Information Systems Management - C724 (Set 1)
What is a black-hat?
a computer hacker with criminal intent.
What is the definition of a digital signal?
a discrete, non continuous electrical waveform
What is supply chain management software used for?
channels and analyzes to assist executives in making orders, pricing, and inventory decision.
CFO
chief financial officer
CIO
chief information officer
COO
chief operations officer
CSO
chief security officer
How are user expectations best managed during system implementation?
communication and training
Forming an internal user group
consisting of users who support and resist the system can provide the implementation team and management with feedback that may help increase user adoption.
Transmission Control Protocol (TCP protocol)
consists of four abstraction layers: application, transport, Internet, and network access
Unit testing
consists of testing each program within the system in an effort to eliminate errors.
Critical path method (CPM)
is a step-by-step process planning technique that defines the critical and noncritical tasks within a project in order to reduce or minimize process delays and time-related problems.
OLAP databases are multidimensional, that is, data sets are referred to as cubic. What is a disadvantage of a multidimensional database?
lengthy ETL load phase
The Henry Mintzberg model identified ten roles performed by organizational managers. Interpersonal roles include figurehead, leader, and Hint, displayed below _____. Choices: liaison negotiator disseminator
liaison (Page 63)
tuples
list of elements
What data models are used by businesses to map processes to data requirements?
logical, physical and analytical
What does classification do?
looks for patterns that indicate customers' shopping behavior in order to target marketing efforts
What helps e-businesses respond and react quickly to changes within the business environment, more than their traditional brick and mortar counterparts?
operational efficiencies
Motherboard
or similarly the backplane, of a system is the device that contains the system bus and connects the various input and output devices that compose any given computer system.
What is information technology management concerned with?
the management of resources that facilitate access to information
Business continuity planning
is a process by which a business identifies its critical processes, or those areas of its business that must occur without failure lest the business will also fail. Such planning defines specific lengths of time for acceptable outages, responsible parties, contact information, and partners that have assumed the risk of supporting emergency continuity services.
Encryption
is a process by which data is encoded so that only persons with a decryption code may unlock and retrieve stored messages.
Clickstream
is an application that records the location on the screen in which a user clicks while browsing the Internet. These clicks are recorded and saved in web server log files.
cost-benefit analysis
is an important decision point for a business to implement controls or security for any risk, because managers need to evaluate the benefits versus the financial cost for implementing these controls.
Operational Database
is an online transaction processing database (OLTP) and can be used to gather real-time transactional or operational data.
Dumpster Diving
Gathering sensitive or nonsensitive information from refuse. This sometimes illegal act is as simple as foraging through household or corporate garbage receptacles for information. Even innocuous information tied with other innocuous information may, when combined, paint an attractive picture for identity thieves.
Accessibility issues
Issues created by barriers to access, implying that some should have access while others should not.
Property issues
Issues created by the association of rights of property ownership to tangible and intangible goods and information.
Privacy issues
Issues created by the collection, storage, distribution, or mere availability of potentially sensitive information.
Accuracy issues
Issues created by the trustworthiness, accuracy, and legitimacy of information.
Advertising
Naturally, it is not a new concept or business practice. The Internet, however provides a wide variety of methods that companies might use to attract customers and funnel them to their online storefront. Whether through direct marketing such as popup and email advertising, in application advertising, and affiliate advertising programs, helping a business to grow their customer base can be a lucrative business in itself.
Shared hot sites
Offsite facilities shared with other organizations for the purpose of disaster recovery, requiring only adequate or prioritized staffing, but at a cost shared with another organization. An obvious disadvantage and risk is that multiple tenants affected by a common event may cause a conflict.
Cold sites
Offsite office space awaiting occupancy, equipment, personnel, and utility service, allowing recovery within days.
Hot sites
Offsite office space with available and up-to-date systems and service connections, requiring only adequate or prioritized staffing, allowing recovery within minutes to hours.
Warm sites
Offsite office space with available systems and service connections, requiring staffing and updates allowing recovery within hours to days.
Phishing
Often completed through email, this generic act of fraud is often in the form of an email requesting a response containing sensitive information, such as a username or password. However, it can also take the form of a misleading and/or masked hyperlink that directs a victim to an official looking website (i.e. a pharming page) that asks for sensitive information.
SQL Injection
One high-profile example of a malware threat is.................... which uses vulnerabilities in the most popular type of database, SQL, to modify, delete, or steal information.
Physical Data Model
One or more -----------may exist within the logical data model, containing greater detail, such as database tables and key indexes.
Disaster recovery planning
is that which is primed for discharge in the case that a disastrous event occurs and business operations need recovery. Such measures include the creation and execution of processes, and the assignment of certain people to help to restore a business to an operational state.
Common good approach
This big picture approach values choices and motivations that perpetuate value for everyone, to sustain a positive whole-community benefit, despite individual income or position.
Accountability
is the application of responsibility or an obligation to accept responsibility. An example might be the person who has agreed to pay for a meal that she or someone else has consumed.
Predictive analytics
is the process of extracting information from existing data in order to identify patterns and predict future trends.
Black Hat
a computer hacker** with criminal intent.
Grey Hat
a computer hacker** with skills and intent to help organizations protect their networks and systems from others, but whose services may come at a price, or sold to the highest bidder.
Financial Services Modernization Act (aka Gramm-Leach-Bliley Act)
of 1999, which requires organizations and individuals to adhere to rules and procedures for storing and transferring financial information.
Public Company Accounting Reform and Investor Act (aka Sarbanes-Oxley Act)
of 2002, which requires organizations to adhere to rules and procedures to ensure the accuracy, integrity, and security of financial information that leads to the creation and storage of financial statements.
Denial of service
a loss of access created by cut cables or power services, malware, hoaxes, bots and botnets (i.e. a computer or groups of hijacked computers to attack others, often without notice to their owners), smurf attacks, SYN floods, DNS poisoning, or outright hijacking and/or redirection of services.
Identity management
which requires each individual in an organization to be appropriately identified and authenticated at specific entry points to an organization and its information systems, and which help with the enforcement of access control, with the appropriate authorizations pre-selected for them.
Acceptable use
which specifies acceptable and tolerable uses of an organization's computer systems, equipment, and information assets.
Normalization
a process of organizing data in a database in order to eliminate duplication, redundancy, and inconsistency. It involves correctly defining keys, tables, columns, and relationships. (1NF) to the Boyce-Codd Normal Form (BCNF)1, which is the form or state in which all redundancy has been removed.
Algorithms
based on machine learning or artificial intelligence are used in most cases to look for relationships, patterns, or trends.
Data Warehouse
is a collection of historical business transaction data, coupled with other, external market data or information. A key reason for implementing a ---------- is to enable storage of data from multiple sources to be queried and analyzed in order to help with management decision making. ---------------store transactional and analytical data for reporting and analysis purposes.
Online Transaction Processing (OLTP)
is a database design used for browsing and manipulating business transaction activity. Can be used to gather real-time transactional or operational data, such as inventory on hand.
Responsibility
is a perceived, moral, or legal duty that someone possesses to control or handle a specific or general task.
Database Server
is a powerful computer that stores the databases and DBMS to access and administer the database.
Data Mining
is a powerful tool used by many online businesses to build customer profiles. It is the process of identifying hidden patterns and relationships in large databases and applying rules to that data in order to predict future behavior.
What is the purpose of a general MIS evaluation?
A company's general evaluation of their MIS is to analyze the system performance against outlined objectives.
True or False. Changing or implementing new information systems creates opportunities for businesses to gain a competitive advantage.
True (Page 55)
Despite security risks, businesses must implement what?
a social media communication strategy
What is the total cost of ownership? (TCO)
a study to determine economic feasibility
Optical Character Recognition (OCR)
is a system that uses a scanner to read characters, automatically inputting them into the system in digital form.
Decision Tree
is a tool used in decision analysis and is another tool used to represent the entity-relationship model.
The _____ management component provides information about data relationships that are too complicated for a database to represent. Choices: knowledge interface data
knowledge (Page 65)
What is a primary role of a systems analyst?
arbitrator and consultant
The _________________ of a global information system is the basic structure of the information required to coordinate international business activities.
architecture
The _________________________of a global information system is basic structure of the information system required to coordinate international business activities.
architecture
Balanced scorecards are often used in business. What is a balanced scorecard?
a tool used by management to track and monitor staff and organizational activities
What is the definition of a systems analysis logical model?
a type of data diagram
What does a software engineer do?
code software to solve problems or perform tasks
Moore's Law
coined by the co-founder of Intel, described that components in integrated circuits or microchips will double every two years.
Transaction processing systems (TPS)
collect, store, update, and retrieve transaction data within an organization. Common business transactions include employee payroll, customer sales, and supplier payments.
What does the behavioral model hope to a accomplish in management decision making?
the unpredictable and less systematic aspects of decision-making
Packet switching refers to a computer networks ability to do what?
transmit discrete, parsed data in small packets
Telecommunication networks transmit data, voice, and _______ over long distances
video
What is a zero-day-attack
a threat or attack that exploits known or unknown vulnerabilities in software. Software developers quickly patch vulnerabilities once known, though identifying these vulnerabilities takes time. Once found and fixed, developers must send patches to all affected or potentially affected users, which, unfortunately, does not occur consistently. In other cases, the public release of patches is used as a tool for malware authors to reverse engineer and easily attack those who have not updated their systems in time.
White Hat
an authorized and ethical computer hacker**, one who helps organizations to protect their networks and systems from others, via penetration testing, or the design and implementation of policies.
What is a white-hat?
an authorized and ethical computer hacker*, one who helps organizations to protect their networks and systems from others, via penetration testing, or the design and implementation of policies.
What is a cyber criminal?
an individual or organization interested in exploiting computers and networks for the purpose of generating revenue. Note that organized crime has a very active presence in cybercrime.
What is a hacktivist?
an individual or organization interested in vandalism, cyber-terrorism, or hacking for a stated cause or purpose.
separation of duties policy
an organization might separate those roles which creates revenue (i.e. sales staff), creates sales quotas (i.e. management), and keeps track of performance (i.e. finance and accounting).
What is the overall job function of the systems analyst?
analysis, design, and implementation
The reporting service element of a successful business intelligence system creates _____ databases that help expedite custom queries. Choices: relational analytical heirarchical
analytical (Page 64)
Why is it not good practice to perform analytics on an online transaction processing database?
analytics would affect the database performance
What is the main role of the software analyst?
analyze and modify software systems, implement and test programs, and document software requirements
What does forecasting software do?
analyzes a series of values in order to predict or forecast the value of other variables.
Describe the process of data mining
analyzing data to gain insight or intelligence
Processes
and procedures provide a structured sequence of activities to govern the use, operation, and maintenance of IS.
When using GDSS, the _____ input mechanism reduces negative behavior, including groupthink and criticism of individual member input. Choices: anonymous parallel simultaneous
anonymous (Page 65)
What are the 7 layers of the OSI model?
application, presentation, session, transport, network, data link, physical
Clickstream
applications are those that track and analyze an application's activity, including how it is used and where a user clicks.
The use of all capital letters in written communication, especially letters, memos, and email, is considered to be all of the following, except: appropriate or acceptable aggressive or angry yelling or shouting
appropriate or acceptable (Page 60)
which step of the model will the company create a functional flow diagram
architecture testing
What are podcasts, and why are they a good source of information for systems analysts?
audio files that contain educational content
Business intelligence systems reduce labor costs through Hint, displayed below _____ data collection and reporting. Choices: automated customized processed
automated (Page 64)
What are the four categories of an organizational change?
automation, rationalization, process redesign, and paradigm
What configuration does the server control the traffic going back and forth the network, thereby maximizing the traffic on the network.
client/server configuration
What is information technology management responsible for in a college setting?
college computers, logins, network access, help desk support, and keeping the technology maintained, upgraded and secure
What is enterprise resource planning
combined systems into comprhensive system
What are measurement, analytics, reporting, collaboration, and knowledge management?
common functionalities of business intelligence
One reason IT is important is because video conferencing has become cheaper, quicker, more collaborative, and more efficient. Of what IT benefit is this an example?
communication
North americans are usually very straightforward and distrust evasive behavior. This characteristic is an example of a cultural difference in what?
communication style
Besides customer attributes, what factor can be used by an e-business to accurately price goods?
competitors' public pricing information
A decision tree is a viable decision analysis tool, provided the developer included all relevant _____. Choices: components events outcomes
components (Page 65)
Input
components include devices that provide input into the processing unit. These include peripherals, such as the keyboard, mouse, microphone (audio input), sensors, and document or visual scanners.
Output
components include internal storage devices or processes, as well as external peripherals such as monitor screens (visual output), speakers (audio output), and printers (physical output).
Storage
components include primary temporary storage and secondary long-term storage devices.
Data models used when mapping business processes, relationships, and data requirements
conceptual, logical, and physical
What do the letters CIA stand for?
confidentiality, integrity, and availability
The first internet social media site was Six Degrees in 1997. Six Degrees was a social network site that allowed users to develop an online profile to __________________ with other users.
connect
What are peer-to-peer network topologies?
connect each user in a network directly
What is the definition of a core router?
connect large business to backbone of internet
Wide area network (WAN)
connects business campuses consisting of computer systems across large distances
Local Area Network (LAN)
connects computer systems of an organization or a floor of a building.
What does network economics see the cost of adding new members as?
consequential
System testing
consists of testing the system as a whole in order to determine whether the modules function properly, and whether the system operates as planned.
intelligence phase
consists of the discovery, identification, and understanding of the problem1 During this phase, a problem may be classified or broken down into subproblems.
Implementation phase
consists of the execution of the alternative and continual performance monitoring. Because the ............... frequently requires the introduction of change, resistance may occur, necessitating the importance of user adoption and management support.
design phase
consists of the identification and exploration of alternatives and solutions to the problem. The design phase includes the construction of a model of the problem and the evaluation of the alternatives for feasibility.
Business analytics (BA)
consists of the tools and techniques used for the analysis and understanding of data, including data mining, modeling, statistics, and online analytical processing (OLAP). Technology vendors developed both terms, with the five largest BI and BA providers being IBM, Microsoft, Oracle, SAP, and SAS.
The ability for a telecommunication network to carry voice, data, and video is called
convergence
What are the systems implementation phases?
conversion, development, testing
What are critical issues of information systems
convey revelance and value of IT to the organization, Manage relationships between IT and Stakeholders, Implemenation of effecitve IT solutions
What is not practical for telecommunications, especially with the advent of wireless?
copper building wire
What business structure is a legal entity that can encompass a big number of shareholders?
corporations
What business structure is an individual not help personally accountable for any liabilities, risks, and debts from business operations?
corporations
What does data cleansing do?
corrects or removes duplicated, incomplete, or inaccurate data
What data should be scrubbed so that they are consistent with the design of the database?
corrupted data
IT is important because it helps businesses streamline processes that increase productivity and profits. What IT benefit does this exemplify?
cost effectiveness
How can mobile e-commerce help businesses actively market to their customers?
create direct channel for doing business, advertise through product or brand marketing using integrated applications, and develop salable mobile applications
What is a management solution when developing global systems?
introducing business process changes slowly will make the transition to the new system less disruptive, and there will be less resistance to the change
Uniform Resource Locator (URL)
is a protocol used by a client computer to request a website from a server via HTTP or HTTPS.
File Transfer Protocol (FTP)
is a protocol used to transfer files from one computer to another.
paradigm shift
is a radical form of change in which the nature of the organization is completely changed.
Virtual Private Network (VPN)
is a secure tunnel through the Internet using a public network infrastructure.
Database
is a set of data, in electronic format, organized in tables and easily searchable.
Value Chain
is a set of inputs used by a strategic information system and put into meaningful outputs to help a company gain a competitive advantage in the marketplace.
Database
is a set or collection of data that is centrally located in electronic format, organized in tables, and easily searchable.
There is a direct relationship between the system ______ of an organization and the effectiveness of the organization's management information. speed effectiveness performance
effectiveness (Page 59)
Server
A system used to provide services to other systems. Servers need not be powerful computers. Server operating systems may be used on personal computers, including desktops or laptops, though usually servers are built on more resilient and reliable components.
What are factors that influence the success of an information system?
functionality of the system, the quality of the data, the usefulness of the system, system usage, system efficiency, user satisfaction
What is the definition of data extraction?
getting data from data sources
The _____ of evaluating alternatives is to select the option that best meets the user requirements. Choices: limitation goal risk
goal (Page 57)
What are the 3 primary activities associated with business performance management?
goal selection, attainment measurement, and achievement intervention
Nation state
government focused and funded individuals or organizations interested in cyber-warfare against other nations and economic infrastructures.
What is nation state?
government focused and funded individuals or organizations interested in cyber-warfare against other nations and economic infrastructures.
What best describes the role of a Systems Analyst?
A systems analyst is responsible for recommending information technology to meet organizational needs.
hierarchical
A tree-like structure database is a type of .......... database.
TELNET
An early and insecure remote access protocol used to allow a user to log on to a remote system. Many newer, more secure and more modern forms exist, including secure shell (SSH) and Remote Desktop Protocol (RDP)
TELNET
An early and insecure remote access protocol used to allow a user to log on to a remote system. Many newer, more secure and more modern forms exist, including secure shell (SSH) and Remote Desktop Protocol (RDP).
D. Trojan horse
An employee downloads software that claims to improve computer performance. Instead, it introduces system vulnerabilities. What type of threats is this software: A. Virus B. Spyware C. Worm D. Trojan Horse
Which activity is an example of how information systems support business functions of human resource management?
An employee processes monthly payroll checks and benefits using an open-source software.
D. Offering an ethics training program
An employee works as an engineer at a software firm and checks personal email while at work. Due to the long hrs at office, the employee does not have time to check email at ho me and feels that his actions are acceptable even though it is against the companies internet policy. Which method could be used to discourage the employees behavior? A. Educating employes on stockholder interests B. Reducing employee workload C. Requiring company access to personal email accounts. D. Offering an ethics training program.
Quid Pro Quo
An exchange of something of value for information. For example, the gift of a T-Shirt in exchange for personally identifiable information.
(Example of dumpster diving) What is quid pro quo
An exchange of something of value for information. For example, the gift of a t-shirt in exchange for personally identifiable information.
What is a hypervisor?
An expensive application used by large businesses to improve computer network performance without having to physically change the network. It is not necessary for small businesses
A. Zombie
An individual writes a program that will take over a computer for the purpose of launching attacks on additonal computers. Which type of threat is being used? A. Zombie B. Phishing C. Vishing D. Pharming
A. Spyware
An individual writes software that collects personal data about a user from a computer and transmits it over the internet without the user's knowledge. What type of threat is this? A. Spyware B. Virus C. Worm D. Trojan Horse
D. Genetic algorithms
An internet service provider offers subscribers e-mail accounts and would like to develop software to identify spam. Which tup of artificail intelligence technology should be used? A. Fuzzy Logic B. Virtual Reality C. Knowledge management D. Genetic algorithms
Which of the following describes a direct system implementation? An old system operates during new system implementation. An old system is used as backup for the new system. An old system is replaced by new system without any overlap.
An old system is replaced by new system without any overlap. (Page 58)
artificial neural networks
Another data mining methodology more complex is...............which are nonlinear algorithm models used in data mining.
What are two examples of information technology?
hardware and software
chief technology officer (CTO)
has ultimate responsibility for all technology implementation, maintaining technology compliance regulations, and identifying technology risks for the company. The .... focus is on day-to-day operations, overall implementation of technology strategies, and efficiency of the IT systems. In most corporations, the .... reports to the CIO.
ABC playground company has been asked to build new playground at a local elementary school. The project must be completed before the first day of school. What steps would increase the likelihood of finishing the project on time?
have the most experienced workers complete tasks on the critical path
What must an effective business intelligence platform accomplish?
help align the organization with business objectives
What does WBS (work breakdown structure) do?
helps the CPM visualize the activity diagrams that define the critical path
Multicore processor
A chip with multiple CPUs is called a ........ This typically provides more computing power for they can run multiple instructions in parallel.
What is the difference between data mining and web mining?
Data mining examines and reveals patterns in a structured DBMS, while web mining discovers patterns in a less structured format, such as the internet.
Describe the difference between data mining and big data?
