensure smooth processing of online transactions.
False
[True/False] With security measures already implemented in the network systems, it is not necessary for telecommuters to use a secured connection, such as the Virtual Private Network (VPN), to gain remote access to their work servers.
False
T/F: Modular design, decision tables, decision trees, and structured PERT are process description tools.
False Correct. All of the above are process description tools except structured PERT
[True/False] The programming stage in the waterfall method of software development focuses on development and testing.
False Testing is a separate, focused stage in the waterfall model
T/F: The prototyping software development method consists of three steps.
False The prototyping method is a four-step process: user basic requirements, development of prototype, using prototype, and revising prototype.
[True/False] The prototyping software development method consists of three steps.
False - 4 Steps: (1)Determine User Needs, (2)Develop Prototype, (3)Use Prototype, (4)Revise Prototype
[True/False] Social media has transformed how individuals communicate; it is not a channel for business communications.
False - Despite security risks, businesses must implement a social media communication strategy.
[True/False] Digital goods are adequately protected as intellectual property under the historical copyright laws.
False - Digital goods can be easily and quickly copied and shared over the Internet.
[True/False] Modular design, decision tables, decision trees, and structured PERT are process description tools.
False - PERT is not a process description tool
[True/False] Software defects, also called patches, can affect system reliability and security.
False - Patches are not defects, but a fix for bugs/defects
[True/False] The virtual layer is the seventh layer of the OSI model.
False - The 7th layer is the PHYSICAL layer
[True/False] The Digital Millennium Copyright Act (DMCA) is an international treaty on copyright law adopted in 1996.
False - The DMCA is a U.S. copyright law.
[True/False] Information is a valuable asset and not everyone in the world can be trusted with it. Therefore, we need to protect our valuable information from those with poor intentions. The protection of our information assets is a discipline known as data security.
False - The protection of our information assets is known as Information Security.
[True/False] Implementing devices in our computer systems to help in identity and approved equipment verification is a defensive method of technological measures.
False - This is a proactive method.
[True/False] The LinkedIn model benefits business organizations only, and has dramatically altered the employment and career environment.
False - it has benefited the entire recruitment community.
[True/False] The process of turning information into an unreadable format to prevent unauthorized access is known as decryption.
False - it is called encryption.
Which of the following is NOT part of the systems analysis process?
Feasibility Study - 4 steps = Problem Definition, Root Cause Identification, Solution Definition, and Information Requirements.
FedEx is a successful business. Which of the following statements regarding FedEx is false?
FedEx uses big data to find flaws, boost production, and root out counterfeiters - Although it does use big data to find flaws, fix processes, and boost the efficiency of its production, it does not use big data to root out counterfeiters.
Organizations must follow procedures to store or transfer their financial information as outlined in which of the following legislation?
Financial Services Modernization Act (aka Gramm-Leach-Bliley Act) of 1999 - requires organizations and individuals to adhere to rules and procedures for storing and transferring financial information.
Data scrubbing
Financial institutions perform WHAT on visitors' data they collect on their websites to detect and create a list of potential customers whom they will send invitations to apply for credit cards or line of equity loans? a.) Data mining b.) Data governance c.) Data administration d.) Data scrubbing
Data normalization
For a DBMS to be efficient and more functional, data redundancy needs to be eliminated. This can be accomplished by creating smaller tables, with stable data structures, using what process? a.) Data administration b.) Data dictionary c.) Data normalization d.) Data retrieval
Banking transactions
For an individual or a business, data can be uploaded to the Internet in many forms. Which of the following data should NOT be communicated on the Internet? a.) Banking transactions b.) Data streaming c.) Personnel files d.) Web pages
Data cleansing
For the DBMS of a financial institution to function properly, WHAT should be performed after a data quality audit on tables that are merged or imported? a.) Data cleansing b.) Data redundancy c.) Data mining
Knowledge Management (KM)
Foster a culture of sharing experiences and information throughout a business by creating teams defines what type of enterprise system? a.) Enterprise Resource Planning (ERP) b.) Customer Relationship Management (CRM) c.) Supply Chain Management (SCM) d.) Knowledge Management (KM)
The owner can have better communications with customers
Frank works for a small landscaping company. He is trying to convince the owner to invest in information technology. Which of the following justifications should he use when he approaches his boss? a.) The owner can better protect the privacy of his customer data. b.) The owner can have better communications with customers. c.) The owner will immediately begin saving money.
Freemium is not a new concept in doing business. Which of the following statement regarding Freemium is accurate?
Freemium involves digital pricing strategies.
What are group decision support systems (GDSS)?
GDSS enable interactive collaboration support for multiple decision makers at multiple geographic locations.
The privacy of sexual predators is not violated because it is public information
Geographic Information Systems (GIS) provide cities, states, municipalities, and even the public, with information such as property tax delinquencies, value of our houses, and addresses of sexual predators. Which of the following statements is FALSE? a.) The benefits provided by the GIS outweighs the violation of privacy of those involved b.) The privacy of sexual predators is not violated because it is public information c.) The property taxes of our houses are obtained by sites such as Zillow.com and realtor.com d.) The use of GIS is legal, but it may or may not be ethically and socially acceptable by some people
Standards
Global business challenges are typically no worse than domestic business challenges, except for the distance. Knowing the challenges upfront can alleviate some of the problems in the end. Of those listed, which is the easiest to solve? a.) Personnel b.) Standards c.) Reliability d.) Speed
What are the three primary activities associated with business performance management?
Goal selection, Attainment Measurement, and Achievement Intervention
Which of the following businesses earns much of its revenues from online advertising and by providing e-business services to hundreds of millions of individuals and businesses?
Google - earns much of its revenues from online advertising and by providing e-business services to hundreds of millions of individuals and businesses.
Which system supports creative thinking and allows users to interact simultaneously at multiple geographic locations to collectively participate in decision making?
Group Decision Support System (GDSS)
Executive management, who are interacting simultaneously in different locations to collectively participate in the decision-making process, use what type of decision-support system?
Group Decision Support Systems (GDSS) - Remote collaboration amongst management teams is supported by GDSS.
Executive management, who are interacting simultaneously in different locations to collectively participate in the decision-making process, use what type of decision support?
Group decision support system (GDSS)
ABC Playground Company has been asked to build a new playground for a local elementary school. The project must be completed before the first day of school. Which of the following steps would increase the likelihood of finishing the project on time?
Have the most experienced workers complete tasks on the critical path.
Health analytics
Healthcare companies can use the data collected from WHAT tools to help their customers design a fitness activity plan? a.) Supply chain management (SCM) b.) Customer relationship management (CRM) c.) Health analytics
Total Cost of Ownership (TCO)
Helps establish feasibility.
Text mining
High-quality information is typically derived through the devising of patterns and trends through means such as statistical pattern learning.
Robin Hood is a heroic outlaw in English folklore who robbed the rich to help the poor. He fought against the Sheriff of Nottingham and the reign of King John. Which of the following statement is TRUE regarding Robin Hood?
His actions were considered ethically and socially acceptable, but legally unacceptable.
Organizations need to include redundancy in their business disaster recovery plan by creating duplicate facilities. Which of the following sites offer offsite office space that allow recovery within minutes to hours?
Hot Sites
They are behavioral in nature and require minimal information system support as they deal with unstructured and less systematic issues
How are management's interpersonal roles supported by information systems? a.) They are behavioral in nature and require minimal information system support as they deal with highly structured and less systematic issues. b.) They are behavioral in nature and require minimal information system support as they deal with unstructured and less systematic issues. c.) They are behavioral in nature and require significant information system support as they deal with unstructured and less systematic issues.
Communication and training
How are user expectations best managed during system implementation? a.) Communication and training b.) User involvement in implementation c.) User involvement in analysis
Database applications enable businesses to store and analyze essential sales data
How can database applications help managers respond to changing market conditions? a.) Database applications arm businesses with big data to make important decisions. b.) Database applications enable businesses to store and analyze essential sales data. c.) Database applications enables businesses to develop and market new products.
Employees must be authenticated
How do organizations confirm the identity of their employees before they are allowed access to the corporate data resources? a.) Employees must be authenticated b.) Employees must be authorized c.) Employees must read the information policies
Both small and large enterprises use firewalls to prevent intrusion
How do small businesses and large enterprises protect themselves from network intrusions? a.) Small businesses do not connect directly to the Internet, whereas large enterprises use core routers. b.) Both small and large enterprises use firewalls to prevent intrusion. c.) Small businesses use detection intrusion operating systems, whereas large enterprises use firewalls.
Business intelligence provides automated data collection and reporting reducing labor cost
How does a corporation benefit from a business intelligence program? a.) Business intelligence re-engineers processes, making companies more productive b.) Business intelligence provides new data that was previously not available c.) Business intelligence provides automated data collection and reporting reducing labor cost
Human resources can target and recruit applicants based on specific qualifications or skills
How has LinkedIn impacted business? a.) Human resources can target and recruit applicants based on specific qualifications or skills. b.) Businesses can market to hundreds of millions of possible customers. c.) LinkedIn enables business customer loyalty programs.
Social media has replaced where people get their news
How has social media influenced the dissemination of news and current events? a.) Social media has replaced where people get their news. b.) Social media has replaced Internet news content sites. c.) Social media has replaced where people get their entertainment.
Social media platforms broadcast events instantaneously, which individual users can share
How has social media transformed and disrupted the coverage of news and current events? a.) Social media platforms enable individual users to broadcast images and videos of news to TV networks as it happens. b.) Social media platforms enable individual users to broadcast news to radio from the actual scene. c.) Social media platforms broadcast events instantaneously, which individual users can share.
E-learning supports the health care demand by training workers more quickly
How is information technology impacting the health care industry? a.) Information technology eliminates data entry errors. b.) E-learning supports the health care demand by training workers more quickly. c.) Records are maintained electronically and allow easy access to anyone who needs them.
Public relations use social media to respond to negative news quickly, as well as for promoting positive news
How is social media an effective public relations tool? a.) Public relations use social media to build individual customer relationships and brand recognition. b.) Public relations use social media to respond to negative news quickly, as well as for promoting positive news. c.) Public relations use social media to communicate their business plans.
What question does the SWOT analysis best answer?
How is the marketplace structured, and how will the business best interact with an e-commerce presence? - SWOT (Strengths, Weaknesses, Opportunities, Threats) analysis is conducted to better understand the organization, and is conducted when addressing the marketplace question.
Three
How many computer memory classifications are there? a.) Two b.) Four c.) Three
What is the difference between ICR and OCR?
ICR is an Intelligent or Advanced Form of OCR - ICR stands for Intelligent Character Recognition and is more accurate than Optical Character Recognition (OCR).
Cost effectiveness
IT is important because it helps businesses streamline processes that increase productivity and profits. What IT benefit does this exemplify? a.) Communication b.) Cost effectiveness c.) Product development d.) Globalization
Product development
IT is important because it helps ensure new, quality products reach the market faster and to more customers and suppliers. This is an example of which IT benefit? a.) Product development b.) Globalization c.) Communication d.) Cost effectiveness
What is the objective of the systems analysis stage in the waterfall method?
Identify User System and Software Requirements.
Organizations must implement procedures to defend themselves against risks from vulnerabilities and threats to their daily operations. Which of the following is NOT a procedure that would be helpful in protecting organizations against risks and vulnerabilities?
Identify potential markets for the organization.
What is the most critical step in systems analysis?
Identifying information requirements
Understand which assets are irreplaceable and how they are vulnerable
Identity theft can be very devastating to innocent victims. What is the first step that people can take to help lessen the severity of risk and to help mitigate or eliminate other risks if their identities are stolen in the future? a.) Protect access to information assets. b.) Understand which assets are irreplaceable and how they are vulnerable. c.) Understand the methods that criminals use to steal personal information. d.) Consult legal counsel and retain documentation of all stolen information.
at multiple locations and then handed off to the next division or location as the day ended
If Apple Computer and Mitsubishi-Hitachi began a global joint venture, where would the information system development likely take place? a.) at one or the other location, not both b.) at one location at a time until part of the project is complete and then passed to the next location c.) at multiple locations and then handed off to the next division or location as the day ended
Transaction
If a student decides to switch classes because she wants a different teacher, this would be considered a WHAT to the college's information system and would involve interaction with its accounting or human resource systems? a.) Credit b.) Payment c.) Transaction
Data integrity
If you receive two copies of the same catalog from a clothing company in your mailbox with a little variation in the first name on the address label, this would be a violation of what rule? a.) Data reliability b.) Data redundancy c.) Data integrity
Consult legal counsel and retain documentation of all stolen information
If your identity has been stolen, what should you do? a.) Protect access to your information assets b.) Understand the methods that criminals used to steal the personal information c.) Understand which assets are irreplaceable and how they are vulnerable d.) Consult legal counsel and retain documentation of all stolen information
Enterprise Resource Planning (ERP)
Implementing this system would tie together many systems and automate tasks so employees could do their jobs more efficiently defines what type of enterprise system? a.) Enterprise Resource Planning (ERP) b.) Customer Relationship Management (CRM) c.) Supply Chain Management (SCM) d.) Knowledge Management (KM)
Data governance
In a Fortune 500 company such as IBM, WHAT is concerned with the management of data, including maximizing quality through effective utilization, availability, and protection? a.) Data governance b.) Database administration c.) Information policy
Architecture
In a global information system (GIS), what is the basic structure of the information system required to coordinate international business activities called? a.) Architecture b.) Software c.) Hardware
Out in the field
In business, mobile smart devices are most beneficial where? a.) At the main office b.) In the home office c.) Out in the field
Vacuum tube
In computer evolution, the integrated circuit replaced what device? a.) CPU b.) RAM c.) Vacuum tube
Acceptable use
In order to keep company computers secure, users must agree to WHAT type of policy stipulated by the organization in order to access a company network or the Internet? a.) Identity management b.) Information audit c.) Acceptable use
Spyware
In order to monitor web surfing activities, what might a retailer install onto their customer's computers? a.) Worm b.) Trojan horse c.) Spyware d.) Virus
IoT
In the near future, most devices, such as home appliances, automobiles, and consumer product packages, will be connected to the Internet. What is this field of networking called? a.) 5G b.) IoT c.) WAN
Which of the following customer attributes helps price goods more accurately?
Income Level
Rights
Individuals are allowed to weigh decision choices based on legal or legislative precedent. This is the foundation for which of the following ethical approaches? a.) Rights b.) Common good c.) Utilitarian d.) Virtue
There are many ways individuals can help protect themselves from threats to their privacy. Choose the best option.
Information Security Education - provides individuals with knowledge of potential risks and threats to privacy and help individuals understand the value of their information assets.
Which of the following application provided by the Internet allows a business to store helpful documents to be accessed by its stakeholders, either for free or for a fee?
Information repositories
Information technology enables faster response to market dynamics due to new entrants, new products, supplier chain, or customer
Information technology should be organized in a way to help businesses run more efficiently. How does good IT planning help an enterprise achieve a competitive advantage? a.) Information technology enables faster response to market dynamics due to new entrants, new products, supplier chain, or customer b.) Information technology requires larger labor pools to digest data, leading to better business practices c.) Information technology enables more management layers in the decision-making process
What is the best way for individuals to safeguard their computers against malware?
Install the latest anti-malware and antivirus programs.
Malware
Installing the latest antivirus applications onto your computer is one way to protect your computer from WHAT type of software which can be used to steal information or spy on users? a.) Malware b.) Application c.) Adware
While enrolled in a traditional course at a university, you and your instructor can communicate synchronously, face-to-face, in the classroom. However, you can also communicate with your instructor SYNCHRONOUSLY outside the classroom using which of the following Internet applications?
Instant message
_________________________________ environments are the most common and are suitable for the entire system development life cycle, from analysis to maintenance.
Integrated - the integrated environments type of CASE tools is the most common SDLC analysis.
Porters 5 competitive forces
Intensity competitive rivalry bargaining power of customers bargaining power of suppliers threat of new entrants threat of substitutes
Not all organizations utilize an extranet. However, an extranet can provide certain benefits. Which of the following IS a benefit of an extranet?
Interact with suppliers - often via an SCM
Which of the following is a great, free, and ubiquitous source of information for systems analysts?
Internet
Mobile
Internet access via WHAT devices is growing exponentially, surpassing Internet access by fixed, desktop computers? a.) Antenna b.) Bluetooth c.) Mobile
The converged communications structure is based on what?
Internet, audio communications, and the PSTN
Most people now use smartphones daily for every aspect of their lives, which includes work, communicating with friends and family, entertainment, shopping, and even health-related activities. Which of the following statements regarding smartphones is FALSE?
It does not have an operating system like those on desktops and laptops.
Which of the following statement about the IP version 4 (IPv4) addressing scheme is true?
It has 4 bytes, which is equivalent to 32 bits.
What is qualitative risk analysis?
It involves the measurement of probability and consequences of risks - looks at the consequences of risk and estimates the impact of those risks on the organization.
Which of the following is NOT a characteristic of a Net marketplace?
It is a single organization that controls the construction and maintenance of relationships for a relatively small number of other organizations
Which of the following statements is FALSE regarding safe harbor?
It is a way to improve information security training.
Which of the following is a characteristic of a Net marketplace?
It provides more focus on individual transactions versus lasting relationships.
What will happen if an e-business does not take any action to sustain the advantages brought by e-business?
It will receive heavy responses from competitors and newcomers - Online business can be quite lucrative. Therefore, e-companies must effectively and continuously maintain a sustainable advantage to circumvent attempts from competitors from invading the marketspace.
Improved processes
Joe and Mary work for a tax preparation company that is implementing new computer technology. What is a likely impact of this new technology to their jobs? a.) Improved processes b.) Reduced stress c.) More job security
Store backup data in the cloud
Joe is responsible for managing the IT department for a local medical records company. His town is in a high risk area for tornadoes. How should Joe prepare for the possibility of a tornado hitting the company facilities? a.) Store daily data backup data on a server in a warehouse located in his community b.) Store backup data in the cloud c.) Watch weather forecasts daily d.) Install weather tracking devices at the facility
Keep passwords private
Keeping information and information technology secure involves good management techniques. Which of the following items is a good management technique for securing information? a.) Locking up laptops b.) Use security software c.) Being smart about wi-fi d.) Keep passwords private
Data centers
Large databases typically reside in WHAT, which are clusters of computers called servers, running software applications that enable business transactions? a.) The cloud b.) Data centers c.) Computers
What is one of the benefits of adequate budgeting for user support?
Less reliant on outside consultants
A decision tree tool is not viable when data contains a different number of ___________________________________________________.
Levels - information gained in decision trees may become biased in favor of attributes with more levels.
As the owner of a small business, which of the following would allow your clients to sue you in court for any mismanagement?
Liability
Which social media platform is NOT a disruptive technology based on the ability for people to comment or share current events, ideas, or opinions?
Which of the following best defines a work breakdown structure (WBS)?
List of broken down project deliverables
Conceptual
Logical, physical, and WHAT data models are used by businesses to map processes to data requirements? a.) Conceptual b.) Relational c.) Hierarchical
What is considered to be a low level security risk during system post-implementation?
Low level is characterized by noticeable impact to the organization.
______________________ CASE tools support development activities, such as design, testing, debugging, and maintenance.
Lower
Database administrator
Maintaining the integrity of a company's database is the responsibility of which person below? a.) Data administrator b.) Information policy administrator c.) Data auditor d.) Database administrator
(Select all that apply). If we intentionally harden our individual security, we can make it more difficult for criminals to steal our information assets. Which of the following recommendations will harden our individual security?
Manage the retention and disposal of potentially sensitive information. Randomize behavior.
Dysfunctional
Management conformity and uniformity often results in WHAT type of decision? a.) Innovative b.) Productive c.) Dysfunctional
GDSS
Management decision-making is supported by IT through various systems including WHAT? a.) OLTP b.) LAN c.) GDSS
Which of the following is not a component of a feasibility study?
Managerial
Which of the following statement regarding e-commerce is false?
Many brick-and-mortar retailers have replaced all their supply chains with elements of e-commerce. (B&M retailers have augmented, not replaced, all their supply chains with elements of e-commerce.)
Secured access
Many businesses require their employees use VPN to gain remote access to the corporate network. Which of the following is an advantage of VPN? a.) Secured access b.) Greater flexibility c.) Reduced expense
The measurement function of business intelligence creates a hierarchy of benchmarking and _____________________________________.
Metrics - Measurement creates a hierarchy of benchmarking and metrics that provide management with a status of the business performance management goals.
Which of the following factors does not help e-businesses accurately target individual customers?
Mobile Devices
Understanding whether the intended e-commerce users will be customers, suppliers, and/or employees is an important component of an e-commerce plan. What other issue must be addressed during this time?
Mobile Payment Options
Mobile e-commerce can provide companies with an avenue to gain and keep their customers. Nevertheless, mobile e-commerce cannot help businesses actively market to their customers in which of the following ways?
Mobile e-commerce helps to solicit post-purchase feedback from customers - Although companies can use mobile e-commerce to solicit some post-purchase feedback from their customers, it is not the main purpose for mobile e-commerce.
Which of the following describes how the modular design process description tool works?
Modular design uses building blocks to represent a system.
Which of the following is NOT a method for gathering user requirements?
Monitor users
Moore's Law
Moore's Law says that computing power and storage capacity will continue to increase or double approximately every two years.
The Internet has contributed to a complex network system. Businesses continue to grow and develop a need for more computer-enabled productivity which results in what?
More complexity due to the need for more systems and better improvements in their processing capabilities.
Manufacturing and production
Most large corporations have several information systems to support their functional business areas. What is the system that processes raw metal into a car frame? a.) Marketing and sales b.) Human resources c.) Accounting and finance d.) Manufacturing and production
Human resources
Most large corporations have several information systems to support their functional business areas. What is the system that helps improve employee productivity by managing the workforce? a.) Marketing and sales b.) Human resources c.) Accounting and fiance d.) Manufacturing and production
It does not have an operating system like those on desktops and laptops
Most people now use smartphones daily for every aspect of their lives, which includes work, communicating with friends and family, entertainment, shopping, and even health-related activities. Which of the following statements regarding smartphones is FALSE? a.) It has unique sensors and functions built for mobility b.) It has ample processing power and electronic storage c.) It does not have an operating system like those on desktops and laptops d.) It combines a cellular phone device with a mobile computer platform
Business ecosystems
Network of businesses involved in delivering a product through mutual cooperation.
Communication style
North Americans are usually very straightforward and distrust evasive behavior. This characteristic is an example of a cultural difference in which of the following? a.) Time orientation b.) Communication style c.) Stereotyping
Interact with suppliers
Not all organizations utilize an extranet. However, an extranet can provide certain benefits. Which of the following is a benefit of an extranet? a.) Interact with employees b.) Interact with suppliers c.) Interact with customers d.) Store and share information
Reporting
OLAP (Online Analytical Processing) databases are used for WHAT, such as being used for regional sales? a.) Reporting b.) Warehousing c.) Compiling
Lengthy ETL load phase
OLAP databases are multidimensional, that is, data sets are referred to as cubic. What is a disadvantage of a multidimensional database? a.) Fast query performance b.) Database aggregation c.) Lengthy ETL load phase
Cold sites
Offsite office space awaiting occupancy, equipment, personnel, and utility service, allowing recovery within days.
Hot sites
Offsite office space with available and up-to-date systems and service connections, requiring only adequate or prioritized staffing, allowing recovery within minutes to hours.
Warm sites
Offsite office space with available systems and service connections, requiring staffing and updates allowing recovery within hours to days.
The advent of the Internet has revolutionized our lives, becoming a vast resource for information, utility, and productivity. Which statement below about the Internet is FALSE?
