INFM 109 MO1-MO8 Quiz Study

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

The process of building software for safety-critical systems takes much longer and is much more expensive because _______________.

extreme measures must be taken to identify and remove defects starting at the very earliest stages of software development

A _______________ is a collection of similar entities while a(n) _______________ is a characteristic of an entity.

file and attribute

Five actions an organization must take in the event of a successful cyberattack include incident notification, protection of evidence and activity logs, incident containment, eradication, and incident _______________.

follow-up

The purpose of the system investigation phase is to _______________.

gain a clear understanding of the specifics of the problem to solve or the opportunity to address

Programming languages are commonly used to perform data analysis and build application software, system software, embedded systems, Web sites, and _______________.

games

A key difference between grid computing, multiprocessing, and parallel processing is that

grid computing relies on a community of computers acting together

Which of the following is not a benefit associated with creating a strategic plan?

guarantees that only the most current technology solutions will be employed

Three subject areas where federal statutes have been implemented to protect the personal data of U.S. citizens include financial data, children's personal data, and information.

health

A trial-and-error method of problem solving used when an algorithmic or mathematical approach is called

heuristics

Module 3: Chapter 8 Three commonly used approaches to cloud computing are public cloud computing, private cloud computing, and _______________ cloud computing.

hybrid

Public cloud computing offers three key benefits to organizations including _______________.

increased redundancy in the event of disaster, reduced costs, and flexible computing capacity

A(n) _______________ is an internal corporate network built using Internet and World Wide Web standards and products.

intranet

The evolution of e-commerce _______________.

is a disruption to business processes that makes businesses rethink how they achieve their objectives

The primary advantage associated with the use of an in-memory database to process big data is that _______________.

it provides access to data at rates much faster than storing data on some form of secondary storage

Computer forensics is a discipline that combines elements of _______________ and computer science.

law

Module 8: Chapter 11 The people, procedures, hardware, software, data, and knowledge needed to develop computer systems and machines that can simulate human intelligence process include _____________, _______________, and _______________.

learning, reasoning, self-correction

One of the consequences of a successful cyberattack that can lead to monetary penalties for organizations that fail to comply with data protection regulations is _______________.

legal consequences

A cloud-based solution is _______________ than purchasing ERP software and upgrading hardware.

less expensive

The ability to learn without being programmed is known as

machine learning

The most important issue to be considered when an organization embarks on e-commerce is _______________.

making the business strategy paramount

An organization that monitors, manages, and maintains computer and network security for other organizations is called a _______________ service provider.

managed security

A faulty sensor or a bad network connection can result in or IoT sensor data that lacks a time stamp indicating when the reading occurred.

missing data

The class of computer used to support workgroups from a small department of two or three workers to large organizations with tens of thousands of employees and millions of customers is the _______________.

multiple-user computer

Two potential benefits of obtaining a certification in an IS subject area are:

new career possibilities and a potential increase in salary

The essential characteristic of a(n) _______________ transaction processing system is that it processes transactions as they occur.

online

Genetic algorithm and linear programming belong in the _______________ general category of BI/analytics.

optimization

The five broad categories of BI/analytics techniques include _______________.

optimization, descriptive analytics, and text and video analysis, simulation, and predictive analytics

The four levels at which the CIA security triad must be implemented include _______________.

organizational, network, application, and end user

Data mining and time series belong in the general category of _______________ of BI/analytics.

predictive analytics

In the Scrum framework, the _______________ is a person who represents the project stakeholders and is responsible for communicating and aligning project priorities between stakeholders and the development team.

product owner

The purpose of client-side programming is to _______________.

provide an interface to allow the client computer to request services of the server computer

A form of cyberattack that is estimated to occur every 10 seconds against an individual in the U.S. is _______________.

ransomware

A collection of attributes about a specific entity is a _______________.

record

Two specific BI/analytics techniques that are in the general category of descriptive analytics are _______________.

regression analysis and visual analytics

A network device that directs data packets to other networks until each packet reaches its destination is a _______________.

router

One of the first things developers of IoT applications should focus on is building in _______________ from the start.

security

The operating system plays no role in controlling access to system resources to provide a high level of security against unauthorized access to the users' data and programs as well as record who is using the system and for how long. True or False?

true

Common issues encountered when moving to public cloud computing include complex pricing arrangements, performance issues, inadequate data security, and _______________.

vendor lock-in

Which of the following is a key technology infrastructure component?