Data mining is used to analyze business databases, while big data analyzes big data sets.
Primary Data
Data observed or collected directly from first-hand experience
corrupted
Data quality audits and data cleansing are important for managing data resources. What data below should be scrubbed so that they are consistent with the design of the database?
Data Information
Organized Facts
Software as a service (SAAS)
Software licensed and hosted on centralized or distributed servers that belong to a service provider
class model
helps visualize static entities and relationships between them. With systems analysis and design, the model is a representation of user requirements.
What kind of database is a tree-like structure?
hierarchical
What does predictive analytics use to better understand customers and other business entities in order to define areas of opportunities or areas of risks?
historical data
Manual data capture is most prone to _____ errors. computer machine human
human (Page 58)
What is the system that helps improve employee productivity by managing the workforce?
human resources
Digital Signature
Term used for marking or signing an electronic document, by a process meant to be analogous to paper signatures, but which makes use of a technology known as public-key cryptograph
SDLC Implementation Phase
Testing and maintaining, Implementing and evaluating
Confidentiality, integrity, and availability
The CIA triad is a model that guides information security policy. What do the letters in CIA stand for?
What is the internet?
The Internet is a complex resource that consists of billions of computer and network connections, each with its own network interface. Every single connection to the Internet requires an IP address, with a DNS system that gives users a friendly way to access web pages.
Convergence
The ability for a telecommunication network to carry voice, data, and video is called
Considerable information is available on the Internet from systems analysts and organizations who choose to share their experiences and best practices. These Internet-based sources include podcasting, RSS feeds, webinars, chatrooms and forums, social network sites, and newsletters. Can you describe the advantages and disadvantages of utilizing the Internet as a source of information?
The advantage of using the Internet to access information is the immense volumes of information and resources within it. The disadvantages to the utilization of the Internet as a source of information is the verification required and the potential inaccuracy of information. The proper techniques for an Internet search include using specific techniques and evaluating the results. (Page 61)
True or False. Easy access to information is both an advantage and disadvantage to information management.
True (IM is responsible for allowing easy access to pertinent information on a network, which is advantage, but they are also challenged with keeping employee information secure and private with can be a disadvantage to easy access.)
True or false. One of the possible ethical or societal issues that arise from the increasing globalization of technology is violating legal statutes.
True
True or false. Web Developers will continue to be in high demand because the internet will continue to transform the way society and business interact and operate in the 21st Century.
True
What is the objective of the systems analysis stage in the waterfall method?
identify user system and software requirements
Benefits of data warehousing to businesses
improves decision making, delivers business intelligence
Post Office Protocol (POP)
in the application layer of the Internet standard protocol and is used to retrieve email from a mail server.
True or False. In order to model a system, it is necessary to determine the various inputs and outputs required by the customer, as well as the necessary processes for managing them.
True (Page 57)
Which of the following is a great, free, and ubiquitous source of information for systems analysts?
internet
What factors help e-business accurately target individual customers?
internet and databases
What do hiring managers use to identify inconsistencies in a candidate's background?
internet search and social media sources
What are the categories from Henry Mintzberg's management behavior roles?
interpersonal roles, decisional roles, informational roles
True or False. The operational feasibility study objective is to understand if the proposed system is compatible with existing or proposed organization operation objectives
True (Page 57)
True or False. Project managers and software developers face many obstacles in their work. One key challenge during the design and implementation of an information system is scope creep.
True (Page 58)
True or False. Information technology supports various types of decisions and management roles at various levels within the organization.
True (Page 63)
True or False. Decisive analytics use visual analytics that reflect human reasoning in order to support management decisions.
True (Page 64)
True or False. Geographic information systems (GIS) are tools used by management to help make decisions about product pricing, product selection, and marketing efforts.
True (Page 64)
True or False. The MIS decision component referred to as hardware consists of input/output devices, CPU, operating system, and media devices.
True (Page 65)
True or False. When managing systems implementation, the primary concerns with reliability are inconsistent output, system failure, and system unresponsiveness.
True (Page 58)
True or False. The focus of strategic-oriented evaluation is the determination of whether the information system outputs enable management to make strategic decisions.
True (Page 59)
True or False. CASE workbenches are classified with the same six categories as CASE tools.
True (Page 61)
True or False. The advantage of using the Internet to understand new IT concepts and access valuable information is that the information is accurate and immense on any IT topic.
True (Page 61)
False: Mashup is the correct terminology when mixing software to create a customized app.
True/false: Cloud computing allows users to ix and match software components to create a customized application.
True
True/false: RAM is Primary storage device, and it stands for Random Access Memory
True
True/false: RFID technology enables companies to monitor and track inventory using wireless handheld devices.
True
True/false: Software applications have a life cycle because of hardware technological advances described by moores law
A. Spyware
Two individuals are notified that soaftware has been found on their computers that collects personal information about them w/out their knowledge. Which type of threat has been found? A. Spyware B. Worm C. Virus D. Trojan horse
Software and data
Two out of six of the main components of a computer-based information system.
Secondary data
Type of quantitative data that has already been collected by someone else for a different purpose to yours. For example, this could mean using: data collected by a hotel on its customers through its guest history system
A web browser is required to surf the internet. What other protocol is needed by a client computer to request a web site via HTTP or HTTPs?
URL (uniform resource locator)
URL
Uniform Resource Locator is a protocol used by a client computer to request a website from a server via HTTP or HTTPS
Bargaining Power of Suppliers
Your company makes cars and firestone tires raises its prices for the tires for your cars. Do you go to another tire company?
True
[True/False] A data warehouse enables businesses to store analytical data and business intelligence from multiple sources.
True
[True/False] Although a Geographic Information Systems (GIS) captures and analyzes spatial or geographical data, it can be used by operations in industries such as engineering, transportation and logistics, telecommunications, insurances, and food.
True
[True/False] An Energy Management System (EMS) can help to manage energy usage and reduce operating costs in an organization. Google's Nest Labs automatic thermostat is an example of an EMS.
True
[True/False] Business intelligence is obtained by performing analytics on OLTP databases.
What is a data mart?
a data warehouse subset focused on a single area or function
Intranet
is a simple yet very beneficial addition to an organization's digital presence. benefits are Centralized information sharing, Email and collaborative software and Centralized storage repository.
database management system (DBMS)
is a software program that allows an organization to organize, manage, and provide multiple users with access to data used to perform administrative tasks to databases.
Data mart
is a subset of the data warehouse that is accessible by a specific department or strategic business unit. The basic characteristics of --------------- and data warehouses are that they are organized by subject or function, they use OLAP, and they are multidimensional, integrated, nonvolatile, and time variant.
data warehouse
is a system used for data analysis and reporting. They are central libraries of data that are combined from one or more sources and organized by subject to support organizational managers.
Hyper Text Markup Language (HTML)
is a system used to convert plain-text document into one optimized for viewing as a Web page, integrating colors, graphics, fonts, and links.
Internet of Things (IoT)
is a technology in which embedded electronic sensors enable connectivity in devices so they can communicate via the Internet. They are commonly used to measure and manage environmental states.
Voice over internet protocol (VoIP)
is a technology that enables the traditional use of a telephone, but with only a high speed Internet connection instead of a standard telephone circuit connection (aka PSTN).
relational database
is a type of database in which multiple information files are combined into one database in one location, where data are stored in two-dimensional tables known as relations and contain multiple entities and attributes.
Flat File
is a type of database model that resembles file cabinet functionality.
Hierarchical Database
is a type of database that connects tables in a master/slave1, leader/follower, or primary/replica format.
Big Data
is a very large data set (structured or unstructured) that can be mined or analyzed to find new trends or relationships for business intelligence.
What is used to show the relationship between data fields and tables in entity-relationship models?
pointers (or linked lines)
Pursuing individual interests or agendas in an organization without regard for company goals is an example of what organizational feature?
politics
Storage devices
portable hard drive, flash drive, tape drive, Cloud, etc.
Consumer credit scores are an example of Hint, displayed below _____ analytics. Choices: predictive descriptive prescriptive
predictive (Page 64)
What can be used to predict future outcomes or trends, but it does not tell you what will happen in the future?
predictive analysis
What are two key elements that make up the data warehouse?
presentation and staging
What is the difference between a primary key and a foreign key in a relational database?
primary keys define columns in a table, while foreign keys are typically a constraint to reference two tables.
The primary role of a systems analyst is _____. coder project manager problem solver
problem solver (Page 60)
What are the key factors to consider when planning and organizing information technology in business?
processes and employees
Management information systems (MIS)
represent a category of information systems that serve lower to middle managers. MIS provide performance reports based on the results from transaction processing systems, such as product cost data, sales data, and expense data.
Information Technology
refers to the non-human, non-process components of an information system (e.g., hardware including network devices, software applications and data).
Cardinality
refers to the numeric relationship between two entities.
Hardware
refers to the physical IT devices (i.e., equipment) that are integrated into an information system.
What data is stored in related tables that can be accessed and joined in many different ways without having to reorganize the tables?
relational database
domain model
represents the definitions and concepts of the problem, and defines relationships of the entities.
Usability testing
requires a formal meeting with several users which includes an interview and observation or screen-sharing. Information obtained during this process will assist with the development of additional training or system customization.
Benchmarking
requires contacting users and teams that have successfully implemented a similar system in order to gather best practices.
Prototyping model
requires the development of a scaled prototype that can be tested prior to full-scale development.
What are the factors that must be considered when implementing anew information system?
resistance to change, user, technical ability
Organizations can help to maintain data integrity by implementing data governance policies. Only employees with appropriate access can __________________ data from the server
retrieve
A software library is built and shared on the cloud, enabling developers to access common software through a process known as code _______. compelling development reuse
reuse (Page 61)
Purchasing homeowner's insurance in case of a fire or hurricane is an example of what?
risk transference- shifting the risk to someone or something else.
What is qualitative risk analysis?
the measurement of probability and consequences of risks
direct implementation
the old system is replaced by the new system without any rollout or overlap.
radio frequency identification (RFID)
tracking barcodes and wireless sensor networks, some used in supply chain operations.
The origin of global markets was__________.
trading on slike route
Due to its data capture and display ability, GIS can be a very beneficial tool for law enforcement. Which data is most useful in a GIS to help fight crimes?
traffic, locations, taxes
What type of management information systems do operational and middle management use for structured decisions?
transactional processing systems
What are the for main global business strategies that form a global firm's organizational and information systems structure?
transnational, multinational, franchisers, domestic exporter
Decision ______ represent graphical representations of the rules, conditions, and actions of the process. Choices: matrices tables trees
trees (Page 57)
What reveals the patterns of behavior, such as currency fluctuations, which can affect a stock or an entire industry or market?
trend analysis
true
true/false: A server is a computer programmed to provide multiple users application services and can have a dule or quad core processor. some servers even contain a octa core CPU with eight processors on a chip.
True
true/false: Engineers tasked with designing complex systems typically require workstations as their computer systems.
-False: HTML is a software language used to design websites
true/false: HTML is a software language used to manage relational databases
true
true/false: Open source software has been found to contain fewer defects than proprietary software.
False: Plan for the future and do not try to get just the bare minimum you will need today: make sure the system meets the recommended requirements, if not more.
true/false: When purchasing hardware, do not purchase more than the minimum required by the software.
true
true/false: a 2 in 1 computer system is a computer that can act as a laptop, with high level of capability, and use tge display as a touch screen pad.
What does the query function do?
turns raw data into meaningful information based on the criteria specified by the user.
There are _____ main methods for modeling and designing systems. Choices: four two three
two (Page 55)
synchronous
two way communications, such as audio/video teleconference and instant messaging
CIO (chief information officer)
typically second in command, also known as the vice president of operations. Reports to the CEO or president and makes sure all company operations run smoothly.
Information systems are less suitable for _____ decision making. Choices: unstructured structured
unstructured (Page 63)
Strategic information systems
use technology resources to enable an organization to meet a specific business goal or initiative and to provide a competitive advantage.
Decisive analytics
use visual analytics that reflect human reasoning in order to support management decisions.
What is QoS?
used to measure performance of data communications
Unified Modeling Language (UML)
which is a general-purpose modeling language designed to provide a standard method to represent the design of a system.
system-oriented evaluation
which is the ability of an information system to discriminate between files or data that are relevant to a user query, and those which are not relevant.
Central Processing Unit (CPU)
which is the brain of the computer. Historically, this unit included several components, such as a control unit, a processor, an arithmetic or logic unit, and memory components.
System Bus
which is the medium through which communications between the input, processor, storage, and output occur.
True or False. The systems analyst sometimes plays the role of arbitrator to resolve conflicts by addressing user concerns.
True (Page 60)
True
True/false: Human touch and human gestures are computer input technologies
Tree Topology
Two or more star networks connected together. The central computers of the star networks are connected to a main bus (network of star networks)
Broadband has enabled data, voice and video to be combined and transmitted over one network. What is the name of the standard that allows this convergence between voice and data networks?
VoIP
Which conversion implementation should a company use if it plans to discontinue using the legacy payroll system on Friday and begin using a new payroll system on Monday? A Phased B. Pilot C. Parallel D. Plunge
D. Plunge
VoIP
Methodology and group of technologies for the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the Internet
choice phase
consists of the selection of an appropriate solution from the available alternatives. Specific values may be assigned to the decision components during this phase.
In information systems, what is the act of capturing data for processing called?
input
A decision tree tool is not viable when data contains a different number of
levels
What is the role of the computer systems administrator?
manage company workflows, identify and fix network issues, and maintain equipment and software
What are the major contributions or factors that drive global systems and the internationalization of business?
management and coordination, production, operation, supply, distribution, global customers, and global marketing
Scope creep
occurs when the project continues to grow in scope, or uncontrolled changes occur during the course of the project.
Family Education Rights and Privacy Act (FERPA)
of 1974, which requires educational institutions receiving certain federal funding to protect the information and privacy of certain aspects of a student record.
Health Insurance Portability and Accountability Act (HIPAA)
of 1996, which requires organizations and individuals who handle medical information to adhere to rules and procedures for billing and information transfer.
Output devices
printer, monitor, speakers, etc.
IT is important because it helps ensure new, quality products reach the market faster and to more customers and suppliers. This is an example which IT benefit?
product development
What can be disseminated to millions of consumers through social media, reducing marketing costs compared to traditional print, radio, and television advertising?
product marketing
System development life cycle (SDLC) consists of 6 stages. What is the last stage?
production and maintenance
RFID technology helps companies to be more ______________ with inventory management because they eliminate the need for physical handling of materials during cycle counting.
productive
What is the definition of clickstream?
records where a user clicks on a web page
What are OLAP databases used for?
reporting- generate reports that have information or business intelligence
What led to the innovation of the telephone?
telegraph technology
Who does the the LinkedIn model benefit?
the entire recruitment community
Data normalization
which is the reorganization of tables, and attributes within a database to reduce duplication is especially important during database redesign, but also when data is imported or merged.
data integrity
which refers to the accuracy and consistency of data within the database over its lifecycle.
principle of least privilege
which suggests that to avoid fraud, abuse, and theft, personnel are given only enough access in order to complete tasks within their job.
Hypertext Transfer Protocol Secure (HTTPS)
which uses HTTP as well as technologies such as Secure Socket Layer (SSL) and Transport Layer Security (TLS) to encrypt and decrypt data between the user and Web server.
What category of CASE does Microsoft Visual Basic fall under?
workbenches
Supply chain management system
works to increase the efficiency of the process of getting materials developed into the products and pushed out to the customer.
Supply chain management system (SCM)
works to increase the efficiency of the process of getting materials developed into the products and pushed out to the customer.
Credentials
would establish what level and type of access a user would have.
Computer programmers
write code to instruct computers to perform certain tasks.
Supply Chain Management (SCM)
Walmart uses ............... software to plan and distribute products from the warehouses to the local stores.
Automation
is the most common opportunity through which employees are assisted with performing tasks more efficiently and effectively.
Build and Fix
is the simplest SDLC model allowing for code to be incrementally modified and implemented until successful.
What should be avoided in effective written communication?
jargon and terminology
Written communication is a concrete form of communication because it should be difficult to Hint, displayed below ______. understand interpret misinterpret
misinterpret (Page 60)
How does web-based databases allow users to access information?
mobile devices or laptops
What are process description tools?
modular design, decision tables, decision trees
How does business intelligence make information actionable?
provides real-time, relevant, and user customized information that is easily shared
What are the classifications of cloud computing?
public, private, and hybrid
What does wireless communication use to send and receive signals?
radio waves over the radio spectrum
The key benefits provided by wireless networks are
that information is available from anywhere, and the networks can be easily reconfigured because there is no physical wiring.
What is an advantage of information management?
the ability to collect, organize and process data from internal and external sources and distribute the resulting information to support decision making and business processes.
What best describes the classical model in management decision making?
the classical management model supports planning and controlling
What is the meaning of outcomes in decision theory?
the consequences of an event
Define synergy
the cooperation of two or more companies to gain efficiency and growth
Data Management
the creation, update, and deletion of the data within the database.
Search engine optimization (SEO)
the process of ensuring the site is visible and highly ranked in search results, is a high priority. The following figure displays many of the areas that a Web developer must consider.
What does velocity mean when describing big data?
the speed required to process or analyze big data
Why is it imperative that modern businesses have a social media marketing strategy?
to capture this new community of users and to address issues of social care
Customer Relationship Management System (CRM)
Customer loyalty, customer interaction, communication, documentation, database, promote certain information into target sales
Normalization prevents inaccurate data entry
Which of the following is not a reason to normalize a database?
Types of attacker are as follows:
White-hat grey-hat black-hat cyber criminal hacktivist nation state
Clickstream
is an application that records the location on the screen in which a user clicks while browsing the Internet.
People in Information Systems are
Specialists
What application provided by the internet allows a business to transfer documents automatically without human intervention?
(EDI) Electronic Data Interchange
What is the typical broadband data speed of a 4G network?
100,000 kbps
Ring topology
Connected in a circular fashion and data travels in one direction
Using the IP address of 142.212.25.1, which two bytes are managed and assigned by the computer administrator to each individual host on the network?
25 and 1. The last two bytes are assigned to and managed by the client. The first two bytes are assigned to and managed by the ISP
What is LinkedIn?
A database of possible employees or candidates
SDLC Phases
Analysis, Design, Implementation
What is Synergy
Cooperation between businesses, combined expertise
IS 4 pyramid
TPS, MIS, DSS, EIS
Which technology trends such as the Internet of Things (IoT), Big Data, Cloud Computing, eCommerce, the internet has become a very important and useful aspect of society. To prepare for these trends and aid in technology evolution, a necessary and critical change in telecommunications was the conversion from IPv4 to IPv6. What was the primary reason to convert to IPv6?
To increase the number of available of IP addresses
The IP version 6 (IPv6) addressing scheme was developed in 2006 for what purpose?
To increase the number of unique IP addresses
TCO (Economic Feasibility)
Total Cost of Ownership
Wi-Fi Protected Access (WPA)
Wi-Fi security algorithm (256bit) - 2003 - 2006
Information Systems
accept data as input
CEO
chief executive officer
What are the basic analytical operations?
consolidation, slicing and dicing, and drilling down
System software
operating systems (windows)
Rapid application development allows adaptability because ______ are developed during the process. Choices: prototypes specifications methodologies
specifications (Page 56)
Information Technology is a subset of ______
Information Systems
Business intelligence consists of what?
databases, data warehouses, and analytics
What is the primary role of information systems managers?
decision making
Freemium involves what?
digital pricing strategies
The primary component categories that make up a Computer-based Information System (CBIS)
(PPHSND) people, processes, hardware, software, networks, and data
relational
, logical, and physical data models are used by businesses to map processes to data requirements.
What are Porters Five Forces Model?
1. Competitive Rivalary, Bargaining Power of Customers, Bargaining power of Suppliers, Threat of New entrants Threat of Subsituites
What are the 3 norms in normalization?
1NF, 2NF, and 3NF
What adoption is a method of system transfer in which the old system is replaced when the new system is implemented? Direct Parallel Serial
Direct (Page 58)
Point to Point topology
Direct link between two computers
What are the downsides to businesses having too much information? Too much information can create information overload and organizational paralysis. Too much information brings down business intelligence databases. Too much information is expensive to generate and act upon.