Once you upload your data to the Internet, it will be available to the public.
Plan daily operations
One benefit of a supply chain management system is to WHAT of the company? a.) Outsource technical functions b.) Automate office functions c.) Plan daily operations
Newsletters are often Internet-published bulletins that are distributed to users and typically cover what?
One general or specific topic of interest
Data manipulation language
One of the capabilities of a database management system is that it allows users to easily modify the data using which of the following? a.) Any computer language b.) Hypertext markup language c.) Data definition language d.) Data manipulation language
Experiment
One way to define user requirements is to allow users to WHAT with the system during development? a.) Train b.) Code c.) Experiment
Separation of Duties
One way to reduce the possibility of fraud and abuse of data resources is to apply which concept of information security, which ensures that personnel's responsibilities and duties are separated from their access? a.) Separation of Duties b.) Information Security c.) Principle of Least Privilege
What is the downside of oral communication outside formal presentations?
Oral communication is not documented and, therefore, subject to misinterpretation.
Which of the following best describes oral communication?
Oral communication is the transfer of information via verbal and visual content.
Which of the following factors deals with the potential loss of business from the dismissal or death of an important key manager?
Organizational Factors
Ensuring that employees are authenticated to prove their unique identity
Organizations have a responsibility to protect information assets and to control access. How do organizations ensure that only authorized personnel have access to the corporate data resources? a.) Ensuring that employees do not share the organization's data resources with customers. b.) Ensuring that employees maintain the confidentiality of the organization's data resources. c.) Ensuring that employees are authenticated to prove their unique identity.
Tailgating
Organizations must be concerned with a low-tech attack that allows unauthorized personnel access to sensitive or restricted areas merely by overtly or covertly following an authorized employee through a controlled access entry point. What is the technical term for this low-tech method? a.) Pretexting b.) Dumpster Diving c.) Baiting d.) Tailgating
Public Company Accounting Reform and Investor Act (aka Sarbanes-Oxley Act) of 2002
Organizations must follow procedures to ensure the accuracy, integrity, and security of their financial information as outlined in which of the following legislation? a.) Public Company Accounting Reform and Investor Act (aka Sarbanes-Oxley Act) of 2002 b.) Health Insurance Portability and Accountability Act (HIPAA) of 1996 c.) Financial Services Modernization Act (aka Gramm-Leach-Bliley Act) of 1999
Identify potential markets for the organization
Organizations must implement procedures to defend themselves against risks from vulnerabilities and threats to their daily operations. Which of the following is NOT a procedure that would be helpful in protecting organizations against risks and vulnerabilities? a.) Identify potential markets for the organization b.) Identify critical business operations c.) Measure risks that threaten the organization d.) Implement planning, measures, and controls to mitigate the risks
Warm sites
Organizations need to include redundancy in their business disaster recovery plan by creating duplicate facilities. Which of the following sites offer offsite office space that allow recovery within hours to days? a.) Shared hot sites b.) Warm sites c.) Cold sites d.) Hot sites
What is the meaning of outcomes in decision theory?
Outcomes are the Consequences of an Event.
What is information system output?
Output is the act of transferring processed data to users.
What is the major difference between private industrial networks and Net marketplaces?
Ownership and/or control of the network - Private industrial networks are owned by a single large corporation, whereas Net marketplace brings together thousands of businesses.
What is the name of a chart representing tasks using an activity-on-arrow diagram?
PERT chart
What does PSDN stand for?
Packet Switched Data Networks
Transmit information in discrete, parsed data encapsulated in packets
Packet switching refers to a computer network's ability to do what? a.) Transmit information in non-discrete, data encapsulated packets b.) Transmit information in discrete, non-parsed packets c.) Transmit information in discrete, parsed data encapsulated in packets
What are the two fundamental protocols that can describe modern telecom networks?
Packet transmission and TCP/IP protocol.
Strategic information system
Palm Beach Real Estate Company created a mobile application to allow prospective clients to view information about beachfront properties from their smartphone. No other local real estate agents currently offer such technology. This mobile app is an example of a(n) WHAT? a.) Executive information system b.) Decision support system c.) Strategic information system
What information can be gained by sniffing a wireless network?
Passwords and Login IDs
Synergy
Penny Dollar and Nickel Dollar stores decide to pool their markets to lower costs and hopefully generate more profits. This is referred to as WHAT? a.) Synergy b.) Economics c.) Competency
How do social media platforms play an increasing role in shaping events?
People can use this medium to influence reserved bystanders.
Mobile e-commerce targets a certain niche. Which of the following communication devices is not one of them?
Personal Computers
Criminals use which method to steal personal information by redirecting users to a legitimate, official-looking website?
Pharming
Criminals use which method to send legitimate-looking emails to innocent victims, which direct them to a Website where they are asked to input personal information such as user logon and password?
Phishing
What are podcasts, and why are they a good source of information for systems analysts?
Podcasts are audio files that that contain educational content.
System quality problems can include which of the following?
Poor data input quality
Relatively slow methods of communication
Prices for goods have changed slowly, due primarily to which of the following? a.) Too much communication. b.) Too many products selling online. c.) Relatively slow methods of communication. d.) Operational inefficiencies resulting in higher operating costs.
Which of the following is an appropriate definition of Fair Information Practices (FIP)?
Principles that govern the collection and use of information about individuals - Created in 1973, FIP forms the basis for most U.S. and European laws.
Which of the following is NOT an interactive multimedia resource published online to inform and educate stakeholders?
Printed Text
Which of the following is not a characteristic of a private industrial network?
Private industrial networks provide more of a focus on individual transactions versus lasting relationships - Net marketplaces, not private industrial networks, provide more of a focus on individual transactions versus lasting relationships.
Which of the following is not a category from Henry Mintzberg's management behavior roles?
Problem Solver - 3 categories include: interpersonal, decisional, informational roles.
Which of the following can be disseminated to millions of consumers through social media, reducing marketing costs compared to traditional print, radio, and television advertising?
Product Marketing
Which of the following is not a primary role of a systems analysts?
Project Manager
What are three levels of risks associated with system design and implementation?
Project Structure, Size, Team Technical Background - project structure, project size, and technical capabilities are three key risks.
Training new users
Project management is essential for managing information technology for many reasons, including everything except which of the following? a.) Planning for the unexpected b.) Delivering quality systems on time c.) Managing the budget d.) Training new users
Businesses, news networks, government agencies, and nonprofit organizations are all actively using social media to primarily do what?
Promote and market their organizations.
The rapid advancement of information technology has created a huge problem for the human right to privacy. Besides stimulating economic progress and world trade, international agencies such as the Organization for Economic Co-operation and Development (OECD) work to _______________________________________________.
Promote but NOT implement international laws to protect the privacy of human beings.
Management information system
Provides timely and accurate information that enables managers to manage their departments more efficiently
Organizations must follow procedures to ensure the accuracy, integrity, and security of their financial information as outlined in which of the following legislation?
Public Company Accounting Reform and Investor Act (aka Sarbanes-Oxley Act) of 2002.
What are the classifications of cloud computing?
Public, Private, and Hybrid
Which of the following is not an organizational change category to consider when implementing a new information system?
Quality - Automation, along with rationalization or paradigm shifts are the desired critical outcomes of business implementation of a new or upgraded information system.
Which of the following technologies is used to track inventory and can be read hundreds at a time, even if the tag is covered?
RFID
Productive
RFID technology helps companies to be more WHAT with inventory management because they eliminate the need for physical handling of materials during cycle counting? a.) Effective b.) Smart c.) Productive
RAD is a method in which products can be developed faster and with higher quality through prototyping and early testing. What does RAD stand for?
Rapid application development
Social media has enhanced customer relationship management by enabling companies to best educate customers about new and existing products and services in ________________________________________________.
Real-Time
A disaster recovery plan (DRP) is a document of procedures to do what?
Recover and protect business operations.
As an employee of a retailing business, which of the following defines your obligations to your clients?
Responsibility - a perceived moral or legal duty that someone possesses to control or handle a specific or general task.
Network Engineer
Responsible for the layout, installation, and maintenance of all information technology network components.
Individuals are allowed to weigh decision choices based on legal or legislative precedent. This is the foundation for which of the following ethical approaches?
Rights - The rights approach values rights specified by society and allows individuals to weigh decision choices based on legal or legislative precedent.
Organizational risk factors
Risks that stem from hierarchies, policies, and procedures. These factors naturally allow organizations to operate as successful businesses, but also help to define categories risks, vulnerabilities, and threats, and create targets for criminals
Electronic communications has predominantly become the primary form of communications in first world countries. Which of the following protocol is used to manage and monitor the massive amount of emails that we receive every day?
SMTP - (simple mail transfer protocol) the popular mail protocols include IMAP and POP3
_____________________________ is the ability of a network to to grow user and services without forklift upgrades.
Scalability
Many businesses require their employees use VPN to gain remote access to the corporate network. Which of the following is an advantage of VPN?
Secured access
The AUP specifies acceptable and tolerable uses of an organization's computer systems, equipment, and information assets
Security policies are output from an organization's risk assessment process, which cover an organization's need for various levels of security. Acceptable use policy (AUP) is an example of a security policies control. Which of the following is TRUE regarding AUP? a.) The AUP specifies acceptable and tolerable uses of an organization's computer systems, equipment, and information assets b.) The AUP determines if the user follows the policies and procedures stipulated by the organization c.) The AUP defines the authorization and authentication of users
One way to reduce the possibility of fraud and abuse of data resources is to apply which concept of information security, which ensures that personnel's responsibilities and duties are separated from their access?
Separation of Duties
Risk of information loss caused by environmental events
Several factors contribute to the increasing vulnerability of information systems. Which of the following risk factors play an important role in contributing to the increasing vulnerability of information systems? a.) Implementing the principle of least privilege. b.) Risk of information loss caused by governmental sources. c.) Risk of information loss caused by environmental events.
ARPANET
Several independent parties or governing bodies work together to define the rules that help to manage effective network communications. Which of the following is NOT one of the governing bodies that recommend and decides on telecommunications standards? a.) IOS b.) IEEE c.) IETF d.) ARPANET
Virtual credit card
Shoppers are strongly encouraged to use secure forms of payment for online purchases. A WHAT is a special credit card number that requires the use of special two-factor authentication code gained via secure communication from a sponsoring bank before a transaction is permitted? a.) Virtual credit card b.) Prepaid debit card c.) Charge and sign credit transaction
Which of the following portable device combines the functionality of the phone technology with the computing of a desktop or laptop?
Smartphone
___________________________ will soon surpass desktop computers accessing the internet.
Smartphones
Which social media site is the second most popular with teens behind instagram?
Snapchat - 41% usage rate among teens.
What is the method used by hackers to develop a relationship with users in order to extract information?
Social Engineering - a method used by hackers to develop a relationship with users in order to extract information.
What do you call the web-based applications that allow user content to be created and shared over the Internet?
Social Media
Social e-commerce has become an important Internet tool for businesses to connect with their customers. Which of the following is not a benefit for companies to use social e-commerce as a business tool?
Social e-commerce allows customers to shop and buy products online - SOCIAL e-commerce is a way for companies to connect with their customers; the goal is not to sell products.
Media
Social networks must be targeted by businesses since social networking is WHAT type of channel? a.) Marketing b.) Business c.) Media
We make our ethical decisions based on the principles of right and wrong that we learn from our upbringing and our exposure to different ______________________________________.
Societies - Ethics is defined as the principles of right and wrong that we acquire through life-long experiences and different environments that guides us in our behaviors, but it can change as a person moves to a different society.
Licenses
Software WHAT must be managed by the IT organization to ensure the business is compliant with software vendors? a.) Codes b.) Licenses c.) Programs
Which of the following occurs during the acquisition phase?
Software and hardware are procured.
Automation
Software applications benefit business because they enable process WHAT? a.) Elimination b.) Automation c.) Redundancy
Software as a Service (SaaS)
Software licensed and hosted on centralized or distributed servers that belong to a service provider. Users access this software using a connection to the Internet and a web browser.
Vertical Application
Software that designed for a specific business.
[Select all that apply]. Which business structures are less formal?
Sole Proprietorship Partnerships
What do we mean by speed and amplification in social media?
Speed is the ability to share information in seconds, and amplification is the re-posting news in a community.
________________________________________ decisions involve an established procedure, and are repetitive and routine.
Structured - can be handled in the same manner each time.
High demand
Supply Chain Management (SCM) is a popular analytics application that can help a manufacturing company control its operating costs. Which of the following does not contribute to inefficiencies in the supply chain activities? a.) Underutilized plant capacity b.) High demand c.) High inventory level d.) Parts shortage
Knowledge Management (KM)
Supportive, collaborative, culture that includes corporate learning to foster corporate efficiency and gain value from intellectual assets defines what type of enterprise system? a.) Enterprise Resource Planning (ERP) b.) Customer Relationship Management (CRM) c.) Supply Chain Management (SCM) d.) Knowledge Management (KM)
The six formal steps that need to be followed to develop an information system is known as what?
System development life cycle (SDLC) 6 steps that must be performed sequentially
Testing and maintenance
System development life cycle (SDLC) consists of seven stages. The sixth stage in SDLC is WHAT? a.) Designing the recommended system b.) Determining information requirements c.) Testing and maintenance
What are the components of system-level security?
System-level security consists of the architecture, policy, and process levels.
What does SDLC stand for?
Systems Development Life Cycle
Why are good communication skills necessary for systems analysts?
Systems analysts interact with internal and external resources.
____________________________________ is an economic feasibility method.
TCO
What is total cost of ownership (TCO)?
TCO is a Study to Determine Economic Feasibility
The Internet standard defines how computers and devices route communications traffic from one network to another over the Internet. What is this Internet standard known as?
TCP/IP
_________________________ is a universal telecommunication network protocol that most operating systems can recognize.
TCP/IP
Social media benefits to businesses are made possible because social media offers both location-specific and time-specific _______________________________________________________________.
Targeting - Businesses can now target customers according to location-specific and time-specific campaigns.
Which of the following factors deals with employee training to mitigate the risks to an organization?
Technological Factors - include: training, careful planning, and intelligent acquisition of technology and services that will help an organization mitigate the risks that they are exposed to.
System development life cycle (SDLC) consists of seven stages. The sixth stage in SDLC is ____________________________________.
Testing and Maintenance - 7 Stages Include: (1)Planning, (2)Systems Analysis/Requirements, (3)System Design, (4)Development, (5)Integration/Testing, (6)Implementation, (7)Operations/Maintenance
Security policies are output from an organization's risk assessment process, which cover an organization's need for various levels of security. Acceptable use policy (AUP) is an example of a security policies control. Which of the following is TRUE regarding AUP?
The AUP specifies acceptable and tolerable uses of an organization's computer systems, equipment, and information assets.
Which of the following crimes affected the security of this country?
The Chelsea Manning and Edward Snowden leaks.
Cost-benefit analysis
The Ford Pinto example illustrates that which analysis is the best way to make well-informed business decisions? a.) Break-even analysis b.) Cost-benefit analysis c.) Risk-benefit analysis
To increase the number of unique IP addresses
The IP version 6 (IPv6) addressing scheme was developed in 2006 for what purpose? a.) To decrease the number of unique IP addresses b.) To increase the number of unique IP addresses c.) To recycle the number of unique IP addresses d.) To improve the performance of the IPv4 addressing scheme
More complexity due to the need for more systems and better improvements in their processing capabilities
The Internet has contributed to a complex network system. Businesses continue to grow and develop a need for more computer-enabled productivity which results in what? a.) More complexity due to the need for more systems and better improvements in their processing capabilities b.) The need for less powerful systems due to cloud computing handling processing power c.) Less complexity due to the need for more systems and better improvements in their processing capabilities
The client has control over the applications residing on the server
The Internet is organized as a client/server system. Which of the following statement is FALSE regarding the client/server architecture? a.) All the applications reside on the server b.) The client has control over the applications residing on the server c.) The client sends messages requesting services from the server on the network d.) The client/server architecture maximizes traffic on the network
Ethical principles often form the foundation for legal regulations. Governmental agencies create these legal regulations to define which of the following?
The fundamental tenets of responsibility, accountability, and liability for all businesses and its citizens to follow.
We live in a diverse culture in this country, with people who came from different nationalities and backgrounds. Which of the following statement about ethics is FALSE?
The government selects one specific culture to codify the ethics into laws.
Strategic agenda
The important characteristics of a balanced scorecard are focused on what? a.) Implementation issues b.) Strategic agenda c.) Management decisions
Dynamic Random-Access Memory (DRAM)
The main memory of a computer system; requires constant refreshing.
Information management
The management of organizational processes and systems; helps the organization reduce costs and adds value to products; helps the organization make better managerial decisions.
Query
The marketing manager for an airline company can perform a WHAT on the Members table in their DBMS to identify frequent fliers who qualify for their credit card program? a.) Query b.) Report c.) Retrieval
Metrics
The measurement function of business intelligence creates a hierarchy of benchmarking and WHAT? a.) KPI (Key Performance Indicator) b.) Relation c.) Metrics
Spice and goods trading on the Silk Route
The origin of global markets was WHAT? a.) Production in the 19th and 20th centuries b.) Expansion of domestic and multinational manufacturing c.) Spice and goods trading on the Silk Route
Knowledge
The practical application of information.
Geographic Information Systems (GIS) provide cities, states, municipalities, and even the public, with information such as property tax delinquencies, value of our houses, and addresses of sexual predators. Which of the following statements is FALSE?
The privacy of sexual predators is not violated because it is public information.
What is risk management in system security?
The process of identifying, analyzing, and responding to risk - helps understand system vulnerabilities and possible security risks, and taking active effort to reduce risk impact.
Knowledge management
The process of sharing knowledge across business units and among employees of a business is called a(n) WHAT? a.) Customer relationship management b.) Information management c.) Knowledge management
Security
The purpose of information security is to protect the information from illegal use and unauthorized access. Which of the following is NOT part of the triad encompassing the three categories of threats to information assets? a.) Security b.) Availability c.) Integrity d.) Confidentiality
Promote and implement international laws to protect the privacy of human beings
The rapid advancement of information technology has created a huge problem for the human right to privacy. Besides stimulating economic progress and world trade, international agencies such as the Organization for Economic Co-operation and Development (OECD) work to WHAT? a.) Promote but not implement international laws to protect the privacy of human beings b.) Promote and implement international laws to protect the privacy of human beings
Information technology management
The shipping clerks at ABC Logistics complained to their supervisor that they experienced delays in uploading shipping and tracking information at certain times of the day. The network provider was contacted, who advised management at ABC that a faster fiber-optic connection was now available at a discounted rate. This type of network connectivity would greatly improve Internet speed. This is an example of WHAT? a.) Information technology management b.) Information management
Information technology
The use of computer and telecommunications systems for storing, retrieving, and sending information; comprised of hardware, software, data, and networks.
Online businesses can operate more easily and freely than brick and mortar businesses
There are many reasons why online businesses must be held accountable to the laws and regulations in the localities and countries in which they operate. Which of the following is NOT one of the reasons? a.) Online businesses create lasting relationships with their customers and are more accountable. b.) Online businesses can respond quickly to the various pressures within the business environment. c.) Online businesses are more flexible and swift in their perception of the market. d.) Online businesses can operate more easily and freely than brick and mortar businesses.
Information security education
There are many ways individuals can help protect themselves from threats to their privacy. Choose the best option. a.) Research techniques online b.) Information security education c.) Ask a friend what they do
Automated
There are multiple methods of data capture, categorized as manual or WHAT? a.) Optical b.) Scanned c.) Automated
Quid pro quo
There are several low-tech attacks that criminals can use to steal sensitive information from individuals in public places. One of the most common methods is WHAT, in which individuals are offered a gift for completing an application for a credit card? a.) Pretexting b.) Pharming c.) Quid pro quo d.) Baiting
Separation of duties
There are two primary concepts within Information Security. WHAT concept stipulates that duties and access are to be disseminated among multiple people, so that the possibility of abuse and fraud are reduced or eliminated? a.) Separation of duties b.) Accountability c.) Principle of least privilege
Principle of least privilege
There are two primary concepts within information security. WHAT concept, otherwise known informally as need-to-know, indicates that access should only be provided to those who need it to complete tasks in their job? a.) Separation of duties b.) Accountability c.) Principle of least privilege
What are measurement, analytics, reporting, collaboration, and knowledge management?
These are common functionalities of business intelligence.
Which of the following statement regarding private industrial networks and Net marketplaces is false?
They are created and/or sponsored by the government.
Which of the following statements regarding private industrial networks and Net marketplaces is true?
They are professional and industrial networks - that include connections to governments, non-profit institutions, and service professionals.
Which of the following is a characteristic of a legacy or old analog network?
They carried continuous electronic waveforms.
Project Manager
They deliver quality systems on time, manage the budget, and plan for the unexpected (they do not train new users).
Why must a systems analyst be a good coordinator
They must always be able to communicate system capabilities and benefits
Decision support system
This system uses models and statistical analysis to help decision makers solve problems
Serve organizational goals
To be a strategic information system, an information system must do WHAT? a.) Serve organizational goals b.) Beat rivals c.) Collaborate with competitors
Dynamic and multimedia
To be competitive in the marketplace, businesses should lure customers in by providing information on their websites that is WHAT kind of driven? a.) Static and text b.) Dynamic and text c.) Dynamic and multimedia
Which of the following is not a reason for providing company information on the Internet?
To discourage customers from visiting the traditional storefront.
What is the primary purpose for publishing company information on the Internet?
To educate stakeholders on the company's mission and vision, production information, and community efforts.
What is the focus of a functional evaluation of a management information system?
To evaluate the quality and functionality of information and output - focuses on data, hardware, software, and networks.
The IP version 6 (IPv6) addressing scheme was developed in 2006 for what purpose?
To increase the number of unique IP addresses.
Which of the following is NOT a benefit for individuals to take information security training?
To understand the concept of safe harbor - this is a framework developed by the U.S. Department and European Commission.
TCO includes technology platform costs
Total cost of ownership (TCO) is a useful strategy when evaluating information systems cost and benefits. What does TCO entail? a.) TCO includes cost of goods b.) TCO includes overhead burden c.) TCO includes technology platform costs
Digital goods are available in electronic format. Which of the following is NOT an example of digital goods?
Traditionally Printed Material
What type of management information systems do operational and middle management use for structured decisions?
Transactional Processing Systems
Packet switching refers to a computer network's ability to do what?
Transmit information in discrete, parsed data encapsulated in packets.
______________________________ analysis reveals patterns of behavior, such as currency fluctuations, which can affect a stock or an entire industry or market.
Trend
[True/False] 4G networks provide IP based voice, data, and multimedia traffic.
True
[True/False] A legal feasibility study is appropriate when dealing with government agencies in which information and data might be sensitive.
True
[True/False] A virtual private network (VPN) provides a secure, encrypted, and remote connection between employees and the company's server via a third-party Internet service provider.
True
[True/False] Hiring managers frequently search multiple social media networks in order to identify inconsistencies in a candidate's background and experience.
True
[True/False] Input is the act of capturing or collecting data from an organization or environment.
True
[True/False] Microsoft Visio enables systems analysts to create professional diagrams that simplify complex information through collaboration tools and data-linked diagrams.
True
[True/False] Social media can be both harmful and helpful to a business or organization.
True
[True/False] The factors that most influence the success of an information system are the functionality of the system, the quality of the data, the usefulness of the system, system usage, system efficiency, and user satisfaction.
True
[True/False] The internet of Things (IoT) will enable automated, just in time e-commerce transactions.
