BTECH Final Study Guide

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

29) ________ is the most secure cable medium

Fiber-optic

7) A network stretching across New York City would be a ________.

MAN

Google maps continuously checks traffic conditions, constructions and available routes to give you the fastest way to your destination? This is an example of _________ type of data analysis.

Prescriptive analysis

Experts argue business analytics and business intelligence should be used interchangeably.

True

Whitelisting allows nothing to run unless it is on the whitelist.

True

A(n) _________ is a software package that attempts to identify and eliminate viruses and worms.

anti-malware system

A(n) ________ of an entity refers to each row in a relational table, which is a specific, unique representation of the entity.

instance

Your company hires FireEye to install security software and monitor your systems.This is an example of risk _________.

limitation

4) ___ are a set of core data that span the enterprise information systems.

master data

6) While late-model cars often utilize any number of technologies to make the driving experience more enjoyable and safer for drivers, there has yet to be a car that is completely autonomous.

False

_________ is an attack by a programmer developing a system.

A trojan horse

Which of the following is NOT a problem associated with Big Data?

Big data can be structured, unstructured, or semi-structured

15) ________ modems operate over coaxial cable.

Cable

Hackers would use a botnet to perform a _________.

DDoS

VPN is a trusted network.

True

Database systems maximize ________.

independence

Stealing a company's business plan is a violation of

intellectual property rights

10) A data ___ is a low-cost, scaled-down version of a data ___.

mart; warehouse

4) MANs are the largest networks.

False

Validation of the model and answering the question "what are my options" occur in the _____ phase of the Business decision making.

design

Rummaging through commercial or residential trash to find discarded information is called

dumpster diving

The IDC model created by Herbert Simon stands for ______________.

intelligence, design, choice

9) A data ___ is a repository of historical data that are organized by subject to support decision makers in the organization.

warehouse

What is a Decision Support System (DSS)

An information system facilitating organizational decision-making

56) ________ is the largest-volume application running over the Internet.

E-mail

________ is an example of a source system for a data warehouse.

ERP

12) A relational database is basically one big table; it is also called a flat file.

False

37) The MIS department creates the business rules necessary to develop an ER diagram.

False

38) A circle for cardinality represents a single relationship.

False

A CPA firm typically performs an internal business audit.

False

You have to go through every step of the Business Decision Making process every time for every problem.

False

24) ________ cables are made of glass.

Fiber-optic

How does Firewall help in controlling network communication ?

Firewall is used to divide external and internal networks into "zones" using IP addresses. Rules are created to accept or deny network traffic from specific zone(s) to other zone(s) using specific network protocols (such as SMTP, HTTP, etc.)

In Disaster Recovery terms, a __________ allows a company to continue operation without any interruption.

Hot site

54) ________ was developed to address the Internet of Things.

IPv6

47) A(n) ________ is a company that provides Internet connections for a fee.

ISP

A connected vehicle is equipped with Internet access and usually with a wireless ________.

LAN

11) ________s allow devices to physically connect to the LAN's communication's .

NIC

17) In the example in prob 15, what type of relationship exist between Passenger and Seats ? Why ?

None. A passenger can only be assigned a Seat in a flight on a specific date. We need a table that connects Passenger, date of travel and the seat number.

14) ___ is a method of analyzing and reducing a relational database to its most streamlined form to ensure minimum redundancy, maximum data integrity, and optimal processing performance.

Normalization

If you analyze a data cube, this is an example of using ________.

OLAP

_________ involves slicing and dicing data, drilling down in the data, and rolling up data to greater summarization.

OLAP

Suppose your university automatically logs you off of a university computer after 15 minutes of disuse.This is an example of a(n) _________ control.

Physical

Greatest threat to a Nuclear power plant comes from what type of attack ?

SCADA attack

________ is the most popular query language used for interacting with a database.

SQL

21) ________ is a broadcast medium

Satellite

Alien software that captures screen every few seconds and sends to the hacker is called________________

Screen scrapper

_____ analysis examines the change in an output given the change in a particular input while keeping all other inputs constant.

Sensitivity

While deciding to purchase a plane ticket from LAX to Boston, you change the preferred departure time, date of travel and number of stops to get the best option. You see the number of options changing as you select various range of options. What type of Decision Support analysis are you performing ?

Sensitivity analysis

The difference between Phishing attack and Spear Phishing attack is

Spear phishing is much more targeted and contains specific personal information of the recipient, appearing to be genuine. Phishing attack is much more generic and does not contain person-specific information.

Cyberterrorism is typically carried out by individuals or groups whereas cyberwarfare is carried out by nation states or nonstate actors such as terrorists.

True

Data mining is a statistical tool for descriptive and predictive analytics.

True

Equifax could have upgraded and patched the software that was the cause of the breach.

True

Government systems typically lack resources and IT expertise and operate on outdated hardware and software. This makes them particularly vulnerable to ransomware attacks.

True

ID cards address physical and access controls.

True

IT security is the business of everyone in an organization.

True

If you choose not to protect your information systems, you have adopted a risk acceptance strategy.

True

The Management Cockpit is a dashboard used by executives and board members

True

The entire business analytics process starts with a business problem or organizational "pain point".

True

The external audit of information systems is frequently a part of the overall external auditing performed by a CPA firm.

True

The internet is an untrusted network.

True

Weak passwords can be addressed through multi-factor authentication.

True

You are a nice person, so you hold the door open for the person running in behind you. Since you needed to use your ID badge to open the door, the person running in behind you is tailgating.

True

18) ________ is a cable medium

Twisted-pair

While deciding to purchase a plane ticket from LAX to Boston, you change the preferred departure time, date of travel and number of stops to get the best option. You see the number of options changing as you select various range of options. What type of Decision Support analysis are you performing ?

