Cism Ch.4,6,7,14 Pi.4,6

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

An information system's _____ is the possibility that the system will be harmed by a threat. Question options: a) vulnerability b) risk c) control d) danger e) compromise

a) vulnerability

The individual's right of privacy supersedes the public's right to know. Question options: a) True b) False

b) False

The network interface card typically houses the LAN's network operating system. Question options: a) True b) False

b) False

The pricing model for infrastructure-as-a-service model offered by cloud computing providers is usually a per user fee. Question options: a) True b) False

b) False

The primary advantage of cloud computing is that it is easier for users to do their work. Question options: a) True b) False

b) False

The quality of automatic translation of Web pages is usually just as good as human translation. Question options: a) True b) False

b) False

The right of privacy is absolute. Question options: a) True b) False

b) False

The security of each computer on the Internet is independent of the security of all other computers on the Internet. Question options: a) True b) False

b) False

The service model infrastructure is the same across all three major types of cloud computing. Question options: a) True b) False

b) False

The traditional approach to project management divides every project into four distinct phases. Question options: a) True b) False

b) False

Adding functions after a project has been initiated is called scope creep. Question options: a) True b) False

a) True

Cladding is the coating that surrounds fiber-optic cables and prevents light from leaking out of the fiber. Question options: a) True b) False

a) True

Executive issues, such as an unrealistic schedule and reactive planning, can cause the failure of an IS project. Question options: a) True b) False

a) True

Extranets offer limited accessibility to the intranets of participating companies. Question options: a) True b) False

a) True

Grid computing combines processing resources to form a virtual supercomputer. Question options: a) True b) False

a) True

Human errors cause more than half of the security-related problems in many organizations. Question options: a) True b) False

a) True

IS project management is a directed effort to plan, organize, and manage resources to bring about the successful achievement of specific IS goals. Question options: a) True b) False

a) True

In a service-oriented architecture (SOA) is web services can be reused across an organization in other applications. Question options: a) True b) False

a) True

In most cases, cookies track your path through Web sites and are therefore invasions of your privacy. Question options: a) True b) False

a) True

Joint application design is used to collect user requirements. Question options: a) True b) False

a) True

Metasearch engines search several engines at once and integrate the findings of the various search engines. Question options: a) True b) False

a) True

Network interface cards are special adapters that link an individual device to the communications medium on a local area network. Question options: a) True b) False

a) True

One advantage of cloud computing is that it shifts IT from a capital expenses to an operating expense. Question options: a) True b) False

a) True

Organizations use authentication to establish privileges to systems operations. Question options: a) True b) False

a) True

Organizations utilize layers of controls because they face so many diverse threats to information security. Question options: a) True b) False

a) True

Project scope creep refers to the uncontrolled changes in a project's scope. Question options: a) True b) False

a) True

Public-key encryption uses two different keys, one public and one private. Question options: a) True b) False

a) True

Under the triple constraints of project management, scope can be decreased by using additional time and incurring increased costs. Question options: a) True b) False

b) False

Uniform resource locators (URLs) are software applications through which users access the Web. Question options: a) True b) False

b) False

Web macros allow IT professionals to combine features so that applications on almost any device can work together. Question options: a) True b) False

b) False

Wide-area networks have a large capacity, and they typically use a single communications channel. Question options: a) True b) False

b) False

You start a dog-walking service, and you store your client's records on your cell phone. You don't need to worry about information security. Question options: a) True b) False

b) False

Refer to IT's About Business 14.3 - Build Your Apps Yourself: The rapid adoption of smartphones and tables has driven an explosion in mobile applications. Question options: a) True b) False

a) True

Organizations use hot sites, warm sites, and cold sites to insure business continuity. Which of the following statements is false? Question options: a) A cold site has no equipment. b) A warm site has no user workstations. c) A hot site needs to be located close to the organization's offices. d) A hot site duplicates all of the organization's resources. e) A warm site does not include actual applications.

c) A hot site needs to be located close to the organization's offices.

Gal runs a music store. He has been going online to a new portal for music lovers. This portal is an example of which type of portal? Question options: a) Industrywide b) Personal c) Affinity d) Corporate e) Commercial

c) Affinity

_____ portals support communities such as hobby groups or political parties. Question options: a) Industry wide b) Personal c) Affinity d) Corporate e) Commercial

c) Affinity

Hyo runs an ice cream store with her family. Which of the following technologies might be a good source of computing for the store? Question options: a) Server farm b) Grid computing c) Cloud computing d) Utility computing e) Virtualization

c) Cloud computing

Refer to IT's About Business 6.2 - Those Mannequins Are Watching You: EyeSee is designed to ___________ Question options: a) Provide a better platform for marketing and displaying cloths and other products. b) Provide product information to store customers. c) Collect customer demographic information such as customer age and sex. d) Act as a customer kiosk.

c) Collect customer demographic information such as customer age and sex.

Which of the following statements is false? Question options: a) Companies that use Software-as-a-Service are running applications on the vendor's hardware. b) Application service providers are similar to Software-as-a-Service providers. c) Companies that purchase open-source software cannot modify it. d) Outsourcing refers to acquiring IT applications from outside contractors. e) Insourcing refers to building IT applications in-house.

c) Companies that purchase open-source software cannot modify it.

