CIS 2700 exam practice questions
IPv6 uses __________ bit address and it can generate _______________ unique addresses.
128; 340 x 10^36
On-demand workers typically receive their income from ______ different sources
3
Based on the statements in Topic 11, "It's hard to say exactly what percentage of jobs will eventually be automated, but some estimates suggest it could be close to _______%.
40
Which of the following is NOT true for the Uber business model?
A customer may choose to pay in cash or by a credit card
________________________ is the practice of running software from a remote server rather than on the user's computer.
Application virtualization
Which of the following is NOT a correct concept or description about Business Process Managment (BPM)?
BPM is used to support continuous initiatives for both BPI and BPR
Computers can be connected on a network via:
cabling and wireless radio waves
Which of the following is NOT a typical industry or task where robotics are used?
childcare
The internet of things (IoT) is the interconnection of any device that has a(n) _________.
connectivity
The term Homo Conexus refers to people who practice _________.
continuous computing
In the digital (online) space, there is a strong relationship between the quality of a firm's ___________, which in turn increases revenue.
customer experiences and loyalty
_________________________ is the business strategy that leverages IT to dramatically improve employee, customer, and business partner relationships; to support continuous improvement in business operations and business processes; and to develop new business models and businesses.
digital transformation
For knowledge workers, entrepreneur, managers and business leaders staying current in ______________ is essential to their careers.
emerging technologies
Almost all ICT network activities are powered by the burning of ____________________.
Fossil fuels
When a cyberattack is conducted by employees within the organization it is referred to as ______________.
Fraud
Which of the following is the business model that considers "Customer is the 'product'. Customer data is the most valuable part of the business along with his/her attention for advertising purposes"?
Free
Which type of malware uses your computer to send emails that look like they came from you to all the people in your email address book?
spamware
A(n) ________ is an inter-organizational information system.
supply chain system
An information system's _________ is the possibility (potential) that the system or network resource may be exploited by a cyber ________ to gain __________ access.
vulnerability; threat; unauthorized
Which of the following is NOT one of the important characteristics of choosing IoT for mobile communication solutions?
adaptable
_____________ is an example of efficiency.
automating order entry
_______ configuration has a main channel to which nodes or secondary channels are connected in a branchlike structure.
Bus network
The sector that reported the highest number of data breaches in 2019 was ________________.
Business
Which of the following is NOT a component addressed by the NABC model?
Business strategy
Which of the following is NOT a correct description of the Cloud Computing?
Cloud computing is a computing firm that offers services to customers without releasing information of hardware and software used in the Cloud Service Agreement (CSA).
The three objectives of data and information systems security are:
Confidentiality, integrity, availability
Which of the following is NOT one of the purposes of developing an IT Architecture?
Creates a plan to align IT with the corporate long-term objectives.
_____________ is the result of optimizing and aligning business processes to fulfill customers' needs, wants, and desires.
Customer satisfaction
Critical infrastructure, intellectual property theft, identify theft, BYOD and social networks are all examples of_____________.
Cyberattack targets
_________ is the result of optimizing the manufacturing and logistics processes
Cycle and fulfillment time reduction
An Enterprise Architecture (EA) is to add value to an organization by tackling _____________________________________.
D. Both A and C.
Which of the following is NOT one of the essential skills of an effective enterprise architect?
Data analytics
Which of the following is NOT considered essential computing resources required to support the SMAC Model for Innovation and Disruption?
Database Server
_____________-thinking managers and entrepreneurs are conducting ____________ transformation of their existing business models
Forward; digital
A(n) ________ tightly integrates the FAISs via a common database and enhances communications among the functional areas of an organization.
ERP
Which one of the following is NOT a characteristic of a Legacy System?
Effective in handling business processes
"Doing the right thing" is used as a metric for __________, and "Doing the thing right" is used as a metric for __________.
Effectiveness, Efficiency
A(n) ____________________is a large-scale application software package that supports business processes, information flows, reporting, and data analytics in complex organizations.
Enterprise system
Programmers have developed AI applications that can diagnose human illnesses, make financial forecasts, and schedule routes for delivery vehicles. These kinds of problems would usually require humans with a lot of education and experience. Which of the following terms best describes the type of AI program used in this example?
Expert Systems
A network configuration that allows an organization to make limited access available to its partners, suppliers, and customers is called a(n) _______________.
Extranet
Which of the following AI applications is the subject of much controversy when used by the police or other law enforcement agencies?
Facial recognition programs that can track and monitor the location and movement of individuals under surveillance by law enforcement officers.
As pointed out in the textbook, carbon emissions will lead the increase in GMT. What does GMT stand for?
Global Mean Temperature
The ___________ the value of the assets to the company and to cybercriminals, the ________ the risk is to the company and the ________ the level of security needs to be.
Higher, greater, higher
_______ integrates AI with cognitive computing to streamline the medical processes.
IBM Watson
Three mobile network technologies that have created new ways of working do NOT include:
IP
Which of the following guide the process of planning, acquiring, building, modifying, and interfacing with deployed IT resources in a single department within an organization?
IT architectures
Which of the following is NOT true about IT's impacts on future jobs and the quality of life?
IT will provide rules to automate human judgement in decision-making.
The base resources for the SDDC are computation, storage, networking, and security, which can be accomplished by using ____________ from a cloud computing service provider.
IaaS
Which of the following is NOT considered one of major support for Business Processes?
Identify external processes for partnership
Which of the following is NOT a goal of business process re-engineering?
Increase cycle time.
The threats to information security are ________, and the greatest threat is ____________.
Increasing; human
The following are CRM mistakes EXCEPT:
Involving key business stakeholders from the outset
In the Opening Case of Topic 5, the City of Cedar Park installed a Smart Water Network (FlexNet) to improve customer services. Which one of the following is NOT an exact description of benefits provided by this new smart water communication network?