Too much information can create information overload and organizational paralysis. (Page 64)
Search engine optimization
Tools that allow webmasters and developers to achieve better rankings from search engines, implying that traffic would better route to a site as a result.
SDLC (Software Development Life Cycle)
Traditional method to develop software
logical data model
contains more detail than a conceptual data model, often defining operational and transactional entities for the database.
When should oral communication be avoided?
when conveying documentation
Field
An attribute of an entity, such as name, address, student id.
Data
The input the system accepts to produce useful information
DBA
Database administrators
ERP
Enterprise resource planning systems
Defeat wardriving
Hide SSID
Data
Input
Access point client
Machine wired to access point
e-Tailers
Provide access for the sale of physical goods, which are then shipped to their customers
TPS
Transaction processing systems
proprietary
belonging to a single organization.
What are steps in the decision-making process?
define problem, develop alternatives
What is an example of big data analytics applications?
new drug discovery
What size is big data database considered?
petabyte
Information that have been organized to provide value to an organization
Data
Example of IS helping HR
Monthly payroll
A decades-old company has several hundred employees and a modern IT infrastructure. An IT security analyst has been hired to provide a layered defense structure and must take measures to ensure confidential information remains confidential. Which activities will help the IT security analyst accomplish this goal? (3 answers)
1) mandating annual information security training for all employees 2) Requiring the use of ID blades at building access points 3) Requiring the regular acknowledgement of acceptable use policies
Analysis Phase
1. Identify problems, opportunities, and objectives 2. Determining information requirements 3. Analyzing system needs
Using the IP address of 142.212.25.1, which two bytes are managed and assigned by the Internet Service Provider?
142 and 212
Five competitive forces
1. threat of new entrants 2. threat of substitute products or services 3. bargaining power of customers (buyers) 4. bargaining power of suppliers 5. intensity of competitive rivalry
What is the primary difference between a 1G cellular network and the current 4G network?
1G enabled mobile voice telecommunication while 4G offers voice, data and video
What are the steps in building a logical model of a system?
1st. collect information about the proposed system, 2nd. development of functional flow diagrams, functional specifications, and a flow dictionary, 3rd. functional flow diagram presented to customer, user input obtained, model is revised, and user approval is obtained
Bluetooth is a wireless protocol that connects nearby devices with peripherals at what spectrum band?
2.4Ghz
How many steps are in the prototyping software development method?
4- user basic requirements, development of prototype, using prototype, and revising prototype
Design Phase
4. Designing the recommended system 5. Developing and documenting software
Implementation Phase
6. Testing and maintaining the system 7. Implementing and evaluating the system
Although teen usage of social media exceeds that of adults, what adult demographic is experiencing an increased use of social media, with 31% of members of that age group reportedly using social media?
65 years and older
How many layers are in the standard OSI model?
7- physical, data, network, transport, session, presentation, application
A software engineer _________________________computer programs to perform specific tasks.
? NOT procures
One of the advantages of information systems for businesses is to take raw data and turn it into information, and then transform that information into knowledge. The number of people in Florida with incomes below the poverty line is an example of
? Not Knowledge
There are four main global business strategies that from a global firm's organizational and information systems structure. Which item below is NOT one of those strategies?
? Not franchisers
Global business challenges are typically no worse than domestic business challenges, except for the distance. Knowing the challenges upfront can alleviate some of the problems in the end. Of those listed, which is the easiest to solve?
? Not personnel
?
A ............ is a planned design structure of a database.
Dynamic Host Configuration Protocol (DHCP)
A DHCP server or appropriately configured router automatically and temporarily assigns IP addresses to DHCP-enabled systems on the network.
Hadoop
A Java based open (i.e., non-proprietary) programming framework that supports big data collection, processing, and analytics of a distributed computing environment.
How are a systems analyst and a business analyst different? A business analyst understands business operations and processes. Systems analysts understand systems and some business processes. There is no difference between the two; they are both able to do the job of the other. A systems analyst understands business operations and processes and implements them in IT. A business analyst understands systems and some business processes.
A business analyst understands business operations and processes. Systems analysts understand systems and some business processes. (Page 60)
Table
A collection of related records. For example, a set of customer records would all be contained in one table.
Foreign Key
A common field that exists in multiple tables that is used to form a relationship. For example, a customer might be assigned a specific sales representative. The customer's record might contain a sales rep ID that would link to the Sales Rep table.
Foreign Key
A common field that exists in multiple tables that is used to form a relationship. For example, a customer might be assigned a specific sales representative. The customer's record might contain a sales rep id that would link to the Sales Rep table.
C. Online analytical processing
A company engineer would like to produce a new product that stores, views, and analyzes data to create multidimensional charts for the CFO. Which decision support system will be the foundation for this new product? A. Business Intelligence B. Geographic information systems C. Online analytical processing D. Executive information systems
It takes into account the needs of the end users.
A company has recently acquired a former distribution competitor in another country. The new subsidiary is found to use obsolete CRM software, so the company decides to create a new, proprietary CRM solution to be used company-wide. The company proposes to use a mutlinational team to develop the new software. Why has this approach been proposed?
Prohibitions against the transfer of certain technologies across national boundaries
A company has recently acquired a former distribution competitor in another country. The new subsidiary uses obsolete CRM software. To streamline integration with the new subsidiary, the CEO and CIO have decided to replace the outdated software with the system the company currently uses. What is a political challenge to implementing this decision?
B. Write guildlines for usage of technology
A company wants to discourage someone from inappropriately accessing the company's technology resources for personal use. Which step should the company take? A. Explain the budget process for technology B. Write guildlines for usage of technology C. Establish a reward system for whistelblowers D. Train employees to use technology efficiently
B. Optimization
A company wants to find a technique that will provide the best value for a target variable. Which analysis should the company select? A. Sensitivity B. Optimization C. What-if D. Goal seeking
B. Supply chain management
A company would like to implement a new network system. The company is looking for a system that will provide management functions of financial, production, and distribution operations at the same time. Which network system should this company use? A. Partner relationship management B. Supply chain management C. Enterprise resource planning D. Technology resource planning
Extensible markup language (XML)
A computer language similar to HTML, XML makes it easier to exchange, validate, store, and interpret data between a variety of applications and systems.
Which of the following best describes a computer network?
A computer network is a data communications system that uses cable or wireless media to transmit and receive signals.
C. Primary Storage
A computer's main memory is directly accessible to the CPU and consists of random access memory (RAM), cache memory, and read-only memory (ROM). What is it called? A. Secondary storage B. Output device C. Primary storage D. Input Device
B. HIPAA
A contractor is bidding on a system to help a dental office schedule patient appts and payments. Which law would contractor need to understand? A. Fincancial services modernizations act. B. HIPAA C. FERPA D. Sarbanes-oxley act
Security
A critical issue that information systems executives must make difficult hardware decisions regarding the issues that pose possible outside threats to the system.
data mart
A data mart is a smaller subset database from a data warehouse typically focused on a single area or function.
ERD
A database schema can be represented by which model?
Decision analysis is a method used by management to assist with decision making. Decision analysis tools increase the likelihood that the decision maker will make the best decision. Can you describe the decision tree tool and list some of its advantages?
A decision tree is a tool that uses a tree-like graph to model decisions in order to identify the most appropriate strategy to reach a goal. A decision tree presents a visual flowchart representation of the decision and each of the possible outcomes. Some advantages of the decision tree method are the following: It is easy to understand and interpret. It enables the addition of new scenarios. It contains value with limited detailed data. It can be combined with other decision analysis tools and techniques. (Page 65)
C. Phased
A development team is creating a new reporting system to track vacation and expenses. Which converstion implementation should the team use if it uses the new vaccation reporting module first and implements the expense reporting module two months later? A. Pilot B. Plunge C. Phased D. Parallel
When performing systems analysis, why is a feasibility study important? A feasibility study determines if a solution is possible for an organization. A feasibility study helps understand and define a system. A feasibility study determines if a solution is too expensive.
A feasibility study determines if a solution is possible for an organization. (Page 55)
Primary Key
A field that uniquely identifies a record, such as customer ID or student ID.
Primary Key
A field that uniquely identifies a record, such as customer id or student id.
Grid computing
A form of supercomputer constructed from many smaller systems that have been connected together.
Network
A group of two or more computers and other devices connected to each other.
What is a denial of service attack?
A hacker attempt to tie up network host resources making them unavailable
Mainframe
A high-capacity, high-performance system built for large organizations and used to quickly process large volumes of data.
(Example of dumpster diving) What is Pharming?
A high-tech attack that is an act of using malicious code to redirect users to a website that mimics the appearance of an official page, but that merely collects sensitive information, such as names, addresses, phone numbers, usernames and passwords, and security questions and answers.
A company will experience many challenges during the design and implementation of an information system. The design team must not only manage the design and implementation process, but must also manage the people involved and their perceptions of the proposed system. Name one key reason why a large majority of system implementations result in failure.
A key reason system implementations fail is due to change, such as system change, information access change, and organizational change. Change brings about fear and fear causes employees to resist (and even undermine) implementation. (Page 58)
3 years
A large part of IS management's main agenda changes this often due to the constant evolving of information systems, confirming the highly dynamic nature of the IS management function.
(Example of dumpster diving) What is tailgating?
A low-tech attack that allows unauthorized personnel access to sensitive or restricted areas merely by overtly or covertly following an authorized employee through a controlled access entry point.
(Example of dumpster diving) What is shoulder surfing?
A low-tech attack that is as simple as watching someone type in their password, or obtaining sensitive information from a computer screen.
Shoulder Surfing
A low-tech attack that is as simple as watching someone type in their password, or obtaining sensitive information from a computer screen.
What is baiting?
A low-tech attack where an attacker depends on the victim's greed or curiosity to provide sensitive information.
Describe predictive analytics.
A method or algorithm that uses statistics and data mining to forecast models.
What is social engineering?
A method used by hackers to develop a relationship to trick employees into revealing confidential information or passwords.
system on a chip
A microchip that performs more functions than a CPU and has other devices embedded in it is called what?
Workstation
A more powerful system used by individuals in order to run more resource-intensive applications.
Business Ecosystems
A network of businesses, such as suppliers and distributors, are involved in providing delivery of a service or product through cooperation.
Tangible User Interface (TUI)
A person interacts with digital data through a physical environment.
Entity
A person, item, event, etc. for which an organization collect data. An example of an entity would be customer or student.
Entity
A person, item, event, etc., for which an organization collects data. An example of an --- would be customer or student.
What is a potential obstacle that may inhibit decision analysis when using a decision support system? Choices: Untrained management A poorly defined problem Cause-and-effect diagrams The environment
A poorly defined problem (Page 65)
D. WAN
A real estate office has several divisions located in different states. Which type of network should the real estate company implement to connect their divisions? A. MAN B. P2P C. LAN D. WAN
B. Data Warehouse
A sales manager for a national chain wants to provide customer demographics and historical sales data to staff in the sales and production departments to help them determine how many products to make and ship to each retail location for the upcoming holiday season. Which approach would allow the staff to most efficiently extract that information? A. Decision support B. Data Warehouse C. Relational D. Object-oriented
You are working on a project and hear the word "sensitive" referred to with regard to the work schedule. What is meant by a project schedule being sensitive? A sensitive schedule has slack time. A sensitive schedule has more than one critical path. A sensitive schedule addresses resource allocation.
A sensitive schedule has more than one critical path. (Page 57)
Infrastructure as a service (IAAS)
A service provider provides a cloud fabric, or pooled services, including server space, servers, storage, and all other aspects of the computing platform, with the exception of the operating system and applications
Infrastructure as a service (IAAS)
A service provider provides a cloud fabric, or pooled services, including server space, servers, storage, and all other aspects of the computing platform, with the exception of the operating system and applications, which the client organization would install and manage. Benefits include dynamic scaling and may include geographic distribution. An example would be Windows Azure or Rackspace.
Platform as a service (PAAS)
A service provider provides server space, the server, virtualization, operating system, database, and development environment in a platform that can be used for application development. An example would be Amazon Web Services
Platform as a service (PAAS)
A service provider provides server space, the server, virtualization, operating system, database, and development environment in a platform that can be used for application development. An example would be Amazon Web Services.
Virtual computing
A software-based platform that allows multiple virtual servers, isolated from host computer, to operate on a single or, potentially, a fabric of many systems. Initially intended to more efficiently use expensive and underutilized hardware, virtualization has allowed for better fault tolerance and flexible, dynamic, and automated server operation and maintenance.
C. Executive information system
A strategic team is using the aggregate results from the decision support system to support long-term decisions that require judgement. Which system is being used by the team? A. Virtual reality system B. Expert system C. Executive information system D. Transaction processing system
Which type of emerging computing technology allows a computer to diagnose its own failure and develop a workaround that enables the computer to continue to function? A. Autonomic B. Auto-correction C. Alternative D. Avatar
A. Autonomic
What is the difference between data and information in information systems? A. Information is processed data B. Data contains numbers where information contains text C. Information and data are synonymous D. Data is written reports where info is the raw numbers
A. Information is processed data
Why would a vendor choose to utilize electronic data interchange (EDI)? A. It permits secure transmissions of business information B. It provides many personal productivity applications. C. It allows multiple computers to run on a single machine. D. It integrates all dept functions into a single IT system
A. It permits secure transmission of business information
Why would a school admin choose to utilize Microsoft Office? A. It provides many personal productivity applications. B. It integrates all department and functions into a single IT system. C. allows multiple computer to run on a single machine. D. permits transmission of business info.
A. It provides many personal productivity programs
What is true of a relational database? A. It provides relational integrity for the database B. It allows for the creation of data marts C. It compiles the metadata about the data elements in the data model D. It creates an indirect backup of data in the database
A. It provides relational integrity for the database
What is the main challenge to growth that is encountered when e-business is used? A. Product or service limitations B. Poor social media presence C. Underdeveloped user interface D. Inability to adhere to taxation rules or regualtions
A. Product or service limitations
What measures computer speed? A. RPM B. CPU C. Hard disk size D. Network interface card
A. RPM
Which risk is reduced when the investigation step is well executed during the planning and analysis phases of systems development? A. Scope creep B. System obsolescence C. End user training failure D. Continual maintenance
A. Scope creep
An individual writes software that collects personal data about a user from a computer and transmits it over the internet without the user's knowledge. What type of threat is this? A. Spyware B. Virus C. Worm D. Trojan Horse
A. Spyware
Two individuals are notified that soaftware has been found on their computers that collects personal information about them w/out their knowledge. Which type of threat has been found? A. Spyware B. Worm C. Virus D. Trojan horse
A. Spyware
What is the primary networking standard used to communicate over the internet? A. TCP/IP B. XBRL C. HTTP D. URL
A. TCP/IP
An individual writes a program that will take over a computer for the purpose of launching attacks on additonal computers. Which type of threat is being used? A. Zombie B. Phishing C. Vishing D. Pharming
A. Zombie
A network protocol designed to handle broadband integrated services such as voice and video is
ATM
Major business functions by IS
Accounting and Finance, HR, Prod and Ops, Sales and Marketing
What are major business functions by information systems
Accounting/Finance, Human Resources, Production/Operations, and Sales and Marketing
Accounting and Finance
Accounts payable, receivable, budgeting, general ledgers, payroll, cash flow, financial transactions
Why would you invest in IS?
Achieve operational excellence, develop new products and services, and competitive advantage
How can IS achieve a competitive advantage
Achieve operational success, develops new products, attains customer service, improves decision making, promotes competitive advantages.
Wardriving
Act of searching for Wi-Fi wireless networks by a person in a moving vehicle, using a portable computer, smartphone or personal digital assistant (PDA)
The information system used to support decision making should be flexible and _____ to various users. Choices: Adaptable Comprehensive Insightful
Adaptable (Page 63)
______ maintenance adds new capabilities to an existing system. Corrective Adaptive Perfective
Adaptive (Page 59)
operating system
All computer systems are composed of hardware components and software components and require a CPU and a ------ to function
When performing a systems analysis, why does the organization need to be analyzed as part of the process? Organizations can veto a change, and therefore, they must be included in analysis. All information systems have an impact on organizations, and therefore, organizational issues need to be part of the analysis. Organizations have the IT resources, and therefore, they must be accounted for.
All information systems have an impact on organizations, and therefore, organizational issues need to be part of the analysis. (Page 55)
Digital Market
Allow for diminished search costs, costs for changing prices, and a better ability to change prices for different types or categories of customers or sellers, or as market conditions change
CASE (computer-aided software engineering)
Allows designers, code writers, testers, planners, and managers to share a common view of where a project stands at each stage of development. Helps ensure a disciplined, check-pointed process.
Hostile or intrusive software with harmful intent can take the form of executable code and greatly damage a user's computer. Which technology can be used to minimize the chance of this happening?
Anti-malware
Content Provider
As with traditional newspapers, cinemas, and video stores, online ------------- rent or sell online access to digital content, such as music, news, video, and images. Examples include iTunes, Shutterstock.com and Netflix.com.
e-Tailer
As with traditional retailers of goods, groceries, and other physical products, ------------- provide access for the sale of physical goods, which are then shipped to their customers. Examples include pure-play firms such as Amazon.com, as well as traditional brick-and-mortar organizations such as Bestbuy.com and Walmart.com.
What social media activity should be avoided by job seekers?
Any post or activity that represents discriminatory behavior
Marketing manager uses a desktop publishing software to create advertising brochures that will be mailed to potential customers. To which major software category does desktop publishing software in this scenario belong?
Application software
A company is exploring the possibility of a merger with another company and decides to create system model of the merged companies. In which step of the model will the company create a functional flow diagram?
Architectural testing Process Enterprise
Service-oriented architecture (SOA)
Architectural pattern in computer software design in which application components provide services to other components via a communications protocol, typically over a network
End Users
Are people actually using systems
Data Inconsistency
As a student taking classes, imagine if your name was misspelled in one class, but not the other, and the impact this would have on your student record. If the same attribute in related data files has different values, what is this an example of?
When a corporation embarks on a new information system development program to either replace its legacy system or invest in a new system to give it a competitive advantage, a team of outside consultants, subject matter experts, systems analysts, business analysts, and super users will form the steering committee. If you are tasked to be the systems analyst, explain your key role in the overall project.
As the systems analyst, I would support the systems analysis, design, and implementation for the project. I would bring expertise in operating systems, programming languages, and computer hardware. My primary roles would include that of consultant, supporting expert, change agent, problem solver, communicator, and arbitrator. I will conduct meetings with managers and users to keep everyone informed of progress. (Page 60)
Community
As with clubhouse and conference facilities, online communities provide a space which individuals, families, and groups might meet, and share content and communications. Examples include Facebook, Google+, and LinkedIn.
Brokerage
As with offline -------, such as with travel agencies and stock trading firms, online ---------- provide a means to create a transaction, and then charge a fee for their services. Examples include Hotwire.com and TDAmeritrade.com.