Data aggregators sell digital dossiers to companies that want to know their customers better, which is a process called ________. Question options: a) Customer relationships b) Customer profiling c) Customer intimacy d) Customer knowledge e) Spying

c) Customer intimacy

Shelli runs a small boutique in Tel Aviv. Shelli wants to purchase digital dossiers on her customers from a data aggregator. Using such dossiers is an example of _____________. Question options: a) Customer relationships b) Customer profiling c) Customer intimacy d) Customer knowledge e) Spying

c) Customer intimacy

Agile development __________________. Question options: a) Takes a long time b) Requires little user input c) Delivers functionality in rapid interactions d) Focuses on all required functionality at each step of the way e) Uses the scrum approach to design the system

c) Delivers functionality in rapid interactions

Jennifer is the owner of a start-up boutique that specializes in hard-to-find dress sizes for women. She has been keeping her financial books by using Excel and by hand. She researched available accounting packages for a business like hers and has decided on Boutique Accounting. What is the best way for Jennifer to implement Boutique Accounting? Question options: a) Pilot b) Piecemeal c) Direct d) Parallel

c) Direct

You just started to work in a branch of your local bank. Which of the following statements is false? Question options: a) Two employees talking about a customer's account is an ethical issue. b) Employees talking to friends about people's bank accounts is an ethical issue. c) Educating employees will solve the problems at the bank. d) Privacy is the responsibility of all employees of the bank. e) Strong information technology security is not the solution.

c) Educating employees will solve the problems at the bank.

Which of the following systems acquisition methods may eventually require maintenance assistance from the IT department, can produce inadequate documentation, and might result in a company's acquiring a system with inadequate interfaces to existing systems? Question options: a) Systems development life cycle b) Prototyping c) End-user development d) External acquisition e) Component-based development

c) End-user development

Information ________ occurs when an attacker either threatens to steal, or actually steals, information from a company. Question options: a) Theft b) Espionage c) Extortion d) Vandalism

c) Extortion

Object-oriented development _______________. Question options: a) Is similar to traditional development approaches b) Focuses on the original task to be handled c) Focuses on the processes that must be modeled to perform that task d) Focuses on data e) Identifies the subjects of the new system

c) Focuses on the processes that must be modeled to perform that task

How does society keep owners of electronic bulletin boards from disseminating offensive or untrue content? This is a difficult question because it involves the conflict between _____ on the one hand and _____ on the other. Question options: a) The public, the individual b) The public, ethics c) Freedom of speech, privacy d) The individual, freedom of speech e) Ethics, security

c) Freedom of speech, privacy

The _____ is a global wide-area network that connects approximately 1 million organizational computer networks. Question options: a) Ethernet b) Extranet c) Internet d) Intranet e) World Wide Web

c) Internet

Which of the following statements is false? Question options: a) Credit card companies usually block stolen credit cards rather than prosecute. b) People tend to shortcut security procedures because the procedures are inconvenient. c) It is easy to assess the value of a hypothetical attack. d) The online commerce industry isn't willing to install safeguards on credit card transactions. e) The cost of preventing computer crimes can be very high.

c) It is easy to assess the value of a hypothetical attack.

Gal runs a music store. He has a desktop computer in the back room that acts as a server. He has a point-of-sale terminal that connects to the desktop. He also has a notebook (using in-store wireless access to the Internet) that can be carried around the store to look up current items in stock, or to search for items from one of his suppliers for special orders. Which type of network does Gal have? Question options: a) Client-server b) Mainframe-based c) LAN d) WAN e) Peer-to-peer

c) LAN

Considering the knowledge areas of PMBOK, this one includes the set of processes that the project outcomes meet the needs for which the project was executed. Question options: a) Project Time Management b) Project Integration Management c) Project Quality Management d) Project Risk Management

c) Project Quality Management

Paula owns a variety store in a tourist town. The store recently went online, and the response has been remarkable. The store's current infrastructure is running close to capacity, so handling the influx of orders is taking much longer than it should. Which of the following suggestions might be the best solution for the company? Question options: a) Add another server to their infrastructure. b) Use grid computing to process the orders across many servers. c) Use cloud computing services. d) Use the services of a utility computing provider. e) Convert their existing servers to virtual services.

a) Add another server to their infrastructure.

_____ is a software development methodology that delivers functionality in rapid iterations, usually measured in weeks. Question options: a) Agile development b) Prototyping c) The systems development life cycle d) Joint application development e) Component-based development

a) Agile development

The term _____ refers to clandestine software that is installed on your PC through duplicitous channels but is not particularly malicious. Question options: a) Alien software b) Virus c) Worm d) Back door e) Logic bomb

a) Alien software

Refer to IT's About Business 4.3 - Yahoo! CEO Marissa Mayer Bans Telecommuting: Based on the case, which of the following companies banned telecommuting? Question options: a) CISCO b) HP c) Best Buy d) Yahoo!

a) CISCO

Various organizations that promote fair and responsible use of information systems often develop a _____. Question options: a) Code of ethics b) Strategic plan c) Mission statement d) Responsibility charter e) Goals outline

a) Code of ethics

The _______________ ethical standard states that respect and compassion for all others is the basis for ethical actions. Question options: a) Common good b) Fairness c) Rights d) Utilitarian e) Well-being

a) Common good

A service-oriented architecture is an IT architecture that makes it possible to build business applications using Web services. Question options: a) True b) False

a) True

Under the triple constraints of project management, which of the following is not a correct statement? Question options: a) Cost and/or time can often be saved by increasing scope. b) Scope can often be increased by using additional time and incurring increased costs. c) Cost and/or time can often be saved by reducing scope. d) For a given scope, time can sometimes be saved by increasing cost.

a) Cost and/or time can often be saved by increasing scope.

Refer to IT's About Business 4.3 - Yahoo! CEO Marissa Mayer Bans Telecommuting: Which of the following is not a reason why Marissa Mayer banned Telecommuting at Yahoo!? Question options: a) Employees were logging in from home more than they were from their offices. b) Large numbers of employees were arriving to work late. c) She was trying to get rid of unproductive employees. d) Large numbers of employees were leaving work early.

a) Employees were logging in from home more than they were from their offices

Refer to Closing Case 1 - Network Neutrality Wars: Which of the following statements about network neutrality made by Internet Service Providers is not correct? Question options: a) Encourages capital investment in new network technologies. b) Charge different rates based on the amount of bandwidth being used by the content. c) Hinders the U.S. international competitiveness by decreasing innovation. d) Discourages capital investment in new network technologies.

a) Encourages capital investment in new network technologies.

