CISA_3358- Management Information System

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

____________systems include a wide range of devices that help people with disabilities to perform tasks that they were formerly unable to accomplish or had great difficulty accomplishing

Assistive technology

_________is a discipline that combines elements of law and computer science to identify, collect, examine, and preserve data from computer system, networks, and storage devices in a manner that preserves the integrity of data gathered so that it is admissible as evidence in a court of law.

Computer forensics

_________software helps a customer manage all aspects of customer encounters, including marketing, sales, distribution, accounting, and customer service.

Customer relationship management (CRM)

___________is a diagram used to document the processes of the current system or to provide a model of a proposed new system.

Data-flow diagram

_____________knowledge is knowledge that is documented, stored, and codified.

Explicit

Few companies have found it necessary to limit employee access to non-work-related Web sites. True or False

False

Founded in 1977, the Association for Computing Machinery (ACM) is the oldest computing society and boasts more than 200,000 members in more than 120 countries. True or False?

False

Tacit knowledge is extremely useful and can be easily shared with others. True or False?

False

The United States has implemented few laws addressing personal privacy. True or False?

False

The number, variety, and severity of computer security incidents is slowly on the decline. True or False

False

Unfortunately, there are few choices for software packages that provide integrated transaction processing system solutions for small and medium-sized enterprises. True or False?

False

__________involves the use of information systems to develop competitive strategies for people, organizations, or even countries.

Game theory

__________algorithms solve problems using the concept of survival of the fittest as a problem- solving strategy

Genetic

The ________ imposes limitations on the bulk collection of the telecommunications metadata of U.S. citizens; prohibits large-scale indiscriminate data collection (such as all records from an entire zip code); and requires the NSA to obtain permission from the Foreign Intelligence Surveillance Court (FISC) to access the metadata records, which are now held by telecommunication companies rather than by the government.

USA Freedom Act (2015)

_______is an exploit in which victims receive a voice mail message telling them to call a phone number or access a Web site.

Vishing

_________software can provide a better match to the current work processes of the organization and may provide a potential competitive advantage; however, software development can be extremely costly, and it can take months or even years to complete. a. Custom b. Enterprise c. Off-the-shelf d. Personal productivity

a. Custom

Most data scientists have computer programming skills and are familiar with languages and tools used to process big data, such as: a.Hadoop, Hive, R b.Python, R, and Assembly c. Visual Basic, Java, and Cobol d.PL/1, Hadoop, PHP

a.Hadoop, Hive, R

_________is a computer system that can recognize and act on patterns or trends that it detects in large sets of data. a.Neural network b.Voice recognition system c.Learning system d.Vision system

a.Neural network

Goal-based strategic planning is divided into four phases: ,________ set direction, define strategies, and deploy plan

analyze situation

The Children's Online Privacy Protection Act (COPPA) was passed by Congress in October 1998. This act, directed at Web sites catering to children, requires site owners to post comprehensive privacy policies and to obtain parental consent before they collect any personal information from children under years of age. a. 10 b. 13 c. 18 d. 21

b. 13

______involves the deployment of malware that secretly steals data in the computer systems of organizations. a. Cyberterrorism b. Cyberespionage c. Data breach d. Smishing

b. Cyberespionage

involves providing feedback regarding a potential data problem and enables users to change the data. a. Data collection b. Data correction c. Data editing d. Data processing

b. Data correction

__________ is a BI analytics tool used to explore large amounts of data for hidden patterns to predict future trends and behaviors for use in decision making. a. Linear regression b. Data mining c. OLAP d. Data visualization

b. Data mining

____________ is a BI analytics tool that involves the interactive examination of high-level summary data in increasing detail to gain insight. a. OLAP b. Drill-down analysis c. Linear regression d. Dashboard

b. Drill-down analysis

Which of the following is not an objective of an organization's batch transaction processing system? a. Capture, process, and update databases of business data required to support routine business activities b. Ensure that data is processed immediately upon occurrence of a business transaction c. Avoid processing fraudulent transactions d. Produce timely user responses and reports

b. Ensure that data is processed immediately upon occurrence of a business transaction