______ is one of the desired critical outcomes of business implementation of a new or upgraded information system. Choices: Simplicity Automation Complexity
Automation (Page 55)
Which security technique helps protect systems by examining each message as it enters the system and blocking improper or unauthorized messages? A. Biometric security B. Firewalls C. Encryption D. Antivirus software
B. Firewall
Which type of ecommerce model is used when a company sells tires to automobile companies? A. G2B B. B2B C. C2C D. C2B
B. B2B
How do info systems support accounting functions? A. By planning for upcoming capital expenses and loan payments B. By generating balance sheets and income statements C. By managing corporate wealth and interest expenditures D. By automating inventory and customer management systems
B. By generating balance sheets and income statements.
A sales manager for a national chain wants to provide customer demographics and historical sales data to staff in the sales and production departments to help them determine how many products to make and ship to each retail location for the upcoming holiday season. Which approach would allow the staff to most efficiently extract that information? A. Decision support B. Data Warehouse C. Relational D. Object-oriented
B. Data Warehouse
What business strategy is a large computer company using if it offers products with several appearances and screen interfaces? A. Cost Leadership B. Differentiation C. Loss Leadership D. Focus
B. Differentiation
Which security technique uses private key and public key pairs to protect sensitive information? A. Antivirus software B. Encryption C. Firewalls D. Biometric Security
B. Encryption
Which solution would allow a company to host a computing service on an internal network and restrict it to employees within the organization? A. Exchange server B. Extranet C. Private Cloud D. Virtual private network
B. Extranet
A contractor is bidding on a system to help a dental office schedule patient appts and payments. Which law would contractor need to understand? A. Fincancial services modernizations act. B. HIPAA C. FERPA D. Sarbanes-oxley act
B. HIPAA
What can happen when the project requirements are not clearly defined? A. It can lead to a lack of business requirements B. It can lead to feature creep. C. It can lead to missing user training documentation D. It can lead to insufficient design alternatives
B. It can lead to feature creep
Why would a company consider using a prototype when converting an existing order entry system to a web-based system? A. It detects errors after development B. It supports change through iteration C. It ensures managerial participation D. It creates a secure system
B. It supports change through iteration
What would be the impact of a hospital using a medication system that automatically distributes prescriptions in the hospital pharmacy? A. It would reduce the total number of medicines prescribed. B. It would decrease errors in medications C. It would increase employee safety D. It would improve customer satisfaction
B. It would decrease errors in medicaitons
Which application is utilized by GPS and GIS? ch 16 A. Automatic vehicle location B. Location-based services C. Edge mapping D. Mapping densities
B. Location-based services
Which type of computer system would an employee need to complete a project requiring a spreadsheet? A. File server B. Microcomputer C. Mainframe D. Midrange System
B. Microcomputer
A company wants to find a technique that will provide the best value for a target variable. Which analysis should the company select? A. Sensitivity B. Optimization C. What-if D. Goal seeking
B. Optimization
A company would like to implement a new network system. The company is looking for a system that will provide management functions of financial, production, and distribution operations at the same time. Which network system should this company use? A. Partner relationship management B. Supply chain management C. Enterprise resource planning D. Technology resource planning
B. Supply chain management
Which method measures the ease with which people perform transactions or find information? A. Transaction speed B. Usability C. Accuracy D. Response time
B. Usability
Which networking standard is used by businesses to transfer information through radio waves over distances up to several miles? A. RFID B. WiMAX C. WiFi D. NFC
B. WiMAX or C. Wi-Fi
A company wants to discourage someone from inappropriately accessing the company's technology resources for personal use. Which step should the company take? A. Explain the budget process for technology B. Write guildlines for usage of technology C. Establish a reward system for whistelblowers D. Train employees to use technology efficiently
B. Write guildlines for usage of technology
What are the methods of social engineering?
Baiting Dumpster diving Phishing
TCP/IP (Transmission Control Protocol/Internet Protocol)
Basic communication language or protocol of the Internet
Ava manages a group of basket weavers and ensures that each basket is perfectly woven. When Ava notices that Caroline and Anna are chatting during much of their shift, she tells them to work quietly so that they can be more productive. But the productivity still did not increase. Which management model would improve the morale of the employees and also increase productivity? Choices: Classical Behavioral
Behavioral (Page 63)
Petabyte
Big Data database size is considered to be in the ........ level.
How does big data analytics enable business to be more competitive? Big data analytics enable businesses to reorganize to improve operations. Big data analytics enable businesses to recommend new products and services based on historical data. Big data analytics enable businesses to become lean and to implement Just in Time (JIT) practices.
Big data analytics enable businesses to recommend new products and services based on historical data. (Page 64)
When reviewing successful communication, what documentation guidelines should be considered? Grammar and clarity Consistency and accuracy Both
Both (Page 60)
Direct Marketing
Both manufacturers and retailers may sell directly to their customers using a disintermediated online marketing strategy, perhaps in addition to others. This model is particularly useful for digital goods, although ------------- of physical goods has massive following too. HP, Dell, and other computer manufacturers offer websites that allow customers to customize products and/or buy them directly off the assembly line.
Work Breakdown Structure (WBS)
Broken down list of all deliverables showing what the customer will get at the end of a project.
A marketing research firm is planning a study involving consumer preferences towards new coffee flavors. The company needs to analyze coffee data from the manufacturer, as well as preference data from consumers in order to discover whether certain flavors are more or less popular among certain segments of the population. Which database technology would help the company conduct online research
Business Intelligence system utilizing data mining technology
Corporations should strive to gain a competitive advantage to remain profitable or relevant. Business intelligence systems can provide corporations an edge in the market place. What are possible benefits and values that all businesses, no matter their size, can experience with business intelligence?
Business intelligence reduces labor costs through automated data collection and reporting. It also makes information actionable by providing real-time, relevant, user-customized information that is easily shared for collaboration. Business intelligence aligns the organization with business objectives by defining key performance indicators (KPIs) and metrics. (Page 64)
Business performance management (BPM) is the collection of analytic and management processes that enable organizational performance management in order to achieve goals or objectives. BPM is a component of and occasionally confused with business process management (BPM). Can you briefly describe the difference between the two?
Business performance management is strategic. It consists of three primary activities within business performance management. One is setting corporate goals. The second is creating metrics or scorecards to measure goal attainment. Finally, management intervention might be required when goals are not being met. Business process management is used by management to improve corporate performance by changing processes. (Page 64)
Company A ordered printer toner cartridges from Company B. Company B ships the products to Company A every two months. What is the e-commerce model described in this scenario?
Business to Business (B2B)
Mary purchased a digital camera from an online store for her upcoming road trip. What is the e-commerce model of the online store?
Business to Consumer (B2C)
Business intelligence and business analytics offer several benefits to organizations. Business intelligence consists of databases, data warehouses, and analytical platforms. Business analytics consists of the tools and techniques used for the analysis and understanding of data. Please list various benefits that result when a business implements a business intelligence program.
Businesses that use analytics can recommend products or services to customers based on analysis of customer preferences, purchase history, and Internet search history. Another more common application of business intelligence is the ability to generate prepackaged production reports that are helpful for users at multiple organizational levels. Finally, predictive analytics can be used to forecast potential customer behavior and future business trends. (Page 64)
Which of the following is NOT the best avenue for the evaluation of alternative solutions for an information system? Evaluate companies in the same industry and their implemented systems/solutions. Buy three systems and test them to see which one performs best. Develop a system in house and test its performance and reliability.
Buy three systems and test them to see which one performs best. (Page 57)
What is a disadvantage of buying digital goods online?
Buying digital goods online makes the buyer more prone to online fraud.
How does the internet help to improve a company's reputation?
By providing information about the company's vision, mission, and community efforts.
What is a successful business that uses big data to find flaws, boost production, and rootlet counterfeiters?
Caseficio Scalabrini
What e-Business tool converts an audio broadcast to a file that can be played on a digital music player? A. Videoconferencing B. Instant Messaging C. Podcasting D. Webinar
C. Podcasting
What is telematics? A. A form of telecommunication technology that is used to identify and track assets via radio frequency. B. A telecommunication chip embedded in store shelving to help retailers. C. A blend of computers and wireless telecommunications technologies. D. A telecommunications device that allows goods and services to be purchased wirelessly
C. A blend of computers and wireless telecommunications technologies.
Which investigative tool is used during the analysis phase of systems development to guide process improvement? A. An entity-relationship diagram B. A brainstorming diagram C. A data flow diagram D. A flow chart
C. A data flow diagram
What is the most recent federal bill that addresses computer monitoring of employees? A. Sarbanes oxely act B. Homeland security act. C. Electronic communications privacy act. D. USA PATRIOT act
C. Electronic communications privacy act
A strategic team is using the aggregate results from the decision support system to support long-term decisions that require judgement. Which system is being used by the team? A. Virtual reality system B. Expert system C. Executive information system D. Transaction processing system
C. Executive information system
What is a drawback of outsourcing system development projects? A. It increases operation expenses for head count B. It leads to a decrease in project quality C. It leads to a loss of confidentiality D. It increases the time needed to market for products
C. It leads to a loss of confidentiality
Which type of software manages the users and contains an array of programs that ensure that data is being transmitted to the correct user, computer, or other devices? A. Device B. Utility C. Network Operating System D. Open-source system
C. Network Operating System
A company engineer would like to produce a new product that stores, views, and analyzes data to create multidimensional charts for the CFO. Which decision support system will be the foundation for this new product? A. Business Intelligence B. Geographic information systems C. Online analytical processing D. Executive information systems
C. Online analytical processing
A development team is creating a new reporting system to track vacation and expenses. Which converstion implementation should the team use if it uses the new vaccation reporting module first and implements the expense reporting module two months later? A. Pilot B. Plunge C. Phased D. Parallel
C. Phased
A computer's main memory is directly accessible to the CPU and consists of random access memory (RAM), cache memory, and read-only memory (ROM). What is it called? A. Secondary storage B. Output device C. Primary storage D. Input Device
C. Primary Storage
Which type of software application is most effective for analyzing small to medium numbers? A. Database B. Web browser C. Spreadsheet D. Word processor
C. Spreadsheet
Which technology allows businesses to use network phone software to make calls to other network users? A. Token Ring B. Frame relay C. VoIP D. ATM
C. VoIP
What combines multiple tools or workbenches to support the complete software cycle?
CASE (computer aided software engineering)
Focused marketing efforts, better customer experiences, automated reporting, and better cooperation to respond to customer needs.
CRM (Customer Relationship Management)
What strategic role has emerged as critical in recent years in large organizations due to cyber attacks?
CSO (Chief Security Officer)
Data Warehouse
Central libraries of data that are combined from one or more sources and organized by subject to support organizational managers
A corporation is using the encryption illustrated in the diagram below to protect business-sensitive information. Abcd Bcde What type of encryption is the corporation using?
Character shifting
_______ and forums are online discussions in which users exchange information. Chatrooms Newsgroups Blogs
Chatrooms (Page 61)
An automobile manufacturer is considering equipping the engines of its new models with the capability of detecting early symptoms of imminent mechanical or electrical failure, automatically transmitting that warning to the dealership form which the customer purchased the car, and the dealership automatically contacting the customer to schedule a repair appointment. It is facing the challenge of whether all of this is technically feasible and operationally viable. Who needs to address the challenge of value creation through technology use?
Chief Information Officer
A small company that is growing quickly into a medium sized company is facing the challenge of consolidating and storing information received from multiple. Sources from the ground up in order to ensure that operations run efficiently. The company needs to hire an expert who will, in addition to the above, maintain security and apply upgrades as needed. Which IT professional does the company need to hire in order to address the challenge?
Chief Technology Officer
_____ management models are primarily focused on following rules, production, and efficiency. Choices: Classical Bahavioral
Classical (Page 63)
A marketing manager would like to study customer behavior and how it relates to customer's purchase products from its online store. Specifically, she would like to know which website page the majority of customers spent the most time on, when and where they decided to abandon the shopping cart, and ow long on average a customer takes to complete a sale. Which database technology supports this study?
Clickstream analysis
A national publisher of newspapers wants to mine its data warehouse (including inputs from social media) to identify which of its publications customers believe provide reliable reporting? What tool is used for this initiative?
Clickstream analysis
A business requires large amounts of data that are processed into information and used to maintain a competitive advantage over their competitors. As the business grows, the data storage and processing capabilities are becoming extremely challenging and costly. What external technological environment can be used to help address these issues?
Cloud computing
Cloud computing has had a major impact on businesses and in systems design. In the most basic sense, how would you define cloud computing to someone unfamiliar with the term? Cloud computing allows software to be stored remotely and accessed via the Internet. Cloud computing is a shared mainframe resource. Cloud computing is a remote data center accessed via corporate WAN.
Cloud computing allows software to be stored remotely and accessed via the Internet. (Page 61)
Cloud computing allows application software to be stored in one or more locations, and accessed and operated using Internet-enabled devices. Cloud computing can be classified as public, private, and hybrid, and relies on shared resources to achieve economies of scale. Please list the benefits for businesses to adopt cloud computing.
Cloud computing enables users to lease hardware and software, thereby reducing capital expenditures, implementation times, and operating costs. Another benefit of cloud computing is the ability to share or reuse software. In addition, numerous prototype tools are available through the cloud, enabling systems analysts to test or pilot software in order to determine if it is appropriate for the system. (Page 61)
Clickstream analysis
Collecting, analyzing, and reporting aggregate data about which pages visitors visit in what order - which are the result of the succession of mouse clicks each visitor makes
Foreign key
Column or set of columns in one table whose values must have matching values in the primary key of another (or the same) table
One reason IT is important because video conferencing has become cheaper, quicker, more collaborative, and more efficient. Of what IT benefits is this an example?
Communication
Asynchronous
Communication occurs at different times via bulletin boards, blogs, and streaming videos
Synchronous
Communication occurs in real time, with their client using online chat or instant messaging
When corporations embark on a large information system development project, they must utilize a method to keep control and monitor project schedule, effectiveness, and cost. There are different methods or options that corporations have, depending on project objectives. Can you name three different methods, besides the SDLC method, and explain why companies might choose that method?
Companies have different options for what method to use when developing an information system. One option is called agile software development, in which the outcome is adaptive planning and fast delivery. Another method is called scrum, which helps meet customer needs that may change throughout the project. Prototyping is another methodology, in which the outcome produces quick modules that can be tested, deployed, and fixed. (Page 56)
database integrity
Companies must maintain .............. by keeping their data safe from unauthorized changes.
Businesses must implement new initiatives to remain competitive or gain a competitive advantage. Information systems initiatives must be evaluated and well planned to ensure success. Discuss why businesses should use the systems development life cycle process to ensure information systems are deployed and implemented successfully.
Companies should use systems development life cycle (SDLC) to gain control and monitor large information system projects. SDLC provides a detailed step/stage approach in systems design, cost and technology evaluation, and organization or user community impact. The seven sequential stages of SDLC reduce the risk of failure or cost overruns. (Page 55)
CASE is a method used to organize and control software development on big projects. What does CASE stand for? Computer-aided software engineering Comprehensive active software engineering Computing and standard engineering
Computer-aided software engineering (Page 61)
An investment banking corporation utilizes employee passwords as data privacy measure to secure sensitive data. The IT security team has been tasked with ensuring the data is produced and modified in the correct way. Which data privacy goal is the IT security team tasked with accomplishing in this scenario?
Confidentiality
Privacy Goals
Confidentiality, integrity, Availablity
What tactic defeats a war driver by barring access to your secured wireless network?
Configuring the access point to hide the SSID
Hierarchical database
Connects tables in a master/slave1, leader/follower, or primary/replica format.
Relational database
Connects tables of records together with complex relationships.
Wireless bridge
Connects two wired networks together over Wi-Fi
What is meant by conversion during the system implementation phase? Conversion is a change management process. Conversion is the process of replacing the old system with new system. Conversion is the transferring of all data to a new system.
Conversion is the process of replacing the old system with new system. (Page 58)
What is an important decision point for a business to implement controls or security for any risk?
Cost-benefit analysis
Lightweight Directory Access Protocol (LDAP)
Created by the International Telecommunications Union; a standardized protocol that defines the organization of a set of directory records, such as groups, individual names, and attributes that are associated with them. Many applications use the LDAP standard. The most used example is Microsoft Outlook's global address list and Microsoft Active Directory.
What is advanced networking?
Creations of networks that connect widely disparate regions, peoples, and cultures allows for information sharing on a global scale, causing issues concerning the appropriateness and authority of those sharing it.
Advanced networking
Creations of networks that connect widely disparate regions, peoples, and cultures allows for information sharing on a global scale, causing issues concerning the appropriateness and authority of those sharing it. Although the availability of information on a wide basis is generally a positive attribute, property rights and the propriety of information sharing may cause and perpetuate conflict.
Which of the following is NOT an element of a decision tree? Choices: Payoff Acts Events Criteria
Criteria (Page 65)
What are the most popular products sold?
Customer Relationship Management (CRM) systems collects and store customer data, product information, and customer orders. Using the appropriate analytical tool, a CRM can answer all, except for which of the following question?
Bargaining Power of Customers
Customer chooses lower price on cell phones. Goes with ATT instead of Verizon
CRM
Customer relationship management
Many factors need to be weighed when managing system implementation, both tangible and intangible, to reduce project risk. What is an intangible benefit when evaluating information systems costs and benefits?
Customer satisfaction (is hard to measure)
What is business intelligence? A. Knowledge B. Technology C. Data sources D. Collective Information
D. Collective Information
What is the difference between data and information as they relate to business functions? A. Data is related to hardware but info is not related B. Data is stored but information is not stored C. Data comes from info D. Data is processed to get information
D. Data is processed to get information
Which investigative activity must occur during the analysis phase of this project? A. Designing the technical architecture B. Setting the projet scope C. Defining the system to be developed D. Gathering the business requirements
D. Gathering the business requirements
An internet service provider offers subscribers e-mail accounts and would like to develop software to identify spam. Which tup of artificail intelligence technology should be used? A. Fuzzy Logic B. Virtual Reality C. Knowledge management D. Genetic algorithms
D. Genetic algorithms
An employee works as an engineer at a software firm and checks personal email while at work. Due to the long hrs at office, the employee does not have time to check email at ho me and feels that his actions are acceptable even though it is against the companies internet policy. Which method could be used to discourage the employees behavior? A. Educating employes on stockholder interests B. Reducing employee workload C. Requiring company access to personal email accounts. D. Offering an ethics training program.
D. Offering an ethics training program
Which term is used to describe an iterative approach to building a system? A. Sketching B. Scrum C. Waterfall D. Prototyping
D. Prototyping
What is a requirement of a field when it is in a table and is defined as the primary key? A. The field must have numeric values B. The field must appear in another relation C. The field must have duplicated values in the relation D. The field must have unique values
D. The field must have unique values
An employee downloads software that claims to improve computer performance. Instead, it introduces system vulnerabilities. What type of threats is this software: A. Virus B. Spyware C. Worm D. Trojan Horse
D. Trojan horse
A real estate office has several divisions located in different states. Which type of network should the real estate company implement to connect their divisions? A. MAN B. P2P C. LAN D. WAN
D. WAN
What application does one use to query and administer databases?
DBMS (database management system)
Which system helps support business decision making activities by manipulating and building upon the information from the systems below it in the hierarchy?
DSS
A company has many separate departments that focus on different business aspects and uses data warehouse subsets to hold data specific to each individual department. The company started a new department and created a new subset. What is the new subset called
Data Mart
Which aspect of data governance is used to ensure that the customer data and payment information saved In the company server are properly encrypted?
Data are properly stored
For the DBMS of a financial institution to function properly, ____________ should be performed after a data quality audit on tables that are merged or imported.
Data cleansing and normalization
flat file
Data files containing records with no structured relationships are a type of................database.
OLTP (online transaction processing)
Database design used for browsing and manipulating business transaction activity
ODS (Operational data store)
Database designed to integrate data from multiple sources for additional operations on the data. Unlike a master data store the data is not passed back to operational systems. It may be passed for further operations and to the data warehouse for reporting
In 1965, computers had .092 MIPS, and today's computers have about 238,000 MIPS. What business practices have taken advantage of this increase in computer speed?
Database management systems Network management systems
Object-oriented database
Database that subscribes to a model with information represented by objects
OLAP (online analytical processing)
Databases containing data that are used for making decisions
Which of the following is NOT a concern for information security? Dealing with risks associated with the environment, malicious attacks, and intentional and unintentional loss of assets or revenue Dealing with the potential for failure from a wide array of threats and vulnerabilities Dealing with factors that contribute to the failure of business practices Dealing with the understanding and management of risks that might affect the security of information assets
Dealing with factors that contribute to the failure of business practices
A police department at a large metropolitan city implemented an information system that analyzes historical crime data including date and locations as well as other external, environmental and city related data. The system then produces daily predictive reports of the major locations around the city that are likely to require additional police attention. The police uses the reports to plan the officer's patrol routes targeting the areas that the system predicted to have high likelihood of incidents. Which type of system provides a competitive advantage based on the described scenario?
Decision Support System that improves decision making
An online mail order company decides to create its own Customer Relationship Management (CRM) system to help management analyze customer's purchasing patterns. To be successful at managing relationships with customers, the CRM system must have access to large amounts of customer purchasing data for analysis and report generation. Which MIS tool is usable by the company's CRM system?