True
[True/False] The user requirements analysis determines inputs, outputs, process steps, and data storage needs.
True
[True/False] When a systems analyst acts as a consultant, he or she interacts with the users to understand their needs and requirements.
True
[True/False] When considering social media in investment strategies, the source of the data may affect whether the use of the information is a violation of insider trading regulations.
True
[True/False] Input is the act of capturing or collecting data from an organization or environment.
True Input is the act of providing data to a computer system for processing
T/F: Microsoft Visio enables systems analysts to create professional diagrams that simplify complex information through collaboration tools and data-linked diagrams.
True Microsoft Visio is one of many tools that help system analysts diagram their solutions
T/F: The factors that most influence the success of an information system are the functionality of the system, the quality of the data, the usefulness of the system, system usage, system efficiency, and user satisfaction.
True There are several factors that influence the success of an information system.
[True/False] Integrating e-business aspects into a business operation can have a significant influence on business and potentially lasting effects on its business environment.
True - E-business aspects include using electronic communications and implementing workflow applications into a business operation.
[True/False] Because of operational efficiencies and the speed of the Internet, businesses that operate digitally may be much better at responding to requirements and changes than traditional brick-and-mortar businesses.
True - Operational efficiencies and the speed of the Internet help e-businesses respond and react quickly to changes within the business environment, more so than their traditional brick-and-mortar counterparts.
[True/False] Wireless networks enable businesses and their customers or suppliers to collaborate and share data on premises.
True - Wireless LANs allow visitors (customers or suppliers) to access the internet and their information systems for collaboration and decision making.
[True/False] Communist countries such as North Korea and China are most likely to utilize the common good ethical approach to maintain discipline and order in the country.
True - this approach values choices and motivations that perpetuate value for everyone, to sustain a positive whole-community benefit, despite individual income or position.
False
True or false. A business benefit of enterprise resource planning (ERP) systems is ease of use. a.) True b.) False
False
True or false. A customer relationship management system provides a business with an opportunity to allow customers to know which products are currently available by displaying them on a website. a.) True b.) False
False
True or false. A storage device consists of all the components that work together to process data into useful information. a.) True b.) False
True
True or false. A system where businesses work together to create a product or service for a customer is called a supply chain management system. a.) True b.) False
False
True or false. A transaction processing system is created to meet a specific business goal and to provide a competitive advantage. a.) True b.) False
True
True or false. Based on statistics from various consultant groups, a majority of strategic Information systems projects fail to meet schedule or budget. a.) True b.) False
False
True or false. Businesses are more successful if they align business objectives with information systems. a.) True b.) False
True
True or false. Businesses invest in information systems for a number of reasons, including to achieve operational excellence, develop new products and services, improve decision making, and promote competitive advantage. a.) True b.) False
False
True or false. CTOs have emerged as a critical strategic role in recent years in large organizations due to cyber attacks. a.) True b.) False
False
True or false. Hardware, software, data, and networks make up information systems. a.) True b.) False
True
True or false. Information systems help managers to perform long-range strategic planning, decision making, and to assess external threats and opportunities. a.) True b.) False
True
True or false. Information technology has both created and eliminated jobs. a.) True b.) False
False
True or false. Information technology managers should not try to standardize software and hardware when developing a global information system for an organization. a.) True b.) False
False
True or false. Modern forms of information technology include digital calculators, computer systems of many sizes and applications, and Morse code. a.) True b.) False
True
True or false. One of the possible ethical or societal issues that arise from the increasing globalization of technology is violating legal statutes. a.) True b.) False
False
True or false. Organizational structure does not have an effect on the success or failure when implementing information systems. a.) True b.) False
True
True or false. Organizations gain many benefits from knowledge management systems, but one of the most important benefits is that the systems make best practices available for employees at any time so they can learn the most effective and efficient ways of doing things. a.) True b.) False
True
True or false. The ATM (automated teller machine) at a bank is an example of an information system. a.) True b.) False
True
True or false. The ability to build a responsive IT infrastructure is one of the key issues facing information systems management. a.) True b.) False
True
True or false. The key role of a database analyst is to plan, design, implement and sustain database needs for an organization. a.) True b.) False
False
True or false. The key role of the CTO (Chief Technology Officer) is to provide vision and leadership for IT initiatives. a.) True b.) False
False
True or false. The terms information technology and information systems have the same definition and can be used interchangeably. a.) True b.) False
False
True or false. Two types of business strategies include growth and product competition. a.) True b.) False
True
True or false. Web Developers will continue to be in high demand because the Internet will continue to transform the way society and business interact and operate in the 21st Century. a.) True b.) False
Culture
Two factors that have contributed to the globalization of business are the availability of inexpensive communication and improved transportation. These factors have also contributed to the creation of a common global WHAT? a.) Software b.) Culture c.) Information system
What is UML?
UML (Unified Modeling Language) is a general purpose, standard software development modeling language used to model and help visualize systems
What is UML?
UML is a General Purpose Modeling Language - used to model and help visualize systems.
Mobile payment options
Understanding whether the intended e-commerce users will be customers, suppliers, and/or employees is an important component of an e-commerce plan. What other issue must be addressed during this time? a.) Purpose for creating e-commerce presence b.) Business and revenue models to use c.) Vision and mission statement d.) Mobile payment options
Biometrics is the study and measuring of individual body characteristics, and is often used in computer security. Biometrics falls under which of the following methods?
Unique Identity
Upper CASE tools are important to analysts in the project planning phase. What is meant by Upper CASE tools?
Upper CASE tools support software modeling and analysis.
What is the safest way to access a public Wi-Fi?
Use a Virtual Private Network
What is not a development stage in the waterfall model?
User Requirements - This is addressed in the system design.
Resistance
User adoption and management support during the implementation phase is required because of change WHAT? a.) Methods b.) Complexity c.) Resistance
Geographic Information Systems
Using connections to numerous databases containing data concerning locations, crimes, taxes, traffic, votes, and environmental and life science data, geospatial analysis can help government administrators to understand demographic trends, population density changes, attribute concentrations
Which of the following category of ethical models for ethical behavior approach assesses the consequences and/or outcomes of an action to determine the greatest good or least harm for the greatest number, regardless of the justice or fairness of or to the individual?
Utilitarian Approach - evaluates the consequences and/or outcome of an action to generate the maximum benefits for those involved.
Software
Various types of WHAT enable companies to utilize their information systems hardware and networks more effectively? a.) Software b.) Technology c.) People
Social media is influencing how the population receives news by enabling ______________________________ distribution.
Viral
Which of the following ethical models values human behaviors that allow us to act in aspirational ways?
Virtue - ethical approach which values human behaviors that allow us to act in aspirational ways, such as compassion, trustworthiness, honesty, generosity, kindness, autonomy, courage, and obedience.
__________________________ aids are helpful in maintaining audience interest, as well as helping the presenter follow and control the presentation.
Visual
Voice over Internet Protocol (VoIP)
VoIP is a type of broadband application, similar to video, in which voice calls are transmitted over the Internet.
Cultural particularism
WHAT are societal norms instilled in populations that tie them emotionally to local brands or habits? a.) Product expectation b.) Cultural particularism
Texting
WHAT can have a negative impact on employees' interpersonal skills and ability to build business relationships? a.) Social networking b.) Telecommuting c.) Texting
Environments
WHAT combine multiple tools or workbenches to support the complete software cycle? a.) Tools b.) Workbenches c.) Environments
Structured
WHAT decisions involve an established procedure, and are repetitive and routine? a.) Semi-structured b.) Unstructured c.) Structured
Integrated
WHAT environments are the most common and are suitable for the entire system development life cycle, from analysis to maintenance? a.) Process b.) Method c.) Integrated
Normalization
WHAT involves correctly defining keys, tables, columns and relationships? a.) Flow charting b.) Referential integrity c.) Normalization
Information technology management
WHAT is concerned with the management of resources that facilitate access to information? a.) Database management system b.) Information technology management c.) Knowledge management
Scalability
WHAT is the ability of a network to to grow user and services without forklift upgrades? a.) Expandability b.) Portability c.) Scalability
Information
WHAT is the meaningful organization of data? a.) Information b.) Knowledge
ETL (Extraction, transfer, and load)
WHAT is the process associated with data warehouse updates and backup? a.) ETL (Extraction, transfer, and load) b.) 1NF c.) Normalization
Data integrity
WHAT means that the data is accurate and consistent through its use and application time? a.) Data integrity b.) Normalization c.) Fidelity
Scrum
WHAT method can address unexpected changes or challenges that cannot be addressed effectively with SDLC? a.) RAD (Rapid-application development) b.) Agile c.) Scrum
Smartphones
WHAT will soon surpass desktop computers accessing the internet? a.) Servers b.) Laptops c.) Smartphones
Why is WPA critical to wireless networks?
WPA (Wi-Fi Protected Access) is a tunneling encryption protocol that secures wireless data transmissions.
Supply chain management (SCM)
Walmart uses WHAT type of software to plan and distribute products from the warehouses to the local stores? a.) Health analytics b.) Customer relationship management (CRM) c.) Supply chain management (SCM)
Organizations need to include redundancy in their business disaster recovery plan by creating duplicate facilities. Which of the following sites offer offsite office space that allow recovery within hours to days?
Warm Sites - offer offsite office space with available systems and service connections, require staffing and updates, allowing recovery within hours to days.
Community
Web 2.0 sites enable collaboration and interaction among users, creating a virtual online a.) Forum b.) Network c.) Community
Web mining can only identify associations, correlations, and significant relationships from data collected from the Internet
Web data mining helps businesses gather intelligence data and make important decisions. Which of the following statements is TRUE regarding web mining? a.) Web mining uses clickstream applications to analyze the data collected from the Internet. b.) Web mining can only identify associations, correlations, and significant relationships from data collected from the Internet. c.) Web mining can handle one database stored in one location at a time. d.) Web mining analyzes a website's traffic by keeping track of the clicks that a user makes.
The Internet was initially developed using a telephone connection. Which of the following is an innovative application provided by the Internet?
Web enabled storefront
Which of the following application provided by the Internet allows an online retailer to conduct business?
Web enabled storefront
What is a rich site summary (RSS)?
Web feed formats used by publishers - Systems analysts can tap RSS for current information and best practices. It is often called really simple syndication.
DBMS
What application does one use to query and administer databases? a.) DBMS b.) SQL c.) Microsoft Access
Application suites
What are application programs bundled together called? a.) Application suites b.) Cloud applications c.) Software packages
These are common functionalities of business intelligence
What are measurement, analytics, reporting, collaboration, and knowledge management? a.) These are the five management roles identified by Henry Mintzberg b.) These are common functionalities of business intelligence c.) These are the best practices of management
Peer-to-peer topologies connect each user in a network directly
What are peer-to-peer network topologies? a.) Peer-to-peer topologies are hierarchical networks b.) Peer-to-peer topologies connect each user in a network directly c.) Peer-to-peer topologies connect each user to the mainframe
Podcasts are audio files that contain educational content
What are podcasts, and why are they a good source of information for systems analysts? a.) Podcasts are content channels that can be read b.) Podcasts are sources of information that are accessed by Apple devices c.) Podcasts are audio files that contain educational content
Database manageability
What are the benefits of partitioning when maintaining a data warehouse database? a.) Database replication b.) Reduced storage c.) Database manageability
Public, private, and hybrid
What are the classifications of cloud computing? a.) Public, private, and hybrid b.) In-house, remote, and hybrid c.) Virtual, multi-core, and distributed
Volume, variety, and velocity
What are the three V's used to describe Big Data? a.) Volume, validity, and veracity b.) Volume, variety, and velocity c.) Validity, velocity, and vast
1NF, 2NF, 3NF
What are the three norms in normalization? a.) 1N, 2N, 3N b.) 1NF, 2NF, 3NF c.) Conceptual, logical, and Independent
Goal selection, attainment measurement, and achievement intervention
What are the three primary activities associated with business performance management? a.) Goal selection, attainment measurement, and achievement intervention b.) Goals, systems, and feedback c.) Objectives, processes, and intelligence
Packet transmission and TCP/IP protocol
What are the two fundamental protocols that can describe modern telecom networks? a.) Asynchronous transfer mode and ATM b.) Packet transmission and TCP/IP protocol c.) Circuit transmission and analog signals
Classical and behavioral models
What are the two management models that have influenced our understanding of the decision-making process in organizational management? a.) Structured and unstructured b.) Classical and behavioral models c.) IT supported and mathematical
Project structure, size, and team technical background
What are three levels of risks associated with system design and implementation? a.) Critical path, work breakdown, and change b.) Project structure, size, and team technical background c.) Cost, schedule, and user acceptance
Mobility, cost, and scalability
What are three reasons that more businesses are deploying wireless networks? a.) Multimedia, flexibility, and cost b.) Mobility, cost, and scalability c.) Security, mobility, and cost
Sniffing, spoofing, and probing
What are three risks to wireless networks? a.) Sniffing, denial of service, and unauthorized access b.) Sniffing, spoofing, and probing c.) Denial of service, security, and sniffing
A tuple is one record or data set in a row
What are tuples and how are they used in databases? a.) A tuple is a collection of sequenced data fields b.) A tuple is one record or data set in a row c.) A tuple is a database field
Presentation and staging
What are two key elements that make up the data warehouse? a.) Presentation and staging b.) Data and information c.) Rules and models
Cloud computing involves all resources connected over the Internet
What best describes a cloud-computing system? a.) Cloud computing involves outsourcing infrastructure services only b.) Cloud computing involves all resources connected over the Internet c.) Cloud computing means off-site data centers
Clickstream records where a user clicks on a web page
What best describes the meaning of clickstream? a.) Clickstream records where a user clicks on a web page. b.) Clickstream measures the number of unique visitors to a web site. c.) Clickstream is a type of foreign key.
Migration is moving data and applications to another computer
What best describes the meaning of data "migration"? a.) Migration is moving data and applications to another computer b.) Migration means upgrading operating system c.) Migration is replacing outdated hardware
Information systems help the enterprise be more productive, reducing size and personnel
What best describes the result of information system impact on a business enterprise? a.) Information systems increase labor cost due to increased information flow. b.) Information systems increase layers of management due to increase information. c.) Information systems slow down decision making process due to more data. d.) Information systems help the enterprise be more productive, reducing size and personnel.
The network engineer is responsible for the layout, installation and maintenance of all IT network components
What best describes the role of a Network Engineer? a.) The network engineer is responsible for the layout, installation and maintenance of all IT network components. b.) The network engineer supports desktops and software applications. c.) The network engineer administers the security of the database.
A systems analyst is responsible for recommending information technology to meet organizational needs
What best describes the role of a Systems Analyst? a.) A systems analyst is responsible for recommending information technology to meet organizational needs. b.) A systems analyst is responsible for the efficiency of corporate IT systems. c.) A systems analyst is responsible for a project completion on time and budget.
Data mining is used to analyze business databases, while big data analyzes big data sets
What can be described as a difference between "data mining" and "big data"? a.) Data mining is used to analyze business databases, while big data analyzes big data sets. b.) Data mining does not use artificial intelligence, while big data uses simple algorithms. c.) There is no difference; both are the same.
Security measures
What can be used to counter the risks, vulnerabilities, and threats experienced by managers in organizations? a.) Internet police b.) Security measures c.) Common sense
Workbenches
What category of CASE (Computer-Aided Software Engineering) does Microsoft Visual Basic fall under? a.) Tools b.) Environments c.) Workbenches
Touch
What computer input capability has Microsoft Windows 8 enabled? a.) Voice b.) Gesture c.) Touch
Structured query language
What computer language is used with relational database applications? a.) Javascript b.) Cobol c.) Structured query language
Network card
What do computer systems that will be interconnected in a network require? a.) Wi-fi b.) Hard drive c.) Network card
Velocity means real time analytics
What do people mean by velocity when describing Big Data? a.) Velocity means ability to update database. b.) Velocity means real time analytics. c.) Velocity means ability to execute data integrity.
Packet Switched Data Networks
What does PSDN stand for? a.) Packet Switched Data Networks b.) Packet Standard Data Node c.) Protocol Standard Data Network
Information technology has reduced bureaucracy by increasing access to information
What impacts has information technology had on organization behavior? a.) Information technology has made the IT organization lead business decision making. b.) Information technology has increased bureaucracy by increasing access to information. c.) Information technology has reduced bureaucracy by increasing access to information.
Passwords and Login IDs
What information can be gained by sniffing a wireless network? a.) VPN access to a corporate network b.) Passwords and Login IDs c.) Root level access to a computer
Provocative photos
What information displayed in social media can disqualify a job candidate? a.) Professional blogs b.) Provocative photos c.) Professional associations
Data warehousing replaces costly ERP systems
What is NOT a data warehousing benefit to business? a.) Data warehousing replaces costly ERP systems. b.) Data warehousing improves decision making. c.) Data warehousing delivers business Intelligence.
QoS is used to measure performance of data communications
What is QoS (Quality of Service)? a.) QoS is used to ensure fiber optic network performance b.) QoS is used to measure performance of data communications c.) QoS is mostly used to measure data switched networks
UML is a general purpose modeling language
What is UML (Unified Modeling Language)? a.) UML is a general purpose modeling language b.) UML is a hypertext language c.) UML is a computer language, like C++
Packet switching does not need a dedicated network connection
What is a benefit of packet switching? a.) Packet switching does not need a dedicated network connection. b.) Packet switching compiles all data to be transmitted in one packet. c.) Packet switching cannot handle multi-media transmission, which can be expensive to send.
A data mart is a data warehouse subset
What is a data mart? a.) A data mart is a small data warehouse. b.) A data mart is used only by small businesses. c.) A data mart is a data warehouse subset.
Schema is a planned design of the data organization
What is a database schema? a.) Schema is a planned design of the data organization. b.) Schema are used when referring to foreign key and primary key. c.) Schema is a term used by DBMS and stands for a structured query.
A hacker attempt to tie up network host resources making them unavailable
What is a denial of service attack? a.) Denial of service is a spoof b.) A hacker attempt to tie up network host resources making them unavailable c.) Denial of service is a network probing process
The scheduling challenges that occur when planning simultaneous events
What is a disadvantage of the group decision-support systems (GDSS)? a.) The lack of interactive collaborative tools b.) The network limitations c.) The scheduling challenges that occur when planning simultaneous events
Relational databases allow easy access to information
What is a key benefit to business organizations for using a relational database? a.) Relational databases are inexpensive. b.) Relational databases allow easy access to information. c.) Relational databases are easy to implement.
Mobile access to the Internet is growing exponentially
What is a key trend in mobile communications that businesses must be aware of? a.) Mobile networks will replace wired networks. b.) Mobile access to the Internet is growing exponentially. c.) Mobile communications is faltering because of lack of security.
A network management application retrieves and analyzes network traffic data
What is a network management application? a.) A network management application is a sniffer. b.) A network management application is the operating system needed in computer networks. c.) A network management application retrieves and analyzes network traffic data.
A radio frequency survey is a signal strength detection process to identify the best wireless access point locations
What is a radio frequency survey? a.) A radio frequency survey is a signal strength detection process to identify the best wireless access point locations b.) A radio frequency survey is used to partition the spectrum for wireless networks c.) A radio frequency survey is performed to understand what spectrum wireless networks should use
Web feed formats used by publishers
What is a rich site summary (RSS)? a.) Systems analysts' information channel b.) Web feed formats used by publishers c.) Websites used specifically by systems analysts
It is simpler to use than a DBMS
What is an advantage of using the traditional file environment? a.) Users can perform advanced queries on the tables. b.) It is simpler to use than a DBMS. c.) There is a dependency between the software program and the data.
Object oriented databases contain multimedia files or executable code in records or fields
What is an object oriented database? a.) Object oriented databases contain multimedia files or executable code in records or fields. b.) Object oriented databases contain simple data with no relationships. c.) Object oriented database is another term for relational database.
Data terminal equipment
What is another name for a network host? a.) Host computer b.) Data terminal equipment c.) Network server
Knowledge discovery
What is another term used to describe data mining? a.) Relational cognizance b.) Information analysis c.) Knowledge discovery
Low level is characterized by noticeable impact to the organization
What is considered to be a low level security risk during system post-implementation? a.) Low level is characterized by complete loss of organizational capabilities b.) Low level is characterized as severe impairment to an organization c.) Low level is characterized by noticeable impact to the organization
When a group suppresses dissent and alternative points of view
What is groupthink? a.) When a group suppresses dissent and alternative points of view b.) When a group uses GDSS c.) When a group shares alternative points of view d.) When a group collaborates effectively
Core routers 'collapse' the network into a backbone for high bandwidth communication
What is meant by a 'Core' router? a.) Core routers are all routers that connect to the Internet. b.) Core routers are a single routing protocol. c.) Core routers 'collapse' the network into a backbone for high bandwidth communication.
Multi-core microprocessors allow for parallel processing
What is meant by a multi-core microprocessor? a.) Multi-core microprocessors are primary memory devices b.) Multi-core microprocessors allow for parallel processing c.) Multi-core microprocessors are memory devices
Decision maker provides the necessary insight, judgment, and evaluation
What is meant by an unstructured decision-making process? a.) Decision maker provides the necessary insight, judgment, and evaluation. b.) Decision maker uses an established routine. c.) Decision maker uses outside consultants. d.) Decision maker uses information technology and algorithms.
Master data are objects shared across the enterprise
What is meant by master data in entity-relationship modeling? a.) Master data is a table of business definitions. b.) Master data are objects shared across the enterprise. c.) Master data is the entity in hierarchical databases.
Scalability refers to the ability to grow user base and data services with ease, built into the infrastructure
What is meant by wireless networks being scalable? a.) Scalability refers to the ability to expand range built into the infrastructure. b.) Scalability refers to the ability to grow at fixed costs. c.) Scalability refers to the ability to grow user base and data services with ease, built into the infrastructure.
Redundancy
What is not a benefit of database normalization? a.) Redundancy b.) Organization c.) Flexibility d.) Consistency
User requirements
What is not a development stage in the waterfall model? a.) User requirements b.) Conversion c.) Systems analysis
It involves the measurement of probability and consequences of risks
What is qualitative risk analysis? a.) It involves the measurement of high level security breach impact b.) It involves the measurement of probability and consequences of risks c.) It involves the measurement and cost associated with quality failures
The process of identifying, analyzing, and responding to risk
What is risk management in system security? a.) The process of identifying, analyzing, and responding to risk b.) The process of cataloging risks c.) The process of security breach prevention
Internet of Things means connectivity of all devices to enable service automation
What is the Internet of Things (IoT)? a.) Internet of Things means every user in the world having access to the internet. b.) Internet of Things means connectivity of all devices to enable service automation. c.) Internet of Things means online e-commerce on every product and service.
Employers validate qualifications, references, and skills
What is the benefit of employers researching social media information on job candidates? a.) Employers evaluate the types of friends candidates keep. b.) Employers validate qualifications, references, and skills. c.) Employers evaluate candidates' personal interests.
Extraction means getting data from database sources
What is the best definition for data extraction? a.) Extraction means copying a database to data warehouse. b.) Extraction means backing up the data warehouse. c.) Extraction means getting data from database sources.
Core routers connect large businesses to the Internet backbone
What is the best definition of a core router? a.) Core routers are used in fiber optics networks b.) Core routers connect large businesses to the Internet backbone c.) Core routers have few protocol capabilities
Data integrity is a process to ensure data is not corrupted
What is the best definition of data integrity? a.) Data integrity means data is current. b.) Data integrity is a process to ensure data is not corrupted. c.) Data integrity means data is secure and reproducible.