A high-speed connection to the network

_______________ properties of SQL databases help ensure the integrity of data in the database.

ACID

Four drivers that set the information strategy and determine information system investments include corporate strategy, technology innovations, innovative thinking, and

Business unit strategies

The builders of safety-critical systems must determine when they have completed sufficient testing and sign off their approval to release the product. This is typically an easy and straight-forward decision. True or False?

False

The use of primary keys and foreign keys make it impossible to define relationships between the data in two tables of a relational database. True or False?

False

Unfortunately, there are few choices for software packages that provide integrated transaction processing system solutions for small- and medium-sized enterprises. True or False?

False

The right to freedom of expression is one of the most important rights for free people in the United States. The _______________ was adopted to guarantee this right and others.

First Amendment

_______________ is a standard page description language for Web pages that tells the browser how to display font characteristics, paragraph formatting, page layout, image placement, hyperlinks, and the content of a Web page. It uses tags, which are codes that tell the browser how to format the text or graphics as a heading, list, or body text.

HTML

_______________ are specially denoted text or graphics on a Web page, that, when clicked, open a new Web page containing related content.

Hyperlinks

_______________ specifies how to address and route each packet to make sure it reaches the desired destination.

IP

A 64-bit number that uniquely identifies a computer on the Internet is a(n) _______________.

IP address

Which of the following is not associated with the implementation of server virtualization?

Increase in the number of software licenses that must be purchased

_______________provide data and instructions to the computer and receive results from it.

Input/output devices

Which of the following statements about any website that caters to children is not true?

It must request birth date and a confirming social security number.

Which of the following is not a disadvantage of self-service analytics?

It places valuable data in the hands of end users.

_______________ is a model used to introduce new systems into the workplace in a manner that lowers stress, encourages teamwork, and increases the probability of a successful implementation.

Leavitt's Diamond

Which of the following is NOT considered to be a key challenge of e-commerce?

Low user interest in accessing global markets and competitive pricing

A 5G network will have the following advantages over a 4G network:

Lower latency, greater bandwidth, and ability to support more devices.

Which of the following is not a main characteristic to consider with m-commerce application?

M-commerce only works when an app are your phone makes the payment.

Module 1 : Chapter 1 Four information system types based on their sphere of influence include inter-organizational, personal, enterprise, and

Workgroup

Which of the following is not a key responsibility of the data governance team?

decide which database technology should be used

The _______________ step in the ethical decision-making process is considered the most critical.

develop a problem statement

The _______________ maps the name people use to locate a Web site to the IP address that a computer uses to locate a Web site.

domain name system

Business data goes through a cycle that includes data collection, data , data correction, data processing, data storage, and documentation production.

editing

There are _______________ steps that must be taken to perform a thorough security risk assessment.

eight

The purpose of data normalization is to _______________.

eliminate data redundancies and ensure data dependencies make sense

_______________is a class of software used to meet organization-wide business needs and typically shares data with other enterprise applications used within the organization.

enterprise

A(n) _______________ is a person, place, or thing (object) for which data is collected, stored, and maintained.

entity

The goal of the _______________ step of the ETL process is to take the source data from all the various sources and convert it into a single format suitable for processing.

extract

A(n) is a means to offer limited network access to people external to the organization such as selected customers and suppliers.

extranet

A company implementing a new PLM system should do which of the following to maximize its chances for a successful implementation?

-Appoint a full-time manager to the project. -Budget enough time and money to train staff. -Keep the scope of the project well defined.

Many multinational companies roll out standard IS applications for all to use. However, standard applications often don't account for all the differences among business partners and employees operating in other parts of the world. Which of the following is a frequent modification required for standard software?

-Software might need to be designed with local language interfaces to ensure the successful implementation of a new IS. -Customization might be needed to handle date fields correctly. -Users might also have to implement manual processes and overrides to enable systems to function correctly.

According to Moore's Law, how long does it take for the power of computing technology to double for the same cost?

1½ years

A data center designed to have an expected annual downtime of less than 30 minutes and able to handle a power outage of up to four days is a tier _______________ data center.

4

Which of the following is not one of the basic components of a TPS?