Decision Support system
DSS
Decision support systems
Management decision making is supported by IT by which of the following systems? Choices: Enterprise support systems Decision support systems Business support systems
Decision support systems (Page 63)
What is a decision analysis method that uses branched lines to model decision choices in order to identify the most appropriate strategy? Choices: Cause and effect Statistical analysis Decision tree
Decision tree (Page 65)
Business intelligence uses analytics tool sets to investigate, data mine, or analyze data to help the business see trends or make better decisions. There are four key analytical modeling processes: decisive, descriptive, predictive, and prescriptive Please describe each one of these analytical models.
Decisive analytics uses visual analytics to reflect human reasoning to support management decisions. Descriptive analytics assists management in gaining insight from historical data. Predictive analytics is a modeling that utilizes statistical and machine learning techniques to predict behavior or trends. Prescriptive analytics uses optimization and simulation to recommend solutions to management. (Page 64)
What is the first step in the decision-making process? Choices: Develop alternatives. Evaluate the decision. Define the problem.
Define the problem. (Page 63)
The implementation of a new system consists of many steps, including acquisition, development, training, and testing, and is also referred to as what? Conversion Replacement Delivery
Delivery (Page 58)
SDLC Design Phase
Designing the recommended system, Developing and documenting software
Which two benefits can a business realize by using social media to connect to customers?
Detailed marketing research & targeted sales promotions
Anti-Malware
Detect and remove malware that even the most well known anti-virus and anti-malware applications fail to detect
The value of security and control is an important question that organizations must address. What must organizations specifically address to protect their security?
Determine the likelihood a loss will occur, along with the target and the source.
Which of the following stages is part of the analysis phase of SDLC? Choices: Determine user requirements Testing the system Developing software
Determine user requirements (Page 55)
Common post-implementation information systems risks include all of the following, except what? Determining the user satisfaction Reluctance to report negative information Rushing project completion
Determining the user satisfaction (Page 59)
A university is looking for ways to customize its courses to the unique needs of its students by creating various levels of hybrid online courses, such as 80% online for one student, whereas only 30% online for another. Which IT management challenge is addressed in this scenario?
Develop new products and services
A regional manager has received an important financial document seemingly sent by a branch manager, but he doubts whether the was actually sent by the manager. Which technology could be used to verify that the report was indeed sent by the branch manager?
Digital signature
A regional manager has received an important financial document seemingly sent by a branch manager, but he doubts whether the report was actually sent by that manager. Which technology could be used to verify that the report was indeed sent by the branch manager?
Digital signature Firewall Virtual private network Anti hack
Large established businesses often have networks of other businesses within their supply chain in order to maintain the flow of information and materials. Company A is and organization that hosts its own marketplace of suppliers in order to facilitate the pursuit of its own interests. Which network describe Company A's example of e-commerce?
Direct marketplace
An art history professor should like to show an original oil painting from the eighteenth century on the classroom projector. The class is held in a large auditorium with more Than 250 students. Which hardware component is required to digitize the painting?
Document camera
DNS
Domain Name Service = Server-based service that translates human language Web address or URL into an IP address, which is used.
Votes
Due to its data capture and display ability, GIS can be a very beneficial tool for law enforcement. Which of the following data is least useful in a GIS to help fight crimes? Traffic Taxes Votes Locations
Normalization
During the database design process, ............ takes place to eliminate data redundancy.
Once an information system has been designed and is ready for testing, system data and information will be required. Collecting and managing data is a time consuming and expensive process. Automated data capture is the most desirable method because it is faster, cheaper, and less prone to error. Why is outsourcing a viable option for this process, and what is its downside?
During the implementation phase, design teams can outsource data capture. Outsourcing is a viable option because data entry firms have expertise with several data capture methods and can best determine which might be necessary or appropriate for a given project. Outsourcing is a less expensive form of manual data input. The downside is that it requires the data to be shared with, and transmitted to, a third party. (Page 58)
DHCP
Dynamic Host Configuration Protocol = A DHCP server or appropriately configured router automatically and temporarily assigns IP addresses to DHCP-enabled systems on the network
Which is a well known tool in project management that illustrates project tasks against a timeline?
Gantt chart
There are different types of information systems based on the different levels of hierarchy in an organization. Which one helps senior executives analyze information and come up with alternate actions and business strategies?
EIS executive information systems is at the top of the hierarchy.
There are different types of information systems based on different levels of hierarchy in an organization. Which one helps senior executives analyze information and come up with alternate actions and business strategies?
EIS- Executive Information Systems
A database schema can be represented by which model?
ERD (entity relationship model) describes the data and map processes to data requirements
Standardized business procedures that allow for more consistency within the business and removes redundancy.
ERP (Enterprise Resource Planning)
What systems do upper management use for decision making?
ESS (executive support systems)
What is the process associated with data warehouse updates and backup?
ETL (extraction, transfer, and load)
What are pitfalls when maintaining a data warehouse database?
ETL load phase
Star topology
Each network host is connected to a central hub with a point-to-point connection
Bus topology
Each node is connected to a single cable, by the help of interface connectors
A hotel experiences relatively long checkout lines on Sundays when the majority of its customers check out. Replacing the hotel's existing checkout system with an expensive state-of system has crossed the mind of top management, and het due to it's relative monopoly in that region, the hotel's. Customers trend to be rather loyal. The management is wondering if the costs involved in installing a new system would be recouped by the new system in the long run. Which type of feasibility is presented in this scenario?
Economic (TCO) feasibility
Elegant Terrific Outlaws Seized Lethal Penguins (SDLC - Feasibility study)
Economic, Technical, Operational, Schedule, Legal, Political
Threat of New Entrants
Electric cars, Prius, Chevy, Tesla, who's coming in to make another better electric car
Competitive Rivalary
Gas stations on same road and 1 gas station lowers the price of gas by 4 cents
What is Dumpster diving?
Gathering sensitive or nonsensitive information from refuse. This sometimes illegal act is as simple as foraging through household or corporate garbage receptacles for information.
What is encryption?
Encryption is a process by which data are encoded so that only persons with a decryption code may unlock and retrieve stored messages.
Application Software
End Users use (excel, MS office, Firefox, Powerpoint)
Which methodology below uses fourth generation computer language? Agile End user RAD
End user (Page 56)
There are many organizational features that can change the direction of the company. Some of these include processes, politics, culture, and environment. Managers must understand how organizational features can influence their business in order to build and se information systems successfully. Internal and external elements that affect various parts of an organization, for instance the government, competitors, customers, and suppliers are examples of what organizational feature?
Environment
Assume you are building out wired technologies in an old building. If you are replacing token rings, what technology are you most likely to be replacing it with?
Ethernet
After implementing a new reporting system, London is leading a "lessons learned" workshop for his employees. This is an example of which step in the decision-making process? Choices: Identify the problem. Develop decision alternatives. Evaluate the decision.
Evaluate the decision. (Page 63)
A bowling center has implemented a new expensive system in hopes of increasing it's clientele. The system stores and tracks patrons bowling performance over time and displays for them the extent to which their performance has been improving over time. However this new system has failed to attract more patrons. During which phase of system development is this failure discovered?
Evaluation (part of the Implementation phase)
Telecommunications technology has always been essential to business. What is the best definition of telecommunications?
Exchanging information via electrical signals
Executive Management
Executive Info Systems, Long term goals and use dashboards
EIS
Executive information systems
Executives at corporations are constantly evaluating business performance and analyzing the competitive landscape. They rely on information and decision support systems. There are four systems used to provide decision support. These are MIS, DSS, ESS, and GDSS. Describe the systems an executive committee that is co-located would use to support their decision-making process.
Executive management would benefit from an executive support system (ESS). ESS provides high-level information concerning key performance indicators (KPI). ESS data for executives includes internal and external data from financial, industry, and trade databases. This information can be analyzed and discussed using group decision support systems (GDSS). GDSS provide interactive collaboration support for multiple decision makers at multiple geographic locations through digital communication. (Page 65)
True or false. Modern forms of information technology include digital calculators, computer systems of many sizes and applications, and Morse code.
False
True or false. Organizational structure does not have an effect on the success or failure when implementing information systems.
False
True or False. A model is an image of an item, system, or process that we code in order to imitate, follow, or duplicate whatever the model represents.
False (Page 57)
True or False. Cloud computing relies on private resources to achieve economies of scale among users.
False (Page 61)
True or False. Upper management requires transaction processing systems (TPS) to provide high-level information concerning key performance indicators.
False (Page 63)
True or False. Business performance management (BPM) is a management action to optimize organizational or business processes.
False (Page 64)
True or False. A facilitator in a GDSS meeting designs the meeting structure, moderates the process, and leads the team.
False (Page 65)
True or False. System-level security maintains the quality of the software and protects the system from events and processes that can exploit or violate the system.
False (Page 59)
True or False Telephones are an example of how information systems are used in business.
False (telephones are hardware therefore represent information technology. )
True or False. Examples of competitive forces include new market entrants, substitute products, and customer rivalry.
False - Customer rivalry is not a competitive force.
True or False. A business ecosystem is a network-based strategy that is tight collection interdependent industries that provide related services and products.
False. (A business ecosystem is a collection of "loosely coupled" interdependent industries that provide related services and products across many industries.
True or False. The key role of the CTO is to provide vision and leadership or IT initiatives.
False. (This is the key role of a CIO, maintaining efficiency of IT systems is Key responsibility of CTO)
FTP
File Transfer Protocol = An unsecure method used to transfer files from one computer to another.
Major threats to managing information systems
Floods, earthquakes, power outages and more.
data cleansing
For the DBMS of a financial institution to function properly, ................ should be performed after a data quality audit on tables that are merged or imported.
Which of the following is a derivative of the waterfall model? Tree Creek Fountain
Fountain (Page 56)
The balanced scorecard measures outcomes on how many organizational dimensions? Two Four Six
Four (Page 64)
An organization is planning its yearly budgeting cycle. Management has requested the information systems team to validate current hardware and software performance. Which type of evaluation can the team use to perform this validation?
Function oriented evaluation
When building a logical model of the system, you use a functional flow diagram. What is the purpose of the functional flow diagram phase in modeling systems? Functional flow diagrams are waterfall depictions of element interaction. Functional flow diagrams emphasize element behavior, function, and flow. Functional flow diagrams represent the relationship of data.
Functional flow diagrams emphasize element behavior, function, and flow. (Page 57)
What are three models of e-business. Choose 3 G2D G2B G2G G2E G2C G2S
G2B, G2C, G2G
_____ does not rely on a knowledge base and mathematical models but instead relies on ideas created by a group of people. Choices: GDSS DSS MIS
GDSS (Page 65)
What should be the objective of good communication during an information system project? Good communication objectives mean all communication should be verbal. Good communication objectives involve all project documentation. Good communication objectives involve the who, what, when, why, and how of a project.
Good communication objectives involve the who, what, when, why, and how of a project. (Page 60)
What business earns much of its revenues from online advertising and by providing e-business services to hundreds of millions of individuals and businesses?
Graphics tools
Graphics, video, animations, and interactive multimedia are popular elements in Web pages. Popular tools used to create these elements include Adobe's Photoshop, Flash, and Premier products.
What system supports creative thinking and allows users to interact simultaneously at multiple geographic locations to collectively participate in decision making?
Group decision support system (GDSS)
Executive management,who are interacting simultaneously in different locations to collectively participate in the decision-making process, use what type of decision support system?
Group decision support systems (GDSS)
In today's global business environment, corporate leadership is constantly on the move and located in various geographical locations. The executive team must ensure corporate performance is maintained in order to solve problems and make decisions, no matter where the team members are located. Describe a decision support system that enables remote, simultaneous collaboration.
Group decision support systems (GDSS) provide interactive collaboration support for multiple decision makers at multiple geographic locations through digital communication and the use of numerous resources and tools. A GDSS differs from traditional DSS in that users are interacting simultaneously and anonymously to collectively participate in the decision-making process. GDSS facilitates increased meeting size and anonymity, reducing the possibility of groupthink, which suppresses alternative points of view. (Page 65)
Hard Data Network System Security Ecommerce (IS elements)
Hardware and Software, Data Resource Mgmt, Network, Systems and Decisions, Security and Ethics, Ecommerce and Social Meida
What makes up Information Technology
Hardware, Software, Netoworks, Data
What makes up Information Software
Hardware, Software, networks, data, people, processes
Hotdogs Since Nutritionists Died (IT = Sub of IS)
Hardware, software, networks and data
Your company has been asked to develop a user's manual for a new product. The project must be completed within 60 days. Which of the following steps would increase the likelihood of finishing the project on time? Have the most experienced workers complete tasks on the critical path. Evenly divide the experienced workers between all tasks for the project. Assign the least experienced workers to the tasks on the critical path.
Have the most experienced workers complete tasks on the critical path. (Page 57)
Which database type, used frequently in early style databases but much less frequently today, contained inflexible data relationships that formed a treelike structure?
Heirarchial
Management is a crucial component of effective and successful business performance. Management plays a key role in disseminating information from various management information systems and making unstructured, semi-structured, and structured decisions. Henry Mintzberg, a management theorist, identified ten roles performed by organizational managers. Categorize and outline these ten roles.
Henry Mintzberg identified ten roles performed by organizational managers, categorized into three areas: interpersonal, decisional, and informational. Interpersonal roles include figurehead, leader, and liaison. Decisional roles include entrepreneur, disturbance handler, resource allocator, and negotiator. Information roles include nerve center manager, disseminator, and spokesperson. (Page 63)
Which database type, used frequently in early style databases but much less frequently today, contained inflexible data relationships that formed a treelike structure?
Hierarchical *
The IS function is _____ in structure and its success depends on its cooperation and relationship with the other functions in an organization
Horizontal
B. By generating balance sheets and income statements.
How do info systems support accounting functions? A. By planning for upcoming capital expenses and loan payments B. By generating balance sheets and income statements C. By managing corporate wealth and interest expenditures D. By automating inventory and customer management systems
What is meant by the political aspect of a feasibility evaluation? How users will respond to new systems How stakeholders respond to system changes How executive management funds projects
How stakeholders respond to system changes (Page 57)
HTTPS
Hypertext Transfer Protocol Secure, which uses HTTP as well as technologies such as Secure Socket Layer (SSL) and Transport Layer Security (TLS) to encrypt and decrypt data between the user and Web server
HTTP
Hypertext Transfer Protocol is the communications protocol at the foundation of all communication of the World Wide Web
What is the difference between ICR and OCR?
ICR (intelligent character recognition) is an intelligent or advanced form of OCR. (optical character recognition
Several independent parties or governing bodies work together to define the rules that help to manage effective network communications. What are the 3 governing bodies that recommend and decide communications standards?
IOS (International organization for standardization), ARPANET (creator of the original internet in 1967), IETF (internet engineering task force)
A systems analyst must possess effective written and oral communication skills. Although a systems analyst may understand the proposed system, it is important to be able to communicate system benefits and capabilities to the audience. Can you describe effective presentation skills that will be required by a systems analyst when keeping stakeholders up to date on a project?
IT professional should understand the knowledge level of their audience. When presenting to stakeholders, IT professionals should be organized, plan their presentation, and even rehearse it. Technical acronyms should be avoided when possible and defined when required. Visual aids should be used because they are helpful in maintaining audience interest. (Page 60)
SDLC Analysis Phase
Identify problems, determine requirements, analyze system needs
The four phases of the decision-making process are intelligence, design, choice, and _____. Choices Implementation Information Integration
Implementation (Page 63)
What does the United States government do to businesses that violate federal legislation? What does the United States government do to businesses that violate federal legislation?
Impose heavy penalties
A police department at a large metropolitan city implemented an information system that analyzes historical crime data including date and locations as well as other external, environmental and city related data. The system then produces daily predictive reports of the major locations around the city that are likely to require additional police attention. The police uses the reports to plan the officer's patrol routes targeting the areas that the system predicted to have high likelihood of incidents. Which two strategies does the information system at the police department aim to accomplish
Improving decision making Operational efficiency
Primary key
In a relational database that is unique for each record
logic bomb
In some cases, internal attackers, such as disgruntled employees, may introduce malware
Data tuple (THU_PL)
In the Relational Model, is a set of named and typed values. The nearest equivalent in SQL is a "row".
Mesh topology
In the full topology, each workstation is connected directly to each of the others. In the partial topology, some workstations are connected to all the others, and some are connected only to those other nodes with which they exchange the most data
A candidate is applying for a job at a local company. His resume listed the most recent position as a supervisor at XYZ corp. However, his social media profile indicated the position during the same time period as a manager at XYZ corp. Which aspect of the job candidates qualification can negatively affect his hiring potential?
Inconsistent experience
Primary reason to convert to IPv6?
Increase number of IP addresses
Pseudocode
Informal high-level description of the operating principle of a computer program or other algorithm
What is meant by informal user support when a system comes into production? Informal user support means documentation support and maintenance. Informal user support means training, communication, and acceptance. Informal user support means waiting for implementation team training.
Informal user support means training, communication, and acceptance. (Page 59)
Data is input in a computer and then processed into _______________.
Information
___________________is the application of management techniques to collect, communicate, and process information in order to make better management decisions.
Information Management
System that accepts input data and processes it into information as output
Information System
What is the difference between IT and IS?
Information Technology refers to the non human, non process componets of an information system. (Hardware, Software, Data, and Networks. Information Systems include the people and processes.
Simple Network Management Protocol (SNMP)
Information concerning network status that is periodically passed between a network management server and routers on a network, for the purpose of monitoring network status.
Corporations that are planning strategic initiatives related to their information system, such as upgrading, replacing, or internally building a system, must discuss and plan possible solutions carefully. Why is it important for companies to evaluate various alternatives to a system development program?
Information systems have the ability to increase productivity and create a competitive advantage. Because companies change over time, any information system must be adaptable. Several factors should be considered when evaluating system alternatives to select the option that best meets the user requirements. Alternative solutions should be evaluated for system compatibility with existing architecture and organization, return on investment, and scalability. (Page 57)
Fred is an IT engineer at a small online news agency, where 35 employees carry laptops and print to the wireless printer. Recently, the company has discovered that the many Bluetooth headsets, cordless telephones, and regular usage of the break room microwaves are causing long-standing intermittent micro outages at often unpredictable times of the day. Which solution to this problem will avoid disruption to the work environment?
Install traditional network wiring
What type of data and information do executive support systems display? Choices: Internal data from enterprise applications, external data from financial, industry, and data from trade databases Operational data, analytical data, and business intelligence Transactional data, sales data, and process performance data
Internal data from enterprise applications, external data from financial, industry, and data from trade databases (Page 63)
IoT
Internet of Things
What is meant by Web 2.0? Internet sites that emphasize interoperability and user-generated content Internet sites that offer passive viewing and downloading of content Internet sites that are driven by web-based databases
Internet sites that emphasize interoperability and user-generated content (Page 61)
How does the use of Internet-based technologies help businesses?
Internet-based technologies allow for distribution of information with external business entities.
Knowledge
Is intellectual capital is an asset, Needs to be dispersed throughout our company to be fully valued, and use IT/IS spread knowledge.
Hardware
Is the computer and all of its peripherals
What function does a data warehouse serve in a business intelligence platform? Choices: It is a depository of trade and market data to predict behavior. It is a central depository of business environment data used for analytics. It is a depository of customer credit history used with predictive analytics.
It is a central depository of business environment data used for analytics. (Page 64)
Definition of a private industrial network
It is a single organization that controls the construction and maintenance of relationships for a relatively small number of other organizations
Reduce
It is good practice to ............. data that is backed up on a regular basis.
Document camera
Real-time image capture for displaying an object to a large audience
A company has recently acquired a former distribution competitor in another country. The new subsidiary is found to use obsolete CRM software, so the company decides to create a new, proprietary CRM solution to be used company-wide. The company proposes to use a mutlinational team to develop the new software. Why has this approach been proposed?
It takes into account the needs of the end users.
PERT stands for Program Evaluation and Review Technique. Which of the following is true about PERT? It was developed by the U.S. Defense Department. It was developed by IBM. It was developed by Microsoft.
It was developed by the U.S. Defense Department. (Page 57)
RAD (Rapid application development)
Iterative alternative to the conventional waterfall model of software development
_________________ have mentioned that inappropriate or provocative photos or information and evidence of alcohol and drug abuse, by the job seeker revealed during social media search can negatively impact employment opportunities
Job recruiters
Supportive, collaborative, culture that includes corporate learning to foster corporate efficiency and gain value from intellectual assets.