The flat file design is a single table database
What is the best description of a flat file database? a.) Flat file databases are hierarchical in nature. b.) Flat file databases are prevalent today because they provide relational functions. c.) The flat file design is a single table database.
Data is digitized, enclosed in packets, and transmitted
What is the best description of how a packet switched network works? a.) Data is transmitted in a virtual circuit. b.) Data is digitized and transmitted in fixed packet size and rates. c.) Data is digitized, enclosed in packets, and transmitted.
The ability to review and target candidates based on their background
What is the business benefit of a social media website like LinkedIn? a.) The ability to reduce wages due to proliferation of candidates. b.) The ability to review and target candidates based on their background. c.) The ability to always find the right candidates.
Partitioning means dividing a database for manageability
What is the definition of a partition in database concepts? a.) Partitioning means distributing a database for availability. b.) Partitioning means dividing a database for manageability. c.) Partitioning means backing up database for business continuity.
ICR is an intelligent or advanced form of OCR
What is the difference between ICR (Intelligent Character Recognition) and OCR (Optical Character Recognition)? a.) ICR is an intelligent or advanced form of OCR b.) ICR uses optical bar codes, whereas OCR recognizes characters c.) ICR is intelligent and not prone to errors, like OCR
A LAN connects computer systems locally, whereas a WAN connects systems over a long distance
What is the difference between a LAN and a WAN? a.) A LAN is a large network, whereas a WAN is a small network. b.) A LAN connects computer systems locally, whereas a WAN connects systems over a long distance. c.) A LAN consists of a client server network, whereas a WAN has client server and mainframe systems.
First degree means users are connected; second degree means they share mutual contacts
What is the difference between a first degree connection and second degree connection on LinkedIn? a.) First degree means a current employee; second degree means a top candidate. b.) First degree means a top candidate; second degree means a back up candidate. c.) First degree means users are connected; second degree means they share mutual contacts.
Object oriented are designed to store audio or mixed media, while relational link tables of records
What is the difference between an object-oriented database model and a relational model? a.) Object oriented are used for hierarchical links, while relational are linked by common key attributes. b.) Object oriented are designed to store audio or mixed media, while relational link tables of records. c.) Object oriented is a centralized database model, while relational is decentralized.
Data mining and analytics are interchangeable; both are processes to identify new patterns in data
What is the difference between data mining and analytics? a.) Data mining looks at operational data, whereas analytics looks at transactional databases. b.) Data mining and analytics are interchangeable; both are processes to identify new patterns in data. c.) Data mining is used in mainframes, whereas analytics is used in client-server environments.
Data mining examines and reveals patterns in a structured DBMS, while web mining discovers patterns in a less structured format, such as the Internet
What is the difference between data mining and web mining? a.) Data mining examines and reveals patterns in a non-relational DBMS, while web mining discovers patterns in a less structured format, such as the Internet. b.) Data mining examines and reveals patterns in a structured DBMS, while web mining discovers patterns in a less structured format, such as the Internet. c.) Data mining examines and reveals patterns in a structured DBMS, while web mining discovers patterns in a non-relational DBMS. d.) Data mining examines and reveals patterns in a less structured format such as the Internet, while web mining discovers patterns in a structured DBMS.
M-commerce is e-commerce transacted using mobile, wireless smart devices
What is the difference between m-commerce and e-commerce applications? a.) M-commerce is business to business, while e-commerce is business to consumer b.) M-commerce is government e-commerce c.) M-commerce is e-commerce transacted using mobile, wireless smart devices
Wireless, mobile networks
What is the fastest growing infrastructure and information system facing the millennial? a.) Smart devices b.) Wireless, mobile networks c.) Satellite communications
To evaluate the quality and functionality of information and output
What is the focus of a functional evaluation of a management information system? a.) To evaluate reporting capability for decision making b.) To evaluate the query response time c.) To evaluate the quality and functionality of information and output
A network bridge links two network LANs together
What is the function of a network bridge? a.) A network bridge is a simple switch. b.) A network bridge connects virtual hosts together. c.) A network bridge links two network LANs together.
The cloud administrator assesses and improves cloud infrastructure needs.
What is the function of the cloud administrator job? a.) The cloud administrator monitors and provides cloud resources b.) The cloud administrator controls who offers cloud services c.) The cloud administrator assesses and improves cloud infrastructure needs
The data integration service serves as the depository of all extracted data for the load function of the data warehouse
What is the function of the data integration service in business intelligence? a.) The data integration service gathers and logically mixes business and master data b.) The data integration service helps extract value from the data c.) The data integration service serves as the depository of all extracted data for the load function of the data warehouse
Malware infection
What is the greatest business security threat from social media applications? a.) Hacking b.) Malware infection c.) Denial of service attack
Computer speeds are increasing exponentially
What is the implication of Moore's law? a.) Computers will become robots b.) Computer speeds are increasing exponentially c.) Computers will process biological signals
The hard drive is a device that stores data
What is the main purpose of the hard drive? a.) The hard drive boots the computer b.) The hard drive is the main memory system c.) The hard drive is a device that stores data
The way they communicate with their stakeholders
What is the major difference between a rigidly defined brick-and-mortar depiction of a business and one that is purely an e-business? a.) The way they communicate with their stakeholders. b.) The type of customers they have. c.) The type of products they sell. d.) The way they operate their business.
Ownership and/or control of the network
What is the major difference between private industrial networks and Net marketplaces? a.) Who is the third party managing the network b.) Goals to achieve c.) Ownership and/or control of the network d.) Amount of transactions conducted
Outcomes are the consequences of an event
What is the meaning of outcomes in decision theory? a.) Outcomes are the consequences of an event b.) Outcomes are possibilities thought by the agent c.) Outcomes are the feedback mechanism to decision theory
Microsoft Windows
What is the most common client-level operating system in business? a.) Microsoft Windows b.) Unix c.) OS X
Prepackaged production reports
What is the most common use of business intelligence in corporations? a.) Data mining b.) Analytics c.) Prepackaged production reports
Sniffing
What is the most prevalent hacker attack on wireless networks? a.) Probing b.) Sniffing c.) Spoofing
Identify user system and software requirements
What is the objective of the systems analysis stage in the waterfall method? a.) Define the software architecture b.) Identify user system and software requirements c.) Identify the hardware platform
A systems analyst focuses on analysis, design, and implementation
What is the overall job function of a systems analyst? a.) A systems analyst executes qualitative risk assessments b.) A systems analyst focuses on analysis, design, and implementation c.) A systems analyst develops system design processes
1G enabled mobile voice telecommunication while 4G offers voice, data and video
What is the primary difference between a 1G cellular network and the current 4G network? a.) 1G offered digital circuits while 4G offers packet switching b.) 1G is the fastest network and is used for converged technology while 4G are voice only c.) 1G enabled mobile voice telecommunication while 4G offers voice, data and video
Reduce losses related to losses in confidentiality, availability and integrity
What is the primary goal of information security? a.) Eliminate all losses associated with risks. b.) Reduce losses related to losses in confidentiality, availability and integrity. c.) Reduce losses regardless of the cost.
Direct move
What is the process of transferring data that does not need to be transformed to the data warehouse? a.) Clean transfer b.) Direct move c.) Stream
A sniffer is used to monitor network traffic
What is the purpose of a network sniffer? a.) A sniffer is used to hack into networks b.) A sniffer is used to monitor network traffic c.) A sniffer is used to improve QoS
Data warehouse analysis leads to business intelligence
What is the relationship between business intelligence and a data warehouse? a.) Data warehouse analysis leads to business intelligence. b.) There is no relationship between business intelligence and data warehouses. c.) Business intelligence must be stored in a data warehouse.
Repeaters are used to amplify signals as they travel in a network
What is the role of repeaters in telecommunication networks? a.) Repeaters are used to amplify signals as they travel in a network. b.) Repeaters store transmitted data in case there is an error in transmission. c.) Repeaters are used to send data to multiple devices in the network.
b
What is the salary range of new and emerging social media jobs? a.) $30,000-$50,000 b.) $45,000-$70,000 c.) $80,000-$100,000
100,000 kbps
What is the typical broadband data speed of a 4G network? a.) 64 kbps b.) 100,000 kbps c.) 2.4 kbps
Petabytes
What is the typical data set size of big data? a.) Petabytes b.) Bytes c.) Terabytes
TCO is a study to determine economic feasibility
What is total cost of ownership (TCO)? a.) TCO is a study to determine economic feasibility b.) TCO is a development life cycle method c.) TCO is a waterfall economic analysis
Pointers
What is used to show the relationship between data fields and tables in entity-relationship models? a.) Circles b.) Pointers c.) Bolding
Predictive analytics
What item below is considered a category of business intelligence? a.) Relational mapping b.) Data warehousing c.) Predictive analytics
Understanding the purpose of creating an e-commerce is addressed in which of the following questions?
What job(s) will the e-commerce presence satisfy? - Developing a presence with e-commerce requires the organization to understand its purpose in creating an e-commerce page.
The project team would create vision and mission statements in alignment with the organization's overall mission, then seek to understand the audience, market conditions, development timeline, and preliminary budget. This assignment is addressed in which of the following questions?
What job(s) will the e-commerce presence satisfy? - the project team will create vision and mission statements and then seek to understand market conditions.
Data cleansing
What occurs during the transformation step in ETL? a.) Data formatting b.) Data stream c.) Data cleansing
Social media
What other sources of information besides a resume, cover letter, and interviews are employers using when evaluating candidates? a.) Social media b.) Social network c.) Social profile
3/4
What portion of small businesses fear potential damage from social media? a.) 1/3 b.) 1/2 c.) 3/4
How is the marketplace structured, and how will the business best interact with an e-commerce presence?
What question does the SWOT analysis best answer? a.) How is the marketplace structured, and how will the business best interact with an e-commerce presence? b.) What business and revenue models are best for e-commerce implementation? c.) What job(s) will the e-commerce presence satisfy? d.) Who is the target audience(s and how will they access e-commerce sites?
Application
What software allows computer users to perform activities, functions, or tasks? a.) Routing b.) Application c.) Operating
Spreadsheet
What software would be used by accountants to create digital ledgers? a.) Word processing b.) Presentations c.) Spreadsheet
Chief Security Officer
What strategic role has emerged as critical in recent years in large organizations due to cyber attacks? a.) Chief Database Officer b.) Chief Security Officer c.) Chief Legal Officer d.) Chief Technology Officer
Executive support systems (ESS)
What systems do upper management use for decision making? a.) Online analytical processing systems (OLAP) b.) Online transaction processing systems (OLTP) c.) Executive support systems (ESS)
It creates analytical databases that help expedite custom queries
What tasks does the analytics services element of business intelligence perform? a.) It creates analytical databases that help expedite custom queries. b.) It performs the predictive analytics function. c.) It performs the data integrity algorithm.
Transactional processing systems
What type of management information systems do operational and middle management use for structured decisions? a.) Data warehouse systems b.) Transactional processing systems c.) Analytical processing systems
Classified documents of the U.S. government
What was stolen in the Chelsea Manning and Edward Snowden crimes? a.) Classified documents of the U.S. government b.) Users' personal information c.) Corporations' customer credit card information
It will receive heavy responses from competitors and newcomers
What will happen if an e-business does not take any action to sustain the advantages brought by e-business? a.) The business will sustain itself with affecting components. b.) Customers will continue to shop online. c.) It will receive heavy responses from competitors and newcomers.
When should oral communication be avoided?
When Conveying Documentation - Documentation should be presented in writing for the audience to read.
When would client computers using TCP/IP in a client/server network not be able to communicate with each other?
When a client computer is offline and not connected to the Internet
The company gets access to enterprise applications
When a company acquires SaaS (Software as a Service) in cloud computing, what do they actually get? a.) The company gets the computer platform b.) The company gets the software in perpetuity c.) The company gets access to enterprise applications
Numerous methods
When a piece of data is in one of the three states (at rest, in motion, or in use), people can employ WHAT to countermeasure threats or vulnerabilities to that particular data? a.) Two specific methods b.) Numerous methods c.) One specific method
The user knowledge and background of target audience
When communicating, what is important for IT professionals to understand during the system development process? a.) The legacy systems model b.) The system networking platform c.) The user knowledge and background of target audience
Users
When installing a wireless network, it is important to know the best access point locations and the number of WHAT? a.) Routers b.) Hubs c.) Users
Decision analysis is used with complex issues that require mathematical analysis
When is decision analysis used by management? a.) Decision analysis is used when management is indecisive. b.) Decision analysis is used when dealing with structured decisions. c.) Decision analysis is used with complex issues that require mathematical analysis.
Documentation
When managing systems implementation, WHAT step consists of cataloging the system specifications in detail? a.) Conversion b.) Aquisition c.) Documentation
When conveying documentation
When should oral communication be avoided? a.) When meeting with people from other cultures b.) When working on global projects c.) When conveying documentation
Circuit switch
When streaming data or voice, which type of switched network is used? a.) Packet switch b.) Circuit switch c.) Analog switch
Data integrity
When there are mistakes or errors in the data, it is a violation of WHAT rule? a.) Data redundancy b.) Data integrity c.) Data inconsistency
Calculations
When using a decision tree, WHAT can become complex when uncertain values exist, or if multiple outcomes are linked oriented? a.) Analysis b.) Outcomes c.) Calculations
Production and operations
Which main business function is responsible for converting resources into goods or services as efficiently as possible? a.) Production and operations b.) Sales and marketing c.) Finance and accounting d.) Human resources
End user development
Which method below uses fourth generation computer languages? a.) End user development b.) Agile c.) RAD
A small business owner installs Microsoft Office suite on all the computers in his office
Which of the following action is considered ethical, social, and legally acceptable? a.) An employee searches the corporate data resources for sensitive information about his neighbor or friends b.) A small business owner installs Microsoft Office suite on all the computers in his office c.) A high school student copies, uses, and distributes Taylor Swift music videos to his classmates
Create automatic backups on cloud storage
Which of the following actions will help us protect our computer against failure? a.) Do not store data on the cloud b.) Create automatic backups on cloud storage c.) Only store data on a hard drive d.) Store all data on a jump drive
Electronic Data Interchange
Which of the following application provided by the Internet allows a business to transfer documents automatically without human intervention? a.) Information repositories b.) Electronic Data Interchange c.) Electronic communications d.) Web forms
Web enabled storefront
Which of the following application provided by the Internet allows an online retailer to conduct business? a.) Web forms b.) Electronic communications c.) Web enabled storefront d.) Fax machine
A digital signal is a discrete, non-continuous electrical waveform
Which of the following best defines a digital signal? a.) A digital signal is a packet b.) A digital signal is a discrete, non-continuous electrical waveform c.) A digital signal is a frequency driven medium
A system of nodes and links
Which of the following best describes a telecommunications network? a.) A system of nodes and links b.) The internet c.) A telephone system
BPM is collection of analytics and processes that enable organizations achieve goals and objectives
Which of the following best describes business performance management (BPM)? a.) BPM is a methodology that relies on business intelligence to fix processes. b.) BPM is a methodology of knowledge sharing from business intelligence. c.) BPM is collection of analytics and processes that enable organizations achieve goals and objectives.
Freeware is copyrighted software that can be used for free
Which of the following best describes freeware? a.) Freeware is copyrighted software that can be used for free b.) Freeware is hardware components that can be used for free c.) Freeware is open-source software that can be modified
A method or algorithm that uses statistics and data mining to forecast models
Which of the following best describes predictive analytics? a.) A method that uses data mining techniques to solve operational challenges b.) A method or algorithm that uses statistics and data mining to forecast models c.) A process that integrates data to help management make changes d.) A process that uses business data to report operational information
Referential integrity is the process of building relationships between tables based on keys
Which of the following best describes referential integrity? a.) Referential integrity applies only in hierarchical database. b.) Referential integrity is the process of building relationships between tables based on keys. c.) Referential integrity is the relationship between primary keys.
Data mining is the process of analyzing data to gain insight or intelligence
Which of the following best describes the process of data mining? a.) Data mining is the process of organizing data for database design. b.) Data mining is the process of creating intelligent databases. c.) Data mining is the process of analyzing data to gain insight or intelligence.
WSNs are spatially distributed sensors.
Which of the following best describes wireless sensor networks (WSNs)? a.) WSNs are spatially distributed sensors. b.) WSNs are antenna mesh. c.) WSNs are highly powered access points.
Utilitarian approach
Which of the following category of ethical models for ethical behavior approach assesses the consequences and/or outcomes of an action to determine the greatest good or least harm for the greatest number, regardless of the justice or fairness of or to the individual? a.) Utilitarian approach b.) Rights approach c.) Virtue d.) Fairness approach
Accessibility
Which of the following category of generalized ethical issues refers to creation of barriers to access? a.) Privacy b.) Accuracy c.) Accessibility d.) Property
b
Which of the following companies has created a network-based strategy with other businesses? a.) Happy Hair is a hair salon catering to young teenagers. The business works hard to keep up with the current trends that teenagers are following for their hair styles, such as current TV shows and pop musicians. The business has been so successful that the owner is considering opening a new location. b.) Chic Computers is a business that sells laptops and tablets. The business works with various laptop and tablet manufacturers and also multiple cell phone carriers to offer a few products from each manufacturer and carrier. The result for consumers is that they can go to one store and learn about the laptop and tablet options available from multiple companies, including pricing.
Principle of Least Privilege
Which of the following concept dictates that personnel should be given access on a need-to-know basis? a.) Separation of Duties b.) Principle of Least Privilege c.) Information Security
The Chelsea Manning and Edward Snowden leaks
Which of the following crimes affected the security of this country? a.) Scams, fraud, and identity theft b.) The Chelsea Manning and Edward Snowden leaks c.) Corporate loss
Income level
Which of the following customer attributes helps price goods more accurately? a.) Customer age b.) Income level c.) Purchase price d.) Ethnic group
Allows individuals to examine government records as long as it does not cause an invasion of privacy
Which of the following describes the Freedom of Information Act (FOIA)? a.) Provides the right to be left alone from individuals, organizations, and the state. b.) Allows individuals to examine government records as long as it does not cause an invasion of privacy. c.) Provides principles and standards that teach us what is right and wrong. d.) Provides principles that govern the collection and use of information about individuals.
Virtue
Which of the following ethical models values human behaviors that allow us to act in aspirational ways? a.) Utilitarian b.) Rights c.) Virtue d.) Fairness e.) Common Good
Technological factors
Which of the following factors deals with employee training to mitigate the risks to an organization? a.) Technological factors b.) Environmental risk factors c.) Organizational factors
To understand the concept of safe harbor
Which of the following is NOT a benefit for individuals to take information security training? a.) Guard against loss from low-tech methods b.) Guard against loss from high-tech methods c.) To understand the value of their information assets d.) To understand the concept of safe harbor
Lower implementation costs
Which of the following is NOT a benefit of information technology? a.) Lower implementation costs b.) New product development c.) Faster communication d.) Increased globalization
Business strategy
Which of the following is NOT a benefit to business from social media apps? a.) Business strategy b.) User generated feedback c.) Targeted sales promotions
Cost-benefit analysis
Which of the following is NOT a component of an organization's framework for security and control? a.) Risk assessments b.) Information systems controls c.) Cost-benefit analysis
Abstract data model
Which of the following is NOT a data model used when mapping business processes, relationships, and data requirements? a.) Physical data model b.) Abstract data model c.) Conceptual data model
Digital Millennium Copyright Act (DMCA)
Which of the following is NOT a legislation created to protect the integrity and confidentiality of information? a.) Sarbanes-Oxley Act (SOX) b.) Digital Millennium Copyright Act (DMCA) c.) Health Insurance Portability and Accountability Act (HIPAA) d.) Gramm-Leach Bliley Act (GLBA)
Database backup
Which of the following is NOT a pitfall when maintaining a data warehouse database? a.) ETL load phase b.) Database backup c.) Data validation d.) Data cleansing
Use anonymous browsing.
Which of the following is NOT a safe way to access a public Wi-Fi? a.) Use a Virtual Private Network (VPN) connection. b.) Use a secure connection to a remote desktop. c.) Use anonymous browsing.
Valuation analysis
Which of the following is NOT a trading use that has emerged from investors applying social media? a.) Sentiment analysis b.) Trend analysis c.) Valuation analysis
Acquiring an e-commerce presence from another firm
Which of the following is NOT a typical option for creating an e-commerce presence? a.) Purchasing e-commerce services from a service provider. b.) Purchasing e-commerce services from off-the-shelf software. c.) Acquiring an e-commerce presence from another firm. d.) Creating an e-commerce presence from scratch.
Printed text
Which of the following is NOT an interactive multimedia resource published online to inform and educate stakeholders? a.) Printed text b.) Audio clips c.) Written text d.) Video clips
Incentives
Which of the following is NOT an organizational feature that managers should consider when building and using information systems? a.) Politics b.) Structure c.) Environment d.) Incentives
Expert consultants
Which of the following is a NOT an element of business intelligence? a.) Expert consultants b.) Managerial methods c.) Analytics toolset
Children's Online Privacy and Protection Act (COPPA)
Which of the following is a U.S. law stipulating what a website operator must include in a privacy policy? a.) Gramm-Leach Bliley Act (GLBA) b.) General Data Protection Regulation (GDPR) c.) Children's Online Privacy and Protection Act (COPPA) d.) Health Insurance Portability and Accountability Act (HIPAA)
They carried continuous electronic waveforms
Which of the following is a characteristic of a legacy or old analog network? a.) They carried continuous electronic waveforms b.) They did not have capacity or bandwidth limitations c.) They require packet switched networks
A logical model is an abstraction of a system
Which of the following is a definition of a systems analysis logical model? a.) A logical model is an abstraction of a system b.) A logical model is a type of data diagram c.) A logical model is UML
Internet
Which of the following is a great, free, and ubiquitous source of information for systems analysts? a.) Internet b.) Textbooks c.) Library
Decision making
Which of the following is a primary role of information systems managers? a.) Performance review b.) Hiring c.) Decision making
Email encryption
Which of the following is a proactive technological measure that could help protect our privacy? a.) Antivirus b.) Anti-malware c.) Email encryption d.) Intrusion protection
European Union's General Data Protection Regulation (GDPR)
Which of the following is a set of regulations to protect Internet users from clandestine tracking and unauthorized personal data usage? a.) European Union's General Data Protection Regulation (GDPR) b.) Health Insurance Portability and Accountability Act (HIPAA) c.) Children's Online Privacy and Protection Act (COPPA) d.) Organization for Economic Co-operation and Development (OECD)
Joe is extracting information from existing data to better understand his customers and identify potential risks
Which of the following is an accurate example of why a business should use predictive analytics? a.) Joe is extracting information from existing data to better understand his customers and identify potential risks. b.) Mary is using historical data so she can know what will happen in her business next year.
Principles that govern the collection and use of information about individuals
Which of the following is an appropriate definition of Fair Information Practices (FIP)? a.) Principles that govern the collection and use of information about individuals. b.) Allows individuals to examine government records as long as this examination does not cause an invasion of privacy. c.) Provides principles and standards that teach us what is right and wrong. d.) Provides the right to be left alone from individuals, organizations, and the state.
Organization for Economic Co-operation and Development (OECD)
Which of the following is an international establishment of laws that help to protect fundamental human right to privacy? a.) Organization for Economic Co-operation and Development (OECD) b.) Health Insurance Portability and Accountability Act (HIPAA) c.) European Union's General Data Protection Regulation (GDPR) d.) Children's Online Privacy and Protection Act (COPPA)
World Intellectual Property Organization (WIPO) Copyright Treaty
Which of the following is an international law or agreement created to combat increasing piracy software and digital goods? a.) Gramm-Leach Bliley Act (GLBA) b.) Digital Millennium Copyright Act (DMCA) c.) Sarbanes-Oxley Act (SOX) of 2002 d.) World Intellectual Property Organization (WIPO) Copyright Treaty
Virtual networks function through network virtualization
Which of the following is correct about virtual networks? a.) Virtual networks function through network virtualization. b.) Virtual networks are a conceptual design. c.) Virtual networks connect virtual hosts together.