Which of the following is not a common computer-related mistake? a. Programming errors b. Shopping online while at work c. Data-entry or data-capture errors d. Errors in handling files

b. Shopping online while at work

The overall emphasis of the ________ phase is on gathering data on the existing system, determining the requirements of the new system, considering alternatives within identified constraints, and investigating the feasibility of alternative solutions. a. investigation b. analysis c. design d. constructio

b. analysis

The use of enables humans and computers to find a good solution, although not optimal, to a complex problem. a. perceptive systems b. heuristics c. visual systems d. roboti

b. heuristics

The concept of ______recognizes that managers must use their judgment to ensure that the cost of control does not exceed the system's benefits or the risks involved. a. risk assessment b. reasonable assurance c. security policy d. security versus privacy

b. reasonable assurance

A ______is a set of programs that enables a user to gain administrative access to the computer without the end user's consent or knowledge. a. zombie b. rootkit c. botnet d. blended threat

b. rootkit

The_________ phase converts the system design into an operational system by coding and testing software programs, creating and loading data into databases, and performing initial program testing. a. system analysis b. system construction c. system implementation d. system testing and integration

b. system construction

A clear example of a tangible benefit is ______. a. the increase in employee morale from implementing a self-service employee benefits soft- ware package b. the reduction in headcount in the accounting organization resulting from improvements in the payroll processing system. c. the increase in customer satisfaction from modifications to the organization's Web site d. the value of improved decision making resulting from self-service analytics tools

b. the reduction in headcount in the accounting organization resulting from improvements in the payroll processing system.

The purpose of the system investigation phase is to_________. a.define what the information system must do to solve the problem or capitalize on the opportunity b.gain a clear understanding of the specifics of the problem to solve or the opportunity to address c.gather data on the existing system and determine the requirements for the new system d.identify, confirm, and prioritize system requirements

b.gain a clear understanding of the specifics of the problem to solve or the opportunity to address

The individual application modules included in an ERP system are designed to support ________, the most efficient and effective

best practices

is a business policy that permits, and in some cases encourages, employees, to use their own mobile devices to access company computing resources and applications.

bring your own device (BYOD)

IS strategic planning is influenced by the corporate and________ strategic plans as well as technology innovations and innovative thinking.

business unit

_________of all IS projects are challenged or failed. a. Less than 25 percent b. Nearly half c. About 71 percent d. Over 80 percent

c. About 71 percent

_______is software used to analyze the robustness and performance of components and assemblies. a. PLM b. CAD c. CAE d. CA

c. CAE

_________acquired the virtual reality company Oculus VR. a. Apple b. Microsoft c. Facebook d. Google

c. Facebook

Which of the following is not a benefit associated with knowledge management? a. It helps leverage the expertise of people across the organization. b. It helps capture the expertise of key individuals before they retire. c. It helps contain the specialized knowledge of experts to a few people on a need-to-know basis. d. It fosters innovation by encouraging the free flow of ideas.

c. It helps contain the specialized knowledge of experts to a few people on a need-to-know basis.

_________software is less risky and leads to quicker deployment; however, maintenance and support costs may become expensive. a. Custom b. Enterprise c. Off-the-shelf d. Personal productivity

c. Off-the-shelf

The primary tool for assessing the software marketplace to determine whether existing packages can meet the organization's needs is the ______. a. system investigation report b. request for quotation c. RFI d. system design report

c. RFI

Which of the following is an example of a SMART goal. a. Achieve 100 percent customer satisfaction within the next year. b. Improve customer service by 50 percent. c. Reduce customer complaints about mispriced merchandise from 12 per day to less than 3 per day by June 30. d. The customer is always right.

c. Reduce customer complaints about mispriced merchandise from 12 per day to less than 3 per day by June 30.