KM (Knowledge Management)
What is the meaning of the acronym KPI as it relates to decision support? Choices: Key practices and instructions Key performance indicators Key process and inputs
Key performance indicators (Page 63)
Knowledge
Knowledge is the practical application of the information given.
Which of the following best describes the knowledge management function enabled by business intelligence? Choices: Knowledge management enables strategic management. Knowledge management enables collaboration between departments. Knowledge management allows a company to become data driven.
Knowledge management allows a company to become data driven. (Page 64)
KMS
Knowledge management systems
Why do users fail to adopt new information systems?
Lack of training or acceptance for new system
MDX (Multidimensional Expressions)
Language provides a specialized syntax for querying and manipulating the multidimensional data stored in OLAP cubes
Why is the size of the project a risk element in system design and implementation? Large projects require more system downtime. Large projects mean broader changes and more resources. Large projects must be outsourced.
Large projects mean broader changes and more resources. (Page 58)
Wi-Fi Protected Access II (WPA2)
Latest algorithm - Mandatory use of AES algorithms and the introduction of CCMP (Counter Cipher Mode with Block Chaining Message Authentication Code Protocol) - 2006
A company is considering an expansion into a new target market. The company's management team develops a decision process to analyze current market strengths and to predict needs for the proposed new target market. Which benefit does the company gain by developing this target market decision process?
Management decisions are easier
MIS
Management information systems
Interactions between buyers and sellers are often more effective when sellers intimately understand the needs of their customers, and when customers have more information to make important decisions. Thanks to the variety of beneficial resources, information, and services made possible by the internet, such interactions may be highly individualized, and tailored to the buyers purchasing capacity, and relative influence. What is another important advantage of a digital market over a traditional market from a buyer's perspective?
Less price discrimination
LDAP
Lightweight Directory Access Protocol = Created by the International Telecommunications Union; a standardized protocol that defines the organization of a set of directory records, such as groups, individual names, and attributes that are associated with them. Many applications use the LDAP standard. The most used example is Microsoft Outlookâs global address list and Microsoft Active Directory
What is LAN?
Local area network, and typically connects computer systems of an organization or a floor of a building;
Supply Chain Managment
Logistics, Sharing Production info with supplies, transmit info back and forth, GM and Good Year Tires, they know what they need to do, the amounts, inventory, and etc
Business strategy is how a business achieves it's goals and outperforms its competitors. Strategic information systems (SIS) are used to help companies accomplish business strategies. Some of the initiatives for implementing an SIS include all except which of the following:
Low switching costs.
Management Information
Lower Management (Coaching employees)
Which system helps managers manage their departments more efficiently?
MIS (management information systems)
Trojan Horse
Malware is spread through a variety of methods, direct download (intentional or not), as a part of another application or utility
First level managers
Management information systems focus on technology, people, and organizations. They primarily serve these people.
Web design tools
Many graphical and traditional text based HTML editors exist and range from the unsophisticated text editors to feature rich graphical WYSIWIG (What You See Is What You Get) interfaces. Modern popular examples include Adobe's Dreamweaver and Microsoft's Visual Studio.
What are the roles of IS Business?
Marketing/Sales, Production/Operations, Accounting/Finance, and Human Resources
Core Competency
Marketplace leader competitive advantage Central to employee focus
Private Exchanges
Marketplaces of health insurance and other related products. Employers and then their employees can choose a health plan from those supplied by participating payors
What is meant by master data in entity-relationship modeling?
Master data are objects shared across the enterprise.
Sasha is an IT engineer at a small online news agency, where 35 employees carry laptops and print to the wireless printer. Several wireless access points are installed in the ceiling at appropriate points throughout the office space, through they share the same SSID (Service Set Identifier). In fact, an employee can start a large download and then carry her laptop from one end of the office space to the other without losing her connection. Which network topology configuration supports this scenario?
Mesh topology
Word substitution
Method of encoding by which units of plaintext are replaced with ciphertext
Structured systems models
Methodical and process-oriented, moving from the general level to the specific level through a series of processes
JAD (Joint application design)
Methodology that involves the client or end user in the design and development of an application, through a succession of collaborative workshops _____ sessions
Decision Support
Middle Management (what products sell more at Aldi's on Sundays)
When it comes to identifying and evaluating alternative solutions prior to acquiring a new information system, which of the following is NOT correct? When embarking on a strategic complex initiative, various solutions should be evaluated. Mistakes can be very costly to businesses. Before deciding on a solution, several alternatives should be evaluated. Mistakes can be easily corrected when identified.
Mistakes can be easily corrected when identified. (Page 57)
Customers with to have the capability of performing tasks anytime, anywhere without being tethered to a desktop computer. Which term describes computer programs designed specifically for this purpose?
Mobile apps
Flat file database
Model that resembles file cabinet functionality
Shared hot sites
Offsite facilities shared with other organizations for the purpose of disaster recovery, requiring only adequate or prioritized staffing, but at a cost shared with another organization
Cold Sites
Offsite office space awaiting occupancy, equipment, personnel, and utility service, allowing recovery within days
What is Moores Law?
Moore's Law says that computing power and storage capacity will continue to increase or double approximately every two years.
Secure File Transfer Protocol (SFTP)
Much like HTTPS, SFTP uses secure technologies, this time Secure Shell (SSH), to secure the connection for transferring files from computer to computer.
Portal
Much like a hotel's concierge desk, an online portal provides gateway access to information, entertainment, and business. With an enormous number of websites, storefronts, encyclopedias, several portals exist and serve as the starting point for many on the Internet. Examples include Google.com, Yahoo.com, and Bing.com.
Market Creator
Much like a traditional bazaar or shopping mall brings together buyers and sellers, the Internet has many organizations who have built a business around providing a market platform. On this platform, individuals and organizations may transact business that is unrelated to the market creator, who nonetheless collects a fee for helping to create the opportunity. Examples include Amazon's Marketplace and eBay.
Partnership
Much like sole proprietorships, partnerships may be created by two or more individuals who may then personally and individually share in the rewards and liabilities created by that business, in proportion to their share of the business.
Hot Sites
Offsite office space with available and up-to-date systems and service connections, requiring only adequate or prioritized staffing, allowing recovery within minutes to hours
Warm Sites
Offsite office space with available systems and service connections, requiring staffing and updates allowing recovery within hours to days
Token Ring
Network is a local area network (LAN) in which all computers are connected in a ring or star topology and a bit- or token-passing scheme is used in order to prevent the collision of data between two computers that want to send messages at the same time
SCM (supply chain management)
Network of businesses that are connected to provide products and services more efficiently to customers, accommodate rapid growth, and meet requirements of retailers and distributors. Lower costs, improve collaboration, reduce cycle times, respond to conflict, forecast demand, and manage product flow. Diane's Designer clothing wants to be the price leader in the industry by cutting out the middleman, renting warehouse space, producing easier clothing designs, and bringing products to market in less than 3 weeks.
The "Internet of ThIngs" (IoT) is a growing topic in business and a hot IT career field. What best describes IoT?
Network of physical devices.
A corporation needs to improve its security policies and has decided to limit physical access to the corporate computers. What value will the corporation realize with this policy?
Network/system protection
Virtual Company Model
Networks of people and resources join together to provide a service or create a product without the traditional storefront boundaries.
Transaction Processing Systems
Non Managerial Employees (people running the cash register at Aldi's)
What are used to handle large amounts of data in a database, and the databases can be stored in multiple locations?
Non-relational database
Unified Modeling Language (UML)
Not a programming language. This is a graphical notation specifically for drawing diagrams of an object-oriented system
Reporting
OLAP databases are used for ......... , such as being used for regional sales.
Which of the following is NOT a primary type of requirement in SDLC? Object Product Project
Object (Page 55)
In Memory Computing
Of the components in a computer, the processor and memory are the fastest and most necessary.
Freemium
Offering of product samples and trial versions
What is Phishing?
Often completed through email, this generic act of fraud is often in the form of an email requesting a response containing sensitive information, such as a username or password. However, it can also take the form of a misleading and/or masked hyperlink that directs a victim to an official looking website (i.e. a pharming page) that asks for sensitive information.
decision trees
One data mining methodology is ......... which generate rules and classify data sets.
What are the Benefits of Enterprise Systems
One key business benefits of enterprise resource planning is the foundation that it provides for a business to standarize it's business procedures across all business units. The systems tightly intergrate functional areas as one single comprhensive system.
Simple Mail Transfer Protocol (SMTP)
One of several popular email protocols in use today (others include IMAP and POP3).
A fast food restaurant chain is in the process more restaurants in an overseas market. One of the requirements is to have a reliable and scalable database technology which allows the local restaurants, A s well the corporate office, data access regardless of the platforms and locations.
Online analytical processing database
Although printed catalogues are still produced and mailed by specialty retailers, for most of these retailers a customer can place an order immediately at the website instead of mailing an order form. Which specific feature of e-business enables this opportunity?
Online order entry
Net Marketplace
Online platform host where transactions may take place between a seller and a buyer
Examples of IS
Online reservation booking, track customer activities, and predicting future sales patterns.
What does OLTP stand for?
Online transaction processing
What is one management solution to overcome global information system challenges?
Only some of the core systems should be shared initially, and then gradually share some of the other systems, but only if they share key elements.
OSI stands for
Open System Interconnection and is the foundation for data communication protocols.
In what areas should a systems analyst be a subject matter expert? Operating systems, programming languages, and computer hardware Embedded software, databases, and microchip Network design, electronics, and databases
Operating systems, programming languages, and computer hardware (Page 60)
During information system development programs, oral communication will be utilized throughout the duration of the project. Oral communication is the transfer of information via verbal and visual content, including conversations, presentations, and speeches. Can you explain the potential pitfalls of oral communications in the professional environment?
Oral communication is part of being a professional. Included in oral communication are nonverbal content such body language and changes in tone, which can help or hinder message comprehension. Oral communication is also subject to misinterpretation. (Page 60)
When a new system is designed, the proposed changes must consider the organization's jobs/skills, along with organizational structure. Which choice below is NOT true when considering a new system? Organizations are living organisms that do not accept change readily, and therefore, they must be included in systems design. Organizations are living organisms that readily accept change and do not require much planning. Organizations should be included in the analysis and design because they must accept change inherent by new systems.
Organizations are living organisms that readily accept change and do not require much planning. (Page 55)
retrieve
Organizations can help to maintain data integrity by implementing data governance policies. Only employees with appropriate access rights can ............. data from the server.
Why is it a challenge for businesses to invest in strategic information technology projects?
Organizations have difficulty defining business objectives.
HR
Recruiting and training, employee benefits and regulations management, employee records
Why is it desirable to use original documents during data capture? Originals have the required keys. Originals ensure validity and fewer errors. Duplicates contain incomplete information. Correct! If data capture is performed using copies or duplicates, there may be more errors.
Originals ensure validity and fewer errors. (Page 58)
Information
Output
Types of computers
PC, Workstation (more than 1 person), Server (printers, fax), Mainframe (high performance to process large data), Supercomputer (simulating weather patters, decoding genome structures), Grid computing (supercomputer for many smaller systems connected), Virtual
Point to Point protocol (PPP)
PPP stands for Point-to-Point protocol. Encryption is used to ensure the privacy of the content being communicated.
Software
Package coded instructions
A corporation wishes to modify its current distribution system. The management team asks the Information systems team to analyze the proposed distribution change. Upon approval of the proposed IS project, the IS team must choose the project implementation method. Which method allows the old system to operate while the new system is developed and tested?
Parallel adoption
What element in decision theory assigns values to events? Choices: Payoff Acts Outcomes Events
Payoff (Page 65)
Widespread use of the internet caused disruption and quick eveloution within the music industry. Responses to widespread internet usage included technological evolutions, such s uniquely identifiable digitally tagged files, and the passage of laws that penalized file sharing. Which type of e-commerce put music industry artists, publishers, publishers and retailers at risk of losing potential revenue due to the widespread use of the internet?
Peer to peer networks
There are six major components of a computer-based information system, four of which are also in the information technology component. Which two are only parts of the information system? Data / Processes / Hardware /Networks /People/Software
People & Processes
Information systems specialists
People who develop, operate, and maintain the systems. Specialists include programmers, systems analysts, testers, computer operators, and other managerial IS personnel
Playboys Produced Hotdogs Since Nutritionists Died (IS)
People, processes, hardware, software, networks, and data
Information systems
People, processes, hardware, software, networks, and data comprise the six major components of a computer-based
Hardware
Physical Device
______ is key for user support after implementation because it helps identify and prepare for future needs and budget planning. Testing Communication Planning
Planning (Page 59)
IT Mgmt Challenges
Political and Legal Pressures, Cultural Pressures, Technological Pressures, Economic Pressures
When managing a database, it is important to be knowledgeable about the risks of poor data quality. What is one consequence of poor data quality? Poor data quality results in poor output. Poor data quality results in system bugs. Poor data quality results in hardware failure.
Poor data quality results in poor output. (Page 59)
Which telecommunications protocol is used to retrieve email from a mail server?
Post Office Protocol (POP)
Imagine a Cat Going To School In (ICGTSI - Decision Making Process (6)
Prob ID, Data Collection, Solution Generation, Solutions Test, Solution Selection, Solution Implementation
A large hotel chain needs to develop a system that would coordinate its airport shuttle service with its customer's needs. This requires that their systems analysis staff interacts with both customers and shuttle drivers to identify and document the necessary requirements. In which role would a systems analyst assume to address this issue?
Problem solver
Which business function is responsible for Quality Control?
Prod and Ops
You have created a database to store the products sold in a department store so they can be managed, updated, and manipulated more easily. The store manager wants to create a query to show the items that are selling today. What would be an appropriate field to sort the data?
Product ID
Which business functions is primarily the responsibility of production and operations information systems?
Product life cycle, manufacturing Inventory management, quality control Research and Development
Prod and Ops
Product life cycle, manufacturing, inventory management, quality control, research and development
What business function benefits from both wireless networks and cellular technologies?
Product sales support
Which feature of social media websites can a job seeker use to convince prospective employers that the job seekers talents are real and are already valued by a number of other individuals and organizations?
Profile creation
Software
Programs comprised of pre-coded instructions written in a programming language which the end user typically uses to interact directly with the IS.
Utility Software
Programs perform periodic system maintenance activities, such as virus detection, storage space consolidation, backup and recovery, intrusion detection, and access authentication monitoring
A company has recently acquired a former distribution competitor in another country. The new subsidiary uses obsolete CRM software. To streamline integration with the new subsidiary, the CEO and CIO have decided to replace the outdated software with the system the company currently uses. What is a political challenge to implementing this decision?
Prohibitions against the transfer of certain technologies across national boundaries
A ride-sharing cab company is looking for ways to generate more business by attracting more customers, both on the supply (drivers) and the demand (passengers) side, via a strategy of tracking their monthly miles and offering "frequent flier" bonuses, just like the airline companies have done. Which IT management challenge is addressed in this scenario?
Promote competitive advantage
Business intelligence provides benefits and value to businesses and organizations. Which answer below is NOT a benefit of BI? Reduced labor costs Reduced IT staff Reduced information bottlenecks
Reduced IT staff (Page 64)
EUD (End-user development) / EUP (End-user programs)
Refers to activities and tools that allow end-users - people who are not professional software developers - to program computers
As a software developer, you explain the prototyping development method to your colleagues. Which of the following best describes the prototyping software development method? Prototyping allows for unexpected changes. Prototyping is a four-step method that results in quick module development. Prototyping is an incremental form of agile software development.
Prototyping is a four-step method that results in quick module development. (Page 56)
RAID (redundant array of independent disks; originally redundant array of inexpensive disks)
Provides a way of storing the same data in different places (thus, redundantly) on multiple hard disks
A company has issued smartphones to its employees with a policy that the devices may not be used off the company's campus. An IT analyst has been tasked with finding a way to enforce this policy. Which solution provides a fitting solution to this problem?
Proximity authentication access control
Which tool is appropriate for use in the design phase of information systems development to specify the detailed logic of a business process in narrative form in a manner easily translatable into program language?
Pseudocode
WAN networks are interconnected via the Internet, private networks, or Hint, displayed below
Public switched telephone networks
Analytical Platforms
Purpose built appliance systems that are designed to process and analyze enormous amounts of data quickly.
When designing and implementing an information system, one must keep in mind the quality and reliability of the information system. Quality and reliability seem to be redundant when discussing and evaluating key aspects of managing systems implementation. Can you describe the difference and relation, if any, between the meaning of "quality" and "reliability" when designing and implementing an information system?
Quality refers to the factors that affect system design, behavior, and the user experience. Reliability is concerned with inconsistent output, system failure, and system unresponsiveness. Quality and reliability do come together when addressing run-time quality factors of the information system. When testing run time, the design team of the information systems must address system availability, manageability, operability, performance, reliability, scalability, and security. (Page 58)
What is used to retrieve specific data from a database?
Query language
What technology is used to track inventory and can be read hundreds at a time, even if the tag is covered?
RFID
Which approach to systems development has a limited emphasis on the planning process and uses prototypes in lieu of predetermined specifications?
Rapid Application Development (RAD)
Which development methodology brings developers together with clients or end users in order to regularly collaborate on a solution?
Rapid application Development (RAD)
Analytical database
Read-only system that stores historical data on business metrics such as sales performance and inventory levels
_____ is defined as the ability of a system to continue operating as expected over a period of time. Usability Quality Reliability
Reliability (Page 58)
A business wished to extend the use of its virus scanning software to the business' customers. This requires the business to allow customers enough access to the internal network so virus scanning software can be downloaded to a customer computer. Which security measure will the business have to take to ensure customer access for virus scanning downloads yet protect internal systems from possible unauthorized access?
Require a username and password for network access
Interactive online communications, such as instant messaging, email and video teleconferencing, have allowed managers at a large retailer to boost efficiency by enabling collaboration between geographically separated employees. However such technologically assisted interactions have led to inappropriate conduct by employees, requiring the employer to implement processes or technological controls to reduce risk and encourage professionalism, but potentially invade employee privacy. Which technological action, if used, will represent an ethical challenge for this large retailer?
Reviewing instant messaging logs
Common risk management terms include:
Risks—The potential for loss, commonly associated with the monetary and non-monetary impact to such a risk, as well as the probability of occurrence. Vulnerabilities—A weakness in the technology, process, and procedure, or people involved with any given information asset. Such vulnerabilities may include weaknesses in the technologies used, including their configurations, and the security policies that are enforced or not within an organization. Threats—The identified and unidentified actors that have the potential for attacking the information assets. Such actors may include elements both internal and external to the organization. Attacks—The damaging or potentially damaging acts that are the product of an attacker's process, which may include: reconnaissance, scanning, gaining and maintaining access, escalating privileges, building backdoors, and destroying evidence.
Network of businesses that are connected to provide products and services more efficiently to the customer, accommodate rapid growth and meet requirements of retailers and distributors.
SCM (Supply Chain Management)
OLAP is a database used for analyzing business data.
Why is an OLAP database considered business intelligence?
Electronic communications has predominantly become the primary form of communications in first world countries. What protocol is used to mange and monitor the massive amount of emails that we receive every day?
SMTP (simple mail transfer protocol) the popular mail protocols include IMAP and POP3
Sales and Marketing
Sales analysis, set pricing, marketing mix, and product promotions, customer profiling
______ feasibility assessment is very important for projects that have long implementation time frames. Choices: Techinical Schedule Project
Schedule (Page 57)
What is a database schema?
Schema is a planned design of the data organization.
Scope, time, cost, quality and risk are five major variables in project management that must be monitored when managing information technology to ensure project success. _____________________________________ is what is included or defined in a project, including goals, deliverables, costs and deadlines.
Scope.
SEO
Search engine optimization
SFTP
Secure File Transfer Protocol = Much like HTTPS, SFTP uses secure technologies, this time Secure Shell (SSH), to secure the connection for transferring files from computer to computer
Processes
Sequence of activities that provide input and output guidelines
A company needs to allow multiple computers to have access to a shared printer. Which type of computer is required to manage the print requests to a shared printer?