What-if analysis

Worm is more dangerous than a virus because _________________

Worm does not need any program to be run. Virus is associated with a program that has to be run by the user.

You don't lock your computer when you go to the restroom. This is_________ and is an_________ mistake.

a human error; unintentional

Triple Z Travel site allows customers to reserve discount hotel rooms and airline tickets with certain companies they have relationships with. In order to secure the credit card information used by customers, which of the following controls would you recommend Triple Z use? a) Biometrics b) Transport layer security c) Whitelisting d) Audits

biometrics

XYZ Inc. scanned the fingerprints of all of their employees and now uses these fingerprints to authenticate their employees and grant them access to different areas of the company's facilities. XYZ Inc.is utilizing which type of technology? a) Cookies b) Intellectual Property c) Biometrics d) Malware

biometrics

Bandwidth is stated in ____ per second.

bits

A ________ is a group of eight ________.

byte; bits

________ refers to the maximum number of times an instance of one entity can be associated with an instance in the related entity.

cardinality

Suppose you are failing one of your classes. Based on your evaluation, you decide to start paying attention in class and talking to the teacher about ways to improve. This decision is part of the _________ phase of the Business Decision making process (Herbert-Simon model).

choice

Verification/testing of the proposed solution and picking an option occur in the _____ phase of the Business decision making.

choice

1) ___ are those data that visitors and customers produce when they visit a website and click on hyperlinks.

clickstream data

A _________ site provides only rudimentary services and facilities.

cold

61) ________ refers to efforts by two or more entities who work together to accomplish certain tasks.

collaboration

Which of the following is NOT a use for data mining?

comparing products

Using images from a website without exclusive permission of the creator is a violation of _____________

copyright

56) A(n) ________ portal is an intranet.

corporate

57) Which of the following is NOT a reason some US companies are moving their call center operations back to the US?

cost

Which of the following is NOT an advantage of VPN?

cost

Which of the following is the correct order of the KMS cycle?

create, capture, refine, store, manage, disseminate

If you want to know what items customers typically buy together so that you can place them next to each other on the shelf, you would be using _________.

data mining

_______ are/is NOT a statistical tool for prescriptive analytics.

data mining

TCP protocol breaks down data into small chunks called ______

data packets

______________________ is the process of converting raw data into a smaller amount of more useful information.

data reduction

Suppose you are failing one of your classes. You know you need to pay attention in class, study every day, take better notes, read the book before the lectures, or talk to the teacher about ways to improve. You developed this list in the _________ phase of the Business Decision making process (Herbert-Simon model).

design

Laurie heads up a team creating a new process for the shipping department of her company. She worked with external consultants and wrote a process diagram. After getting upper management's opinions the team posted the new diagram to a corporate portal site. They are now demonstrating the new process to all shipping department employees. Laurie's team is at the ________ knowledge stage of the KMS cycle.

disseminate

The __________ of an information resource is the harm, loss, or damage that can result if a threat compromises the resources.

exposure

45) An/The ________ connects networks of multiple organizations so they can communicate securely.

extranet

Databases maximize _________; this means ________.

independence; applications and data are not linked to each other, so all applications are able to access the same data

All the information about you in your university's database is a(n) ________.

instance

Business _______________ has been defined as a broad category of applications, technologies, and processes for gathering, storing, accessing, and analyzing data to help business users make better decisions

intelligence

Examination and answering the question "what is the problem" occur in the ______ phase of the Business decision making.

intelligence

Databases minimize _________; this means ________.

isolation; applications cannot access data associated with other applications

A ___ connects two or more devices in a limited geographical region so that every device on the network can communicate with every other device.

local area network or LAN

________________ is a process by which an organization achieves its goals through the use of resources.

management

Considering the nature of decision, acquiring and using resources efficiently in accomplishing organizational goals is ___________.

management control

A data ________ is a low-cost, scaled-down version of a data ________ that is designed for the end-user needs in an SBU or an individual department.

mart; warehouse

3) ___ is a process that spans all organizational business processes and applications.

master data management

Databases ________ redundancy; this means ________.

minimize; the same data stored in multiple locations

Databases ________ inconsistency; this means ________.

minimize; various copies of the data do not agree

Normalization is a method for analyzing and reducing a relational database to its most streamlined form to ensure ________ redundancy, ________ data integrity, and optimal processing performance.

minimum; maximum

_____ is NOT a statistical tool used for predictive analytics.

multidimensional analysis

39) The ________ layer of TCP/IP places packets on, and receives them from, the network , which can be any networking technology.

network interface

A _________ is an official document that grants the holder exclusive rights on an invention or a process for a specified period of time.

patent

An official document that grants the holder exclusive rights on an invention or a process for a specified period of time is called a ________

patent

Targeted marketing relies on _________ analytical information.

predictive

________ analytics drives the coupons you get at the grocery store when you use your loyalty card.

predictive

Productivity is a _________.

ratio between the inputs and outputs for which a manager is responsible

Management is a process by which an organization achieves its goals through the use of ___________.

resources

You recently inherited an Alvin and The Chipmunks "A Chipmunk Christmas" record. Since you don't have a record player, you need to find a way to convert the record into a CD. This is an example of data ________.

rot

What is the main purpose of Internet protocol ?

routing data through various network interface

Each relational database table contains records (listed in _______) and attributes (listed in ______) .

rows; columns

_________ is a deliberate act that involves defacing an organization's website, potentially damaging the organization's image and causing its customers to lose faith.

sabotage

What type of broadband is good for remote areas ? why ?