A is a form of malware that fools its victims into thinking that it is useful software from a legitimate source. a. virus b. worm c. Trojan horse d. ransomware

c. Trojan horse

An individual who combines strong business acumen, a deep understanding of analytics, and healthy appreciation of their data, tools, and techniques to deliver real improvements in decision making is called a _____________. a. data steward b. database administrator c. data scientist d. database manager

c. data scientist

The component of an expert system seeks information and relationships to provide answers, predictions, and suggestions similar to the way a human expert would. a. knowledge base b. explanation facility c. inference engine d. user interface

c. inference engine

A preliminary evaluation of software packages and vendors begins during the________phase when the two or three strongest contenders are identified. a. system investigation b. system design c. system analysis d. feasibility analysis

c. system analysis

___________is a type of artificial system that enables a computer to change how it functions or reacts to situations based on feedback it receives. a.Neural network b.Voice recognition system c.Learning system d.Vision system

c.Learning system

In the scrum framework, the_____is a person who represents the project stakeholders and is responsible for communicating and aligning project priorities between stakeholders and the development team. a.project manager b.scrum master c.product owner d. project sponsor

c.product owner

Many organizations use a waterfall approach with six phases, including investigation, analysis, design,_________ , integration and testing, and implementation.

construction

A(n) ________________________ is a graphical representation that summarizes the steps a consumer takes in making the decision to buy your product and become a customer.

conversion funnel

Wasting time online costs U.S. businesses more than_______annually. a. $385 billion b. $285 billion c. $185 million d. $85 billion

d. $85 billion

Many multinational companies roll out standard IS applications for all to use. However, standard applications often don't account for all the differences among business partners and employees operating in other parts of the world. Which of the following is a frequent modification that is needed for standard software? a. Software might need to be designed with local language interfaces to ensure the successful implementation of a new IS. b. Customization might be needed to handle date fields correctly. c. Users might also have to implement manual processes and overrides to enable systems to function correctly. d. All of the above

d. All of the above

Which of the following is not one of the basic components of a TPS? a. Databases b. Networks c. Procedures d. Analytical models

d. Analytical models

Which of the following statements is not true? a. The data used in BI is often pulled from multiple sources—both internal and external to the organization. b. Users may access the data and BI applications via the Web or through organizational intranets and extranets—often using mobile devices, such as smartphones and tablets. c. The data used in BI applications can come from data warehouses, data marts, and data lakes. d. BI is strictly the realm of data scientists; end users and business managers should be discouraged from using these tools and techniques.

d. BI is strictly the realm of data scientists; end users and business managers should be discouraged from using these tools and techniques.

________includes communicating the organization's mission, vision, values, objectives, goals, and strategies so that everyone can help define the actions required to meet organizational goals. a. Analyze situation b. Define strategies c. Set direction d. Deploy plan

d. Deploy plan

________is the practice of blending the tasks performed by the development and IT operations groups to enable faster and more reliable software releases. a. Scrum b. Extreme programming c. JAD d. DevOps

d. DevOps

__________are some of the file formats that can be used to store graphic images. a. MP3, WAV, and MIDI b. AVI, MPEG, and MOV c. DOC and DOCX d. EPS, GIF, JPEG, PNG, TIFF, and Raw

d. EPS, GIF, JPEG, PNG, TIFF, and Raw

Which of the following is not an essential component for a highly effective BI program? a. Creative data scientists b. Strong data management program c. Strong management commitment to data-driven decision making d. The most current and powerful BI and analytics tools and software

d. The most current and powerful BI and analytics tools and software

The initial step in selling and implementing a knowledge management project is . a. get employee buy in b. identify valuable tacit knowledge c. start with a small pilot project and enthusiastic participants d. connect knowledge management to goals and objectives

d. connect knowledge management to goals and objectives

A _____ is someone who attacks a computer system or network for financial gain. a. hacker b. cracker c. malicious insider d. cybercriminal

d. cybercriminal

A(n)_____ is an attack on an information system that takes advantage of a particular system vulnerability. a. virus b. worm c. Trojan horse d. exploit

d. exploit

A(n)_____stands guard between an organization's internal network and the Internet and it limits network access based on the organization's access policy. a. router b. wormhole c. intrusion detection system d. firewall

d. firewall

According to the Project Management Institute (PMI), project managers must coordinate areas of expertise. a. three b. five c. seven d. nine

d. nine

____________software is used widely to create outstanding graphics for feature films and has been used on every Visual Effects Academy Award for over 15 years. a.Apple's Final Cut Pro b.Adobe Audition c.Prezi d.Pixar's RenderMan

d.Pixar's RenderMan

Facebook's AI vision system called DeepFace can correctly tell if two photos show the same person with_______ accuracy. a.less than 50 percent b.between 50 percent and 75 percent c. between 75 percent and 95 percent d.over 95 percent

d.over 95 percent

Capturing and gathering all the data necessary to complete the processing of transactions is called _________.