Server computer
To help facilitate business in areas without traditional infrastructure, some companies offer devices that allow businesses to accept credit cards with the tablets and cell phones. Which business model category do these companies fall in?
Service Provider
On premises (private cloud)
Services are provided in-house on servers or in a datacenter owned, managed, and administered by the organization
On Premises (private cloud)
Services are provided in-house on servers or in a datacenter owned, managed, and administered by the organization.
TCO takes into account the total costs over time, including all of the following, except: Maintenance and service contract costs Fixed and ongoing operating costs Deployment and network infrastructure costs Shipping and transportation costs
Shipping and transportation costs (Page 57)
SMTP
Simple Mail Transfer Protocol = One of several popular email protocols in use today (others include IMAP and POP3)
SNMP
Simple Network Management Protocol = Information concerning network status that is periodically passed between a network management server and routers on a network, for the purpose of monitoring network status
How many types of CASE tools are there? Six Three Five
Six (Page 61)
Micropayment
Small payment made each time a user accesses an Internet page or service
Personal Computer (PC)
Small systems are used on an individual basis (i.e., one-person use) and include traditional multicomponent desktop systems (monitor, computer, keyboard, mouse) and integrated systems, such as laptops and tablet computers.
_______ sites are web-based platforms that allow individuals to develop a public profile and connect with persons of common interest to exchange information. Underground Social Network Social Media
Social Network (Page 61)
A food truck wants to connect with its customers using a site that enables users and businesses to use public messages to create informed commerce. Which concept best describes service to consumers and businesses closing the feedback loop?
Social networking
automation
Software applications benefit business because they enable process
Software as a service (SAAS
Software licensed and hosted on centralized or distributed servers that belong to a service provider. Users access this software using a connection to the Internet and a Web browser. Examples include Salesforce.com's CRM (Customer Relationship Management) application or Google Apps.
What communication best practice should IT professionals perform during a project? Holding regular meetings to give status updates Soliciting feedback throughout the project Sharing documentation with all users
Soliciting feedback throughout the project (Page 60)
IEEE 802.11
Specifies an over-the-air interface between a wireless client and a base station or between two wireless clients
Critical Path Method (CPM)
Step-by-step process planning technique that defines the critical and noncritical tasks within a project in order to reduce or minimize process delays and time-related problems
Information asymmetry
Study of decisions in transactions where one party has more or better information than the other. This creates an imbalance of power in transactions, which can sometimes cause the transactions to go awry, a kind of market failure in the worst case
Data Mart
Subset of the data warehouse that is usually oriented to a specific business line or team
Character shifting (Ceasar cipher)
Substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions down the alphabet. For example, with a left shift of 3, D would be replaced by A, E would become B, and so on. The method is named after Julius Caesar, who used it in his private correspondence.
Which of the following is not a dimension of the balanced scorecard tool? Financial Process Supply
Supply (Page 64)
SCM
Supply chain management system
An international company is facing the challenge of its software development team working on a specific application spread across the globe in 16 countries in 12 different time zones. Flying them to the same location once a week or even once a month for coordination purposes would be prohibitively expensive. Moreover, the issues that arise trend to be urgent and in need of almost immediate resolution in communication with team members in other countries. Which communication style is necessary to resolve the issues in the given scenario?
Synchronous
An international company is facing the challenge of its software development team working on a specific application spread across the globe in 16 countries in 12 different time zones. Flying them to the same location once a week or even once a month for coordination purposes would be prohibitively expensive. Moreover, the issues that arise tend to be urgent and in need of almost immediate resolution in communication with team members in other countries. Which communication style is necessary to resolve the issues in the given scenario?
Synchronous *
The traditional systems development. Lifecycle (SDLC) consists of six formal phases.. Which phase involves. Developing the plan for capturing data and producing output?
System Analysis
Why is system modeling referred to as an iterative process? System modeling is an iterative process because it is required to model several times. System modeling is used to implement findings and start over to ensure the system is understood. System modeling is an iterative process because information gathering is not a perfect process.
System modeling is used to implement findings and start over to ensure the system is understood. (Page 57)
Corporations are constantly evaluating their processes, changing or upgrading their management information systems, or implementing a new strategic initiative. These initiatives can sometimes be designed or deployed using information systems. Why is it important to use systems analysis in these circumstances?
Systems analysis is the process of analyzing organizational programs that can be solved with an information system. It is critical to understand the problem as a whole by defining the problem, looking at the underlying causes, and identifying a possible solution along with system requirements. The requirements will involve process development, information technology, and possible changes to the organization's management. (Page 55)
Which of the following best describes systems analysis as a general term? Systems analysis is a feasibility study. Systems analysis is used to analyze organizational problems. Systems analysis is defined by Systems Development Life Cycle.
Systems analysis is used to analyze organizational problems. (Page 55)
As previously discussed, corporations are always taking on new initiatives to remain competitive or gain a competitive advantage. When taking on an information system development project, it is necessary to evaluate the program. Describe why it is important to perform a feasibility study during the systems analysis phase.
Systems analysis necessitates the performance of a feasibility study to determine whether the solution is financially, technologically, or organizationally feasible. The objective is to determine whether the proposed system is a good investment, whether the necessary technology is available, and whether the organization can adapt to the changes introduced by the new system. (Page 57)
Which of the following best describes a systems evaluation? Systems evaluation includes performance of software. System evaluation includes performance of hardware. Systems evaluation includes query response speed, data relevancy, and memory space demands.
Systems evaluation includes query response speed, data relevancy, and memory space demands. (Page 59)
What is a universal telecommunication network protocol that most operating systems can recognize?
TCP/IP
What should team members acknowledge and understand when projects are global? Team members should communicate in foreign languages. Team members should translate documents. Team members should try to understand foreign cultures.
Team members should try to understand foreign cultures. (Page 60)
What are telecommunications?
Telecommunications is the process of exchanging information between various entities over electrical, electromagnetic, or digital networks.
Which of the following is not a modern telecommunications system technology?
Telegraph
Examples of IT
Telephone and radio equipment, data, voice, and video equipment, and computer peripherals.
Complex corporate initiatives, such as software development or information system development, are managed as projects. Project management and the SDLC method are essential strengths in systems development. One way to manage a complex project is to evaluate and understand the project's critical path. Describe the benefits of applying critical path method (CPM) to complex projects.
The benefit of applying critical path analysis is that it defines the longest paths for each task, as well as calculates the earliest and latest dates each task. This process identifies tasks that are critical and those that cannot be delayed; it also identifies the tasks that can incur delays without adversely affecting the project. (Page 57)
In organizational management, two management models have influenced our understanding of the decision-making process. These models are called classical and behavioral. Describe the differences between these two models and provide examples where they can be applied.
The classical model of management describes the role of management within the context of four functions: planning, organizing, leading, and controlling. An example of the application of this model is the action of budgeting. Budgeting is part of planning. On the other hand, the behavioral model of management recognizes that actual management behavior is less systematic or predictable than classical management. Behavioral models can be applied in unstructured decisions. (Page 63)
Schema
The complete definition of a database, including the tables, records, fields, and relationships.
schema
The complete definition of a database, including the tables, records, fields, and relationships.
Network economies
The cost of adding another business participant to a business venture is small, and the potential gain is great.
To facilitate the economic aspects of security and to implement a feasible risk assessment, what question must that organization address?
The cost of potentially lost resources
Attacks
The damaging or potentially damaging acts that are the product of an attacker's process, which may include: reconnaissance, scanning, gaining and maintaining access, escalating privileges, building backdoors, and destroying evidence.
When identifying post-implementation considerations, which of the following best defines strategy oriented system evaluation? The determination of the success of the information system in meeting functional objectives The determination of whether the information system outputs enable management to make strategic decisions The ability of the information system to discriminate between files or data that are relevant to a user query
The determination of whether the information system outputs enable management to make strategic decisions (Page 59)
What is a disaster recovery plan?
The disaster recovery plan is one that depicts the process involved with returning operations to their appropriate function in case an emergency or disaster halts them.
database management systems (DBMS)
The evolution of software has produced the ability to manage large databases of information, known as
What is the role of the facilitator when using GDSS in decision making? Choices: The facilitator leads the meeting. The facilitator ensures meeting productivity. The facilitator schedules the meeting.
The facilitator ensures meeting productivity (Page 65)
The information systems support team is asked to perform an analysis of corporate privacy measures regarding a centralized relational database. The database is interconnected to several business groups via the internal data network that also supports connectivity to outside organizations. Which ethical risk is identified after a secondary analysis?
The financial system introduces unwanted liabilities
Threats
The identified and unidentified actors that have the potential for attacking the information assets. Such actors may include elements both internal and external to the organization.
Decision making is one of the primary functions of management. Good decision making relies on information technology. Corporations invest and support management decision making through various IT systems. Describe a positive attribute of decision-making support systems and name at least three types of decision-making support systems.
The information system used to support decision making should be flexible and adaptable to various users and enable management to use and develop their individual or group decision-making styles. Systems supporting decision making include decision support systems (DSS), group decision support systems (GDSS), and online analytical processing (OLAP). (Page 63)
What is the critical path? The longest path through the network diagram, indicating the shortest amount of time in which a project can be completed The shortest path through the diagram, indicating the maximum length of time in which a project can be completed The path with the most activities and longer durations
The longest path through the network diagram, indicating the shortest amount of time in which a project can be completed (Page 57)
search
The marketing manager for an airline company can perform a ............... on the Members table in their DBMS to identify frequent fliers who qualify for their credit card program.
Analysis
The most important task performed during system analysis is defining the information requirements, because the leading cause of system failure and cost overrun is inaccurate requirements.
Freemium
The offering of product samples and trial versions is not a new concept, although with a digital market and digital goods, product quality and available features can be tightly controlled so that when a customer wishes to expand their usage of a product, they need merely pay a fee and the new features may be immediately available. Often with --------- pricing strategies, the core service might be free, but additional features and services may be available for a charge. Mobile phone apps and games are an example of this concept, where limited versions of software are available for free, but often charge a fee for full versions, additional features, or related digital goods.
Device operators, network administrators, system specialists, and users are components of what system? Choices: The people who make structured decisions The people component of MIS The people component of co-located management for GDSS
The people component of MIS (Page 65)
What is the definition of decision making in the context of DSS? Choices: The process of identifying and selecting an alternative based on the values and preferences of the decision maker. The process of analyzing and testing outcomes. The process of defining user preferences that should be considered in the decision-making process.
The process of identifying and selecting an alternative based on the values and preferences of the decision maker. (Page 63)
What is risk management in system security?
The process of identifying, analyzing, and responding to risk
Sole proprietorship or sole trader
The simplest form of business allows an individual to register as a business, and enjoy all of the profits and benefits of doing business, but also be personally accountable for to all liabilities, risks, and debts from business operations.
User support after implementation is important because user adoption is critical for the success of any information system. Users often fail to adopt the new system because they were not properly trained, or because the system is different from the previous system. There are six methods to increase user adoption and lower post-implementation costs. What are the six methods, and which one do you think is the most important for driving user adoption?
The six methods include benchmarking, usability testing, user communication, forming an internal user group, planning, and leveraging existing resources. Benchmarking is critical because it teaches best practices. Usability testing is critical because there can never be enough testing. Communication among the users is most critical because communication is key for driving change acceptance. Forming user communities builds a support infrastructure. Finally, leveraging existing resources drives down cost. (Page 59)
The waterfall model is a type of systems development life cycle model. Which of the following is true about the waterfall model? The waterfall model is a non-sequential development process. The waterfall model is most appropriate when system requirements are clear, well-documented, and unlikely to change. The waterfall model is easy to manage due to the rigidity of the model. The waterfall model consists of five stages that follow the criteria of the SDLC model.
The waterfall model is most appropriate when system requirements are clear, well-documented, and unlikely to change. (Page 56)
When corporations embark on an information system development project, it is necessary to evaluate the program, its objectives, and how to approach development. There are methods to keep control and monitor project schedules, effectiveness, and cost. One of these methods is the waterfall model. Can you describe a scenario in which the waterfall model would be most appropriate?
The waterfall model is most appropriate when system requirements are clear, well-documented, and unlikely to change. This model is also useful when the technology is understood and will not change, when the project is relatively short term, and when sufficient resources and expertise are available to support the process. The waterfall model includes stages that must be completed prior to moving forward to the next stage, moving in a flow that is similar to a waterfall. (Page 56)
How does business intelligence reduce irrelevant information and information bottlenecks? Business intelligence makes information available to the entire organization. Business intelligence generates constant real-time data. Trained users can generate individualized reports without support from IT.
Trained users can generate individualized reports without support from IT. (Page 64)
Analytics would affect the database performance
Why is it not good practice to perform analytics on a online transaction processing database?
Computer-aided software engineering (CASE) is the use of computer methods to organize and manage software development in information systems. CASE software can be classified into three categories or hierarchies: tools, workbenches, and environments. Please describe the types of tools in each category.
There are six types of CASE tools and CASE workbenches: business analysis or graphic modeling; development; verification and validation; configuration management; metrics and measurement; and project management. There are five categories of CASE environments: toolkits, fourth-generation, language-centered, integrated, and process centered. (Page 61)
When designing an information system, it is imperative that security is planned and addressed at the system level. System level security consists of the architecture, policy, and processes that establish the security on computer systems. No matter how much time is spent analyzing and designing security protection, the system will always have a risk of being breached. Describe the three levels of risk when performing risk management analysis.
There are three levels of risk for system security: low, moderate, and high. Low-level risks have a noticeable impact and possible damage. Low-level risks can affect the short-term performance of a business. A moderate-level risk is very serious and would result in severe impairment, adversely impacting the organization's operations. A high-level risk would result in complete loss of capabilities. The resulting damage from a high-level threat could threaten public safety or economic stability. (Page 59)
What type of information systems does middle management use to support decision making? Choices: Decision support systems Executive support systems Transaction processing systems
Transaction processing systems (Page 65)
Partitioning is done to improve performance.
Why is partitioning done when administering relational database systems?
Management information systems (MIS) should make an organization more effective. MIS provides information to employees and management, enabling increased productivity and better, faster management decision making. Why is it important for executive management to periodically evaluate corporate management information systems?
There is a direct relationship between the effectiveness of an organization and the effectiveness of the organization's management information system. Periodic evaluations of MIS yield important information about the cost-effectiveness, impact, and future potential of the system. (Page 59)
What is a benefit of public cloud computing? There is no need for software customization. There is no need for new software development. There is no capital expenditure on hardware or software.
There is no capital expenditure on hardware or software. (Page 61)
Why are DBMS reports a valuable database tool in helping managers make business decisions?
They display data in a structured format
Information system
This consists of all the components that work together to process data into useful information.
Information
This is data that has been organized to provide value to an organization.
Skilled workers
This is one of the most important issues facing businesses today since the IS management function is extremely complex and changes regularly.
Horizontal
This is the structure of the IS function because information systems encompass many different business functions in an organization, and cannot work alone in a vertical structure.
implementation
This phase includes testing, user training, maintenance, and documentation of the system.
TPS, MIS, DSS, EIS
This system organizes and presents data and information using internal and external data sources in support of senior executives as a four-level pyramid that depicts different types of information systems, as they relate to different hierarchical levels within an organization.
Management information systems (MIS)
This system provides first level managers with reports on current performance and historical records to help keep an organization running smoothly
MIS (Management Information System)
This system provides first level managers with reports on current performance and historical records to help keep an organization running smoothly.
Decision-support systems (DSS)
This system provides modeling and analytical tools that support middle to senior managers in all aspects of the decision making process, when problems are unique, unstructured, and not easily specified in advance, to project potential future trends
DSS (Decision-support System)
This system provides modeling and analytical tools that support middle to senior managers in all aspects of the decision making process, when problems are unique, unstructured, and not easily specified in advance, to project potential future trends.
Executive information systems (EIS)
This system supports senior executives by providing important data in the form of graphs and charts to analyze and identify long-term trends
EIS (Executive Information System)
This system supports senior executives by providing important data in the form of graphs and charts to analyze and identify long-term trends.
Transaction processing systems (TPS)
This system tracks the flow of daily routine transactions that are necessary to conduct business, such as payroll or order processing
TPS (Transaction Processing System)
This system tracks the flow of daily routine transactions that are necessary to conduct business, such as payroll or order processing.
What does TCP/IP stand for?
Transmission Control Protocol/Internet Protocol
Telecommunications
Transmission of Information
Supercomputer
This term merely implies the fastest category of computer available. Supercomputers are purpose built to handle vast amounts of information very quickly. Examples of supercomputer applications include simulating global weather patterns, decoding genome structures, or simulating the human mind.
How many types of management information systems evaluations are there? Four Two Three
Three (Page 59)
How many types of decision-making processes in decision support systems are there? Choices: Three Four Five
Three (Page 63)
About one third of the IS management agenda is expected to change every _____ ______ , confirming the highly dynamic nature of the IS management function.
Three years
As an IT professional, you are conducting a feasibility study for a project. What is the overall objective of a feasibility study? To determine development cost To determine the technology required To determine if the outcome is possible and desirable
To determine if the outcome is possible and desirable (Page 57)
Why do communications networks use defined rules or standards called protocols?
To ensure communication between packets is accurate and understood.
What are the three CASE software classifications? Methods, diagrams, and users Tools, workbench, and environment Analysis, design, and documentation
Tools, workbench, and environment (Page 61)
Public Exchanges
Trading venues open to all interested parties (many sellers and many buyers) that use a common technology platform
Service Provider
Traditional retailers such as tire shops and grocery stores sell both goods and services. The online equivalent is much the same, where Amazon.com offers goods that are purchased and shipped, and digital services such as Amazon Web Services, where online storage space and processing power is rented, or paid as an ongoing subscription. Other examples include the many options and utilities provided by Google Apps.
You are testing a new system implementation. What are the three elements of the testing phase? Unit, system, and acceptance testing Unit, system, and conversion testing Unit, system, and configuration testing
Unit, system, and acceptance testing (Page 58)
_____ testing requires a formal meeting with several users, which includes an interview and observation or screen-sharing. Output Usability Benchmark
Usability (Page 59)
Rolling code (hopping code)
Used in keyless entry systems to prevent replay attacks, where an eavesdropper records the transmission and replays it at a later time to cause the receiver to 'unlock'. Such systems are typical in garage door openers and keyless car entry systems
What is a data mart business application?
Used to analyze a business unit, or a single unit
System implementation success depends on a number of factors, but true system success is measure by which factor below? Data quality System performance User adoption rates Query speed
User adoption rates (Page 59)
A car dealership has been receiving complaints from its customers about its inflexible repair system in which customers who drop off their cars the previous evening are not properly placed in the queue and tend to be placed behind those who drop their cars the morning of the scheduled repair. It needs technical staff members who understand the scheduling drop-off operation so it can determine and articulate precise customer needs to the programmers who would then build the code behind the system. What type of challenge is this?
User requirements
What are user requirements in the SDLC process? User requirements means getting users to define the system GUI. User requirements means documenting all user needs, wants, and requirements. User requirements means interviewing users to define process.
User requirements means documenting all user needs, wants, and requirements. (Page 55)
Object-oriented systems development
Uses the object as the unit of design, and is based on the concepts of class and inheritance. For example, numerous automobiles belong to the class of automobiles, and numerous trucks belong to the class of trucks, but both inherit the property of vehicle from the vehicle class
What is a secure tunnel through the internet using a public infrastructure?
VPN (virtual private network)
Amanda has been asked to regularly extract and process databases from many sources into a data warehouse, which will be used by several divisions within the company. Which type of data should Amanda recognize is prevented by her data warehouse design?
Variable
How are WAN networks interconnected?
Via the Internet, private networks, and the public switched telephone network
What is WAN?
WAN stands for wide area network, and typically connects LANs or smaller networks across large distances.
Although WPA has been a secure encryption protocol for wireless networks, it is being replaced by a standard that offers an even stronger security as the latest Wi-Fi encryption protocol. What is the name of the new standard?
WPA2
What is the meaning of the waterfall methodology in software development? Waterfall means the development team spends most of the project time on planning and specification. Waterfall means that there is a fast project development process with difficulty when it comes to predicting costs. Waterfall means that each stage must be completed before starting on the next development stage.