Difficulty in estimating project cost
Which of the following is not a benefit of using SDLC when implementing an information system program? a.) Detailed staged process b.) Ability to monitor large projects c.) Difficulty in estimating project cost
IP
Which of the following is not a circuit switching protocol? a.) Frame Relay b.) IP c.) ATM
Managerial
Which of the following is not a component of a feasibility study? a.) Economic b.) Technical c.) Managerial
Competition
Which of the following is not a factor that must be considered when implementing a new information system? a.) Technical ability b.) User c.) Resistance to change d.) Competition
Brand
Which of the following is not a key factor to consider when evaluating a system alternative? a.) Brand b.) Compatibility c.) Limitations d.) Economic
Normalization prevents inaccurate data entry
Which of the following is not a reason to normalize a database? a.) Normalization prevents inaccurate data entry b.) Normalization eliminates data redundancy c.) Normalization reduces data complexity
Select team
Which of the following is not a step in the decision-making process? a.) Select team b.) Develop alternatives c.) Define problem
Scheduling
Which of the following is not a systems implementation phase? a.) Testing b.) Conversion c.) Scheduling d.) Development
DOS
Which of the following is not a telecommunications network protocol? a.) DOS b.) PPP c.) FTP d.) TCP/IP
Row-to-column
Which of the following is not a type of relationship in a relational database model? a.) One- to-one b.) One to-many c.) Row-to-column
POP
Which of the following is not a wireless telecommunication networking protocol? a.) Wi-Fi b.) POP c.) Bluetooth
Copper building wire
Which of the following is not an effective telecommunication medium? a.) CAT 5 cable b.) Fiber optics cable c.) Copper building wire
Model
Which of the following is not an element in decision theory? a.) Acts b.) Model c.) Payoffs
Quality
Which of the following is not an organizational change category to consider when implementing a new information system? a.) Automation b.) Quality c.) Rationalization
A network of servers is set up to share and manage client data across multiple satellite offices for a healthcare provider so the staff at any location can access the same data
Which of the following is the best description of an information system? a.) A network of servers is set up to share and manage client data across multiple satellite offices for a healthcare provider so the staff at any location can access the same data. b.) A restaurant's important recipes are stored in a database on their desktop computer. c.) A program is written to create mailing labels for marketing company.
It is a self-regulation component
Which of the following statement is TRUE concerning safe harbor? a.) It is a self-regulation component. b.) The U.S. firms must protect and enforce privacy based on the U.S. government regulation. c.) It is a framework run and enforced by the U.S. Department of Commerce. d.) It allows U.S. firms to collect and store personal information of U.S. citizens.
Many brick-and-mortar retailers have replaced all their supply chains with elements of e-commerce
Which of the following statement regarding e-commerce is false? a.) E-commerce helps to stem the flow of supply chain, while improving efficiency. b.) Many brick-and-mortar retailers have replaced all their supply chains with elements of e-commerce. c.) E-commerce provides companies with an online presence. d.) E-commerce has taken market share from traditional commerce models in a variety of industries.
The omnichannel model has replaced the e-commerce model
Which of the following statement regarding e-commerce is true? a.) E-business enabled distribution systems are a little more efficient and reliable than brick-and-mortar establishments. b.) Many brick-and-mortar retailers have replaced their supply chains with elements of e-commerce. c.) The omnichannel model has replaced the e-commerce model. d.) E-commerce has taken market share from traditional commerce models in all industries.
They are created and/or sponsored by the government
Which of the following statement regarding private industrial networks and Net marketplaces is false? a.) They are created and/or sponsored by the government. b.) They allow connections within an industry to create closer collaborative ties. c.) They are professional and industrial networks. d.) They are maintained by third parties.
They are professional and industrial networks
Which of the following statement regarding private industrial networks and Net marketplaces is true? a.) They are maintained by the government. b.) They are professional and industrial networks. c.) They allow connections across industries to create closer collaborative ties. d.) They are created and/or sponsored by the government.
Actions that are ethically acceptable are also socially and legally acceptable
Which of the following statements is FALSE about our actions that are ethically acceptable? a.) Actions that are ethically acceptable may or may not be politically acceptable. b.) Actions that are ethically acceptable may or may not be legally acceptable. c.) Actions that are ethically acceptable may or may not be socially acceptable. d.) Actions that are ethically acceptable are also socially and legally acceptable.
It is a way to improve information security training
Which of the following statements is FALSE regarding safe harbor? a.) It is a framework developed by the U.S. Department of Commerce and European Commission. b.) It is a way to improve information security training. c.) The U.S. firms must protect and enforce privacy independent of government regulation. d.) It allows U.S. firms to collect and store personal information from EU citizens.
An advantage to wireless communication is that information is available from anywhere, but the main disadvantage is that networks cannot easily be reconfigured because there is no physical wiring
Which of the following statements is false? a.) Wireless networks communicate through the air via the radio frequency spectrum, and can easily be configured because of the lack of physical wiring. b.) An advantage to wireless communication is that information is available from anywhere, but the main disadvantage is that networks cannot easily be reconfigured because there is no physical wiring. c.) Security and hacking is the main disadvantage to wireless communication.
Defining what must be accomplished
Which of the following would likely be a step in building a logical model of a system? a.) Describing methods of implementation b.) Describing how something will be accomplished c.) Defining what must be accomplished
b
Which of these choices best describes a knowledge management system? a.) A ski resort collects customer information when a new reservation is made. That customer information is sent to the children's ski school that is on property so that they can market the ski school to customers with young children. b.) A large company with hundreds of employees creates a new department called Technical Writing. This new department will be responsible for collecting information from the employees and writing documentation to be shared with clients as well as internal documentation that will aid in employee training in the future.
a
Which of these choices best describes an ERP system? a.) A large theme park company enters information about a potential employee into a system during the hiring process. The same system is used by the company's management team to enter information about the employee's assigned roles and about their work performance. Everyone on the management team can access information in the system, and some pieces of the system are secure allowing only top level administrators to have access. The system is also used by the Accounting team to determine hours worked each week for payroll purposes. b.) A receptionist at a recruiting company enters information about a potential candidate into a spreadsheet and emails key pieces of information to the recruiter responsible for that area. Only the receptionist has access to the spreadsheet.
Threat of substitutes
Which one of Michael Porter's five competitive forces does this describe: Switching from one product or service to another similar product or service with little cost? a.) Threat of substitutes b.) Threat of new entrants c.) Bargaining power of suppliers
b
Which one of the following scenarios describes a strategic information system? a.) Papa Jack's Pizza restaurant implemented a new system to help manage employee schedules and help with routine questions about inventory. b.) We Be Fit gym implemented a new system to determine trends and identify new operational methods in order to improve customer service.
Which social media site do teens use the most? a.) Snapchat b.) Pinterest c.) Facebook
Which social media site has made employee recruitment more economical and efficient? a.) Twitter b.) Facebook c.) LinkedIn
Which social media site is the most commonly used? a.) Facebook b.) Twitter c.) Instagram
Group Decision Support System
Which system supports creative thinking and allows users to interact simultaneously at multiple geographic locations to collectively participate in decision making? a.) Geographic Information System b.) Decision Support System c.) Group Decision Support System
Instant message
While enrolled in a traditional course at a university, you and your instructor can communicate synchronously, face-to-face, in the classroom. However, you can also communicate with your instructor synchronously outside the classroom using which of the following Internet applications? a.) Bulletin board b.) Email c.) Instant message d.) Blog
Information policy administrator
Who is responsible for acquiring, organizing, and distributing information for the organization? a.) Information policy administrator b.) Data administrator c.) Data auditor d.) Database administrator
Relational databases have simpler table relationships than hierarchical databases
Why did relational database models replace hierarchical database models in business applications? a.) Relational databases don't use SQL, which is used in hierarchical databases. b.) Relational databases have simpler table relationships than hierarchical databases. c.) Relational databases are less expensive than hierarchical databases.
OLAP is a database used for analyzing business data
Why is an OLAP (Online Analytical Processing) database considered business intelligence? a.) OLAP is a database used for analyzing business data. b.) OLAP is a transactional database used in data mining. c.) OLAP is a database that leads to predictive analytics.
Organizations have difficulty defining business objectives
Why is it a challenge for businesses to invest in strategic information technology projects? a.) Organizations have difficulty finding good project managers. b.) Organizations do not have the necessary financial means. c.) Organizations have difficulty defining business objectives.
Businesses must have a social media marketing strategy to capture this new community of users and to address issues of social care
Why is it imperative that modern businesses have a social media marketing strategy? a.) Businesses must have a social media marketing strategy to capture this new community of users and to address issues of social care b.) Businesses must target social media because all transactions now are electronic c.) Businesses must target social media because it has replaced TV and radio
When a strategic information system fails to deliver outcome, the business can fail
Why is it important to have effective project management of new information system? a.) When a strategic information system fails to deliver outcome, the business adjusts and succeeds. b.) When a strategic information system fails to deliver outcome, the business can fail. c.) When an strategic information systems fails to deliver outcome, the business re-groups and offshores operations.
Analytics would affect the database performance
Why is it not good practice to perform analytics on an online transaction processing database? a.) Analytics would duplicate operational data. b.) Analytics would corrupt transaction data. c.) Analytics would affect the database performance.
Partitioning is done to improve performance
Why is partitioning done when administering relational database systems? a.) Partitioning is done to reduce cost. b.) Partitioning is done to improve performance. c.) Partitioning centralizes the database.
Budgets are reduced, and the implementation team takes on new tasks
Why is providing user support after system production a challenge? a.) Budgets are reduced, and the implementation team takes on new tasks b.) Users are busy dealing with other job responsibilities c.) Systems typically do not perform
Additional cost for business software is from upgrades, expansion, and training
Why is there additional cost associated when purchasing business software applications? a.) Additional cost comes in the form of penalties for license pirating b.) Additional cost when purchasing business software is due to the need for suites c.) Additional cost for business software is from upgrades, expansion, and training
A systems analyst must be able to communicate system capabilities and benefits
Why must a systems analyst be a good communicator? a.) A systems analyst must be a good communicator because he/she is the project manager b.) A systems analyst must be able to communicate system capabilities and benefits c.) A systems analyst must be a good communicator because he/she will use the system
Social media is a ubiquitous marketing channel
Why should businesses have a social media strategy? a.) Social media is an e-commerce business platform. b.) All business over the Internet comes from social media. c.) Social media is a ubiquitous marketing channel.
Security
Wired networks may not be advantageous because of the large amount of cables involved, but they provide businesses with network reliability and WHAT? a.) Speed b.) Bandwidth c.) Security
More scalable than wired networks
Wireless LAN networks are WHAT? a.) More scalable and reliable than wired networks b.) More reliable than wired networks c.) More scalable than wired networks
Productivity
Wireless LAN networks support the on-premise workforce, making them more mobile, which increases WHAT and access to real-time information? a.) Mobility b.) Collaboration c.) Productivity
What does WSN stands for?
Wireless Sensor Networks
Business process management
With which of the following is business performance management most frequently mistaken? a.) Business process management b.) Business procurement management c.) Business profitability management
What category of CASE does Microsoft Visual Basic fall under?
Workbenches
Which of the following is an international law or agreement created to combat increasing piracy software and digital goods?
World Intellectual Property Organization (WIPO) Copyright Treaty - an international treaty developed to combat increasing piracy of software and digital goods, allowing organizations to more easily seek out and prosecute violators of their copyright.
Asynchronous
You are working on a project with a colleague in India and you have a technical question. Realizing that it is nearly midnight in India, you send her an email. This is an example of WHAT type of communication? a.) Asynchronous b.) Synchronous c.) Standard
The latest security patches
You can protect your computer against risks and threats by making sure that you are always running the latest version of your software. Along the same line, you can also download and install which of the following applications to help protect your computer? a.) The latest security patches b.) The latest version of plug-ins c.) The latest version of web browser
Product ID
You have created a database to store the products sold in a department store so they can be managed, updated, and manipulated more easily. The store manager wants to create a query to show the items that are selling today. Which would be an appropriate field to sort the data? a.) Product Category b.) Product Size c.) Product Description d.) Product ID
Forecasting
You were hired by a company to administer survey questionnaires to customers entering a major shopping mall. The data mining software is capable of doing WHAT for consumers' future purchases based on the items they had bought in the past? a.) Classification b.) Associations c.) Forecasting
Associations
You were hired by a company to administer survey questionnaires to customers entering a major shopping mall. The data mining software is capable of identifying WHAT based on the customers' shopping habits; for instance, how often did the customers buy socks when they buy a new pair of sneakers? a.) Classification b.) Associations c.) Forecasting
Data quality audit
Your FICO score is one of the factors used in determining your ability to get a mortgage loan. If credit bureaus such as Equifax and TransUnion contain outdated and inaccurate financial information of individuals, they should immediately conduct WHAT to survey the accuracy and completeness of the data in the database? a.) Data cleansing b.) Data quality audit
Customer Relationship Management (CRM)
Your boss asks you to collect zip codes for every customer who purchases something in your store and then generate a report to show where they all come from so he can market to the low zip code areas defines what type of enterprise system? a.) Enterprise Resource Planning (ERP) b.) Customer Relationship Management (CRM) c.) Supply Chain Management (SCM) d.) Knowledge Management (KM)
Which of the following is a definition of a systems analysis logical model?
[NOT DATA DIAGRAM, NOT UML] ABSTRACTION maybe? I really think it's a DATA DIAGRAM, but it was marked wrong.
a and c
[Select all that apply]. Which business structures are less formal? a.) Sole proprietorship b.) Corporations c.) Partnerships
True
[True/False] 4G networks provide IP based voice, data, and multimedia traffic. a.) True b.) False
False
[True/False] 4G networks, also called Long-Term Evolution (LTE), offer data transmission speeds of 64 kbps in the Ultra High Frequency band. a.) True b.) False
False
[True/False] A Geographic Information Systems (GIS) is a system developed to collect, process, analyze, and store all types of data. a.) True b.) False
False
[True/False] A data warehouse enables businesses to store analytical data and business intelligence from multiple sources. a.) True b.) False
False
[True/False] A disaster recovery plan (DRP) must include measures that are preventive, detective, and corrective. Examples of preventive measures include network and physical security intrusion detection systems (IDS). a.) True b.) False
True
[True/False] A virtual private network (VPN) provides a secure, encrypted, and remote connection between employees and the company's server via a third-party Internet service provider. a.) True b.) False
True
[True/False] Although a Geographic Information Systems (GIS) captures and analyzes spatial or geographical data, it can be used by operations in industries such as engineering, transportation and logistics, telecommunications, insurances, and food. a.) True b.) False
True
[True/False] Although software patches fix bugs, they are expensive to code and can take time. a.) True b.) False
False
[True/False] Among all the administrators' roles (the database administrator, the data administrator, the information policy administrator, and the data auditor) the database administrator is the most important role since s/he is in charge of designing the physical database for the organization. a.) True b.) False
True
[True/False] An Energy Management System (EMS) can help to manage energy usage and reduce operating costs in an organization. Google's Nest Labs automatic thermostat is an example of an EMS. a.) True b.) False
False
[True/False] An important issue concerning budgeting for the cost of a computer is to keep the hardware cost in perspective, relative to the software cost. If you are paying thousands of dollars for special software, then you will want to pay as little as possible for the computer hardware. a.) True b.) False
True
[True/False] Business intelligence enables flexible, deep data investigative capabilities. a.) True b.) False
False
[True/False] Business intelligence is obtained by performing analytics on OLTP (Online Transaction Processing) databases. a.) True b.) False
True
[True/False] Businesses can integrate both Supply Chain Management (SCM) and Customer Relationship Management (CRM) into their organizations to merge, mine, organize, and manage their data. For instance, point-of-sale (POS) orders from the CRM can immediately trigger a restock request in the SCM. a.) True b.) False
False
[True/False] Clickstream applications can provide online retailers with information such as the web pages that the user visits and/or the products that the they are interested in. Many online retailers, such as Amazon.com and ebates.com, use the information collected from the clickstream applications to monitor and track their customers' spending habits. a.) True b.) False
False
[True/False] Coaxial cable is the required medium for telecommunication transmissions. a.) True b.) False
True
[True/False] Communist countries such as North Korea and China are most likely to utilize the common good ethical approach to maintain discipline and order in the country. a.) True b.) False
False
[True/False] Companies that have more than 1,000 employees with a diverse product portfolio are too small to benefit from a data warehouse application. a.) True b.) False
False
[True/False] Digital goods are adequately protected as intellectual property under the historical copyright laws. a.) True b.) False
True
[True/False] During data cleansing and normalization, the structure of some tables will be affected. For instance, a big table could be broken into several, smaller tables or a few small tables could be combined into a big table. a.) True b.) False
True
[True/False] Environmental risks alone can be easily addressed. However, the human factor increases the challenge of mitigating environmental risks. a.) True b.) False
False
[True/False] Every time we use a computer, we are exposed to the risk of getting a computer virus, even when we scan a photo onto a jump drive using a scanner or a printer. a.) True b.) False
False
[True/False] Financial corporations, such as CitiGroup, Inc., employ web mining to reveal any correlations and associations among customer variables in their database, and to predict future customers' banking behaviors. a.) True b.) False
False
[True/False] Healthcare companies and hospitals cannot destroy their patients' records; they must keep their data forever, just in case they need to retrieve information for potential malpractice lawsuits from their patients. a.) True b.) False
False
[True/False] Implementing devices in our computer systems to help in identity and approved equipment verification is a defensive method of technological measures. a.) True b.) False
True
[True/False] In a healthcare organization, policies concerning data governance of clients' information would include creating information policy, planning for the types and quantities of data, designing the database, and predicting or monitoring how users utilize the data. a.) True b.) False
True
[True/False] In many organizations, employees are allowed different levels of access to the data in the database. Database access rights can be assigned based on their seniority, duties, and responsibilities. a.) True b.) False
False
[True/False] In-memory computing is a business intelligence tool that uses increased memory for data processing to provide an alternative to data warehouses. A computer's ROM is used for in-memory computing. a.) True b.) False
False
[True/False] Information is a valuable asset and not everyone in the world can be trusted with it. Therefore, we need to protect our valuable information from those with poor intentions. The protection of our information assets is a discipline known as data security. a.) True b.) False
True
[True/False] Input is the act of capturing or collecting data from an organization or environment. a.) True b.) False
True
[True/False] Integrating e-business aspects into a business operation can have a significant influence on business and potentially lasting effects on its business environment. a.) True b.) False
False
[True/False] Mainframes, unlike microcomputers, allow users unlimited and flexible access to computing power. a.) True b.) False
True
[True/False] Microsoft Visio enables systems analysts to create professional diagrams that simplify complex information through collaboration tools and data-linked diagrams. a.) True b.) False
False
[True/False] Modular design, decision tables, decision trees, and structured PERT are process description tools. a.) True b.) False
False
[True/False] On the Internet, relational databases are connected to web-enabled forms to capture data automatically and allow for instant data retrieval for real-time online processing. Relational databases are useful in business because they handle large amounts of data that have been downloaded and stored in multiple locations from the Internet. a.) True b.) False
False
[True/False] Organizational information policy stipulates that all printed documents in an organization should be destroyed immediately. a.) True b.) False
True
[True/False] Personal conduct is often the weakest link in the chain of personal security. For instance, someone who is knowledgeable of the risks, threats, and vulnerabilities from the Internet will react differently towards technology compared to someone who is ignorant of such risks. a.) True b.) False
False
[True/False] Predictive analytics uses current and future data to better understand customers and other business entities in order to define areas of opportunity or areas of risk. a.) True b.) False
False
[True/False] RAM is a secondary storage device, and it stands for Read Access Memory. a.) True b.) False
True
[True/False] RFID technology enables companies to monitor and track inventory using wireless handheld devices. a.) True b.) False
False
[True/False] Social media platforms, such as Twitter, enable news stories to be searched by a large number of users. a.) True b.) False
True
[True/False] The internet of Things (IoT) will enable automated, just in time e-commerce transactions. a.) True b.) False
False
[True/False] The local Amish furniture store in a small country town uses a traditional file system to keep track of their sales. This is a good way to store their sales records and inventory since this is a small business, and therefore, it is more cost-effective for the store owner. a.) True b.) False
False
[True/False] The process of turning information into an unreadable format to prevent unauthorized access is known as decryption. a.) True b.) False
False
[True/False] The programming stage in the waterfall method of software development focuses on development and testing. a.) True b.) False
False
[True/False] The prototyping software development method consists of three steps. a.) True b.) False
True
[True/False] There are four systems used by corporations to provide decision support. These systems are MIS, DSS, ESS, and GDSS. a.) True b.) False
False
[True/False] There are several business models that organizations can use to conduct business online. However, organizations can only use one model at a time to ensure smooth processing of online transactions. a.) True b.) False
False
[True/False] To gain entry to secured location at airports or the building of some government agencies, a photo identification (which is classified as a knowledge authentication method) is all you need to have. a.) True b.) False
False
[True/False] Web-based databases allow users to access data only from their office computers, via the business internet connection. a.) True b.) False
False
[True/False] When a retailer acquires another retail store, the two companies' databases can be easily merged into one database without any problem after performing a data quality audit, since they are both in the same industry. a.) True b.) False
False
[True/False] When installing a wireless LAN, the access points must be configured to TCP/IP and 4G protocols. a.) True b.) False
False
[True/False] Wireless communication uses radio waves over the optical spectrum to send and receive signals. a.) True b.) False
True
[True/False] Wireless networks enable businesses and their customers or suppliers to collaborate and share data on premises. a.) True b.) False
Transnational
a commercial enterprise that operates substantial facilities, does business in more than one country and does not consider any particular country its national home.
Variable
a data type or simply type is a classification of data which tells the compiler or interpreter how the programmer intends to use the data.
Extraction, transformation, and loading (ETL)
a process in which data is extracted from a computer, transformed into a format appropriate for the data warehouse, and then transferred to the data warehouse.