Systems design answers the question, _____. Question options: a) How will the information system resolve the business problem? b) How much will the information system cost? c) What is the problem the information system must address? d) Who will benefit from use of the information system being developed? e) What is the effective operational life of the system?

a) How will the information system resolve the business problem?

Paula owns a variety store in a tourist town. The store recently went online, and the response has been remarkable. The store's current infrastructure is running close to capacity, so handling the influx of orders is taking much longer than it should. Which of the following cloud computing services would make the most sense for the business? Question options: a) Infrastructure-as-a-service model b) Platform-as-a-service model c) Software-as-a-service model d) SOAP model

a) Infrastructure-as-a-service model

Travis is the VP of Operations for a company that owns and operates six ski areas around the world. Their IT needs are seasonal. Which of the following cloud computing services would make the most sense for the business? Question options: a) Infrastructure-as-a-service model b) Platform-as-a-service model c) Software-as-a-service model d) SOAP model

a) Infrastructure-as-a-service model

Place the stages of the systems development life cycle in order: Question options: a) Investigation - analysis - design - programming/testing - implementation - operation/maintenance b) Investigation - design - analysis - programming/testing - implementation - operation/maintenance c) Analysis - design - investigation - operation/maintenance - programming/testing - implementation d) Investigation - analysis - design - programming/testing - operation/maintenance - implementation e) Investigation - implementation - analysis - programming/testing - design - operation/maintenance

a) Investigation - analysis - design - programming/testing - implementation - operation/maintenance

Shelli runs a small boutique in Tel Aviv. She accepts credit cards and writes the number on her copy of the receipt in case there is a problem later. This practice involves which ethical issue related to IT? Question options: a) Privacy b) Accuracy c) Accountability d) Property (such as intellectual property) e) Accessibility to information

a) Privacy

Shelli runs a small boutique in Tel Aviv. She has built up a very nice client base and regularly sends her clients a newsletter. A new bakery business down the block wants to buy Shelli's client list from her. If Shelli does sell the list, which ethical issue related to IT would be involved? Question options: a) Privacy b) Accuracy c) Accountability d) Property (such as intellectual property) e) Accessibility to information

a) Privacy

Shelli runs a small boutique in Tel Aviv. She has built up a very nice client base and regularly sends her clients a newsletter. Clients fill out a form to join her mailing list. Shelli indicates on the form that client information will not be shared without permission. This policy illustrates which ethical issue related to IT? Question options: a) Privacy b) Accuracy c) Accountability d) Property (such as intellectual property) e) Accessibility to information

a) Privacy

_____ issues involve collecting, storing, and disseminating information about individuals. Question options: a) Privacy b) Accuracy c) Transferability d) Property e) Accessibility

a) Privacy

Considering the knowledge areas of PMBOK, takes excellent scheduling skills and tools to manage the activities to complete project milestones and the project itself within the allotted time. Question options: a) Project Time Management b) Project Integration Management c) Project Cost Management d) Project Risk Management

a) Project Time Management

______________ provides a nonexclusive IT infrastructure over the Internet. Question options: a) Public cloud computing b) Private cloud computing c) Hybrid cloud computing d) Vertical cloud computing e) Horizontal cloud computing

a) Public cloud computing

Which of the following systems acquisition methods requires staff to systematically go through every step in the development process and has a lower probability of missing important user requirements? Question options: a) Systems development life cycle b) Prototyping c) End-user development d) External acquisition e) Object-oriented development

a) Systems development life cycle

A URL that begins with https rather than http indicates that the site transmits using an extra layer of security called transport layer security. Question options: a) True b) False

a) True

A code of ethics is a collection of principles that are intended to guide decision-making by members of the organization. Question options: a) True b) False

a) True

A service-level agreement (SLA) outlines how work is divided between the company and its vendors. Question options: a) True b) False

a) True

Refer to Opening Case - LinkedIn's Fast Development Process Helps Save the Company: LinkedIn's advanced coding tools enable their programmers to quickly develop new and add new features without a significant impact on the site processing. Question options: a) True b) False

a) True

Security-issues around cloud computer center on the management of the security-based services. Question options: a) True b) False

a) True

Software can be copyrighted. Question options: a) True b) False

a) True

Systems maintenance includes debugging and updating a system. Question options: a) True b) False

a) True

The "cloud" in cloud computing is composed of computers, the software on those computers, and the network connections among those computers. Question options: a) True b) False

a) True

The IS operational plan is a set of projects that will be executed by the IS department and by functional area managers. Question options: a) True b) False

a) True

The Internet is a global network of computer networks. Question options: a) True b) False

a) True

The Platform for Privacy Preferences automatically communicates privacy policies between a commerce Web site and its visitors. Question options: a) True b) False

a) True

The SDLC is relatively inflexible. Question options: a) True b) False

a) True

The World Wide Web is a system with universally accepted standards for storing, retrieving, formatting, and displaying information via a client/server architecture. Question options: a) True b) False

a) True

The application portfolio in an organization is a set of recommended applications resulting from the planning and justification process in application development. Question options: a) True b) False

a) True

The buy option is particularly attractive if the software vendor allows the company to modify the package to meet its needs. Question options: a) True b) False

a) True

The computing skills necessary to be a hacker are decreasing. Question options: a) True b) False

a) True

The higher the level of an employee in organization, the greater the threat that he or she poses to the organization. Question options: a) True b) False

a) True

The hypertext transport protocol (HTTP) is the communications standard used to transfer pages across the World Wide Web portion of the Internet. Question options: a) True b) False