satellite broadband, since it does not need any physical cables

_________ is an unintentional threat.

social engineering

An __________ to an information resource is any danger to which a system may be exposed.

threat

The relational database model is based on the concept of ________-dimensional tables.

two

If humans are careless with laptops, this is an_________ error which could cause theft of equipment or information (an_________ error) .

unintentional; intentional

__________ decisions deal with "fuzzy", complex problems.

unstructured

_________ is a remote attack requiring user action.

virus

60) ________ is a disadvantage of telecommuting.

visibility

8) The three distinct characteristics of Big Data are ___.

volume, velocity, and variety

An information resource's __________ is the possibility that the system will be harmed by a threat.

vulnerability

You assume the inflation rate will remain constant over the next few years, so you consider purchasing a home with a variable interest rate. You decide to double-check this assumption with a(n) __________ analysis.

what-if

Auditing _________ the computer means using a combination of client data, auditor software, and client and auditor hardware.

with

Current US laws award patents for_________ years and copyright protection for _________ years.

20; life+70

5) A(n) ___ is a collection of logically related records.

data file

Database systems minimize ________.

inconsistency

Broadband is defined as more than _____ download and more than _____ upload capacity

25 Mbps, 3 Mbps

6) A byte is a group of ___ bits.

8

Industry experts estimate that ________ percent of data in an organization is unstructured.

80-90

_________ is a physical control.

A company gate

_________ is a communications control.

A firewall

What is a Botnet?

A group of computers that have been hijacked for performing simultaneous malicious attacks, such as DDoS attacks or other cybercrimes.

_________ controls restrict unauthorized individuals from using information resources.

Access

21) A Student table has been designed to have the following fields: Student ID, Student Name, Date of Birth, Age, Gender, Grade, Parents, Siblings. What is/are wrong with the Student entity ?

Age is a calculated field - so it does not belong in the table. parents and Siblings refer to multiple values. A specific field cannot have multiple values.

Which of the following companies is NOT developing cars and self-driving technology/services?

Amazon

16) ________ modem services share bandwidth among subscribers in a locality, so speeds can decrease significantly when large numbers of neighbors access the Internet at the same time.

Cable

A(n) _________ is located between two firewalls.

DMZ

__________ analytics answers the question "what has happened".

Descriptive

____________ analytics summarize what has happened in the past and allow decision makers to learn from past behaviors.

Descriptive

13) ________ modems convert information for use on the POTS.

Dial-up

14) ________ modems convert information for use on the POTS and are almost extinct in most parts of the developed world today.

Dial-up

28) ________ is a disadvantage of fiber-optic cable.

Difficult to work with

_________ is a remote attack requiring no user action.

DoS

When a hacker highjacks a system and instead of destroying the data threatens to publish sensitive or personal information to the public, it is called ____________

Doxxing (or Doxing)

_________ is a capability of dashboards that gives the user the ability to go to details at several levels by a series of menus or by clicking on a portion of the screen that can be expanded.

Drill down

_________ is an access control.

Encryption

15) Peer-to-peer processing is illegal.

False

31) Tacit knowledge is easily codified.

False

20) ________ is a cable medium

Fiber-optic

23) ________ is a broadcast medium

Infrared

43) An/The ________ is a network of networks.

Internet

20b) ________ is a broadcast medium

Microwave

48) ________ are exchange points for Internet traffic.

NAPs

18) In case of a many to many relationship between Table1 and Table2, which table holds the primary key ?

Neither. We need a joint table with primary keys from table 1 and table 2 to establish the many-to-many relationship

___ manages the Internet.

No central agency or nobody in particular

Can an antivirus software prevent DoS attack ? Why ?

No. DoS attack overwhelms the network infrastructure with so much data that it cannot function. Antivirus software only works when a system can function properly.

Data marts and data warehouses typically use ________.

OLAP

15) In an airlines database there are three tables called Passenger, Flight and Seats. Flight table has flight number, departure and arrival times, and departure and arrival airports. Seats table holds seat numbers, class of travel (First, Business, Economy) and position attribute (Aisle, Middle, Window). Passengers are allocated seats in specific flights. What type of relationship exists between Flight and Seats table ? 16) In the above database, considering relationship between Flight and Seats tables, which table should have the foreign key ? Why ?

One-to-many from flight to seats

3) Which of the following is the correct order of networks from smallest to largest?

PAN, LAN, MAN, WAN

Fiber Optics cables transmit data using ____________

Pulses of light

22) ________ is a broadcast medium

Radio

34) Which of the following is NOT a basic function of TCP/IP?

Responsible for disassembling, delivery, and reassembling data during transmission

If a hacker takes control of equipment such as power grids or nuclear power plants, this is an example of a(n) _________ attack.

SCADA

You are a jeweler who wants to make sure you have the maximum number of diamonds for sale. You notice that the number of diamonds available drops more when the size is relevant versus when the color is relevant. By comparing these factors, you are conducting a(n) _____ analysis.

Sensitivity

33) ________ is the protocol of the Internet.

TCP/IP

A URL that begins with https uses _________.

TLS

________ is the cumulative store of subjective or experiential learning.

Tactic knowledge

What are the problems of using a Satellite broadband ?

The satellite dish or antenna needs a direct "line-of-site" access with the satellite. Atmospheric disturbance can affect or block transmission

___ is the protocol of the Internet.

Transmission Control Protocol/ Internet Protocol or TCP/IP

19) Organizations can use Big Data to conduct experiments.

True

2) Smart technologies may cause consumers to forfeit their privacy rights in legal proceedings.

True

21) Broadband Internet service is defined as a utility.

True

21) Organizations can use Big Data to create new business models.