Analytical models

An _______________ functions like an arm, with rotary joints that can move up and down and also twist.

Articulated robot

The primary difference between business intelligence and analytics is that _______________.

BI is used to analyze historical data to tell what happened or is happening right now in your business while analytics employs algorithms to determine relationships among data to develop predictions of what will happen in the future.

_______________ is software used to analyze the robustness and performance of components and assemblies.

CAE

handle work that is hard on a person and could cause repetitive injuries.

Cobots

_______________ is not a specific goal of green computing.

Combating global climate change

_______________ software can provide a better match to the current work processes of the organization and may provide a potential competitive advantage; however, software development can be extremely costly, and it can take months or even years to complete

Custom

_______________ involves providing feedback regarding a potential data problem and enables users to change the data.

Data correction

_______________ is the practice of blending the tasks performed by the development and IT operations groups to enable faster and more reliable software releases.

DevOps

Which of the following is not an objective of an organization's batch transaction processing system?

Ensure that data is processed immediately upon occurrence of a business transaction

A database and a database management system are the same thing. True or False?

False

Data governance is a subset of data management. True or False?

False

Encouragement of self-service analytics almost assuredly will eliminate the risk of erroneous analysis and reporting and the problem of different analyses yielding inconsistent conclusions. True or False?

False

JavaScript, VBA Script, HTML, CSS, and Ajax are server-side programming languages, while PHP, C++, Java, Python, and Ruby on Rails are client-side programming languages. True or False?

False

Machine learning and AI are the same thing. True or False?

False

Module 5: Chapter 9 Businesses should use Web sites as standalone items for e-commerce and not connect them to other commerce efforts by the business. True or False?

False

Module 6: Chapter 2 The growth of the Internet of Things is helping to curb the number of cyberattacks. True or False?

False

Module 6: Chapter 3 Acting in an ethical manner and acting in a legal manner will always lead to the same actions. True or False?

False

Network connectivity is not required for objects with sensors to exchange data with other connected devices. True or False?

False

One of the problems with machine learning is that it is not able to identify unique patterns. True or False?

False

Organizations cannot use existing technologies in innovative ways, they must wait for new Technology to emerge before they innovate. True or False?

False

Safety-critical systems are easy to learn and use because they perform quickly and efficiently, they meet their users' needs, and they operate safely and reliably. True or False?

False

The _______________ component of the Hadoop environment is composed of a Procedure that performs filtering and sorting and a method that performs a summary operation.

Map/Reduce program

A _______________ database enables hundreds or even thousands of servers to operate on the data, providing faster response times for queries and updates.

NoSQL

A _______________ differs from a _______________ in that it provides a means to store and retrieve data that is modeled using some means other than the simple two-dimensional tabular relations.

NoSQL database and relational database

Module 2: Chapter 13 _______________ software is less risky and leads to quicker deployment; however, maintenance and support costs may become expensive.

Off-the-shelf

Businesses may use multiple, coordinated e-commerce applications that engage you in a purchase decision (such as allowing a customer in a physical store to scan a product UPC code to see social media comments, price comparisons for nearby stores, or a coupon for a discounted purchase). What is this marketing plan called?

Omnichannel marketing

_______________ is a form of software that is distributed, typically for free, with the source code studied, changed, and improved solely by the original developers.

Open-source software

_______________ is a wireless network that connects information technology devices close to one person.

Personal area network

The primary tool for assessing the software marketplace to determine whether existing packages can meet the organization's needs is the _______________.

RFI

An artificial neural network does all of the following except:

Reacts to emotional stimulation

Characteristics of expert systems include all of the following except

Reproducible

Which of these is not a type of industrial robot?

SCUBA

_______________ an Agile development framework that uses a team-based approach in order to keep the development effort focused and moving quickly.

Scrum

_______________ are three subclasses of computers associated with the multiple-user computer

Server, mainframe, and supercomputer

_______________ is a software design approach based on the use of discrete pieces of software (modules) to provide specific functions (such as displaying a customer's bill statement) as services to other applications.

Service-oriented architecture

A federal law that focuses on unlawful access to stored communications to obtain, alter, or prevent authorized access to a wire or electronic communication while it is in electronic storage.