a) True

The return on investment (ROI) method of cost-benefit analysis measures the effectiveness of management in generating profits with its available assets. Question options: a) True b) False

a) True

The rightmost part of an Internet name is the top-level specification, or the zone. Question options: a) True b) False

a) True

The utilitarian approach to ethics states that an ethical action is the one that provides the most good or does the least harm. Question options: a) True b) False

a) True

UDDI is a registry of descriptions of Web services. Question options: a) True b) False

a) True

Virtual universities are online universities from which students take classes from home or at an off-site location, via the Internet. Question options: a) True b) False

a) True

Web services description language (WSDL) is used to create XML documents. Question options: a) True b) False

a) True

When you interview for a job at a company, it is likely that the company will Google you and search social networking sites for information on you. Question options: a) True b) False

a) True

With agile development, a company develops only what it needs right now to be successful. Question options: a) True b) False

a) True

XML is a more powerful language than HTML. Question options: a) True b) False

a) True

XML makes it easier to exchange data among applications. Question options: a) True b) False

a) True

XML tags data. Question options: a) True b) False

a) True

_____ are segments of computer code that attach to existing computer programs and perform malicious acts. Question options: a) Viruses b) Worms c) Trojan horses d) Back doors e) Logic bombs

a) Viruses

Unintentional threats to information systems include all of the following except ______________. Question options: a) malicious software b) tailgating c) power outage d) lack of user experience e) tornados

a) malicious software

Refer to Opening Case - Get Rid of E-Mail? Seriously?: The company Volkswagen __________________. Question options: a) prevents its Blackberry servers from sending messages to employees outside of work hours b) limited all email of BBM c) limited the use of email to company executives d) banned email as a form of internal communication

a) prevents its Blackberry servers from sending messages to employees outside of work hours

Biometrics are an example of _______________. Question options: a) something the user is b) something the user wants c) something the user has d) something the user knows e) something the user does

a) something the user is

Refer to IT's About Business 7.2 - The Mask: The malware application Careto appears to be designed to ____________. Question options: a) target information from government institutions b) target information from home personal computers c) target information from personal computers used by college students d) target information from mom-and-pop type businesses

a) target information from government institutions

You start a new job. You want to install some fun software on your laptop and get an error message which indicates that the software is not on the ________________ list so it cannot be installed. Question options: a) white b) black c) yellow d) blue

a) white

Refer to IT's About Business 14.2 - General Motors Insources its Information Technology Function: When General Motor's new CIO started in February 2012, what percent of the company's Information Technology work was outsourced? Question options: a) 100 percent b) 90 percent c) 75 percent d) 25 percent

b) 90 percent

_____ issues involve the authenticity and fidelity of information that is collected and processed. Question options: a) Privacy b) Accuracy c) Transferability d) Property e) Accessibility

b) Accuracy

Evaluating the benefits of IT projects is more complex than evaluating their costs for all of the following reasons except: Question options: a) Benefits are harder than costs to quantify. b) Benefits tend to be more tangible than costs. c) IT can be used for several different purposes. d) The probability of obtaining a return from an IT investment is based on the probability of implementation success. e) The proposed system may be "cutting edge".

b) Benefits tend to be more tangible than costs.

Which of the following is not a service of cloud computing? Question options: a) Cloud infrastructure as a service b) Cloud data storage as a service c) Cloud platform as a service d) Cloud software as a service e) All of the above are services of cloud computing.

b) Cloud data storage as a service

Shelli runs a small boutique in Tel Aviv. Shelli wants to purchase digital dossiers on her customers from a data aggregator. Creating such dossiers is an example of __________. Question options: a) Customer relationships b) Customer profiling c) Customer intimacy d) Customer knowledge e) Spying

b) Customer profiling

The process of profiling ______________. Question options: a) Increases individual privacy b) Decreases individual privacy c) Has no effect on individual privacy d) Is illegal in more than half of the states e) Is legal but unethical

b) Decreases individual privacy

The four types of cloud computing are public clouds, private clouds, hybrid clouds, and horizontal clouds. Question options: a) True b) False

b) False

Which of the following statements is correct? Question options: a) An individual's right to privacy is absolute. b) Determining and enforcing privacy regulations can be difficult. c) An individual's right to privacy supersedes the needs of society. d) Advances in information technologies have not affected individual privacy. e) The Internet has increased individuals' privacy.

b) Determining and enforcing privacy regulations can be difficult.

A service-oriented architecture _________________. Question options: a) Is one in which the servers are supporting multiple mobile devices b) Enables Web services to be reused across an organization c) Is a type of cloud computing d) Is focused on user response e) Places servers closest to the primary user

b) Enables Web services to be reused across an organization

The _____________ ethical standard states that ethical actions treat all human beings equally. Question options: a) Common good b) Fairness c) Rights d) Utilitarian e) Well-being

b) Fairness

A business does not need network connectivity in order to maintain a strategic advantage. Question options: a) True b) False

b) False

A password refers to "something the user is". Question options: a) True b) False

b) False

A request for proposal (RFP) is sent to potential customers. Question options: a) True b) False

b) False

An extranet is a network that uses Internet technologies and is designed to serve the information needs of a single organization. Question options: a) True b) False

b) False

An individual or organization faced with an ethical decision is basically considering whether to break the law. Question options: a) True b) False

b) False

Any application can run on a grid computing system. Question options: a) True b) False

b) False

Client server computing is just another example of the mainframes and dumb-terminals setup. Question options: a) True b) False

b) False

Customers that are using software-as-a-service are not using cloud computing. Question options: a) True b) False

b) False

Employees who telecommute have generally found that the experience enhances their careers. Question options: a) True b) False

b) False

Entering data and programs from user departments to the mainframe was called remote data entry. Question options: a) True b) False