True

39) A "Crow's foot" for cardinality represents a many relationship.

True

7) Enterprise networks are composed of embedded LANs and a WAN.

True

9) Cable and DSL modems offer broadband access.

True

You lose the company's USB with your sales spreadsheets on it.This is_________ and is an_________ mistake.

a human error; unintentional

Auditing _________ the computer means verifying processing by checking for known outputs using specific inputs.

around

The ________ provide(s) information on each attribute and why the attribute is needed in the database, who uses it, and how it should be updated.

data dictionary

________ is an approach to managing information across an entire organization.

data governance

The category "student" is a(n) ________.

entity

42) The Internet backbone is a ________ network.

fiber-optic

Jim finds out that someone accessed his bank account pretending to be him and stole thousands of dollars. This is an example of ____________.

identity theft

Biometrics is an example of something the user _________.

is

Intellectual capital is another term for ________.

knowledge

Considering the nature of decisions, executing specific tasks efficiently and effectively is ___________.

operational control

A circle with a "Crow's foot" to the entity represents the ________ cardinality symbol.

optional many

_________ analytics answers the question "what could happen?"

predictive

Database systems minimize ________.

redundancy

Data ________ refers primarily to problems with the media on which the data are stored.

rot

___________ decisions deal with routine and repetitive problems.

structured

You are an employee in Inside Sales. This means you take calls and address customer issues like entering orders, updating orders, and providing order status reports. This is a(n) _____ task and a(n) _______ decision.

structured; operational control

A ________ is an intellectual work that is not based on public information.

trade secret

37) The ________ layer of TCP/IP provides communication and packet services.

transport

62) ________ is the movement of information as it progresses through the sequence of steps that make up an organization's work procedures.

workflow

______ refers to the transmission capacity of a network.

Bandwidth

Why is DDoS attack more dangerous than DoS attack ?

Because DDoS attacks come from many sources, which have been taken over by the hacker.

Which of the following is TRUE?

Big Data systems perform well because they contain huge amounts of data on which to base their predictions.

How does VPN secure communication from sender and recipient ?

By creating a "tunnel" through the internet between sender and recipient, which cannot be breached by an outside party.

LMU is conducting an online student survey about how the Fall semester classes, trying to determine the effectiveness of remote teaching ? This is an example of what type of data analysis?

Descriptive analysis

________ deals with more objective, rational, and technical knowledge.

Explicit knowledge

11) A byte is the smallest unit of data a computer can process.

False

_________ occurs when an unauthorized individual attempts to gain illegal access to organizational information.

espionage

The goal of whaling is to trick a(n) _______ into revealing personal or corporate data.

executive

12) ___ knowledge deals with more objective, rational, and technical knowledge.

explicit

Suppose you work for XYZ Corporation. You know you can contribute 6% of your salary to a 401K and the company will match that 100% after 6 years of service because it is in the employee handbook. This is an example of ________.

explicit knowledge

Assuming someone's identity to open a credit card account is a type of threat known as _____________________

identity theft

The ________ key has some identifying information but does not identify the record with complete accuracy.

secondary

_________ decisions are partially routine and partially complex.

semi-structured

You are a marketing manager responsible for planning the budget for your department. This is a(n) ______ task and a(n) _______ decision.

semi-structured; management control

Considering the nature of decisions, the long-range goals and policies for growth and resource allocation is ___________.

strategic planning

59) ________ is an advantage of telecommuting.

stress-level

As a purchasing manager, you have to purchase widgets every week to replenish your inventory. This is a(n) ________ decision.

structured

You are a nice person, so you hold the door open for the person running in behind you. Since you needed to use your ID badge to open the door, the person running in behind you is __________; this is_________.

tailgating; an unintentional threat to your organization

You want to make sure your entire organization is using a single data warehouse instead of using a data mart for every department. This is an example of ___________.

the development of infrastructure to support enterprise-wide analytics

Data marts are typically associated with ___________.

the development of one or a few related analytics applications

Data silos are often associated with ___________.

the development of one or a few related analytics applications

Management is a process by which an organization achieves its goals (called ______) through the use of resources (called _______).

the output; inputs

Auditing _________ the computer means auditors check inputs, outputs, and processing.

through

If you shift your risk by using other means to compensate for the loss like purchasing insurance, you have implemented a risk _________ strategy.

transference

Your company decides to purchase security insurance from Travelers Insurance in case your systems get hacked and employee information is stolen. This is an example of risk _________.

transference

As a board member, you recommend hiring a new CEO to address the scandals that have been reported in the Wall Street Journal. This is a(n) ________ decision.

unstructured

Knowledge management is a process that helps organizations manipulate important knowledge that comprises part of the organization's memory, usually in a(n) ________ format.

unstructured

You are the CEO of Widgets R Us. You know your widgets need to be more efficient and cost less, so you ask R&D to develop a plan. This is a(n) _____ task and a(n) ______ decision.

unstructured; strategic planning

Determining that a specific server may be vulnerable to attack and not doing anything about it is called __________________

Risk acceptance

30) ________ is the slowest cable medium

Twisted-pair

Dave and Darla are worried about their home's security as there have been a lot of robberies in the neighborhood lately. To ease their concern, they purchase insurance for their home and possessions. This is an example of __________.

risk transference

Your name in your university's database is a(n) ________.

attribute

40) Client/server computing links two or more computers in an arrangement in which powerful ________ provide computing services for ________.

servers; user PCs

What is the main purpose of TCP ?

transfer data from one IP source to another

__________ decide what data should be stored in an organization's data warehouse.

users

You need to be particularly careful of tailgating at airport terminals.