Stored Wire and Electronic Communications and Transactional Records Access Statute Hide Feedback Correct

A_______________ Act was written to protect children from pornography on the Internet but was ruled unconstitutional.

The Children's Internet Protection

Which of the following is not a true statement about the software as a service model.

The SaaS subscriber must manage service levels and availability, so there may be a need to add hardware, software, or communications capacity as the number of users increases.

Which of the following is not an advantage associated with database-as-a-service (DaaS)?

The customer has complete responsibility for database security access and database backup.

_______________ is not a benefit of promoting a work environment in which employees are encouraged to act ethically.

The employees' tendency to act in a manner that seems ethical to them will be suppressed and instead they will act in a manner that will protect them from punishment.

When comparing off-the-shelf software to proprietary software, which of the following statements is not true:

The initial cost of the off-the-shelf software is likely greater.

Which of the following is not a reason to subscribe to on-demand software?

The software does not need to be scalable.

A private cloud computing environment can provide more data security than a public cloud computing environment. True or False?

True

Choosing what data to store and where and how to store the data are two key challenges associated with big data. True or False?

True

E-commerce is dependent upon electronic payments. True or False?

True

Each user should conduct a security self-assessment test. True or False?

True

Implementation of a B2C e-commerce application can lead to B2B opportunities. True or False?

True

In the design of a database, it is not necessary to know how long the data must be stored. True or False?

True

Input/output devices provide data and instructions to the computer and receive results from it.

True

Machine learning used in enterprise software is valuable to decision makers because it saves them time while also providing valuable business insights. True or False?

True

Many Web sites use Cascading Style Sheets (CSS) to define the design and layout of Web pages, and Extensible Markup Language (XML) to define the content, and hypertext mark-up language to join the content with the design. True or False?

True

Module 4: Chapter 5 An organization may require high-quality data to avoid fines and penalties for non-conformance to regulatory requirements. True or False?

True

One means of ensuring that you are interacting with a secure Web site is to look for a Web address beginning with https. True or False?

True

One of the driving reasons behind the need for data management is to manage risk associated with the misstatement of financial data. True or False?

True

Small organizations were slow to adopt ERP systems because of the relative complexity and cost of implementing these systems. True or False?

True

The NSA is required to obtain permission from the Foreign Intelligence Surveillance Court (FISC) to access the telephone metadata records of U.S. citizens, which are now held by telecommunication companies rather than by the government. True or False?

True

The Waterfall approach allows for a high degree of management control, but it does not allow for user interaction with the system until the integration and testing phase, when the system is nearly complete. True or False?

True

The contemporary view of information systems is that they are often so intimately involved in an organization's value chain that they are part of the process itself. True or False?

True

The hosted software model for enterprise software helps customers acquire, use, and benefit from new technology while avoiding much of the associated complexity and high start-up costs. True or False?

True

The primary intent of a code of ethics is to define desired behavior. True or False?

True

The specific business needs and goals of the organization define the method of transaction processing best suited for the various application of the company. True or False?

True

There is a concern by some people who belong to a particular ethnic, religious, or social group that surveillance data collected by the government could be used to identify and target them and their associates. True or False?

True

While there are three key components that must be in place for an organization to get real value from its BI and analytics efforts, the one that is first and foremost is the existence of a solid data management program. True or False?

True

The _______________ is a Web address that specifies the exact location of a Web page using letters and words that map to an IP address and a location on the host.

URL

Which of these is not a type of training for machine learning?

Unsupported learning

Natural language processing may be found in which of these activities?

Using a microwave

Which of the following is not a Payment Card Industry security safeguard?

Using cash in transactions

The fact that big data comes in many formats and may be structured or unstructured is an indicator of its _______________.

Variety

Module 4: Chapter 6 _______________ is a measure of the quality of big data.

Veracity

A network that connects large geographic regions is a _______________.