It is a two-way system that allows customers to call in and find out their real-time water consumption.
Which of the following is NOT considered an advantage of using IoT for data collection in wireless communication?
It is small and can be easily embedded in products for data collection without security concerns.
Which of the following characteristics is NOT a factor when determining if a job is a strong candidate for being performed by robotic or other types of machines?
Jobs that are service driven
_____________ allow(s) employee computers and servers to be connected into one network.
LAN
From a technology perspective, CRM refers to the methodologies and software tools to ____________ customer data:
Leverage
In general, the _____ is responsible for corporate-level and shared IT resources; the ______ are responsible for departmental IT resources.
MIS department; end users
A supply chain involves the following three flows:
Materials, data, and payments
The principle of _____________________________ applies to ERP vendor selection.
Measure twice, cut once
The S-M-A-C model has been used for business "Innovation and Disruption." Which of the components will provide ubiquitous services?
Mobile Device
Which of the following is NOT considered as one of the wireless transmission media?
Modem
The short-range wireless network that is best-suited for touchless credit card transaction is ______________.
Near-field communication
Bandwidth is measured in ________ per second.
bits
Which of the following model matches the description that "customers pay for a service that they don't have time to do themselves but is fulfilled by people with time, but short on money?"
On-demand
The inconsistency between competing demand to use IT and have an online presence which guarding against potential threats to personal safety and privacy is called the privacy _____________.
Paradox
Many companies now use AI programs that contribute to organizational efficiency and effectiveness. One type of AI program uses data from CRM or customer transaction history to identify customers that are most likely to make a purchase in response to a sales promotion campaign. This application of AI programming is referred to as ______________.
Predictive analytics
Which of the following is NOT one of the six elements of quality of life that can be impacted by ICT?
Privacy
Based on the eTicketing Process, an example, given in Topic 3 of your e-Textbook, it has four major steps. Which of the following steps is the simplest process as compared to the other three?
Receive a ticket
Based on the textbook, which one of the following is NOT one of the FOUR factors to preserve the environment?
Reproduce
Which of the following is NOT a basic function of TCP in Internet communication?
Responsible for disassembling and reassembling data packets
Autonomous vehicles are powered by AI that learns how to safely drive passengers from one place to another. Which of the following terms best describes this type of autonomous vehicle?
Robotics and AI
Natural language processing (NLP) programs can read and understand a social media post and assign a score indicating how favorable or unfavorable the users have felt about the company when they wrote the post. This application of AI programming is referred to as _________________.
Sentiment analysis
The central feature of all ERP systems is referred to as a _________________.
Shared data repository
The three facets of sustainability are__________________________.
Society, economy, environment
_________ collects personal information about users without their consent.
Spyware
________ is a traditional function of the MIS department.
Staffing, training, and developing IS skills
The consulting firm Gartner developed a five-stage maturity model that organizations can use to determine their readiness for implementation of AI technology. Which of the following is not one of the five AI maturity stages identified by Gartner?
Strategic
To achieve sustainability companies and government must engage in ___________________ development activities.
Sustainable
As detailed in Topic 4, what is the acronym TSaaS?
Technology Solutions as a service
Managing information systems in modern organizations is a difficult and complex task. Which of the following factors does NOT contribute to this?
Technology becomes cheaper to acquire, operate, and maintain.
Which of the following is NOT considered critical to the results of "becoming an informed user?"
The more you know about what computing resources, the more you know how to use IT to entertain your daily life.
Advanced persistent threats (APT) are carried out as _____________.
Under the Radar attacks
Which of the following is not an application of facial recognition technology that people consider to be "good" applications that have a positive impact on people and society?
When used by employers to identify job applicants that may be prone to mental health conditions like depression or mood disorders.
A computer security specialist who breaks into protected systems and networks to test and assess their security is a ________________ hacktivist.
White Hat
On‐demand workers are typically ______________________.
Younger, optimistic, urban‐based
In developing countries, the two main sustainability issues are:
access to clean water, lack of food security
When you decide to start automating order entry by creating a website instead of forcing people to call into Inside Sales to place orders, you are in the _________ phase of BPI.
improve
In recent years, companies such as Walmart and Amazon.com have offered streaming videos for rent on their Web sites. This is an example of how new technology has ___________________________________.
increased the barriers to new entrants
The IS function has become ________ strategic within organizations, so a growing number of CIOs are coming from _________.
increasingly; other business units
There are three flows in a typical supply chain, the ___________ flow consists of data related to market demands, customer orders, goods return, as well as product details in any of these data.
information
Much of the complexity in implementing an enterprise system is due to getting new apps or system modules to _________ with legacy systems.
interface
BPI is typically performed by ___________.
knowledge workers
Business models designed to serve today's on-demand economy are based on time, convenience, and ____________ service.
location-based
If there are _________ alternatives to an organization's products or services, then the threat of substitutes is high; if there are _________ alternatives, then the threat is low.
many; few
The goal of building a Cloud Service Agreement is to the terms that are most ________________ to the business needs.
meaningful
A set of complex processes involved in providing customers what they ordered on-time and all customer services related to on-time delivery of a product is referred to as _____________________.
order fulfillment
A computer-based information system (CBIS) can be viewed from different perspectives. If you consider a CBIS that has six major components - hardware, software, database, networks, procedures, and people, which represent the ______________ view.
physical
Which one of the following is NOT one of the characteristics/benefits of virtualization?
process-simplification (no redundant processes)
A threat that a perpetrator uses social skills to trick or manipulate a legitimate user's trust into providing confidential company information is known as _______________.
social engineering
