CIS Ch. 1-4 Exam
_____ controls restrict unauthorized individuals from using information resources and are concerned with user identification.
Access Control
_____ issues revolve around who should have access to information and whether a fee should be paid for the access.
Accessibility
______ refers to determining who is responsible for actions that were taken.
Accountability
_____ means verifying processing by checking for known outputs using specific inputs.
Auditing around the computer
______ is a real-time approach for measuring and managing business processes.
Business activity monitoring
______ systems provide computer-based support for complex, non-routine decisions, primarily for middle managers and knowledge workers.
Business intelligence (BI)
______ is the tight integration of the IT function with the strategy, mission, and goals of the organization
Business-Information technology alignment
The title of the executive who is in charge of IS function is the:
CIO
_____ is/are an advantage over competitors in some measure, such as cost, quality, or speed; it leads to control of a market and to larger-than-average profits.
Competitive advantage
A ______ is an information system that uses information technology to perform some of all of its intended tasks.
Computer-based information system
Data aggregators sell digital dossiers to companies that want to know their customers better. This practice is called ________.
Customer intimacy
Amazon provides a personalized one-to-one relationship by welcoming you by name back to its Web site on your second visit. This is employing which strategy for competitive advantage?
Customer-orientation
______ is the science of designing machines and work settings that minimize injury and illness.
Ergonomics
_____ refers to the principles of right and wrong that individuals use to make choices that guide their behavior.
Ethics
An organization's_____ consists of the IT components plus IT services.
Information Technology infrastructure
A(n) ______ is a person knowledgeable about information systems and information technology.
Informed User
Which strategy for competitive advantage involves introducing new products and putting new features in existing products?
Innovation
______ is delegating operations or jobs within a business to another company that specializes in those operations.
Insourcing
The threat of competitors entering a market is particularly high in industries that perform a(n) _____ role and in industries where the primary product or service is _____.
Intermediation, digital
The list of all your purchases from Amazon (books bought, price paid, dates) would be considered to be:
Knowledge
_____ uses deception to fraudulently acquire sensitive personal information by masquerading as an official e-mail.
Phishing
Under which ethical issue would the following questions be asked: Who owns the information? What are just and fair prices for its exchange? How should access to information channels be allocated?
Property
_____ is the process in which an organization assesses the value of each asset being protected, estimates the probability that each asset might be compromised, and compares the probable costs of each being compromised with the costs of protecting it.
Risk Analysis
In _____, the organization takes concrete actions against risks.
Risk Mitigation
_____ involves building an inappropriate trust relationship with employees for the purpose of gaining sensitive information or unauthorized access privileges.
Social Engineering
Biometrics are an example of:
Something the user is
_____ is designed to use your computer as a launch pad for sending unsolicited e-mail to other computers.
Spamware
Court decisions in many countries have followed two rules fairly closely. Those rules are?
The right of privacy is not absolute AND the public's right to know supersedes the individual's right of privacy.
Information-based industries are most susceptible to which one of Porter's five forces?
Threat of substitute products
_____ are software programs that hide in other computer programs and reveal their designed behavior only when they are activated.
Trojan Horses
When software is used to block connections to inappropriate web sites, it is called:
URL Filtering
According to Friedman's the World is Flat, ______ empowered all Internet users to create content and put it on the Web.
Uploading
The ____________ ethical standard states that an ethical action is the one that provides the most good or does the least harm.
Utilitarian
Dumpster diving is:
always legal because the dumpster is not owned by private citizens.
Which of the following is the correct hierarchy from the lowest level to the highest level? a. Knowledge, information, data b. Information, data, knowledge c. Data, information, knowledge
c. Data, information, knowledge
Which of the following is NOT true regarding transborder data flows? a. Every country around the world has some privacy laws, which makes coordination for transborder data flows difficult b. The absence of consistent or uniform standards for privacy and security obstructs the flow of information among countries c. EU privacy laws are stricter than US privacy laws d. There is always a problem of whose laws apply when data is transmitted across boarders e. All of the above are TRUE regarding transborder data flows
e. All of the above are TRUE regarding transborder data flows
Computer information systems have many capabilities. Which of the following is NOT a major capability of information systems presented in chapter 1? a. Perform high-speed, high-volume numerical computations b. Store huge amounts of information in an easy-to-access, yet small space c. Automate both semiautomatic business processes and manual tasks d. Provide fast, accurate communication and collaboration within and among organizations e. All of the above are major capabilities of information systems presented in Chapter 1
e. All of the above are major capabilities of information systems presented in Chapter 1