______________ is an alternative tool that requires a group of users to collectively review and analyze the alternatives, prior to making a decision. a- brainstorming b- a decision tree c- PERT
a- brainstorming
Why is providing user support after system production a challenge? a- budgets are reduced and the implementation team takes on new tasks b- systems typically do not perform c- users are busy dealing with other job responsibilities
a- budgets are reduced and the implementation team takes on new tasks
How are user expectations best managed during system implementation? a- communication and training b- user involvement in implementation c- user involvement in analysis
a- communication and training
North Americans are usually very straightforward and distrust evasive behavior. This characteristic is an example of a cultural difference in which of the following? a- communication style b- time orientation c- stereotyping
a- communication style
Web 2.0 sites enable collaboration and interaction among users, creating a virtual online a- community b- network c- forum
a- community (a forum is short lived)
Which of the following would likely be a step in building a logical model of a system? a- defining what must be accomplished b- describing methods of implementation c- describing how something will be accomplished
a- defining what must be accomplished
What is qualitative risk analysis? a- it involves the measurement of probability and consequences of risks b- it involves the measurement and cost associated with quality failures c- it involves the measurement of high level security breach impact
a- it involves the measurement of probability and consequences of risks
What is total cost of ownership (TCO)? a- it is a study to determine economic feasibility b- it is a waterfall economics analysis c- it is a development life cycle method
a- it is a study to determine economic feasibility
Why do users fail to adopt new information systems? a- lack of training or acceptance for new system b- new systems being more complex c- new systems being web GUI based
a- lack of training or acceptance for new system
What is the meaning of outcomes in decision theory? a- outcomes are the consequences of an event b- outcomes are possibilities thought by the agent c- outcomes are the feedback mechanism to decision theory
a- outcomes are the consequences of an event
In systems modeling and design, the structured systems model is methodical and ________ oriented. a- process b- analytical c- class
a- process
___________ decisions involve an established procedure, and are repetitive and routine. a- structured b- unstructured c- semi-structured
a- structured
What is a disadvantage of the group decision-support systems (GDSS)? a- the scheduling challenges that occur when planning simultaneous events b- the network limitations c- the lack of interactive collaborative tools
a- the scheduling challenges that occur when planning simultaneous events
Secondary storage
accessed only through a system's input/output bus and is generally several orders of magnitude slower than primary storage technologies Removable media, such as magnetic floppy disks, optical discs (CDs & DVDs), and USB flash drives
growth (business strategy)
adding new products or new enhancements to existing products
Multinational
an organization that owns or controls production of goods or services in one or more countries other than their home country.
Business intelligence consists of databases, data warehouses, and ____________.
analytics
Online Analytical processing (OLAP)
analyze transaction data used for making decisions.
What are group decision support systems (GDSS)? a- GDSS provide internal and external grouped data for middle managers b- GDSS enable interactive collaboration support for multiple decision makers at multiple geographic locations c- GDSS help translate organizational objectives into operational targets d- GDSS define key performatnce indicators for decision making
b- GDSS enable interactive collaboration support for multiple decision makers at multiple geographic locations
Business analytics consists of the tools and techniques used for the analysis and understanding of data, and include _____________ modeling, statistics, and OLAP a- reporting b- data mining c- methods
b- data mining
What systems do upper management use for decision making? a- Online analytical processing systems (OLAP) b- exclusive support systems(ESS) c- Online Transaction Processing Systems (OLTP)
b- exclusive support systems(ESS)
work breakdown structure (WBS)
broken down list of all deliverables showing what the customer will get at the end of a project.
Waterfall derivative models in the SDLC methodology include fountain, spiral, and _________________________________________.
build and fix
A systems analyst should try to have an understanding of ___what kind of___ processes
business
How does business intelligence make information actionable? a- BI formats non-relational data into hierarchial reporting b- BI uses predictive analytics to predict future business trends c- BI provides real-time, relevant, and user-customized information that is easily shared
c- BI provides real-time, relevant, and user-customized information that is easily shared
Which method uses fourth generation computer languages? a- RAD b- Agile c- End user development
c- End user development
Which is not a component of a feasibility study? a- Technical b- Economic c- Managerial
c- Managerial
is a project management technique that identifies critical tasks and helps reduce program delays. a- WBS b- CPM c- PERT
c- PERT (?)
Balanced scorecards are often used in business. What is a balanced scorecard? a- a methodology in BI that only tracks organizational activities b- a type of dashboard that tracks goal attainment intervention c- a tool used by management to track and monitor staff and organizational activities
c- a tool used by management to track and monitor staff and organizational activities
Because feedback is not readily available with written communication, the content must be accurate and contain sufficient detail. Which of the following is most likely to increase the audience understanding of written communication? a- acronyms b- technical terms c- action-specific verbs
c- action-specific verbs
Which is not a key factor to consider when evaluating a system alternative? a- economic b- compatibility c- brand d- limitations
c- brand
What is the objective of the systems analysis stage in the waterfall method? a- define the software architecture b- identify the hardware platform c- identify user system and software requirements
c- identify user system and software requirements
Which of the following is not a category from Henry Mintzberg's management behavior roles? a- informational b- interpersonal c- problem solver
c- problem solver
What does the behavioral model hope to accomplish in management decision making? a- support unstructured types of decisions b- support the human factors design of information systems c- support the unpredictable and less systematic aspects of decision-making d- support the predictable and systematic aspects of decision making
c- support the unpredictable and less systematic aspects of decision-making
What is the focus of a functional evaluation of a management information system? a- to evaluate reporting capability for decision making b- to evaluate the query response time c- to evaluate the quality and functionality of information and output
c- to evaluate the quality and functionality of information and output
What is not a development stage in the waterfall model? a- systems analysis b- conversion c- user requirement
c- user requirement
When should oral communication be avoided? a- when working on global projects b- when meeting with people from different cultures c- when conveying documentation
c- when conveying documentation
Hybrid systems
called thin- or zero-clients are dumb terminals that use input and output devices, such as a monitor, mouse, and keyboard, but connect to a centralized server for processing.
The waterfall model for software development is ideal when systems requirements are _______________________________________________.
clear and unlikely to change
Information Technology Infrastructure Library (ITIL)
common set of best practices widely used by businesses to give guidance to companies on how to use IT as a tool for implementing change
Input
components include devices that provide input into the processing unit. These include peripherals, such as the keyboard, mouse, microphone (audio input), sensors, and document or visual scanners.
Storage
components include primary temporary storage and secondary long-term storage devices. Random access memory (RAM) is temporary or short-term storage used by the processor.
Processing
components include the central processing unit (CPU), which is the brain of the computer. Historically this unit included several components, such as a control unit, a processor, an arithmetic or logic unit, and memory components. Modern CPUs have merged these components into an integrated design
wide area network (WAN)
connection b/w small networks that create a large network that typically connects business campuses consisting of computer systems across large distances
system bus
connection between the CPU, memory, storage, expansion slots, and other motherboard components
Which of the following best describes predictive analytics? a- a method that uses data mining techniques to solve operational challenges b- a process that uses business data to report operational information c- a process that integrates data to help management make changes d- a method or algorithm that uses statistics and data mining to forecast models
d- a method or algorithm that uses statistics and data mining to forecast models
Attacks
damaging or potentially damaging acts that are the product of an attacker's process, which may include: reconnaissance, scanning, gaining and maintaining access, escalating privileges, building backdoors, and destroying evidence
VoIP technology is currently a very popular form of communications because it ______________________________________.
delivers voice information in digital form using packet switching
data-flow model
describes how data moves and is processed by the proposed system under development.
function-oriented (system evaluation)
determine of the success of the information system in examining he performance of data, hardware, software, networks, and human resources
A router connects data links from a single network and transmits data packets between ______________________________________.
different networks
The intelligence phase in the decision-making process consists of the __________, identification, and understanding of the problem.
discovery
Which of the following statements regarding e-Tailers is false?
e-Tailers provide a venue for brokerage services.
ring network
each computer connected to the next computer; cheaper to install; less effiecient.
Sniffing
eavesdropping on network traffic in order to acquire traffic data packets and decoding. The information gathered can be used to hack into a network
copyright
egal right given to the creator of an original work allowing the exclusive right for sale and distribution of that work for a period of time.
change agent
encompasses the identification of the desired organizational improvements, designing systems that will implement those changes, and training and motivating users to operate and access the new system.
Agile development (SDLC)
encourages adaptive planning and development, fast delivery, continuous improvement, and flexibility in response to change. (interactive)
One way to define user requirements is to allow users to _______ with the system during development. a- experiment b- code c- train
experiment
To facilitate efficient and effective business, corporations utilize the _____________________ for communications with suppliers and vendors.
extranet
Internet Protocol version 4 (IPv4) was created and standardized in the 1970s by the original ARPANET group to _________________________________.
facilitate communications
Threats
identified and unidentified actors that have the potential for attacking the information assets. (Internal, External)
The first step when building a system model is to collect _____________________________ about the proposed system.
information
Transaction processing system
information system used for processing patient admissions, employee time cards, and purchase orders
four phases of the decision-making process
intelligence, design, choice, and implementation
To facilitate efficient and effective business, corporations utilize the ____________________ to communicate with their customers.
internet
To facilitate efficient and effective business, corporations utilize the ______________________ to manage employees' affairs.
intranet
Structured decisions
involve an established procedure, are repetitive and routine, and therefore can be handled in the same manner each time. Line-level managers and non-management employees typically make... decisions.
problem solver
involves converting processes and procedures into system components and troubleshooting errors or delays that may occur.
chief operations officer (COO)
is the director of operations, responsible for the oversight of internal operations on a day-to-day basis and for monitoring production quotas
chief security officer (CSO)
is the highest level executive concerned with the overall security functions and policies of a business.
The process of creating a model is _______________________________ with the desired outcome of a validated model.
iterative
There is a higher chance of failure in information system projects if ___who_____ do not use and leverage the system on behalf of their organization.
managers
chief financial officer (CFO)
manages the company's cash flow and evaluates and communicates financial risks.
Decision analysis
method of assisting decision makers with making simple choices and using mathematical formulas to infer from these choices whether the decision maker is making the best decision.
The focus of strategic-oriented evaluation is the determination of whether the information system outputs enable management to execute the plan and _______________________________________________ of the organization.
mission
Wireless LAN networks are _____________________________________________.
more scalable than wired networks.
TCP/IP
most common protocol which establishes the connection, and data packet quality transmission.
network host
node/computer connected with an IP address
Social engineering
normally low tech attacks used to trick individuals into disclosing information, providing access, or changing their patterns. Examples include phishing, spear-phishing (i.e. targeted phishing), dumpster diving, baiting, tailgating, and quid pro quo.
Product differentiation (business strategy)
offering a higher quality product to differentiate from others in the market
Output
omponents include internal storage devices or processes, as well as external peripherals such as monitor screens (visual output), speakers (audio output), and printers (physical output).
The objective of a _____________________________ feasibility study is to determine if stakeholders will support the development program and not sabotage or disrupt it.
political
Data mining
process of identifying hidden patterns and relationships in large databases and applying rules to that data in order to predict future behavior.
RFID technology helps companies to be more _________________________ with inventory management because they eliminate the need for physical handling of materials during cycle counting.
productive
The objective of SDLC is to deliver a high quality system, provide management control, and maximize ____________________.
productivity
Strategic information system
provide tools used by an organization to accomplish specific tasks to gain competitive advantage.
The Network address translation (NAT) technology allows private users to ________________________.
redefine network addresses to assign their own addresses
prototyping model (SDLC)
requires the development of a scaled prototype that can be tested prior to full-scale development
Spoofing is effective to hackers because it solicits a network _________________________________________________.
response
The scope of a project defines the elements of cost, time, quality, and ____________________________.
risk
critical path method (CPM)
step-by-step process planning technique that defines the critical and noncritical tasks within a project in order to reduce or minimize process delays and time-related problems.
Convergence
the ability for a telecommunication network to carry voice, data, and video
Network economics (network-based strategy)
the cost of adding another business participant to a business venture is small, the potential gain is great.
information technology management
the management of hardware, software, data, networks, and people that facilitate access to information and allow the organization to achieve business objectives.
Among all the connections - Internet, intranet, and extranet - the Internet is ________________________________________.
the most widely used channel for business
The Internet has contributed to a complex network system. Businesses continue to grow and develop a need for more computer-enabled productivity. This resulted in more complexity due to _________________________________________________.
the need for more systems and better processing capabilities
Risks
the potential for loss, commonly associated with the monetary and non-monetary impact to such a risk, as well as the probability of occurrence.
Data normalization
the reorganization of tables, and attributes within a database to reduce duplication is especially important during database redesign, but also when data is imported or merged.
Build and fix model (SDLC)
the simplest SDLC model allowing for code to be incrementally modified and implemented until successful.
waterfall model (SDLC)
the traditional systems development method, so named because each stage must be completed before moving on to the next stage. (slow application development)
Health Analytics Tools
through smartphone sensors or wearable peripheral devices. Data from these devices is collected, analyzed, and used to help a user to understand, improve, and maintain, or automatically report, their health to their health professionals.
Unified Modeling Language (UML)
which is a general-purpose modeling language designed to provide a standard method to represent the design of a system.
system-oriented (system evaluation)
which is the ability of an information system to discriminate between files or data that are relevant to a user query, and those which are not relevant.
The dawn of e-commerce created several new possibilities for businesses. Which of the following is NOT one of these new possibilities?
A new mobile market to process financial transactions - Companies could process financial transactions online for customers long before e-commerce.
Which of the following is a definition of a software patch?
A patch is a code that fixes a software defect.
Information
A payroll spreadsheet is an example of WHAT? a.) Process b.) Data c.) Information d.) Information system
Memory slot
A primary memory device like a DRAM (Dynamic Random Access Memory) can be plugged into a motherboard through a(n) WHAT? a.) VGA cable b.) Extension card c.) Memory slot
Information management
A restaurant relied on a manual ordering and accounting system. The restaurant owner decided to purchase a point-of-sale (POS) system to better track sales of different food items to determine which were the most profitable. This scenario is an example of an advantage of WHAT? a.) Information management b.) Information technology management
Record
A set of related fields, also called a tuple, that describe one occurrence of an entity, such as a customer.
Which of the following action is considered ethical, social, and legally acceptable?
A small business owner installs Microsoft Office suite on all the computers in his office.
What is the purpose of a network sniffer?
A sniffer is used to monitor network traffic.
How many stages are in the waterfall methodology?
6 - System Engineering, Analysis, Design, Coding, Testing, Maintenance
What is the purpose of a general Management Information Systems (MIS) evaluation?
A company's general eval of their MIS is to analyze the system performance against outlined objectives
Success of strategic information systems projects
A majority fail to meet schedule or budget
Which of the following best describes predictive analytics?
A method or algorithm that uses statistics and data mining to forecast models - used to forecast behavior of consumers and help develop business models to capitalize on opportunities.
System on a chip
A microchip that performs more functions than a CPU and has other devices embedded in it is called WHAT? a.) DRAM b.) System on a chip c.) Multi-core CPU
CPU
A motherboard consists of other microprocessors, like memory, expansion slots for peripheral devices, as well as a WHAT? a.) LCD b.) CPU c.) GUI
When using a decision tree, _______________________________________ can become complex when uncertain values exist, or if multiple outcomes are linked oriented.
Calculations
Which of the following is a successful business that uses big data to find flaws, boost production, and root out counterfeiters?
Caseificio Scalabrini - with IBM's help, Caseificio Scalabrini, a producer of Parmigiano Reggiano cheese in Italy, uses big data to find flaws, boost production, and root out counterfeiters.
The term 'generations' is used to describe changes in which type of technology?
Cellular wireless standards
When streaming data or voice, which type of switched network is used?
Circuit switch
Have more flexibility than they do with a VPN
Cloud computing is becoming more popular because users WHAT? a.) Don't need internet access to get to cloud data b.) Have more flexibility than they do with a VPN c.) Have greater security than they do with a VPN
In asynchronous communications, two people in separate locations can communicate with each other during different times of the day. Which is an example of asynchronous communication:
Collaboration among participants via online message boards
What activities do Web 2.0 enable?
Collaboration and interaction among users
Which of the following is not a factor that must be considered when implementing a new information system?
Competition - Once a decision has been made to implement an information system, competition is not a factor.
Besides customer attributes, which of the following factors can be used by an e-business to accurately price goods?
Competitors' public pricing information.
Randomizing your online behavior
Computer-based actions are actions that involved the use of a computer. Which of the following is NOT a computer-based action? a.) Installing anti-virus and malware programs on your computer. b.) Turning off your computer when you are not using it. c.) Implementing authorization and authentication procedures. d.) Randomizing your online behavior.
If your identity has been stolen, what should you do?
Consult legal counsel and retain documentation of all stolen information.
What is the cost of keeping a customer?
Customer Relationship Management (CRM) systems collects and store customer data, product information, and customer orders. Using the appropriate analytical tool, a CRM can answer all, except for which of the following question? a.) What is the value of a customer to the company? b.) What is the cost of keeping a customer? c.) Who are the most loyal and profitable customers? d.) What are the most popular products sold?
Which of the following is an international establishment of laws that help to protect fundamental human right to privacy?
Organization for Economic Co-operation and Development (OECD) - an international agency consisting of 34 developed countries. Founded in 1961 to stimulate economic progress and world trade, it has since created an anti-spam task force, wrote papers on best practices for ISPs, and worked on the information economy and the future of the Internet economy.
Black Hat
Organizations are constantly encountering cyber-attacks from intruders. For instance, in late 2013, the security system of Target Stores, Inc., was compromised by which of the following type of attacker? a.) Grey Hat b.) Black Hat c.) White Hat
Retrieve
Organizations can help to maintain data integrity by implementing data governance policies. Only employees with appropriate access rights can do WHAT with data from the server? a.) Record b.) Store c.) Retrieve
Information
Data that has been organized in a meaningful manner.
What helps e-businesses accurately target individual customers by charging them different prices?
Databases - mainstream innovations that contain massive data to help e-businesses identify regions and localities where they can charge different prices based on location demographics and income.
Which method below uses fourth generation computer languages?
End User Development - uses fourth generation computer languages, enabling users to code with little expert assistance.
Social Networking and interpersonal skills.
Enhances interpersonal and relationship-forming skills.
[True/False] An information repository allows a business to store important information and documents that are accessed remotely by its stakeholders for free.
False
[True/False] Coaxial cable is the required medium for telecommunication transmissions.
False
[True/False] Wireless communication uses radio waves over the optical spectrum to send and receive signals.
False - it uses RADIO waves over the RADIO spectrum
[True/False] The programming stage in the waterfall method of software development focuses on development and testing.
False - the programming stage consists of software development, proving, and integration.
As a student taking a course at a university, which of the following legislation must your university follow when dealing with your personal information?
Family Educational Rights and Privacy Act (FERPA) of 1974.
Business intelligence provides real-time, relevant, and user-customized information that is easily shared
How does business intelligence make information actionable? a.) Business intelligence provides real-time, relevant, and user-customized information that is easily shared b.) Business intelligence formats non-relational data into hierarchical reporting c.) Business intelligence uses predictive analytics to predict future business trends
ESS provide high-level information in KPI format
How does executive management use executive support systems (ESS)? a.) ESS provide executive management data to make structured decisions b.) ESS data has transaction and production data used by executives c.) ESS provide high-level information in KPI (Key Performance Indicators) format
Internet-based technologies allow for distribution of information with external business entities
How does the use of Internet-based technologies help businesses? a.) Internet-based technologies provide on-site information for decision making b.) Internet-based technologies are centralized and require suppliers to have a virtual private network to access information c.) Internet-based technologies allow for distribution of information with external business entities
7
How many layers are in the standard OSI (Open System Interconnection) model? a.) 7 b.) 5 c.) 6
The Virtue ethical model focuses on which of the following?
Human Behaviors - the Virtue Ethical Model values human behaviors that allow us to act in aspirational ways, such as compassion, trustworthiness, honesty, generosity, kindness, autonomy, courage, and obedience.
Which of the following is a weakness of manual keying for data capture?
Human error
Cut and paste
In online analytical processing applications, which of the following is not a basic analytical operation? a.) Slicing and dicing b.) Consolidation c.) Drilling down d.) Cut and paste
Process
In systems modeling and design, the structured systems model is methodical oriented and WHAT? a.) Class b.) Analytical c.) Process
Online banking
Information technology is used everywhere: where you work, where you live, and where you play. Keeping track of financial information and making transfers at anytime, from home, without waiting in line is an example of what? a.) Telecommuting b.) Social networking c.) Online banking d.) Online shopping e.) Online learning
Enterprise Resource Planning (ERP)
Involves utilizing computer technology to link various aspects of a business; a very complex resource planning system that spans the entire business; companies often have difficulty implementing the system.
Reduce
It is good practice to do WHAT to data that is backed up on a regular basis? a.) Reduce b.) Copy c.) Duplicate
Which of the following best describes structured English as a process description tool?
It is similar to modular design with data terminology.
Community
Maintaining a social online presence has become the latest trend. Businesses can use which of the following models to connect online with their customers? a.) Advertising b.) Brokerage c.) Community d.) E-tailer
Data administrator
Maintaining employees' usage of a company's database is the responsibility of what role below? a.) Data auditor b.) Data administrator c.) Database administrator d.) Information policy administrator
Analysis
Maintaining historical records allows managers to analyze the data to help improve their business. Data collected from all internal and external sources are extracted, transformed, and then loaded into a data warehouse for additional WHAT? a.) Processing b.) Storage c.) Analysis
Installing the latest antivirus applications onto your computer is one way to protect your computer from __________________________ software which can be used to steal information or spy on users.
Malware
Digital goods refer to products that can be downloaded from the Internet. Which of the following is NOT an example of digital goods?
Musical DVDs
Have the most experienced workers complete tasks on the critical path
ABC Playground Company has been asked to build a new playground for a local elementary school. The project must be completed before the first day of school. Which of the following steps would increase the likelihood of finishing the project on time? a.) Assign the least experienced workers to the tasks on the critical path b.) Have the most experienced workers complete tasks on the critical path c.) Evenly divide the experienced workers between all tasks for the project
In order to keep company computers secure, users must agree to an _______________ policy stipulated by the organization in order to access a company network or the Internet.
Acceptable Use
Which of the following category of generalized ethical issues refers to creation of barriers to access?
Accessibility
Supply Chain Management (SCM)
Network of businesses that are connected to provide products and services more efficiently to the customer, accommodate rapid growth, and meet requirements of retailers and distributors defines what type of enterprise system? a.) Enterprise Resource Planning (ERP) b.) Customer Relationship Management (CRM) c.) Supply Chain Management (SCM) d.) Knowledge Management (KM)
Are hypervisors or hypervisor applications necessary in small businesses with simple networks?
No, a hypervisor is a computer software that enables network virtualization and is not necessary.
What is a downside of using the Internet as a resource?
Accuracy of information
Evil twins and pharming are two different examples of phishing. What's the best example of pharming and where it can occur?
Airports or coffee shops, where criminals redirect users to a website that looks official and legitimate.
Artificial intelligence
Algorithms based on machine learning or WHAT are used in most cases to look for relationships, patterns, or trends? a.) Deterministic b.) Logic c.) Artificial intelligence
Both high tech and low tech attacks
All cyber threats or attacks are associated with computers; therefore, all computer risks are limited to WHAT? a.) Low tech attacks b.) Both high tech and low tech attacks c.) High tech attacks
ability to improve communication
All of the following are advantages of cloud computing except WHAT? a.) ability to support remote workers b.) ability to support mobile computing c.) ability to improve communication
Information system
An integrated network of components working together to convert data into useful information; includes an input, a process, and an output; comprised of people, processes, machines, and information technology.
System Development Life Cycle (SDLC)
Analysis Phase 1. Identify problems, opportunities, and objectives 2. Determining information requirements 3. Analyzing system needs Design Phase 4. Designing the recommended system 5. Developing and documenting software Implementation Phase 6. Testing and maintaining the system 7. Implementing and evaluating the system
Which answer best completes the following sentence? Business intelligence consists of databases, data warehouses, and _____________________________________________________.
Analytics - the systematic analysis of data produced for business intelligence.
Family Educational Rights and Privacy Act (FERPA) of 1974
As a student taking a course at a university, which of the following legislation must your university follow when dealing with your personal information? a.) Public Company Accounting Reform and Investor Act (aka Sarbanes-Oxley Act) of 2002 b.) Family Educational Rights and Privacy Act (FERPA) of 1974 c.) Financial Services Modernization Act (aka Gramm-Leach-Bliley Act) of 1999
Responsibility
As an employee of a retailing business, which of the following defines your obligations to your clients? a.) Ethical principles b.) Responsibility c.) Liability d.) Accountability
Effective written communication must be correct, simple, and accurate. Jargon and terminology should be ______________.