False

Amazon remembers what items you browsed in the past and presents similar or related items when you visit next time. This is an example of _________ type of data analysis.

Predictive analysis

Computer crimes typically average_________ of dollars and cause businesses_________ of dollars in damages.

hundreds of thousands; billions

Answering the question "did this option work as proposed" occurs in the _____ phase of the Business decision making.

implementation

Suppose you are failing one of your classes. Based on the choice you made to start studying harder, you look over your notes every day after class and study at least an hour every night for at least a week before an exam. This action is part of the ______ phase of the Business Decision making process.

implementation

Someone demanding payment for not disclosing sensitive company information to public is called _____________

information extorsion

_________ occur(s) when an attacker either threatens to steal, or actually steals, information from a company and then demands payment for not carrying out a particular act.

information extortion

Suppose you are failing one of your classes. If you don't know what the problem is, you need to enter the _______ phase of the Business Decision making process (Herbert-Simon model).

intelligence

________ analytics examines recent and historical data to detect patterns and predict future outcomes and trends.

predictive

You would use optimization or simulation for ______ analytics.

prescriptive

_______ analytics answers the question "what should we do".

prescriptive

______ analytics require _______ analytics to be done first.

prescriptive; predictive

Why do we need "shielding" in network cables ?

Since ethernet cables are made of metals, teh data transmitting through these can be affected by electro-magnetic fields. Shielding protects data transmission from electro-magnetic fields.

6) WANs typically connect multiple LANs.

True

Middle managers typically handle management control decisions and semi-structured tasks.

True

2) ___ is an approach to managing information across an entire organization.

governance

A circle with a vertical line represents the ________ cardinality symbol.

optional single

The entire basis of a whaling attack is to ___________.

appears as authentic as possible with actual logos, phone numbers, and various other details used in communications that come from fake email addresses.

36) The ________ layer of TCP/IP enables client application programs to access the other layers.

application

64) Most global virtual teams are ________, which means ________.

asynchronous; team members cannot meet at the same time

Each characteristic or quality of a particular entity is called a(n) ________.

attribute

23) The collection of qualities to which NewSQL systems for online transaction processing are measured against are Autonomy, Consistency, Independence, and Durability.

False

24) In a TCP/IP data transmission, data packets are never lost

False

28) Information is knowledge that is contextual, relevant, and useful.

False

3) In the case of Ross Compton, the Butler County judge ruled that using his pacemaker data was stealing personal information and violated the Fifth Amendment.

False

35) Once a KMS is set-up, it is updated automatically by Big Data the organization collects.

False

36) Learning about and adjusting to your organization's culture increases your explicit knowledge.

False

5) Infotainment in cars is a new concept facilitated by social media technologies.

False

7) The process of acquiring, keeping, and managing data is becoming easier.

False

8) Sarbanes-Oxley requires that private companies evaluate and disclose the effectiveness of their internal financial controls.

False

9) Sarbanes-Oxley requires that public companies evaluate and disclose the effectiveness of their internal operational controls.

False

Authentication occurs after authorization.

False

Competitive intelligence and espionage are similar except that competitive intelligence crosses the legal boundary.

False

Dumpster diving is always theft and is always illegal.

False

Employee monitoring systems are illegal and unethical.

False

If you choose to spend as much as you can to protect your information systems, you have adopted a risk transference strategy.

False

It is always safe to open e-mails and click on links from your friends.

False

Lower-level managers typically handle strategic planning decisions.

False

Once a copyright and patent is established, it applies to all countries in the world.

False

Predictive analytics require prescriptive analytics with two additional components: actionable data and a feedback system that tracks the outcome produced by the action taken.

False

Prescriptive analytics require predictive analytics with one additional component: actionable data.

False

The 2017 Equifax data breach was more damaging to lenders than to consumers.

False

The purpose of prescriptive analytics is to tell decision makers what will happen in the future.

False

Whaling attacks are easier to detect than typical phishing attacks because they are so highly personalized and targeted.

False

Whaling attacks have the biggest impact on financial institutions due to the nature of their business; it is not a true concern for other types of organizations.

False

You can't return to previous stages of the Business Decision Making cycle, so it is really important to do a good job the first time.

False

12) Which of the following Internet services is typically NOT available in rural areas?

Fiber-optic

55) The ________ functions as a transport mechanism; the ________ is an application.

Internet; World Wide Web

In order to send encrypted communication to Joe, what do you need ?

Joe's public key

Alien software that captures and sends each keystroke to the hacker is called________________

Key logger

________ is an intellectual asset.

Knowledge

10) Ethernet is a technology associated with ________s.

LAN

32) Ethernet is a common ________ protocol.

LAN

8) A network that is restricted to a single building is a ________.

LAN

Competitive intelligence is legal while espionage is illegal even though both involve collecting information about competitors.

True

Cybercrime is typically nonviolent but lucrative.

True

Data marts support the development of one or a few related analytics applications.

True

If a hacker enters a building with an official-looking ID badge.This is considered social engineering.

True

If you choose limit your risk by implementing firewalls and other security measures, you have adopted a risk limitation strategy.

True

Passwords are a huge information security problem for all organizations.

True

People are not liable for fraudulent use of their credit cards.

True

People tend to violate security procedures because the procedures are inconvenient.

True

People, devices, software, and websites can be blacklisted and whitelisted.

True

Senior executives typically handle strategic planning decisions.

True

Social engineering is an unintentional threat on the part of the employee.

True

Social engineers will often pose as real employees or contractors such as exterminators or fire marshals.

True

You purchased a copy of Microsoft Office and give a copy to a friend so he/she doesn't have to buy it too. This is piracy and is illegal.