b) False

Improvements in information technologies are leading to a decreasing number of ethical problems. Question options: a) True b) False

b) False

In a direct conversion, the new system is turned on, and the old system is turned off at a later time. Question options: a) True b) False

b) False

In general, employees have high legal protection against surveillance by employers. Question options: a) True b) False

b) False

Insourcing application development is usually less time consuming and less expensive than buying or leasing. Question options: a) True b) False

b) False

Mainframe computers are no longer being used. Question options: a) True b) False

b) False

One exabyte is the same as 1 million megabytes Question options: a) True b) False

b) False

One of the future features of cloud computing is grid computing. Question options: a) True b) False

b) False

Only IS projects are constrained by the same factors known as the triple constraints of project management, Question options: a) True b) False

b) False

Projects are long-term efforts to create a specific business-related outcome. Question options: a) True b) False

b) False

Refer to Closing Case 2 - The Federal Aviation Administration's Next Generation Air Transportation System: The primary purpose of the FAA's NetGen project is to transform America's air traffic control system from an antiquated satellite-based system to a ground-based system. Question options: a) True b) False

b) False

Refer to IT's About Business 14.3 - Build Your Apps Yourself: You need to have technical knowledge as to how to build mobile apps on your own in order to be successful in the mobile apps market Question options: a) True b) False

b) False

Refer to Opening Case - LinkedIn's Fast Development Process Helps Save the Company: LinkedIn currently uses Oracle's database management system for their site. Question options: a) True b) False

b) False

Server farms can be located just about anywhere. Question options: a) True b) False

b) False

Simple object access protocol (SOAP) defines how messages can be exchanged through the use of HTML. Question options: a) True b) False

b) False

Software rental is a method of delivering software in which a vendor hosts the applications and customers use them over a network, typically the Internet. Question options: a) True b) False

b) False

The "safe harbor" framework details how the European Union exports data about U.S. citizens. Question options: a) True b) False

b) False

The Project Management Body of Knowledge is a collection of processes and knowledge areas generally accepted as worst practice within the project management discipline. Question options: a) True b) False

b) False

The SDLC encourages changes to user requirements once they have been established. Question options: a) True b) False

b) False

The fairness approach maintains that an ethical action is one that best protects and respects the moral rights of the affected parties. Question options: a) True b) False

b) False

Travis is the VP of Operations for a company that owns and operates six ski areas around the world. Which of the following types of cloud computing would be best for the business? Question options: a) Public cloud computing b) Hybrid cloud computing c) Vertical cloud computing d) Horizontal cloud computing

b) Hybrid cloud computing

As an MIS analyst, you have decided to use a prototyping methodology for a small, Web-based design project. What is the order of steps that you will follow in the project? Question options: a) Develop the prototype; use the prototype; revise and enhance the prototype. b) Identify user requirements; develop the prototype; use the prototype; revise and enhance the prototype. c) Develop the prototype; identify user requirements; use the prototype; revise and enhance the prototype. d) Identify user requirements; develop solutions; select the best prototype; implement the prototype. e) Identify user requirements; develop the prototype; revise and enhance the prototype.

b) Identify user requirements; develop the prototype; use the prototype; revise and enhance the prototype.

Ryan works for a small consulting company. They want to do a better job of tracking their clients and the jobs they have bid on and either won or lost. There are no processes in place right now, and all users (consultants and managers) have different ideas. Their IT consultants have suggested they use JAD to design their application. Which of the following is not an advantage of that design approach. Question options: a) It saves time. b) It involves fewer users in the development process. c) It results in greater user acceptance of the new system. d) It can produce a higher-quality system.

b) It involves fewer users in the development process.

Shelli runs a small boutique in Tel Aviv. Her intern was checking the boutique's Facebook page and noticed some negative comments. He deleted them. At the end of the day, when they were closing up, he told Shelli about the comments and what he had done. Shelli was not pleased, and she told him so. Why wasn't Shelli pleased? Question options: a) She didn't like hearing anything negative about her store. b) People are free to say what they wish. c) She thought he should ask her before he deleted them. d) He wasn't supposed to be checking Facebook. e) All of these are reasons for Shelli's not being pleased.

b) People are free to say what they wish.

Anna works in the sales organization of a mid-size company. The company has decided to replace its existing sales support system. Of the seven sales offices, only Anna's is going to run it at first. What type of implementation is her company using? Question options: a) Direct b) Pilot c) Phased d) Parallel

b) Pilot

With _____, every call opens up a dedicated circuit for the duration of the call. Question options: a) Voice over IP b) Plain old telephone service c) Chat rooms d) Teleconference e) Internet relay chat

b) Plain old telephone service

In this phase of project management every project objective and every activity associated with that objective must be identified and sequenced. Question options: a) Project Monitoring and Control b) Planning c) Project initiation d) Project completion

b) Planning

______________ provides computer resources as extensions to an organization's existing resources. Question options: a) Infrastructure-as-a-service model b) Platform-as-a-service model c) Software-as-a-service model d) SOAP model

b) Platform-as-a-service model

Paula owns a variety store in a tourist town. The store recently went online, and the response has been remarkable. The store's current infrastructure is running close to capacity, so handling the influx of orders is taking much longer than it should. Which of the following types of cloud computing would be best for the business? Question options: a) Public cloud computing b) Private cloud computing c) Vertical cloud computing d) Horizontal cloud computing

b) Private cloud computing

In the _____ stage of the systems development life cycle, the design specifications are translated into computer code. Question options: a) Systems analysis b) Programming c) Systems design d) Prototyping e) Feasibility study

b) Programming

Considering the knowledge areas of PMBOK, this area of knowledge includes concepts such as staffing decisions; team management; and organizational culture, style, and structure. Question options: a) Project Time Management b) Project Human Resource Management c) Project Quality Management d) Project Risk Management