Avoided
There are many reasons why online businesses must be held accountable to the laws and regulations in the localities and countries in which they operate. Which of the following is NOT one of the reasons?
Online businesses can operate more easily and freely than brick and mortar businesses - Online businesses CAN operate anywhere to gain efficiencies, but ARE NOT more free to do what they want; they are still accountable to laws and regulations.
How does a corporation benefit from a business intelligence program?
BI provides automated data collection and reporting reducing labor costs
For an individual or a business, data can be uploaded to the Internet in many forms. Which of the following data should NOT be communicated on the Internet?
Banking transactions - must be encrypted to be safely communicated over the internet
Risk transference
Because no two projects are alike, different strategies for managing project risk exist and should be used depending on project complexity and scope. Some of these strategies include acceptance, avoidance, sharing, reduction, or transference. Purchasing homeowner's insurance in case of a fire or hurricane is an example of WHAT? a.) Risk transference b.) Risk reduction c.) Risk sharing d.) Risk acceptance
Amazon
Besides e-tailing, which of the following e-businesses utilizes its supply chain to be a platform for many others and also continuously innovates into other e-business services? a.) Federal Express b.) Google c.) Caseificio Scalabrini d.) Amazon
Petabyte
Big Data database size is considered to be in WHAT size level? a.) Petabyte b.) Megabyte c.) Terabyte
Unique identity
Biometrics is the study and measuring of individual body characteristics, and is often used in computer security. Biometrics falls under which of the following methods? a.) Possession b.) Unique identity c.) Knowledge
Why is providing user support after system production a challenge?
Budgets are reduced, and the implementation team takes on new tasks.
A systems analyst should try to have an understanding of _________________________________________ processes.
Business - information systems automate business processes.
When using the balanced scorecard method, quality would fall under which of the following measurements?
Business Process - measures the ability of the organization to satisfy customer and/or stakeholder needs.
Data mining
Business analytics consists of the tools and techniques used for the analysis and understanding of data, and include WHAT modeling, statistics, and OLAP? a.) Reporting b.) Methods c.) Data mining
Analytics
Business intelligence consists of databases, data warehouses, and WHAT? a.) Methods b.) Algorithms c.) Analytics
Software
Business intelligence is defined as the infrastructure, data, and WHAT tools to help mine collected data? a.) Application b.) Software c.) Hardware
How does a corporation benefit from a business intelligence program?
Business intelligence provides automated data collection and reporting reducing labor cost - can provide reporting that helps management make actionable decisions.
How does business intelligence make information actionable?
Business intelligence provides real-time, relevant, and user-customized information that is easily shared.
Flexibility
Business intelligence reporting WHAT provides users with better insight than traditional reporting systems? a.) Hierarchy b.) Uniformity c.) Flexibility
Organizational features that can change the company direction
Processes, politics, culture, and environment
What is QoS?
QoS (Quality of Service) is used to measure performance of data communications.
__________________________________ risk analysis involves performing an analysis of the risks and conditions in order to prioritize the effects on a project.
Qualitative
Financial Services Modernization Act (aka Gramm-Leach-Bliley Act) of 1999
Organizations must follow procedures to store or transfer their financial information as outlined in which of the following legislation? a.) Public Company Accounting Reform and Investor Act (aka Sarbanes-Oxley Act) of 2002 b.) Health Insurance Portability and Accountability Act (HIPAA) of 1996 c.) Financial Services Modernization Act (aka Gramm-Leach-Bliley Act) of 1999
Hot sites
Organizations need to include redundancy in their business disaster recovery plan by creating duplicate facilities. Which of the following sites offer offsite office space that allow recovery within minutes to hours? a.) Warm sites b.) Shared hot sites c.) Cold sites d.) Hot sites
What are peer-to-peer network topologies?
Peer-to-peer topologies connect each user in a network directly.
In systems modeling and design, the structured systems model is methodical and __________________________________ oriented.
Process
Enact and enforce security, and manage and retain documentation
The U.S. government enacted legislation and regulations to protect privacy and do what else? a.) Enact, but not enforce, security, and manage and retain documentation. b.) Enact and enforce security, and manage and retain documentation. c.) Enact and enforce security, and manage and remove documentation off of servers.
Human behaviors
The Virtue ethical model focuses on which of the following? a.) Outcomes of an action b.) Moral rationality c.) Human behaviors d.) Choices and motivations
Information management
The ability to collect, organize and process data from internal and external sources and distribute the resulting information to support decision making and business processes is an advantage of WHAT? a.) Information management b.) Information technology management
Integration
The benefit of contracting a single vendor to provide the software and hardware necessary for a business intelligence system is reduced problems with WHAT? a.) Deployment b.) Training c.) Integration
Trust built through customer interaction
The business value of using social media as a marketing tool relies on the WHAT? a.) Distribution of mass messages to customers b.) Ability to communicate business plans c.) Trust built through customer interaction
Which of the following best describes the classical model in management decision making?
The classical management model supports planning and controlling - the classical model describes the role of management through 4 functions: planning, organizing, leading, and controlling.
The Internet is organized as a client/server system. Which of the following statement is FALSE regarding the client/server architecture?
The client has control over the applications residing on the server. (the server, not the client, has control over the applications residing on the server)
Schema
The complete description of the database.
What is the function of the data integration service in business intelligence?
The data integration service serves as the depository of all extracted data for the load function of the data warehouse - logically related or integrated before the load function of the ETL process is performed.
A new mobile market to process financial transactions
The dawn of e-commerce created several new possibilities for businesses. Which of the following is NOT one of these new possibilities? a.) A digital marketplace to sell goods and services. b.) A new mobile market to process financial transactions. c.) The creation and sale of goods that were completely digital.
Businesses perform regular backups for operational databases
The disaster recovery plan (DRP) addresses several issues when an emergency occurs. What item below would NOT be addressed in a DRP? a.) Businesses perform regular backups for operational databases. b.) Legal and insurance liabilities are reduced. c.) Decisions during a disaster are structured and expected.
According to the omnichannel model, inventory volume is reduced and operations become leaner and better able to react to changes in demand because of which of the following reasons?
The division between brick-and-mortar and online operations has been erased.
COBOL
The first computer language; developed in the 1950s; still used today.
Helping them use structured processes for decision making
The information system should assist management in decision-making by doing what? a.) Helping them use unstructured processes to make decisions b.) Helping constrain them so decision making is controlled c.) Helping them use structured processes for decision making
Discovery
The intelligence phase in the decision-making process consists of the identification, understanding, and the WHAT of the problem? a.) Solutuion b.) Analysis c.) Discovery
What is a disadvantage of the group decision-support systems (GDSS)?
The scheduling challenges that occur when planning simultaneous events - especially across multiple time zones.
Cellular wireless standards
The term 'generations' is used to describe changes in which type of technology? a.) Network hardware devices b.) Telecommunications protocols c.) Cellular wireless standards
central home office
The three most common types of global organizational structures are centralized, decentralized, and coordinated. Where are corporate activities and information systems located in a centralized structure? a.) central home office b.) local foreign units
Data complexity
The traditional file environment is not usually as efficient as a database management system. What is typically NOT a challenge when using the traditional file environment? a.) Data inconsistency b.) Data redundancy c.) Data complexity
When communicating, what is important for IT professionals to understand during the system development process?
The user knowledge and background of target audience.
What is the major difference between a rigidly defined brick-and-mortar depiction of a business and one that is purely an e-business?
The way they communicate with their stakeholders - An e-business communicates and interacts with their stakeholders via an online format.
Deliverables
The work breakdown structure (WBS) is a broken down list of project WHAT that are required to complete a project? a.) Resources b.) Activities c.) Deliverables
Information Security Analyst
Their goal is to ensure that data and systems are secure to prevent breaches.
EIS
There are different types of information systems based on the different levels of hierarchy in an organization. Which one helps senior executives analyze information and come up with alternate actions and business strategies? a.) DSS b.) EIS c.) MIS d.) TPS
Quality
There are five major variables in project management that must be monitored when managing information technology to ensure it is completed on time, within budget, according to specs, and with high quality and low risk. How well the end product meets the goals and objectives of management is called WHAT? a.) Time b.) Risk c.) Quality
Foreign exporter
There are four main global business strategies that form a global firm's organizational and information systems structure. Which item below is NOT one of those strategies? a.) Transnational b.) Multinational c.) Franchisers d.) Foreign exporter
CIO
There are many IT roles in an organization. Which one is responsible for information systems strategic thinking and planning? a.) Project Manager b.) IT Manager c.) MIS Manager d.) CIO
Virus
There are many different kinds of malware, which could be a spyware, worm, virus, or Trojan horse. In general, any WHAT that is downloaded and stored on a computer hard drive can cause undesirable damage to the computer or network system? a.) Spyware b.) Worm c.) Virus d.) Trojan horse
Employees
There is a higher chance of failure in Information system projects if WHO do not use and leverage the system on behalf of their organization? a.) Executives b.) Managers c.) Employees
Threat of substitute products or services
There is less demand for DVDs because of the creation and quick distribution on-demand video services, such as those supplied by Netflix and iTunes. In terms of Porter's five competitive forces, this is an example of WHAT? a.) Intensity of competitive rivalry b.) Threat of substitute products or services c.) Threat of new entrants
Resistance
There is often considerable organizational WHAT when implementing new information systems? a.) Compliance b.) Resistance c.) Acceptance
Knowledge Management (KM)
These systems provide tools to help manage organizational knowledge and create value to meet business requirements and strategic goals.
T/F: Although software patches fix bugs, they are expensive to code and can take time
True
[True/False] Although software patches fix bugs, they are expensive to code and can take time.
True - Software patches are expensive and time consuming.
False
True or false. A virtual company provides only virtual services. a.) True b.) False
False
True or false. Accountants have no need to interact with an organization's information system. a.) True b.) False
True
True or false. Major threats to information systems facilities vary by region and can include floods, hurricanes, terrorism, power outages, and earthquakes. a.) True b.) False
False
True or false. Managers only need to understand the basic features of their organization to build and use information systems successfully. a.) True b.) False
False
True or false. Michael Porter's five competitive forces include the following: threat of new entrants, threat of substitute products or services, bargaining power of customers (buyers), bargaining power of suppliers, and product development. a.) True b.) False
True
True or false. One positive impact of information technology is the increasing number of jobs that are becoming available for the disabled. a.) True b.) False
True
True or false. When considering global system strategy solutions, not all systems should be shared with the foreign units. Only some of the core systems should be shared, along with other systems if they share key elements. a.) True b.) False
Enterprise Resource Planning (ERP)
Typically uses one database to store all information needed by various business units and increases operational efficiency defines what type of enterprise system? a.) Enterprise Resource Planning (ERP) b.) Customer Relationship Management (CRM) c.) Supply Chain Management (SCM) d.) Knowledge Management (KM)
Data
Unorganized data that lacks meaning.
In asynchronous communication, participant communication is not concurrent. Why is this an advantage of email?
Users can send or reply to messages on their own schedule.
142 and 212
Using the IP address of 142.212.25.1, which two bytes are managed and assigned by the Internet Service Provider? a.) 142 and 25 b.) 212 and 1 c.) 25 and 1 d.) 142 and 212
25 and 1
Using the IP address of 142.212.25.1, which two bytes are managed and assigned by the computer administrator to each individual host on the network? a.) 142 and 212 b.) 142 and 25 c.) 212 and 1 d.) 25 and 1
WSNs
WHAT are located in strategic locations and used to monitor physical or environmental conditions? a.) Barcodes b.) WSNs c.) RFID
Enterprise resource planning (ERP) systems
WHAT involve utilizing computer technology to link various aspects of a business, including human resources, accounting, and inventory control? a.) Supply chain management (SCM) systems b.) Enterprise systems c.) Enterprise resource planning (ERP) systems
CPM (Critical Path Method)
WHAT is a project management technique that identifies critical tasks and helps reduce program delays? a.) WBS (Work Break-down Structure) b.) PERT(Program Evaluation Review Technique) c.) CPM (Critical Path Method)
Clickstream
WHAT is a series of human or user Web visitor page requests? a.) Keystroke b.) Cookie c.) Clickstream
TCP/IP
WHAT is a universal telecommunication network protocol that most operating systems can recognize? a.) TCP/IP b.) Ethernet c.) Bluetooth
Core competency
WHAT is an activity for which a business is a marketplace leader? a.) Synergy b.) Growth c.) Core competency
Brainstorming
WHAT is an alternative tool that requires a group of users to collectively review and analyze the alternatives, prior to making a decision? a.) PERT (Program Evaluation Review Technique) b.) Decision tree c.) Brainstorming
_____________ have mentioned that inappropriate or provocative photos or information, and evidence of alcohol and drug abuse, by the job seeker revealed during social media search can negatively impact employment opportunities.
Recruiters
His actions were considered ethically and socially acceptable, but legally unacceptable
Robin Hood is a heroic outlaw in English folklore who robbed the rich to help the poor. He fought against the Sheriff of Nottingham and the reign of King John. Which of the following statement is TRUE regarding Robin Hood? a.) His actions were considered legally acceptable, but ethically and socially unacceptable. b.) His actions were considered ethically, socially, and legally unacceptable. c.) His actions were considered ethically and socially acceptable, but legally unacceptable.
Which of the following is not a systems implementation phase?
Scheduling
______________________________ is usually the result of a lack of proper documentation, definition, or control over the project requirements and can sneak up and destroy a project.
Scope Creep
Scope
Scope, time, cost, quality and risk are the five major variables in project management that must be monitored when managing information technology to ensure project success. What is included or defined in a project, including goals, deliverables, costs, and deadlines? a.) Time b.) Cost c.) Scope
The ______________ method can address unexpected changes or challenges that cannot be addressed effectively with SDLC.
Scrum - designed to better handle unexpected changes.
For what purpose is SCRUM software development methodology designed?
Scrum is designed to address customer need changes.
Auditing can only be used by the accounting department
Security policies are output from an organization's risk assessment process, which cover an organization's need for various levels of security. Auditing is an example of a security policies control. Which of the following is FALSE regarding auditing? a.) Auditing is used by many divisions and departments within an organization b.) Auditing can only be used by the accounting department c.) An IS auditor may penetrate security policies to determine their adequacy or need for training
Which of the following is not a step in the decision-making process?
Select Team - The intelligence phase in the decision-making process consists of the (DISCOVERY), identification, and understanding of the problem.
Configure your computer system to receive these updates automatically
Software companies such as Microsoft frequently develop system updates. What should individuals do with these system updates? a.) Configure your computer system to receive these updates automatically b.) Ignore them because they may contain malware c.) Download and install them after they are 100 percent tested by Microsoft and other system developers
Horizontal Application
Software that provides solutions based upon the common needs of many businesses.
Response
Spoofing is effective to hackers because it solicits a network WHAT? a.) Authentication b.) Denial of service c.) Response
What does the behavioral model hope to accomplish in management decision making?
Support the unpredictable and less systematic aspects of decision-making.
Confidentiality, integrity, and availability
The CIA triad is a model that guides information security policy. What do the letters in CIA stand for? a.) Cardinality, intelligence, and audit b.) Confidentiality, integrity, and availability c.) Capacity, infrastructure, and adaptive
Confidentiality
The Central Intelligence Agency is responsible for high level data integrity and security for the nation. One of the key points in the CIA triad is to maintain WHAT and keep the data from those who don't need to have access to it? a.) Consistency b.) Availability c.) Integrity d.) Confidentiality
Fairness
The Golden Rule, or "do unto others as you would have them do unto you," belongs to which of the following ethical models for ethical behavior? a.) Utilitarian b.) Fairness c.) Virtue d.) Rights
Combining data, voice, and video into one platform means having only one network to service and maintain
What is a benefit of telecom services convergence for business? a.) Combining voice, data, and video into one platform reduces complexity. b.) Combining voice, data, and video into one network reduces failures. c.) Combining data, voice, and video into one platform means having only one network to service and maintain.
Data marts are used to analyze a business unit
What is a data mart business application? a.) Data marts are used to analyze data warehouse operations. b.) Data marts are used to analyze subsets of Big Data. c.) Data marts are used to analyze a business unit.
Passive tags leverage energy from radio signals
What is the advantage of RFID passive tags? a.) Passive tags leverage energy from radio signals. b.) Passive tags use battery power. c.) Passive tags emit or reflect optical signals.
Install the latest anti-malware and antivirus programs
What is the best way for individuals to safeguard their computers against malware? a.) Install only the latest antivirus programs b.) Install the latest anti-malware and antivirus programs c.) Install only the latest anti-malware programs d.) Install any version of anti-malware and antivirus programs
Cloud computing
What is the biggest trend, with future growth, in enterprise IT operation regarding software, platform, and infrastructure? a.) Cloud computing b.) Onsite IT data center c.) Virtual private networks
An entity exists in itself.
What is the definition of an entity in a database? a.) An entity is a record. b.) An entity exists in itself. c.) An entity is an object.
A byte is a unit of digital information, whereas a hertz is the standard measurement of frequency
What is the difference between a hertz and a byte? a.) A byte is a data transmission speed, whereas a hertz is a frequency. b.) A byte is a unit of digital information, whereas a hertz is the standard measurement of frequency. c.) A byte is a measure of frequency, whereas a hertz is a wavelength.
Primary keys define columns in a table, while foreign keys are typically a constraint to reference two tables
What is the difference between a primary key and a foreign key in a relational database? a.) Primary keys define columns in a table, while foreign keys are typically a constraint to reference two tables. b.) There is no difference between a primary key and a foreign key. c.) Primary keys are used in hierarchical models, while foreign keys are used in relational models.
PSTN is the voice telephone network around the globe
What is the public switch telephone network (PSTN)? a.) PSTN is the voice telephone network around the globe. b.) PSTN is the old telegraph analog system. c.) PSTN is the wire line infrastructure.
SQL's purpose is to administer and manage data in a database
What is the purpose of Structured Query Language (SQL)? a.) SQL is business language for enterprise applications b.) SQL's purpose is to act as the operating system for a DBMS c.) SQL's purpose is to administer and manage data in a database
To analyze system performance
What is the purpose of a general MIS evaluation? a.) To analyze system performance b.) To speed up system response c.) To review system cost effectiveness
A feasibility study is an analysis to determine if a proposed system is possible
What is the relationship of a feasibility study to an information system development project? a.) A feasibility study is an analysis performed to understand technology requirements b.) A feasibility study is an analysis to determine if a proposed system is possible c.) A feasibility study is a financial analysis
To increase traffic to the organization's website
What is the responsibility of a search engine optimization (SEO) specialist? a.) To develop an Internet marketing campaign b.) To increase traffic to the organization's website c.) To work as the organizational liaison for search engine companies
Use a Virtual Private Network
What is the safest way to access a public Wi-Fi? a.) Use an Evil Twin b.) Use anonymous browsing c.) Use a Virtual Private Network
Application
What kind of controls manages the restrictions that employees may have to the corporate data resources? a.) Information systems b.) General c.) Application
The assassination of Osama Bin Laden
What major event in American history was tweeted 20 minutes before any established news organization made the announcement? a.) The assassination of Osama Bin Laden b.) The election results of Barack Obama c.) The capture of Saddam Hussein
To analyze traffic accidents and citation data
What might a local government agency use a business intelligence geographic information system (GIS) application for? a.) To analyze traffic accidents but not citation data b.) To analyze traffic accidents and citation data c.) To predict traffic accidents and citation data
Business intelligence must help align the organization with business objectives
What must an effective business intelligence platform accomplish? a.) Business intelligence must reduce the labor force b.) Business intelligence must help align the organization with business objectives c.) Business intelligence must predict future trends
ESS data includes internal enterprise data, as well as external data from financial, industry, and trade databases
What type of data is included in executive support systems (ESS)? a.) ESS data includes internal enterprise data, as well as external data from financial, industry, and trade databases b.) ESS data only includes production, quality, and customer satisfaction data c.) ESS data focuses on financial and cost of goods information
Business process
When using the balanced scorecard method, quality would fall under which of the following measurements? a.) Customer perspective b.) Learning and growth c.) Business process d.) Financial perspective
Accountability
When you are enrolled as a student at your university, you automatically assume which of the following for your own actions? a.) Accountability b.) Responsibility c.) Liability d.) Ethical principles
Data governance
Which answer below defines the policies and processes to manage and maintain the data integrity and security of a government agency? a.) Data governance b.) Data administration c.) Database administration d.) Information management
Excel
Which application below uses data patterns to fill numbers in a column? a.) Access b.) Excel c.) Word
Android
Which is a mobile operating system? a.) Windows XP b.) Android c.) BSD
Gantt chart
Which is a well known tool in project management that illustrates project tasks against a timeline? a.) Calendar b.) Gantt chart c.) Visio
Entity-relationship diagram
Which item below is a graphical representation of the relationships and provides a description of the entities in a database? a.) Structured query language b.) Entity-relationship diagram c.) Graphical user interface d.) Data dictionary
Educating employees about social media threats
Which method can businesses utilize to thwart social media risks and threats? a.) Creating their own social media platforms b.) Educating employees about social media threats c.) Opting out of social media channels
Actions that are both legal and ethical
Which of the following actions is the hardest, but most desirable in individuals and businesses? a.) Actions that are legal but unethical b.) Actions that are both legal and ethical c.) Actions that are ethical but illegal d.) Actions that are both illegal and unethical
The classical management model supports planning and controlling
Which of the following best describes the classical model in management decision making? a.) The classical management model supports collaborative decision making b.) The classical management model supports planning and controlling c.) The classical model supports motivational theory
1G networks were "voice only" analog communication networks
Which of the following best describes the first generation of mobile networks? a.) 1G networks were "voice only" analog communication networks. b.) 1G networks were "data digital" networks. c.) 1G networks were "optical data" networks.
Organizational factors
Which of the following factors deals with the potential loss of business from the dismissal or death of an important key manager? a.) Technological factors b.) Environmental risk factors c.) Organizational factors
New drug discovery
Which of the following is an example of a big data analytics application? a.) New drug discovery b.) Structural design and analysis c.) Sales history of an enterprise
Problem Solver
Which of the following is not a category from Henry Mintzberg's management behavior roles? a.) Informational b.) Interpersonal c.) Problem Solver
Project manager
Which of the following is not a primary role of a systems analysts? a.) Arbitrator b.) Project manager c.) Consultant
patent
legal right given to an inventor of a product or process
mesh network
network topology in which each node relays data for the network
Platform as a Service (PaaS)
service provider provides server space, the server, virtualization, operating system, database, and development environment in a platform that can be used for application development. An example would be Amazon Web Services.
data mart
smaller subset database from a data warehouse typically focused on a single area or function.
Rapid application development (RAD)
software development focuses on the development's process, with limited emphasis on the planning process.
Fourth generation computer languages (4GL)
software tools that help reduce the amount of procedural knowledge that is needed about how computers operate and lets end users create programs as needed.