True

_________ is a private network that uses a public network to connect users.

VPN

66) ________ allows participants in one location see participants, documents, and presentation at other locations.

Videoconferencing

4) _________s cover large geographical areas.

WAN

5) The Internet is a _________

WAN

6) A network between Mars and the Earth would be a ________.

WAN

2) Which of the following is the correct order of networks from largest to smallest?

WAN, MAN, LAN, PAN

______ analysis attempts to predict the impact of changes in the assumptions (input data) on the proposed solution.

What-if

19) What is Transitive Dependency ?

When an entity (say Entity A) is related to another entity (Entity B), only when a third entity exists, Entity A has a transitive dependency on entity B

Which of the following does NOT contribute to the increasing vulnerability of organizational information resources? a) Additional management support b) Decreasing skills necessary to be a computer hacker c) International organized crime taking over cybercrime d) Smaller, faster, cheaper computers and storage devices e) Today's interconnected, interdependent, wirelessly networked business environment

a

Which of the following does NOT contribute to the increasing vulnerability of organizational information resources? a) Increasing skills necessary to be a computer hacker b) International organized crime taking over cybercrime c) Lack of management support d) Smaller, faster, cheaper computers and storage devices e) Today's interconnected, interdependent, wirelessly networked business environment

a

The entire business analytics process starts with ___________.

a business problem

Judith works from home. In order to access her corporate email and other computer systems she logs into a virtual private network (VPN). The VPN is an example of _____________.

a communication control

Careless Internet surfing is_________ and is an_________ mistake.

a human error; unintentional

Carelessness using unmanaged devices is _________ and is an _________ mistake.

a human error; unintentional

You get a new smartphone and throw your old one away without erasing all your data. This is_________ and is an_________ mistake.

a human error; unintentional

You leave your laptop at your desk while you go to the restroom. This is_________ and is an_________ mistake.

a human error; unintentional

You open an e-mail from your friend that looks a little odd, but you figure your friend would never send you anything bad. This is_________ and is an_________ mistake.

a human error; unintentional

A Data packet contains __________, ____________, ______________, _________ and __________

a small chunk of data, total number of packets in the transmission, sequence of this packet, originating IP address, and destination IP address

63) ________ is a group of people working in different locations.

a virtual team

A _________ is a statutory grant that provides the creators or owners of intellectual property with ownership of the property for a designated period.

copyright

A statutory grant that provides the creators or owners of intellectual property with ownership of the property is called a ________________

copyright

The U.S. government considers the Sony hack _________.

cyberterrorism

_________ refers to malicious acts in which attackers use a target's computer systems to cause physical, real-world harm or severe disruption, often to carry out a political agenda.

cyberterrorism

Sarah received an email that claimed to be from her bank. The email asked her to provide her password. Sarah later found out that the email was not from her bank and that she had given sensitive information to someone who gained access to her accounts. This is an example of a ____________.

phishing attack

You purchased a copy of Microsoft Office and give a copy to a friend so he/she doesn't have to buy it too.This is _________ and is _________.

piracy; illegal

The ________ key is an identifier field that uniquely identifies a record.

primary

Intellectual property is NOT protected under_________ laws.

privacy

58) ________ is an advantage of telecommuting.

productivity

In public-key encryption, the _________ key is used for locking and the _________ key is used for unlocking.

public; private

Blacklisting allows everything to run unless it is on the list.

True

Only large organizations use business analytics applications.

False

31) ________ is a common LAN protocol.

Ethernet

5) The Internet is a WAN.

True

A data ________ is a repository of historical data that are organized by subject to support decision makers in the organization.

warehouse

A _________ site typically does not include the actual application the company needs to get the business back up and running immediately.

warm

A ______ attack is a targeted attempt to steal sensitive information from a company, such as financial data or personal details about employees.

whaling

Making sure that the business keeps running in case of disaster is called ______________

Business continuity planning

29) Knowledge is information in action.

True

What is the difference between a Router and a Modem ?

A modem connects a network to internet. It does not participate in data communication inside a network. Router connects various devices in a network, as well as various networks (e.g. LAN to LAN)

3) PANs are the smallest networks.

True

What is the similarity and difference between a Trojan Horse and a Logic Bomb?

Both enter a company's system hidden in another software and then wait to be activated. Trojan Horse is activated by the hacker using some type of communication. Logic Bomb does not need any communication - it gets activated on a specific date and time.

What the differences between Cat 5, Cat 5e and Cat 6 cables ?

Cat 5 is unshielded cable with a max transmission capacity of 10 Mbps. Cat 5e is unshielded cabled with a max transmission capacity of 1 Gbps. Cat 6 is shielded cable with a max transmission capacity of 1 Gbps.

________ are those data that visitors and customers produce when they visit a website and click on hyperlinks.

Clickstream data

41) ________ leads to the ideas of fat and thin clients where ________ clients have no local storage and only limited processing power.

Client/server computing; thin

25) ________ cables are made of copper.

Coaxial

19) ________ is a cable medium

Coaxial

_________ controls secure the movement of data across networks.

Communications

Which of the following is NOT a characteristic of Big Data?

Complexity

17) ________ modems use the digital portion of a voice telephone to offer broadband access.

DSL

Examples of _______ include sensitivity, what-if, and goal-seeking analyses.

DSS

A _____________ provides easy access to timely information and direct access to management reports.

Dashboard

__________ can perform two basic operations: 1) identifying previously unknown patters and 2) predicting trends and behaviors.

Data mining

During recent presidential debate, news channels analyzed the number of times a specific candidate's name was mentioned in twitter in order to determine popularity of the candidate. This is an example of what type of data analysis ?