data collection

Business data goes through a cycle that includes data collection, data______ , data correction, data processing, data storage, and documentation production.

editing

The study of designing and positioning computer equipment is called_________.

ergonomics

Morals are one's personal beliefs about right and wrong, whereas the term______ describes standards or codes of behavior expected of an individual by a group (nation, organization, and profession) to which an individual belongs.

ethics

The ________ model describes how teams form, evolve, and dissolve.

forming-storming-norming-performing-adjourning

A(n) _______________________ is a measure that tracks progress in executing chosen strategies to attain organizational objectives and goals.

key performance indicator (KPI)

A(n)______ instruction detection system contains information about specific attacks and system vulnerabilities and watches for attempts to exploit these vulnerabilities

knowledge-based

The essential characteristic of a(n) ___________transaction processing system is that it processes transactions as they occur.

online

A _______ is a temporary endeavor under taken to create a unique product, service, or result.

project

Five highly interrelated parameters define a project—scope, cost, time,________ , and user expectations.

quality

Preventing waste and mistakes involves establishing, implementing, monitoring, and policies and _______ procedures

reviewing

When video files are played while they are being downloaded from the Internet, it is called______ video.

streaming

Two primary causes of computer-related health problems are a poorly_________ designed and failure to take regular breaks to stretch the muscles and rest the eyes.

work environment

Small organizations were slow to adopt ERP systems because of the relative complexity and cost of implementing these systems. True or False?

True

_________is a tool used by the NSA and FBI to access the servers of major Internet services such as Facebook, Google, YouTube, and others to collect the content of emails, video, photos, file transfers, and live chats.

PRISM

_______is the process of assessing security-related risks to an organization's computers and networks from both internal and external threats.

Risk assessment

__________is an agile development framework that uses a team-based approach in order to keep the development effort focused and moving quickly.

Scrum

The Government Accounting Office uncovered a total of $321 million spent in the six-year period 2008 to 2013 on projects that duplicated other efforts within the Defense Department, Department of Homeland Security, and the Department of Health and Human Services. True or False?

True

The specific business needs and goals of the organization define the method of transaction processing best suited for the various application of the company. True or False?

True

The waterfall approach allows for a high degree of management control, but it does not allow for user interaction with the system until the integration and testing phase when the system is nearly complete. True or False?

True

U.S. organizations increasingly rely on commercial software with known vulnerabilities. True or False?

True

Analysis of the internal assessment and external environment are frequently summarized into a _______ matrix.

Strengths, Weaknesses, Opportunities, Threats (SWOT)

Transaction processing systems (TPSs) capture and process the fundamental data about events that affect the organization called___________that are used to update the official records of the organization.

Transactions

An IS organization can be viewed as either a cost center/service provider, a business partner/business peer, or as a game changer. True or False

True

Heavy computer use can negatively affect one's physical health. True or False?

True

In 2015, the European Court of Justice found that the Safe Harbor Framework (an agreement that had been in place since 2000 between the United States and the European Union (EU), allowing the transfer of personal data from the EU to the United States) did not adequately protect the personal data of citizens residing in EU countries. True or False?

True

Just because an activity is defined as legal does not mean that it is ethical. True or False?

True

Robots are increasingly being used in surgical procedures including open-heart surgery. True or False?

True

Self-service analytics encourages nontechnical end users to make decisions based on facts and analyses rather than intuition. True or False?

True


संबंधित स्टडी सेट्स

Negotiations - The Who, Stakes, and Situation + Strategy Chart

View Set

Tema: Hur känner du dig idag? - How are you feeling today?

View Set

Exploring Religious Meaning Midterm

View Set

Project Management: Ch 5 quiz Qs

View Set