WAN

_______________ is not a key challenge associated with big data.

Which format the data should be stored in

The fact that _______________ is not a benefit that can be expected from following a professional code of ethics.

a code can provide an answer to every ethical dilemma

Which of the following are non-technical skills not commonly associated with an effective Information system worker?

ability to work in a static, boring environment where there is little change

A key difference between the U.S. and EU fair information practices is that _______________.

although numerous laws have been implemented over time, no single overarching national data privacy policy has been developed in the United States

The overall emphasis of the _______________ phase is on gathering data on the existing system, determining the requirements of the new system, considering alternatives within identified constraints, and investigating the feasibility of alternative solutions.

analysis

What type of computer system can recognize and act on patterns or trends that it detects in large sets of data and is developed to operate like the human brain?

artificial neural network

A blended threat, phishing, and virus are all examples of a(n) _______________.

attack vector

A(n) _______________ is the technique used to gain unauthorized access to a device or a network.

attack vector

The individual application modules included in an ERP system are designed to support _______________, the most efficient and effective ways to complete a business process.

best practices

Web client software used to view Web pages is called _______________.

browser

The perpetrator most likely to be the cause of a cyberattack is the _______________.

careless insider

Improving an organization's performance with e-commerce most often means _______________.

changing the organization's processes to achieve goals

A networking approach wherein many clients (end user computing devices) request and receive services from servers (host computers) on the network is _______________.

client/server

Many organizations use a Waterfall approach with six phases, including investigation, analysis, design, ________________, integration and testing, and implementation

construction

Module 2 : Chapter 4 The primary hardware component of a computer responsible for routing data and instructions to and from the various components of a computer is the _______________.

core

Three ways IS organization can be perceived by the rest of the organization that influence IS strategy are _______________.

cost center, business partner, and game changer

Which of the following is not a function of the database management system _______________?

database data normalization and data cleansing

The process of detecting and then correcting or deleting incomplete, incorrect, inaccurate, or irrelevant records that reside in a database is called _______________.

data cleansing

Capturing and gathering all the data necessary to complete the processing of transactions is called _______________.

data collection

A collection of instructions and commands to define and describe data and relationship in a specific database is a _______________.

data definition language

An individual who combines strong business acumen, a deep understanding of analytics, and a healthy appreciation of the limitations of their data, tools, and techniques to deliver real improvements in decision making is a(n) _______________.

data scientist

A _______________ is a large database that holds business information from many sources in the enterprise, covering all aspects of the company's processes, products, and customers.

data warehouse

_______________ is a diagram used to document the processes of the current system or to provide a model of a proposed new system.

data-flow diagram

At the core of the ERP system is a _______________ that is shared by all users so that all business functions have access to current and consistent data for operational decision making and planning.

database

The individual who is responsible for planning, designing, creating, operating, securing, monitoring, and maintaining databases is the _______________.

database administrator

The three primary types of end user license agreements are individual/multiuser, network/multiuser, and _______________.

single user

Spreadsheet, word processor, and graphics presentation software are used in the _______________ sphere of influence.

single-user

A _______________ is a class of computer used by people on the move to run personal productivity software, access the Internet, read and prepare email and instant messages, play games, listen to music, access corporate applications and databases, and enter data at the point of contact.

single-user portable computer

Module 05: Chapter 7 A network topology in which all network devices connect to one another through a single central device called the hub node is a_______________.

star network

The two basic types of software are application software and _______________ software.

system

A preliminary evaluation of software packages and vendors begins during the _______________ phase when the two or three strongest contenders are identified.

system analysis

The _______________ phase converts the system design into an operational system by coding and testing software programs, creating and loading data into databases, and performing initial program testing.

system construction

Managers of the business functions most affected by a new information system have a key responsibility to ensure that _______________.

the people, processes, and human structure components are fully addressed

Three advantages associated with a software-defined network include _______________.

the risk of human error is reduced, overall network support and operations costs are reduced, and new applications can be made available sooner

Module 3: Chapter 10 Transaction processing systems (TPS) capture and process the fundamental data about events that affect the organization called _______________ that are used to update the official records of the organization.

transactions


संबंधित स्टडी सेट्स

Intermediate Accounting Midterm 2

View Set

CH. 10 PLANETARY ATMOSPHERES... HAHA

View Set

Chapter 7: Long-Term Memory - Structure (Encoding, Retrieval, and Consolidation)

View Set

Chapter 18 - Formation of Sales and Lease Contracts

View Set

Chapter 12: The Future of Data Systems

View Set

Mrs. Long AP Psych Semester 1 Final- Multiple Choice Q&A

View Set

Peds - Chapter 28: Nursing Care of the Child With a Neoplastic Disorder

View Set

Biology Chapter 5 6 7 8 checkouts

View Set