Descriptive analysis

Ransomware negatively affected the city of Atlanta in many ways. Which vulnerability was the main cause of the problems? a) Today's interconnected, interdependent, wirelessly networked business environment b) Smaller, faster, cheaper computers and storage devices c) Decreasing skills necessary to be a computer hacker d) International organized crime taking over cybercrime e) Lack of management support

E

______ is the most popular and common business analytics tool.

Excel

46) ________ offer limited accessibility to the ________ of participating companies.

Extranets; intranets

10) Sarbanes-Oxley holds CIOs personally responsible for financial disclosures since they manage the systems that hold financial information.

False

15) Unstructured data can reside in a traditional relational database.

False

17) Big Data is so large and complex that it must be managed using a traditional DBMS.

False

17) The cost of running the Internet is huge for most governments.

False

18) The term "Big Data" refers simply to huge amounts of data.

False

19) The Internet and World Wide Web are synonyms.

False

20) Telecommuting means you have to drive a long distance to work.

False

22) Computer network transmissions speeds are faster than the processing speeds of the computers themselves.

False

22) TCP sends all data packets of a transmission at the same time

False

For this Christmas, you have a certain budget for a gift you want to give your Mom? You know she loves certain types of perfumes, specific brand of cookies, and house decoration items. You are researching online stores to decide what will be the best gift you can give your mom within your budget. What type of Decision Support analysis are you performing ?

Goal seeking analysis

_____ analysis attempts to calculate the value of the inputs necessary to achieve a desired level of output.

Goal-seeking

35) ________ defines how messages are formulated and how their receivers interpret them.

HTTP

Specific phases of Decision making was first conceived by ____________

Herbet Simon

26) ________ is NOT an advantage of twisted-pair wire.

High bandwidth

27) ________ is an advantage of coaxial cable.

High bandwidth

49) ________ is the most commonly used IP addressing scheme.

IPv4

50) ________ consists of 32 bits.

IPv4

51) 135.62.128.91 is an example of an ________ address.

IPv4

53) ________ consists of 128 bits.

IPv6

52) ________ was developed because we have run out of IP addresses in the original IP addressing scheme.

IPv6

30) Explicit knowledge deals with more objective, rational, and technical knowledge.

True

What are the 3 key elements of a DSS ?

Organizational data, mathematical or statistical model, and an user interface to interact with the model

_________ controls prevent unauthorized individuals from gaining access to a company's facilities.

Physical

________ analytics examines recent and historical data to detect patterns and predict future outcomes and trends.

Predictive

Recommending products to customers based on past purchases and search history is what type of data analysis ?

Predictive analysis

_____ analytics go beyond descriptive and predictive models by recommending one or more courses of action and showing the likely outcome of each decision.

Prescriptive

State Farm analyzes trend of accidents a driver is involved in based on distance travelled daily, address of the driver, age, and marital status. Based on these trends State Farm comes up with the Automobile Insurance rates. This is an example of what type of data analysis ?

Prescriptive analysis

In order to read encrypted communication from Joe, what do you need ?

Private key corresponding to the public key Joe used to encrypt the message

A company decides that a specific group of servers may be vulnerable to attack. They decide to purchase insurance to protect from potential loss in case the servers actually get affected. This is called __________________

Risk transference

32) Tacit knowledge is more unstructured than explicit knowledge.

True

33) KMS are useful for creating best practices in an organization.

True

34) Organizations may need to reward employees to get them to add their expertise to a KMS.

True

You are trying to find the best deal for a flight from LAX to Houston. You decide to freeze the travel dates first and change the time of departure to see what is the best price you can get. Then you fix the time of departure and change the date of travel to see how it impacts the available ticket prices. What type of Decision Support analysis are you performing ?

Sensitivity analysis

9) ________ networks are an emerging technology that is becoming increasingly important to help organizations manage their data flows across their enterprise networks.

Software-defined

4) As we incorporate more and more technology into myriad aspects of daily life, so too are we presented with a whole new set of legal questions that must be answered.

True

40) The join operation combines records from two or more tables in a database to obtain information that is located in different tables.

True

8) Burying fiber-optic cables costs approximately $30,000 per mile, so telecommunications and cable companies are resistant to installing fiber in rural areas.

True

Affinity analysis is a data mining application that discovers co-occurrence relationships among activities performed by specific individuals or groups.

True

All organizational information systems support decision making.

True

An intranet is a trusted network.

True

Anti-malware systems are generally reactive.

True

Authorization means someone has privileges to do certain things on a system.

True

65) ________ does not allow participants to communicate face to face.

Teleconferencing

20) Entity A is related to Entity B (A -> B) and Entity B is related to Entity C (B -> C), therefore entity A is related to entity C, or A->C. This is an example of ___________.

Transitive dependency

1) Download speed is much faster than upload speed when defining the term broadband.

True

1) Law enforcement agencies can use devices in the Internet of Things category to arrest and prosecute criminals.

True

10) Ethernet is a common LAN protocol.

True

11) In packet switching, packets travel independently across the network and can be routed through different paths in the network.

True

12) Fat clients have large storage and processing power and therefore can run local programs.

True

13) A foreign key is a primary key in another file.

True

13) In peer-to-peer processing, every computer is a server.

True

14) A secondary key can be a foreign key.

True

14) In peer-to-peer processing, each computer can access all files on all other computers.

True

16) Big Data is a collection of data so large and complex that it is difficult to manage using traditional database management systems.

True

16) No central agency manages the Internet.

True

18) IP addresses must be unique around the globe to have a global Internet.

True

2) The definition of broadband is fluid.

True

20) Organizations can use Big Data to microsegment customers.