b) Project Human Resource Management

Considering the knowledge areas of PMBOK, this one includes those processes that are required to ensure that all the project's components are properly coordinated. Question options: a) Project Time Management b) Project Integration Management c) Project Quality Management d) Project Risk Management

b) Project Integration Management

_____________ means accepting the consequences of your decisions and actions. Question options: a) Privacy b) Responsibility c) Transferability d) Accountability e) Liability

b) Responsibility

Which of the following enables users to send data across sometimes unreliable networks? Question options: a) Ethernet b) TCP/IP c) Protocols d) Digital subscriber lines e) Integrated services digital network

b) TCP/IP

Server virtualization: Question options: a) Can function only within server farms. b) Uses software to build multiple virtual servers on the same machine. c) Requires changes to applications. d) Requires a license for each virtual server. e) Requires no additional security.

b) Uses software to build multiple virtual servers on the same machine.

You start a new job, and human resources gives you a ten-page document that outlines the employee responsibilities for information security. Which of the following statements is most likely to be true? Question options: a) The document recommends that login passwords be left on a piece of paper in the center desk drawer so that others can use the laptop if necessary. b) You are expected to read the document, and you could be reprimanded if you don't follow its guidelines. c) You can back up sensitive data to a thumb drive so you can take them home to work with. d) The document indicates that you can leave your laptop unlocked if you leave your desk for less than an hour. e) The document permits you to lend your laptop to your brother for the weekend.

b) You are expected to read the document, and you could be reprimanded if you don't follow its guidelines.

Refer to Closing Case 1 - Network Neutrality Wars: Telecommunications companies want to replace network neutrality with an arrangement in which they ______. Question options: a) provide service to only small businesses b) charge different rates based on the amount of bandwidth being used by the content c) charge the same rate no matter the amount of bandwidth being used by the content d) provide service to only large companies

b) charge different rates based on the amount of bandwidth being used by the content

Employees in which functional areas of the organization pose particularly grave threats to information security? Question options: a) human resources, finance b) human resources, management information systems c) finance, marketing d) operations management, management information systems e) finance, management information systems

b) human resources, management information systems

You just started to work in a branch of your local bank. The bank is dealing with the privacy standards that exist for transferring data to banks in other countries. This flow of information is called __________. Question options: a) information passing b) transborder data flows c) normal business practice d) data processing e) privacy issues

b) transborder data flows

All of the following are cloud computing security issues except _________. Question options: a) sensitive data access b) users technical ability c) privacy d) malicious insiders

b) users technical ability

In this phase of project management is to clearly define the problems that are intended to be solved along with the goals that are to be achieved. Question options: a) Project Monitoring and Control b) Planning c) Project initiation d) Project execution

c) Project initiation

Refer to IT's About Business 4.2- Just Exactly What Is Quora? Which of the following is a correct statement about Quora users? Question options: a) Quora is similar to Facebook. b) Quora requires short to the point posts. c) Quora permits users to vote on responses up or down based on quality. d) Quora limits who can post to the site.

c) Quora permits users to vote on responses up or down based on quality.

Which of the following statements concerning the difficulties in protecting information resources is not correct? Question options: a) Computing resources are typically decentralized. b) Computer crimes often remain undetected for a long period of time. c) Rapid technological changes ensure that controls are effective for years. d) Employees typically do not follow security procedures when the procedures are inconvenient. e) Computer networks can be located outside the organization.

c) Rapid technological changes ensure that controls are effective for years.

The ____________ ethical standard states that an ethical action is the one that best protects and respects the moral rights of the affected parties. Question options: a) Common good b) Fairness c) Rights d) Utilitarian e) Well-being

c) Rights

______________ handles all aspects of an application - the software, the resources to run it, and storing the data. Question options: a) Infrastructure-as-a-service model b) Platform-as-a-service model c) Software-as-a-service model d) SOAP model

c) Software-as-a-service model

In a _____ system, participants are able to seamlessly and electronically share data, voice, images, graphics, and animation. Question options: a) Teleconference b) Group decision support c) Telepresence d) Telephone conference call e) Crowdsourcing

c) Telepresence

Gal runs a music store. He wants to begin to give music appreciation classes online. His goal is to have the participants share data, voice/sound, and images. What type of system should Gal consider having? Question options: a) Teleconference b) Group decision support c) Telepresense d) Telephone conference call. e) Crowdsourcing

c) Telepresense

Which of the following is not a tool used by developers in sequencing IS projects? Question options: a) Program Evaluation and Review Technique (PERT) b) Critical Path Method (CPM) c) Time Management Development Tracking (TMDT) d) Gantt charts

c) Time Management Development Tracking (TMDT)

_____ are software programs that hide in other computer programs and reveal their designed behavior only when they are activated. Question options: a) Viruses b) Worms c) Trojan horses d) Back doors e) Logic bombs

c) Trojan horses

Each site on the Internet gets an assigned address, which is a(n) _____. Question options: a) TCP address b) IP address c) URL address d) ISO/OSI identifier e) World Wide Web address

c) URL address

What is _____ is not necessarily _____. Question options: a) Illegal, unethical b) Ethical, illegal c) Unethical, illegal d) Unethical, legal e) Ethical, legal

c) Unethical, illegal

Refer to IT's About Business 7.1 - Stealing Cash from ATMs with Text Messages: Ploutus is ____________. Question options: a) the operating system that runs on most ATM machines b) malware that runs on the computers banks use to connect to their ATM c) a malware that is engineered to compromise certain types of ATMs d) can easily uploaded to all ATMs

c) a malware that is engineered to compromise certain types of ATMs

Refer to IT's About Business 7.3 - A Tale of Two Cybersecurity Firms: The Rustock botnet sent spam to individuals on the Internet advertising all of the following except for ___________. Question options: a) fake drugs b) Russian stocks c) college degrees d) online pharmacies