Data access
Which of the following is the best reason to implement a database for a growing business? a.) Digital age b.) Big data c.) Data access
Query language
Which of the following is used to retrieve specific stored data from a database? a.) Foreign key b.) Query language c.) Schema
Utility
Which of the following items is a type of system software? a.) Routing b.) DBMS c.) Utility
Modem
Which of the following items is used as an output device? a.) Modem b.) Touch screen c.) Keyboard
Authentication and authorization
Which of the following must be enforced to protect the organization's corporate data resources and to control access to the information assets? a.) Authentication and authorization b.) Authentication and prevention c.) Authorization and prevention
Wireless networks
Which of the following networks is the easiest for someone to gain access to? a.) Both b.) Wired networks c.) Wireless networks
Smartphone
Which of the following portable device combines the functionality of the phone technology with the computing of a desktop or laptop? a.) Smartphone b.) Tablet c.) Netbook d.) iPod
It is important for management to periodically evaluate information systems in order to determine whether the system is effective and relevant to the organization. There are three types of system evaluation: system-oriented, function-oriented, and ________________________________________________.
strategy-oriented
Effective written communication is also important in emails. Although less formal than written documents and manuals, with email communication, attention should be given to all of the following, except ________________________________________________.
technical jargon
Global Business Strategies that form their organizational and information systems structure
transnational, multinational, franchisers, domestic exporter
relational database
type of database in which multiple information files are combined into one database in one location, where data are stored in two-dimensional tables known as relations and contain multiple entities and attributes
router
used to connect multiple networks together and forward data packets between those separate networks to the destination host.
Protocols
used to ensure the quality and accuracy of the transmission, and that the transmission is understood by the receiving device.
Vulnerabilities
weakness in the technology, process, and procedure, or people involved with any given information asset
First and second-generation computer languages
were specific to the computer manufacturer (1GL) or to a specific processor or environment (2GL).
RFID
Which of the following technologies is used to track inventory and can be read hundreds at a time, even if the tag is covered? a.) Bar code b.) RFID c.) Wireless sensor networks
Which social media site do most teenage girls use? a.) Facebook b.) Instagram c.) Snapchat
They display data in a structured format
Why are DBMS reports a valuable database tool in helping managers make business decisions? a.) They display data in a structured format. b.) They display summarized data of the whole table. c.) They display data in an unstructured format. d.) They displace raw data of the whole table.
Data warehouses can be mined or analyzed for trends or patterns
Why are data warehouses beneficial to business managers? a.) Data warehouses store operational data. b.) Data warehouses increase the effectiveness of OLTP databases. c.) Data warehouses can be mined or analyzed for trends or patterns.
Lack of training or acceptance for new system
Why do users fail to adopt new information systems? a.) New systems being web GUI based b.) New systems being more complex c.) Lack of training or acceptance for new system
WPA is a tunneling encryption protocol that secures wireless data transmissions
Why is WPA (Wireless Protected Access) critical to wireless networks? a.) WPA is a tunneling encryption protocol that secures wireless data transmissions b.) WPA is necessary for accessing information over the web c.) WPA brings all the wireless technologies into a standard protocol
Classification
You were hired by a company to administer survey questionnaires to customers entering a major shopping mall. The data mining software is capable of sorting the respondents into WHAT based on their age, gender, education level, and household income? a.) Classification b.) Associations c.) Forecasting
True
[True/False] Computer hardware is a means to an end, running the software programs that allow a user to perform tasks. a.) True b.) False
True
[True/False] Software applications have a life cycle because of hardware technological advances described by Moore's Law. a.) True b.) False
False
[True/False] Spoofing a network is a false representation of digital identity and leads to less packet encapsulation information as the network responds. a.) True b.) False
False
[True/False] Supply Chain Management (SCM) is a popular analytics application. A company's supply chain is a network of business processes that includes procuring raw materials, producing and manufacturing the goods, marketing the products to potential customers, and finally, distributing the finished products to the customers. a.) True b.) False
False
[True/False] Telegraph technology provided richer quality, more detailed, and a more reliable form of communication than the telephone. a.) True b.) False
False
[True/False] The Digital Millennium Copyright Act (DMCA) is an international treaty on copyright law adopted in 1996. a.) True b.) False
False
[True/False] The Open System Interconnection model consists of five layers. a.) True b.) False
False
[True/False] The behavioral model of management recognizes that actual management behavior is more systematic and predictable. a.) True b.) False
True
[True/False] The business benefit of LinkedIn is the ability to target a large number of users with specific skills or education. a.) True b.) False
True
[True/False] The factors that most influence the success of an information system are the functionality of the system, the quality of the data, the usefulness of the system, system usage, system efficiency, and user satisfaction. a.) True b.) False
False
[True/False] The five largest business intelligence technology vendors are IBM, Apple, Oracle, SAP, and SAS. a.) True b.) False
False
[True/False] The virtual layer is the seventh layer of the OSI (Open System Interconnection) model. a.) True b.) False
chief information officer (CIO)
a business leader who analyzes internal business processes such as payroll and billing, reshapes the physical infrastructure and network purchases to meet business goals, and leads the workforce to implement critical IT internal projects; responsible for information systems strategic thinking and planning.
A reliable intranet connection provides organizations and their suppliers and vendors with ________________________________.
a secure platform for internal use
What is the relationship of a feasibility study to an information system development project? a- A feasibility study is an analysis to determine if a proposed system is possible b- A feasibility study is a financial analysis c- A feasibility study is an analysis performed to understand technology requirements
a- A feasibility study is an analysis to determine if a proposed system is possible
Which of the following is not an organizational change category to consider when implementing a new information system? a- Quality b- Automation c- Rationalization
a- Quality
The ______________ method can address unexpected changes or challenges that cannot be addressed effectively with SDLC. a- SCRUM b- agile c- RAD
a- SCRUM
There are multiple methods of data capture, categorized as manual or ________________- a- automated b- optical c- scanned
a- automated
Effective written communication must be correct, simple, and accurate. Jargon and terminology should be a- avoided b- explained c- used
a- avoided
When using the balanced scorecard method, quality would fall under which measurement? a- business process b- customer perspective c- learning and growth d- financial perspective
a- business process
When using a decision tree, ____________ can become complex when uncertain values exist, or if multiple outcomes are linked oriented. a- calculations b- outcomes c- analyses
a- calculations
What are measurement, analytics, reporting, collaboration, and knowledge management? a- common functionalities of business intelligence b- the best practices of management c- the five management roles identified by Henry Mintzberg
a- common functionalities of business intelligence
Which is not a factor that must be considered when implementing a new information system? a- competition b- technical ability c- user d- resistance to change
a- competition (once a decision has been made to implement an information system, competition is not a factor)
Which of the following is a primary role of information systems managers? a- decision making b- hiring c- performance review
a- decision making
The work breakdown structure (WBS) is a broken down list of project __________ required to complete a project a- deliverables b- activities c- resources
a- deliverables
Which of the following is not a benefit of using the SDLC when implementing an information system program? a- difficulty in estimating project cost b- ability to monitor large projects c- detailed staged process
a- difficulty in estimating project cost
The _________step, when managing systems implementation, consists of cataloging the system specifications in detail. a- documentation b- acquisition c- conversion
a- documentation
__________ combine multiple tools or workbenches to support the complete software cycle. a- environments b- workbenches c- tools
a- environments
Which of the following is not a primary role of a systems analysts? a- project manager b- consultant c- arbitrator
a- project manager
Which is not a step in the decision making process? a- select team b- define problem c- develop alternatives
a- select team
What is the function of the data integration service in business intelligence? a- serves as the depository of all extracted data for the load function of the data warehouse b- helps extract value from the data c- gathers and logically mixes business and master data
a- serves as the depository of all extracted data for the load function of the data warehouse
When communicating, what is important for IT professionals to understand during the system development process? a- the user knowledge and background of the target audience b- the system networking platform c- the legacy systems model
a- the user knowledge and background of the target audience
What type of MIS do operational and middle management use for structured decisions? a- transactional processing systems b- analytical processing systems c- data warehouse systems
a- transactional processing systems
chief executive officer (CEO)
also called president or managing director, is responsible for the success or failure of the company, creating the company culture, selecting the senior management team, setting strategy and vision, and selecting projects to fund.
Pseudocode
an informal high-level description of the operating principle of a computer program or other algorithm. Used for human reading, rather than machine reading.
Agile software development methodology
an operational method by which software developers iteratively gather requirements, plan, design, develop, test, and implement software.
Which of the following is a definition of a systems analysis logical model? a- a logical model is an abstraction of a system b- a logical model is UML c- a logical model is a type of data diagram
b- a logical model is UML (?)
What are podcasts, and why are they a good source of information for systems analysts? a- sources of information that are accessed by apple devices b- audio files that contain educational content c- content channels that can be read
b- audio files that contain educational content
What is the overall job function of a systems analyst? a- executes qualitative risk assessments b- focuses on analysis, design, and implementation c- develops system design processes
b- focuses on analysis, design, and implementation
___________ environments are the most common and are suitable for the entire system development life cycle, from analysis to maintenance. a- process b- integrated c- method
b- integrated
Which of the following is a great, free, and ubiquitous source of information for systems analysts? a- textbooks b- internet c- library
b- internet
What is considered to be a low level security risk during system post-implementation? a- low level is characterized by complete loss of organizational capabilities b- low level is characterized by noticeable impact to the organization c- low level is characterized as severe impairment to an organization
b- low level is characterized by noticeable impact to the organization
What are three levels of risks associated with system design and implementation? a- cost, schedule, and user acceptance b- project structure, size, and team technical background c- critical path, work breakdown, and change
b- project structure, size, and team technical background
What are the classifications of cloud computing? a- virtual, multi-core, and distributed b- public, private, and hybrid c- in-house, remote, and hybrid
b- public, private, and hybrid
System development life cycle (SDLC) consists of seven stages. The sixth stage in SDLC is a- designing the recommended system b- testing and maintenance c- determining information requirements
b- testing and maintenance
What is risk management in system security? a- the process of security breach prevention b- the process of identifying, analyzing, and responding to risk c- the process of cataloging risks
b- the process of identifying, analyzing, and responding to risk
What is a rich site summary (RSS)? a- systems analysts' information channel b- web feed formats used by publishers c- websites used specifically by systems analysts
b- web feed formats used by publishers
What category of Computer Aided Software Engineering (CASE) does Microsoft Visual Basic fall under? a- tools b- workbenches c- environments
b- workbenches
Tertiary storage
consists of an automated robotic mechanism to mount and dismount magnetic tape or optical discs.
Open System Interconnection (OSI)
consists of seven layers and is an international standard that governs or guides the development of data communication protocols the seven layers are: application, presentation, session, transport, network, data link, and physical.
The proper techniques for developing an internet search strategy include reviewing information requirements, using proper search techniques and tools, evaluating the results, and determining __________________________________________________________.
copyright and data integrity issues
Clickstream applications
create non-relational databases which are mined to track and analyze an application's activity, including how it is used and where a user clicks.
Which of the following is not a systems implementation phase? a- development b- conversion c- testing d- scheduling
d- scheduling
Online transaction processing (OLTP)
database design used for browsing and manipulating business transaction activity. Processing of information into the database.
Both cloud computing and Web 2.0 are ____________________________.
disrupting systems design and implementation
primary storage
flash memory chips, such as shown below, plugged into memory slots on the motherboard.
End-user development (SDLC)
fourth-generation languages that enable end users to develop systems and solutions with little or no assistance from professional technical specialists.
Benchmarking requires contacting users and teams that have successfully implemented a similar system in order to ______________________________________________.
gather best practices
chief technology officer (CTO)
has ultimate responsibility for all technology implementation, maintaining technology compliance regulations, and identifying technology risks for the company.
Cloud computing is becoming more popular because users ___________________________________________.
have more flexibility than they do with VPN
Third generation computer languages (3GLs)
high-level programming languages such as FORTRAN, COBOL, C, Java, C++, and C#
The government selects one specific culture to codify the ethics into laws
We live in a diverse culture in this country, with people who came from different nationalities and backgrounds. Which of the following statement about ethics is FALSE? a.) Our social ethics is codes of conduct based on accepted standards of right and wrong. b.) Different cultures develop their own set of ethics by which members abide. c.) Ethics are moral principles and concepts and rules of behavior governing our behavior. d.) The government selects one specific culture to codify the ethics into laws.
Societies
We make our ethical decisions based on the principles of right and wrong that we learn from our upbringing and our exposure to different? a.) Communities b.) Organizations c.) Societies
Destroying sensitive information
We need to intentionally harden our individual security to make it harder for criminals to steal our information assets by removing all paper trails to our important information. Doing WHAT by using a cross-cut shredder will help eliminate this possibility? a.) Making accounts more secure b.) Destroying sensitive information c.) Using secure forms of payment
GDSS enable interactive collaboration support for multiple decision makers at multiple geographic locations
What are group decision support systems (GDSS)? a.) GDSS help translate organizational objectives into operational targets b.) GDSS provide internal and external grouped data for middle managers c.) GDSS enable interactive collaboration support for multiple decision makers at multiple geographic locations d.) GDSS define key performance indicators for decision making
Online transaction processing
What does OLTP stand for? a.) Online tracking processing b.) Online transcript processing c.) Online transaction processing d.) Offline transaction processing
Open System Interconnection
What does OSI stand for? a.) Open Switch Interpacket b.) Open System Interconnection c.) Open Standard International
Wireless Sensor Networks
What does WSN stands for? a.) Wireless Sensor Networks b.) Wireless System Networks c.) Wireline Sensor Nodes
Develop public profiles for organizations in order to enable interaction with customers
What does an organization's social media strategist do? a.) Serve as the liaison between the organization and the online community. b.) Boost website rankings through analysis and testing marketing techniques. c.) Develop public profiles for organizations in order to enable interaction with customers.
Support the unpredictable and less systematic aspects of decision-making
What does the behavioral model hope to accomplish in management decision making? a.) Support unstructured types of decisions b.) Support the unpredictable and less systematic aspects of decision-making c.) Support the predictable and systematic aspects of decision making d.) Support the human factors design of information systems
It provides real-time information that can be acted upon quickly
What function does the breaking news aspect of social media provide the investment community? a.) It provides real-time information that can be acted upon quickly. b.) It reveals patterns of behavior, such as consumer spending. c.) It can predict the direction of market indexes.
Mobile Internet devices and Web 2.0
What has enabled social media use to grow exponentially over the past decade, dramatically changing how individuals and organizations communicate and conduct business? a.) The Internet b.) Broadband packet switched data communications c.) Mobile Internet devices and Web 2.0
Databases
What helps e-businesses accurately target individual customers by charging them different prices? a.) Databases b.) Telecommunications c.) Mobile devices d.) The Internet
Systems Analyst
A change agent who uses design and analysis techniques to solve organizational problems using information technology.
Codes
A software engineer does WHAT with computer programs to perform specific tasks? a.) Codes b.) Procures c.) Selects
Low switching costs
Business strategy is how a business achieves its goals and outperforms its competitors. Strategic information systems (SIS) are used to help companies accomplish business strategies. Some of the initiatives for implementing an SIS include all except which of the following? a.) Customer lock-in b.) Differentiating products c.) Low switching costs d.) Barriers to competitors
Technology
Businesses face difficult decisions regarding their hardware needs. Constant changes in WHAT can lead to obsolescence? a.) Technology b.) Communication c.) Training
Foreign currency exchange rates
Businesses should not build global systems just to build global systems; senior management should weigh all benefits before proceeding. The major contributions or factors that drive global systems and the internationalization of business includes all except which of the following? a.) Management and coordination b.) Production, operation, supply and distribution c.) Global customers and global marketing d.) Foreign currency exchange rates
Customer Relationship Management (CRM)
Focused marketing efforts, better customer experiences, automated reporting, and better cooperation to respond to customer needs defines what type of enterprise system? a.) Enterprise Resource Planning (ERP) b.) Customer Relationship Management (CRM) c.) Supply Chain Management (SCM) d.) Knowledge Management (KM)
Customer Relationship Management (CRM)
For a new business, to collect customer information online and at the register and to consolidate and merge the information to better serve customers defines what type of enterprise system? a.) Enterprise Resource Planning (ERP) b.) Customer Relationship Management (CRM) c.) Supply Chain Management (SCM) d.) Knowledge Management (KM)
Operating system
In order to function, all computer systems are composed of hardware components, software components,and require a CPU as well as a(n)? a.) Hard drive b.) Operating system c.) Application
Supply Chain Management (SCM)
Lower costs, improve collaboration, reduce cycle times, respond to conflict, forecast demand, and manage product flow defines what type of enterprise system? a.) Enterprise Resource Planning (ERP) b.) Customer Relationship Management (CRM) c.) Supply Chain Management (SCM) d.) Knowledge Management (KM)
Customer satisfaction
Many factors need to be weighed when managing system implementation, both tangible and intangible, to reduce project risk. WHAT is an intangible benefit when evaluating information systems cost and benefits? a.) Faster order fulfillment b.) Customer satisfaction c.) Reduced customer complaints
Accounting and finance
Most large corporations have several information systems to support their functional business areas. What is the system that tracks and processes company revenues, purchases, and payroll? a.) Marketing and sales b.) Human resources c.) Accounting and finance d.) Manufacturing and production
Insignificant
Network economics sees the cost of adding new members as WHAT? a.) Consequential b.) Prohibitive c.) Insignificant
Associate with other companies, without being physically tied to them
One network-based strategy is that of virtual companies that can do WHAT? a.) Associate with other companies, without being physically tied to them b.) Use the internet as their storefront to connect with customers c.) Provide online products and services only
Information
One of the advantages of information systems for businesses is to take raw data and turn it into information, and then transform that information into knowledge. The number of people in Florida with incomes below the poverty line increased in the City of Tampa between 2010 and 2015 is an example of what? a.) Knowledge b.) Information c.) Data
Data
One of the advantages of information systems for businesses is to take raw data and turn it into information, and then transform that information into knowledge. The number of people in Florida with incomes below the poverty line is an example of what? a.) Data b.) Knowledge c.) Information
Knowledge
One of the advantages of information systems for businesses is to take raw data and turn it into information, and then transform that information into knowledge. Understanding why the poverty line increased in the city of Tampa is an example of what? a.) Data b.) Knowledge c.) Information
Communication
One reason IT is important is because video conferencing has become cheaper, quicker, more collaborative, and more efficient. Of what IT benefit is this an example? a.) Cost effectiveness b.) Communication c.) Product development d.) Globalization
Shifting environment
Porter's five competitive forces includes all except what below? a.) Competitive rivalry b.) New entrants c.) Shifting environment d.) Substitute products
Enterprise Resource Planning (ERP)
Standardized business procedures that allow for more consistency within the business and removes redundancy defines what type of enterprise system? a.) Enterprise Resource Planning (ERP) b.) Customer Relationship Management (CRM) c.) Supply Chain Management (SCM) d.) Knowledge Management (KM)
Synergy
Teamwork is used in business to motivate employees to work harder and be more productive. When employees show commitment to team goals and work effectively, collaboratively, and cooperatively with others to reach desired outcomes is an example of WHAT? a.) Merger b.) Synergy c.) Core competency
Network of physical devices
The "Internet of Things" (IoT) is a growing topic in business and a hot IT career field. What best describes IoT? a.) Internet access for everyone b.) Internet streaming services c.) Wi-Fi access everywhere d.) Network of physical devices
MIS
There are different types of information systems based on the different levels of hierarchy in an organization. Which system helps managers manage their departments more efficiently? a.) DSS b.) EIS c.) MIS d.) TPS
DSS
There are different types of information systems based on the different levels of hierarchy in an organization. Which system helps support business decision-making activities by manipulating and building upon the information from the systems below it in the hierarchy? a.) DSS b.) EIS c.) TPS d.) MIS
Environment
There are many organizational features that can change the direction of the company. Some of these include processes, politics, culture, and environment. Managers must understand how organizational features can influence their business in order to build and use information systems successfully. Internal and external elements that affect various parts of an organization, for instance the government, competitors, customers, and suppliers, are examples of what organizational feature? a.) Culture b.) Politics c.) Structure d.) Environment
Culture
There are many organizational features that can change the direction of the company. Some of these include processes, politics, culture, and environment. Managers must understand how organizational features can influence their business in order to build and use information systems successfully. Values and behaviors that contribute to the social and psychological well-being of an organization are examples of what organizational feature? a.) Culture b.) Politics c.) Structure d.) Environment
Politics
There are many organizational features that can change the direction of the company. Some of these include processes, politics, culture, and environment. Managers must understand how organizational features can influence their business in order to build and use informations systems successfully. Pursuing individual interests or agendas in an organization without regard for company goals is an example of what organizational feature? a.) Structure b.) Environment c.) Culture d.) Politics
Information Systems
WHAT accepts data as input? a.) Information b.) People c.) Information Systems
Facilities
WHAT are needed for information systems infrastructure? a.) Service providers b.) Facilities c.) Computers
Memory and CPU
WHAT are the components found on a computer's motherboard? a.) Memory and CPU b.) Hard drive and Memory c.) CPU and Hard drive
Processes and employees
WHAT are the key factors to consider when planning and organizing information technology in business? a.) Hardware and processes b.) Processes and employees c.) Customers and suppliers
The internet
WHAT is the biggest impact to global business due to the fact that there are virtually no physical borders? a.) The internet b.) Foreign exchange c.) Information technology
Information management
What is the application of management techniques to collect, communicate, and process information in order to make better management decisions called? a.) Information management b.) Information technology management
Competitive forces
What is the name of Porter's Model that is used to help businesses determine their ability to compete. a.) Competitive forces b.) Competitive advantage c.) Competitive rivalry
Perform a strategic analysis
When determining business benefits from implementing a strategic information system, several factors need to be considered. Businesses need to consider their business objectives, look at who their customers are, create justification for the project and then seek support. What would be the first step in determining benefits? a.) Analyze competitive forces b.) Revamp business processes c.) Study the value chain d.) Perform a strategic analysis
Manage incoming data and catalog data
When looking at the evolution of software, databases have grown in features and popularity. What do database management system (DBMS) applications do for business? a.) Compile data into machine language and manage incoming data b.) Manage incoming data and catalog data c.) Catalog data and compile data into machine language
Synergies
When the output from one area is used to create input for another, thereby lowering costs and generating more profit is the idea of WHAT? a.) Network strategies b.) Synergies c.) Core competency
Defining an acceptable test plan
Which of the following is not a management solution when developing global systems? a.) Coordinating software releases b.) Encouraging local user support c.) Changing business processes d.) Defining an acceptable test plan
Design and select database software
Which of the following is not a responsibility of a project manager? a.) Demonstrate leadership and have good communication skills b.) Make team assessments and evaluations c.) Design and select database software d.) Establish project milestones and deliverables
Information security analyst
Whose job is it to focus on risk and vulnerability assessment to prevent security breaches of company or government data? a.) Information security analyst b.) Database administrator c.) Computer systems analyst
Computer systems administrator
Whose role is it to manage company workflows, identify and fix network issues, and maintain equipment and software? a.) Computer systems administrator b.) Computer programmer c.) Computer support specialist
True
[True/False] A 2-in-1 computer system is a computer that can act as a laptop, with high level of capability, and use the display as an touch screen pad. a.) True b.) False
False
[True/False] A desktop processor is designed to meet the needs of one person, whereas a server meets the needs of many people. Server processors are designed for speed and reliability, so they always use a quad-core processor. a.) True b.) False
False
[True/False] Cloud computing allows users to mix and match software components to create a customized application. a.) True b.) False
True
[True/False] Computer software is a set of machine-readable instructions that makes computers perform specific tasks. a.) True b.) False
True
[True/False] Engineers tasked with designing complex systems typically require workstations as their computer systems. a.) True b.) False
False
[True/False] HTML (Hypertext Markup Language) is a software language used to manage relational databases. a.) True b.) False
True
[True/False] Human touch and human gestures are computer input technologies. a.) True b.) False
True
[True/False] Open-source software has been found to contain fewer defects than proprietary software. a.) True b.) False
True
[True/False] The term "PC," which stands for personal computer, was adopted because of the success of the IBM personal computer. a.) True b.) False
False
[True/False] When purchasing hardware, do not purchase more than the minimum required by the software. a.) True b.) False