True

23) TCP protocol sends data packets of a transmission in arbitrary sequence

True

24) A data mart is a low-cost, scaled down version of a data warehouse.

True

25) Data marts and data warehouses are typically organized by business dimension or subject.

True

26) Data marts and data warehouses maintain historical data.

True

27) Knowledge is distinct from data and information.

True

If you accept the potential risk, continue operating with no controls, and absorb any damages that occur, you have adopted a risk _________ strategy.

acceptance

Your company decides not to implement security procedures because employees refuse to comply anyway.This is an example of risk _________.

acceptance

Microsoft ________ is a popular example of a relational database.

access

_________ causes pop-up advertisements to appear on your screen.

adware

Spam costs US companies_________ of dollars per year.

billions

A ________ represents the smallest unit of data a computer can process.

bit

Which of the following is an accurate representation of the data hierarchy from smallest to largest?

bit, byte, field, record, file, database

1) Bandwidth is stated in ________ per second.

bits

A _________ site is the least expensive option.

cold

Data reduction is the conversion of raw _______ into a smaller amount of more useful _______.

data; information

7) A ___ is a set of programs that provide users with tools to create and manage a database.

database management system or DBMS

You would use OLAP and DSS as statistical procedures for __________ analytics.

descriptive

_________ analytics is the first step in data reduction.

descriptive

Today, computer networks communicate through ___ signals, which are discrete pulses that are either on or off, representing a series of bits.

digital

If you have to speak into your phone to unlock it, this is an example of something the user _________.

does

You are looking at a sales report from last month. You notice one salesperson's numbers are much lower than the rest, so you click on that person's name to get more details on the products they sold last month. You are using the _______ feature of a dashboard.

drill down

_________ is the process of converting an original message into a form that cannot be read by anyone except the intended receiver.

encryption

An unauthorized individual attempting to gain illegal access to organizational information is called _____________

esiponage or trespass

A(n) _________ is a system that prevents a specific type of information from moving between untrusted networks and private networks.

firewall

The ________ key creates links between two tables.

foreign

You want to spend a maximum of $100,000 on your first house. You need to use a(n) _____ analysis to figure out the location and size of those types of homes.

goal-seeking

Your student ID is an example of something the user _________.

has

Business analytics is the process of developing actionable decisions or recommendations for actions based on insights generated from ______________ data.

historical

A _________ site is a fully configured computer facility with all of the company's services, communication links, and physical plant operations.

hot

A _________ site is the most expensive option.

hot

Suppose you have a primary location in New York City where you main corporate servers are located. Just in case something happens in New York City, you have backup servers that are updated every minute in Chicago.This is an example of a _________ site.

hot

38) The ________ layer of TCP/IP is responsible for addressing, routing, and packaging data packets.

internet

44) An/The ________ is a network that allows users to take advantage of familiar applications and work habits within an organization's network.

intranet

11) ___ is a process that helps organizations manipulate important knowledge that comprises part of the organization's memory, usually in an unstructured format.

knowledge management

Typing in your password to access a system is an example of something the user _________.

knows

A data _______ is a central repository that stores all of an organization's data, regardless of their source or format.

lake

If you limit your risk by implementing controls that minimize the impact of the threat, you have implemented a risk _________ strategy.

limitation

A vertical line with a "Crow's foot" to the entity represents the ________ cardinality symbol.

mandatory many

Two vertical lines represent the ________ cardinality symbol.

mandatory single

________ is a process that spans all organizational business processes and applications.

master data management

Data marts can be implemented ________ compared to data warehouses.

more quickly

An employee at ABC Inc.downloaded an email and opened the attachment contained within the message. Shortly afterwards all employees were blocked from accessing files on the company's servers and the criminals told ABC Inc. they would have to pay a large amount of Bitcoin to regain access to their files. ABC Inc. was a victim of ____________.

ransomware

A ________ generally describes an entity.

record

Laurie heads up a team creating a new process for the shipping department of her company. She worked with external consultants and wrote a process diagram. The team is now asking the VP of shipping to review the process diagram and give opinions. Laurie's team is at the ________ knowledge stage of the KMS cycle.

refine

Every year, you have to give each of your employees a performance review and decide whether they have earned a raise. This is a(n) ________ decision.

semistructured

Watching laptop screen over one's shoulder is called ____________

shoulder surfing

A hacker coming into office impersonating as a Fire Marshall is a type of threat known as ______________________

social engineering

_________ is an attack in which the perpetrator uses social skills to trick or manipulate legitimate employees into providing confidential company information such as passwords.

social engineering

_________ is pestware that users your computer as a launch pad for unsolicited e-mail, usually advertising for products and services.

spamware

Keystroke loggers and screen scrapers are examples of _________.

spyware

_________ collects personal information about users without their consent.

spyware

You decide to implement a new customer loyalty program that rewards customers for shopping in your store. To accomplish this, you need to implement a data warehouse to collect data from all your physical and online stores. This is an example of ___________.

support for organizational transformation

13) ___ knowledge is generally imprecise and costly to transfer.

tacit

Suppose you are a salesperson. You take great pride in knowing each customers' favorite places to eat and their favorite meals. This is an example of ________.

tactic knowledge


संबंधित स्टडी सेट्स

Phlebotomy Technician 1 NHA Practice Test

View Set

Chapter 02: Community-Based Nursing Practice (1)

View Set

CH 38 Assessment of Digestive and Gastrointestinal Function

View Set

What are the Traditional Tools of the Federal Reserve?

View Set

Ch 2 Comprehension and Extension

View Set

Quelques fractions à connaître par cœur

View Set

Macro Econ Test 1: Homework Q's (ch. 5-8)

View Set