c) college degrees

Rank the following in terms of dollar value of the crime, from highest to lowest. Question options: a) robbery - white collar crime - cybercrime b) white collar crime - extortion - robbery c) cybercrime - white collar crime - robbery d) cybercrime - robbery - white collar crime e) white collar crime - burglary - robbery

c) cybercrime - white collar crime - robbery

You start a new job. You know that logging in with your password authenticates who you are. What actions, rights, or privileges you have based on your identity is called __________. Question options: a) biometrics b) authorization c) passphrase d) encryption

c) passphrase

You start a new job, and the first thing your new company wants you to do is create a user ID and a password. To remember your password, you write it on a Post It note and put it on your laptop screen. This is an example of ________________. Question options: a) social engineering b) tailgating c) poor security d) dumpster diving e) phishing

c) poor security

The traditional approach to project management divides every project into phases. Which of the following is not one of the phases? Question options: a) initiation b) planning c) redevelopment d) completion

c) redevelopment

______________ determines who is responsible for the actions taken. Question options: a) Privacy b) Responsibility c) Transferability d) Accountability e) Liability

d) Accountability

What is the relationship between advances in information technology and the practice of profiling? Question options: a) Advances in IT make it more difficult to profile individuals. b) Advances in IT have no impact on profiling. c) Advances in IT make it more expensive to profile individuals. d) Advances in IT make it easier to profile individuals.

d) Advances in IT make it easier to profile individuals.

Which of the following is not the cause the failure of an IT project. Question options: a) Unclear objectives and lack of business focus. b) Shifting requirements and technical complexity. c) Project team not aligned with business objectives or has a general lack of skill. d) All of the above can cause an IT project failure.

d) All of the above can cause an IT project failure.

Anna works in the sales organization of a mid-size company. The company decided to purchase Sales SME that is offered as a SaaS. What would you expect to see in a SLA with the vendors? Question options: a) Price of the software b) Upgrade prices for the software c) Whether the software can be changed by Anna's company d) Availability guarantees e) Bug reporting process

d) Availability guarantees

Refer to Opening Case - Get Rid of E-Mail? Seriously?: Altos' email initiative _______________. Question options: a) provided email services to small businesses b) banned the use of Facebook at work c) limited the use of email to company executives d) Banned email as a form of internal communication

d) Banned email as a form of internal communication

Which of the following systems acquisition methods can result in a company's acquiring software that is controlled by another company, may be difficult to enhance or modify, and may not support the desired business processes? Question options: a) Systems development life cycle b) Prototyping c) End-user development d) Buy option e) Component-based development

d) Buy option

_____ portals coordinate content within relatively narrow organizational and partners' communities. Question options: a) Publishing b) Personal c) Affinity d) Corporate e) Commercial

d) Corporate

Which of the following is not a disadvantage of cloud computing? Question options: a) Privacy b) Security c) Reliability d) Costs e) Loss of control

d) Costs

Refer to IT's About Business 14.1 - A Disastrous Development Project: Marin County filed a complaint that Deloitte, the consulting firm they selected to lead their project, charging a number of things. Which among the following was not one of them? Question options: a) Deloitte was using project to train new consultants. b) Deloitte intentionally failed to disclose its lack of needed technical expertise for the project. c) Deloitte conducted inadequate testing during project. d) Deloitte was charged with all of the above.

d) Deloitte was charged with all of the above.

You just started to work in a branch of your local bank. Over lunch in the break room you find out that the bank has been concerned that employees are stealing from the bank. Which of the following statements is false? Question options: a) The bank can read employee's Emails on bank-supplied accounts. b) The bank can have surveillance cameras without notifying employees. c) The bank can monitor Internet usage on bank-owed computers. d) Employees have considerable legal protection against surveillance.

d) Employees have considerable legal protection against surveillance.

Which of the following statements concerning firewalls is false? Question options: a) Firewalls prevent unauthorized Internet users from accessing private networks. b) Firewalls examine every message that enters or leaves an organization's network. c) Firewalls filter network traffic according to categories of activities that are likely to cause problems. d) Firewalls filter messages the same way as anti-malware systems do. e) Firewalls are sometimes located inside an organization's private network.

d) Firewalls filter messages the same way as anti-malware systems do.

Gal runs a music store. He tells you that he gets his Internet access from his TV company. Which of the following is true? Question options: a) Gal has FTTH. b) Gal has satellite service. c) Gal has DSL service. d) Gal has a cable modem.

d) Gal has a cable modem.

A(n) _____ is a network designed to serve the internal informational needs of a single organization. Question options: a) Global network b) Extranet c) Internet d) Intranet e) World Wide Web

d) Intranet

Which of the following is not a benefit of grid computing? Question options: a) It enables efficient use of computing resources. b) It enables applications to run faster. c) There is no single point of failure. d) It reduces the number of applications. e) It makes it easier to scale up or down.

d) It reduces the number of applications.

Shelli runs a small boutique in Tel Aviv. She has built up a very nice client base and regularly sends her clients a newsletter. Clients fill out a form to join her mailing list. Shelli has a box on the form that the customer checks to indicate they have read her policies which are on the form. This check box is an example of ____________. Question options: a) Privacy b) Profiling c) Opting-out d) Opting-in

d) Opting-in

A firm implements a new information system in one of its plants, assesses the new system's performance, and then implements the new system in its other plants. This is an example of __________ conversion. Question options: a) Phased b) Direct c) Parallel d) Pilot e) Timely

d) Pilot

Considering the knowledge areas of PMBOK, this one defines the processes that limit and control the work included in a project. Question options: a) Project Time Management b) Project Integration Management c) Project Quality Management d) Project Scope Management

d) Project Scope Management

Refer to IT's About Business 6.3 - Google Glass: Big Brother Really Is Watching You: Which of the following is not a correct statement about Google Glasses? Question options: a) Can perform Internet search for questions asked of it. b) Can perform language translations for user. c) Can digitally capture every moment of every individual around the person wearing them. d) Restaurants like Google glass users because other can see what they and others are eating.

d) Restaurants like Google glass users because other can see what they and others are eating.

The forecast for your company's headquarters predicts the area hit head on by a hurricane. The company sends you to their cold site to minimize downtime should such a disaster hit. Which of the following statements is false? Question options: a) The site will not have any servers. b) The site will not have any workstations, so you need to bring your laptop. c) The site is probably in the next town. d) The site will have all of the company's applications. e) The site will not have up-to-date data.

d) The site will have all of the company's applications.

The forecast for your company's headquarters predicts the area hit head on by a hurricane,. The company sends you to their warm site to minimize downtime should such a disaster hit. Which of the following statements is true? Question options: a) The site will not have any servers. b) The site will not have any workstations, so you need to bring your laptop. c) The site is probably in the next town. d) The site will not have any of the company's applications. e) The site will not have up-to-date data.

d) The site will not have any of the company's applications.

Gal runs a music store. The Web site for the store is www.GalsTunes.net. Which of the following is false? Question options: a) The "GalsTunes" is the name of the organization. b) The "net" is a top-level domain name. c) That is the URL for the web site for the store. d) This is the name of a particular server in Gal's store.

d) This is the name of a particular server in Gal's store.

Refer to Closing Case 2 - Protecting Your Privacy: Concerning the security applications listed in the case, which one requires a secure messaging system and permits sender to retrieve messages they already sent? Question options: a) Wickr b) Snapchat c) Silent Circle d) TigerText

d) TigerText

Ryan works for a small consulting company. They want to do a better job of tracking their clients and the jobs they have bid on and either won or lost. There are no processes in place right now, and all users (consultants and managers) have different ideas. Their IT consultants have suggested they use JAD to design their application. The IT consultants will use agile development to deliver the application. Agile development ______________. Question options: a) requires little user input b) forcuses on all required functionality at each step of the way c) uses the scrum approach to design the system d) delivers functionality in rapid interactions e) takes a longer time but the results are better

d) delivers functionality in rapid interactions

Which of the following is not part of the efforts associated with IS project management? Question options: a) plan b) organize c) manage resources d) infrastructure management

d) infrastructure management

The most overlooked people in information security are: Question options: a) consultants and temporary hires. b) secretaries and consultants. c) contract laborers and executive assistants. d) janitors and guards. e) executives and executive secretaries.

d) janitors and guards.

An organization's e-mail policy has the least impact on which of the following software attacks? Question options: a) virus b) worm c) phishing d) zero-day e) spear phishing

d) zero-day

Shelli runs a small boutique in Tel Aviv. She has built up a very nice client base and regularly sends her clients a newsletter. She keeps all her client data on her laptop in a password-protected file. Her decision to protect the file reflects which ethical issue related to IT? Question options: a) Privacy b) Accuracy c) Accountability d) Property (such as intellectual property) e) Accessibility to information

e) Accessibility to information

The benefits of e-learning include which of the following? Question options: a) Increased content retention b) Current, high-quality content c) Consistency d) Flexibility e) All of the choices are correct.

e) All of the choices are correct.

Which of the following is not a step in ethical decision-making? Question options: a) Recognize the ethical issue. b) Get the facts. c) Evaluate alternative actions. d) Make a decision and test it. e) All of these are steps in ethical decision-making.

e) All of these are steps in ethical decision-making.

_____ refers to the range of frequencies available in any communications channel. Question options: a) Protocol b) Broadband c) Capacity d) Narrowband e) Bandwidth

e) Bandwidth

Which of the following statements concerning cloud computing is not true? Question options: a) Users access computers in the cloud, usually via the Internet. b) The cloud includes computers, software, and a network. c) A cloud can be private or public. d) A cloud is usually a server farm. e) Data are stored on the user's computer.

e) Data are stored on the user's computer.

Which of the following statements about publication of material in foreign languages is not correct? Question options: a) It is a competitive necessity. b) It must be accurate. c) It is expensive. d) Content must be localized to the needs of people in local markets. e) It is not yet a major consideration for most companies.

e) It is not yet a major consideration for most companies.

_____ are segments of computer code embedded within an organization's existing computer programs that activate and perform a destructive action at a certain time or date. Question options: a) Viruses b) Worms c) Trojan horses d) Back doors e) Logic bombs

e) Logic bombs

You start a new job, and the first thing your new company wants you to do is create a user ID and a password. Which of the following would be a strong password? Question options: a) The name of the company b) Your last name c) Your birthdate d) Your initials (capitalized) and the number of the floor you are on e) The name of the company spelled backward

e) The name of the company spelled backward

In a _____ attack, a coordinated stream of requests is launched against a target system from many compromised computers at the same time. Question options: a) phishing b) zero-day c) worm d) back door e) distributed denial-of-service

e) distributed denial-of-service

Voice and signature recognition are examples of _____________. Question options: a) something the user is b) something the user wants c) something the user has d) something the user knows e) something the user does

e) something the user does


संबंधित स्टडी सेट्स

Chapter 42, Loss, Grief, and Dying

View Set

TestOut c.4 A+ 220-1002 Core 2 Certification Practice Exam

View Set

Chapter 8 Financial Management (read and answer)

View Set

Chapter 12: Congenital and Acquired Immunodeficiencies, Diseases Caused by Defective Immunity

View Set

Chapter 8: Cities of Sub-Saharan Africa

View Set

Chapter Ten - Race and Ethnicity

View Set

Information Security Exam Questions

View Set