Waterfall means that each stage must be completed before starting on the next development stage. (Page 56)
Private Industrial Networks
Web networks allowing 360 to collaborate
Why are webinars a great source of technical information for IT professionals? Webinars are web based meetings that cover a variety of topics. Webinars are face-to-face technology expos. Webinars are free for anyone to join.
Webinars are web based meetings that cover a variety of topics. (Page 61)
- CPU -Memory
What are the components found on a computers motherboard?
Volume, variety, and velocity
What are the three V's used to describe Big Data?
1NF, 2NF, 3NF
What are the three norms in normalization?
G2B, G2C, G2G
What are three models of e-business. Choose 3 G2D G2B G2G G2E G2C G2S
Is one record or data set in a row
What are tuples and how are they used in databases?
Presentation and staging
What are two key elements that make up the data warehouse?
clickstream records where a user clicks on a webpage
What best describes the meaning of clickstream?
B. Differentiation
What business strategy is a large computer company using if it offers products with several appearances and screen interfaces? A. Cost Leadership B. Differentiation C. Loss Leadership D. Focus
B. It can lead to feature creep
What can happen when the project requirements are not clearly defined? A. It can lead to a lack of business requirements B. It can lead to feature creep. C. It can lead to missing user training documentation D. It can lead to insufficient design alternatives
Velocity means ability to execute data integrity.
What do people mean by velocity when describing Big Data?
C. Podcasting
What e-Business tool converts an audio broadcast to a file that can be played on a digital music player? A. Videoconferencing B. Instant Messaging C. Podcasting D. Webinar
Data marts are used to analyze a business unit.
What is a data mart business application?
C. It leads to a loss of confidentiality
What is a drawback of outsourcing system development projects? A. It increases operation expenses for head count B. It leads to a decrease in project quality C. It leads to a loss of confidentiality D. It increases the time needed to market for products
D. The field must have unique values
What is a requirement of a field when it is in a table and is defined as the primary key? A. The field must have numeric values B. The field must appear in another relation C. The field must have duplicated values in the relation D. The field must have unique values
Object oriented databases contain multimedia files or executable code in records or fields.
What is an object oriented database?
D. Collective Information
What is business intelligence? A. Knowledge B. Technology C. Data sources D. Collective Information
C. A blend of computers and wireless telecommunications technologies.
What is telematics? A. A form of telecommunication technology that is used to identify and track assets via radio frequency. B. A telecommunication chip embedded in store shelving to help retailers. C. A blend of computers and wireless telecommunications technologies. D. A telecommunications device that allows goods and services to be purchased wirelessly
Data integrity is a process to ensure data is not corrupted.
What is the best definition of data integrity?
The flat file design is a single table database.
What is the best description of a flat file database?
An entity exists in itself
What is the definition of an entity in a database?
D. Data is processed to get information
What is the difference between data and information as they relate to business functions? A. Data is related to hardware but info is not related B. Data is stored but information is not stored C. Data comes from info D. Data is processed to get information
A. Information is processed data
What is the difference between data and information in information systems? A. Information is processed data B. Data contains numbers where information contains text C. Information and data are synonymous D. Data is written reports where info is the raw numbers
data mining and analytics are interchangeable, both are processes to identify new patterns in data
What is the difference between data mining and analytics?
Data mining examines and reveals patterns in a structured DBMS, while web mining discovers patterns in a less structured format, such as the Internet.
What is the difference between data mining and web mining?
A. Product or service limitations
What is the main challenge to growth that is encountered when e-business is used? A. Product or service limitations B. Poor social media presence C. Underdeveloped user interface D. Inability to adhere to taxation rules or regualtions
C. Electronic communications privacy act
What is the most recent federal bill that addresses computer monitoring of employees? A. Sarbanes oxely act B. Homeland security act. C. Electronic communications privacy act. D. USA PATRIOT act
A. TCP/IP
What is the primary networking standard used to communicate over the internet? A. TCP/IP B. XBRL C. HTTP D. URL
A. It provides relational integrity for the database
What is true of a relational database? A. It provides relational integrity for the database B. It allows for the creation of data marts C. It compiles the metadata about the data elements in the data model D. It creates an indirect backup of data in the database
Predictive analytics
What item below is considered a category of business intelligence?
A. RPM
What measures computer speed? A. RPM B. CPU C. Hard disk size D. Network interface card
application software
What software allows computer users to perform activities, functions or tasks? routing, application, or operating?
B. It would decrease errors in medicaitons
What would be the impact of a hospital using a medication system that automatically distributes prescriptions in the hospital pharmacy? A. It would reduce the total number of medicines prescribed. B. It would decrease errors in medications C. It would increase employee safety D. It would improve customer satisfaction
Software engineers and information systems analysts follow standards, such as the SDLC and waterfall methods, as well as other software and system development tools to ensure program success. Another important tool used in designing complex systems is modeling. A standard modeling tool used in systems design is Unified Modeling Language (UML). Can you explain the benefit of systems logical modeling and how UML is applied?
When developing a system or a product, the development team should strive to model and test systems against requirements and assumptions before committing to design and production. By modeling the system using tools like UML, inputs, processes, data, and outputs are visualized and edited or redefined before moving to the design phase. This helps the team optimize the system design. (Page 57)
-Manage Incoming data -catalog data
When looking at the evolution of software, databases have grown in features and popularity. What do databases management system (DBMS) applications do for business?
Data Integrity
When there are mistakes or errors in the data, it is a violation of the ............ rule.
C. Network Operating System
Which type of software manages the users and contains an array of programs that ensure that data is being transmitted to the correct user, computer, or other devices? A. Device B. Utility C. Network Operating System D. Open-source system
Database administrator
Who is responsible for acquiring, organizing, and distributing information for the organization?
They display data in a structured format.
Why are DBMS reports a valuable database tool in helping managers make business decisions?
Data warehouses can be mined or analyzed for trends or patterns
Why are data warehouses beneficial to business managers?
Data governance
Which answer below defines the policies and processes to manage and maintain the data integrity and security of a government agency?
B. Location-based services
Which application is utilized by GPS and GIS? ch 16 A. Automatic vehicle location B. Location-based services C. Edge mapping D. Mapping densities
D. Plunge
Which conversion implementation should a company use if it plans to discontinue using the legacy payroll system on Friday and begin using a new payroll system on Monday? A Phased B. Pilot C. Parallel D. Plunge
D. Gathering the business requirements
Which investigative activity must occur during the analysis phase of this project? A. Designing the technical architecture B. Setting the projet scope C. Defining the system to be developed D. Gathering the business requirements
C. A data flow diagram
Which investigative tool is used during the analysis phase of systems development to guide process improvement? A. An entity-relationship diagram B. A brainstorming diagram C. A data flow diagram D. A flow chart
B. Usability
Which method measures the ease with which people perform transactions or find information? A. Transaction speed B. Usability C. Accuracy D. Response time
B. WiMAX or C. Wi-Fi
Which networking standard is used by businesses to transfer information through radio waves over distances up to several miles? A. RFID B. WiMAX C. WiFi D. NFC
Joe is extracting information from existing data to better understand his customers and identify potential risks.
Which of the following is an accurate example of why a business should use predictive analytics?
Query language
Which of the following is used to retrieve specific stored data from a database?
utility
Which of the following items is a type of system software? Routing, utility or DBMS?
A. Scope creep
Which risk is reduced when the investigation step is well executed during the planning and analysis phases of systems development? A. Scope creep B. System obsolescence C. End user training failure D. Continual maintenance
B. Firewall
Which security technique helps protect systems by examining each message as it enters the system and blocking improper or unauthorized messages? A. Biometric security B. Firewalls C. Encryption D. Antivirus software
B. Encryption
Which security technique uses private key and public key pairs to protect sensitive information? A. Antivirus software B. Encryption C. Firewalls D. Biometric Security
B. Extranet
Which solution would allow a company to host a computing service on an internal network and restrict it to employees within the organization? A. Exchange server B. Extranet C. Private Cloud D. Virtual private network
C. VoIP
Which technology allows businesses to use network phone software to make calls to other network users? A. Token Ring B. Frame relay C. VoIP D. ATM
D. Prototyping
Which term is used to describe an iterative approach to building a system? A. Sketching B. Scrum C. Waterfall D. Prototyping
B. Microcomputer
Which type of computer system would an employee need to complete a project requiring a spreadsheet? A. File server B. Microcomputer C. Mainframe D. Midrange System
B. B2B
Which type of ecommerce model is used when a company sells tires to automobile companies? A. G2B B. B2B C. C2C D. C2B
A. Autonomic
Which type of emerging computing technology allows a computer to diagnose its own failure and develop a workaround that enables the computer to continue to function? A. Autonomic B. Auto-correction C. Alternative D. Avatar
C. Spreadsheet
Which type of software application is most effective for analyzing small to medium numbers? A. Database B. Web browser C. Spreadsheet D. Word processor
Relational databases have simpler table relationships than hierarchical databases.
Why did relational database models replace hierarchical database models in business applications?
B. It supports change through iteration
Why would a company consider using a prototype when converting an existing order entry system to a web-based system? A. It detects errors after development B. It supports change through iteration C. It ensures managerial participation D. It creates a secure system
A. It provides many personal productivity programs
Why would a school admin choose to utilize Microsoft Office? A. It provides many personal productivity applications. B. It integrates all department and functions into a single IT system. C. allows multiple computer to run on a single machine. D. permits transmission of business info.
A. It permits secure transmission of business information
Why would a vendor choose to utilize electronic data interchange (EDI)? A. It permits secure transmissions of business information B. It provides many personal productivity applications. C. It allows multiple computers to run on a single machine. D. It integrates all dept functions into a single IT system
Which telecommunications protocol is used to connect devices in a wireless local area network (LAN)?
Wi-Fi
Wired Equivalent Privacy (WEP)
Wi-Fi security algorithm (64bit) - Retired 2002
Wireless access point
Wired internet extention
What does WSN stand for?
Wireless Sensor Networks
Wireless repeater
Wireless internet extension
Which two network devices boost Wi-Fi strength for wireless devices in area of low signal quality?
Wireless repeater / wireless bridge
Bluetooth
Wireless technology standard for exchanging data over short distances (using short-wavelength UHF radio waves in the ISM band from 2.4 to 2.485 GHz[4])
What is Advanced Data Analysis?
With the increasing use of computer-based information systems, an ocean of data has been collected, stored, and made available for a wide array of analyses.
Advanced Data Analysis
With the increasing use of computer-based information systems, an ocean of data has been collected, stored, and made available for a wide array of analyses. These analyses may be general or specific, potentially very intricate, and may expose information or nonobvious relationships and connections, leading to breaches of privacy and trust.
What is mobile information availability?
With the increasing use of mobile computing platforms connected to the Internet, including smartphones and tablets, more information input and output is available to more people in more places.
Mobile Information Availability
With the increasing use of mobile computing platforms connected to the Internet, including smartphones and tablets, more information input and output is available to more people in more places. This availability of information allows benefits, such as localization and personalization, but direct and specific invasions of privacy require faster reputation management and for information controls in more places.
A WBS is developed at the beginning of a project to identify activities required to complete a project. What does WBS stand for? Work baseline system Work and business system Work breakdown structure
Work breakdown structure (Page 57)
Why are good writing skills critical to the system analyst function? Writing skills are essential because new ideas are shared in writing. Writing skills are essential as the primary method of communication. Writing skills are essential for documentation requirements.
Writing skills are essential for documentation requirements. (Page 60)
Product ID
You have created a database to store the products sold in a department store so they can be managed, updated, and manipulated more easily. The store manager wants to create a query to show the items that are selling today. Which would be an appropriate field to sort the data?
Forecasting
You were hired by a company to administer survey questionnaires to customers entering a major shopping mall. The data mining software is capable of .............. consumers' future purchases based on the items they had bought in the past.
associations
You were hired by a company to administer survey questionnaires to customers entering a major shopping mall. The data mining software is capable of identifying .................... based on the customers' shopping habits; for instance, how often did the customers buy socks when they buy a new pair of sneakers.
classifications
You were hired by a company to administer survey questionnaires to customers entering a major shopping mall. The data mining software is capable of sorting the respondents into ........... based on their age, gender, education level, and household income.
false
[True/False] Clickstream applications can provide online retailers with information such as the web pages that the user visits and/or the products that the they are interested in. Many online retailers, such as Amazon.com and ebates.com, use the information collected from the clickstream applications to monitor and track their customers' spending habits.
False
[True/False] Companies that have more than 1,000 employees with a diverse product portfolio are too small to benefit from a data warehouse application.
True
[True/False] During data cleansing and normalization, the structure of some tables will be affected. For instance, a big table could be broken into several, smaller tables or a few small tables could be combined into a big table.
False
[True/False] Healthcare companies and hospitals cannot destroy their patients' records; they must keep their data forever, just in case they need to retrieve information for potential malpractice lawsuits from their patients.
false
[True/False] On the Internet, relational databases are connected to web-enabled forms to capture data automatically and allow for instant data retrieval for real-time online processing. Relational databases are useful in business because they handle large amounts of data that have been downloaded and stored in multiple locations from the Internet.
false
[True/False] Organizational information policy stipulates that all printed documents in an organization should be destroyed immediately.
False
[True/False] Supply Chain Management (SCM) is a popular analytics application. A company's supply chain is a network of business processes that includes procuring raw materials, producing and manufacturing the goods, marketing the products to potential customers, and finally, distributing the finished products to the customers.
False
[True/False] Web-based databases allow users to access data only from their office computers, via the business internet connection.
Financial, business process, customer, and learning and growth are organizational dimensions of _____. Choices: a balanced scorecard business performance management business process management
a balanced scorecard (Page 64)
What is a business ecosystem?
a collection of loosely coupled, interdependent industries that provide related services and products across many industries.
What is the work breakdown structure (WBS)?
a comprehensive list of all activities needed to complete a project.
What is a grey-hat?
a computer hacker with the skills and intent to help organizations protect their networks and systems from others, but whose services may come at a price, or can be sold to the highest bidder.
What is UML
a general purpose modeling language (unified modeling language)
What is denial of service?
a loss of access created by cut cables or power services, malware (see below), hoaxes, bots and botnets (i.e. a computer or groups of hijacked computers used to attack others, often without notice to their owners), smurf attacks, SYN floods, DNS poisoning, or outright hijacking and/or redirection of services.
What is a private industrial network?
a major corporation in the industry that can provide leadership and resources to the smaller counterparts.
What is UML?
a modeling language used to help model systems
What is OLAP (online analytic processing)
a multidimensional database that is used for analyzing business data to discover and gather business intelligence
What is the definition of data integrity?
a process to ensure data is not corrupted
A reliable intranet connection provides organizations and their suppliers and vendors with __________________________________
a secure platform for internal use
What is a radio frequency survey?
a signal strength detection process to identify the best wireless access point locations.
The advantage of using Internet communication tools is the easy access to _______ information and resources. relevant accurate abundant
abundant (Page 61)
What is the system that tracks and processes company revenues, purchases, and payroll?
accounting and finance
When conducting presentations, technical ______ should be avoided if possible and defined when required. acronyms synonyms dictionaries
acronyms (Page 60)
Because feedback is not readily available with written communication, the content must be accurate and contain sufficient detail. Which of the following is most likely to increase the audience understanding of written communication?
action specific verbs
What customer attribute is not helpful for accurately pricing goods to increase profit margins?
age
Collaborative, self organized, cross functional teams used to develop software systems represent the _____ methodology. Choices: RAD agile prototypes
agile (Page 56)
Scrum is a type of _____ software development methodology in which there is emphasis on planning. Choices: end user RAD agile
agile (Page 56)
What are used in most cases to look for relationships, patterns, and trends.
algorithms
Total cost of ownership (TCO) is a useful strategy when evaluating information systems costs and benefits. What does TCO entail?
all aspects of cost from the inception to decommissioning, along with associated maintenance, upgrades, support, and training.
What is the IoT (internet of things)
all devices connected to the internet with sensors to be automatically re-filled or serviced when needed
What is a key benefit to business organizations for using a relational database?
allow easy access to information
How does the use of internet-based technologies help businesses?
allow for distribution of information with external business entities, allow mobile and external resources to access information which allows for better communication with business partners and a good use of information technology
What is one way to define user requirements?
allowing users to experiment with the system during development.
Fountain Model
allows for activity overlap, such as the need for a system design prior to coding or hardware acquisition.
User communication
allows users to provide input through various communications methods, including meetings. This communication allows users to share best practices, experiences, and tips that may help other users.
chief executive officer (CEO)
also called president or managing director, is responsible for the success or failure of the company, creating the company culture, selecting the senior management team, setting strategy and vision, and selecting projects to fund. In larger companies, this position deals with high-level strategies and overall business growth planning.
Bloggers
also known as social media copywriters develop engaging and factual online content using relevant keywords, intended to attract followers to the organization. A bachelor's degree is usually preferred, but not required for this position.
What is the relationship of a feasibility study to an information system development project?
an analysis to determine if a proposed system is possible, evaluates cost, return on investments, and the likelihood of project success.
Executive information systems (EIS)
are a specific class of DSS that support the strategic decision-making process of top-level executives. These systems incorporate summarized information from decision support systems and management information systems, along with external factors to forecast and analyze trends. An example of an executive information system is a digital dashboard,
online analytical processing (OLAP)
are analytical, fixed databases containing data that are used for making decisions.
Fourth generation environments
are based upon fourth-generation languages, which focus on specific types of interface-driven applications.
Toolkits
are collections of tools to perform system integration.
Structures systems models
are methodical and process-oriented, moving from the general level to the specific level through a series of processes.
Data
are more than just raw material; they are facts that are a valuable organizational resource that must be well managed to benefit all end users in an organization.
Semi structured decisions
are ones in which only a portion of the problem can be solved using an established procedure. Middle managers more commonly make semi-structured decisions.
Application Software
are programs that are commonly used by end users as a means of increasing their productivity by directly applying them to specific tasks inherent in the work they are responsible for accomplishing. Examples of application software include word processors, electronic spreadsheets, and presentation software.
Web developers
are responsible for creating and maintaining a company's website. This includes layout design, programming, and website usability studies.
Information security analysts
are responsible for the security of a company's network, data, and information. ......... must determine where a company might be vulnerable to a cyber attack and install or recommend protection against these threats, such as firewalls, data encryption programs, and changes to training or operational policy.
Corporation
are separate legal entities created to represent the capital investments and somewhat or completely encapsulate the risks, liabilities, and debts of a single owner or many shareholders. A disadvantage to incorporating includes double taxation (the corporation's revenue is taxed and then the investor's corporate income is taxed), however this disadvantage is offset by an investor's limit of liability, which is merely the amount of their investment in the corporation.
Integrated environments
are the most common and are suitable for the entire system development life cycle (SDLC) from analysis to maintenance.
Process centered environments
are the most resourceful category due to the capability of specifying analysis and design, as well as the formal software control process.
Information system specialists
are the people who develop, operate, and maintain the systems. Specialists include programmers, systems analysts, testers, computer operators, and other managerial IS personnel.
End users
are the people who directly interact with the IS on a regular basis (e.g., daily) and use the information produced to get their work done.
Geographic information systems (GIS)
are tools used by management to make decisions based upon the geographic distribution of people or resources.
Language centered environments
are useful for research and development or prototyping projects, having a single language basis.
Risk _____ measures the level of risk by analyzing the likelihood of occurrence and the impact to the business if the event occurs. identification assessment management
assessment (Page 59)
Descriptive analytics
assists management in gaining insight from historical data through scorecards and reporting.
One network-based strategy is that of virtual companies that can do what?
associate with other companies, without being physically tied to them
If Apple Computer and Mitsubishi-Hitachi began a global joint venture, where would the information system development likely take place?
at multiple locations and then handed off to the next division or location as the day ended.
When streaming data or voice, which type of switched network is used?
circuit switch
For an individual or a business, data can be uploaded to the internet in many forms. What data should not be communicated on the internet?
banking transactions must be encrypted to be safely communicated over the internet
Why has cloud computing become more popular?
because users have more flexibility than they do with VPN
The measurement function of business intelligence creates a hierarchy of what?
benchmarking and metrics
What is an alternative tool that requires a group of users to collectively review and analyze the alternative, prior to making a decision.
brainstorming
What does data normalization do?
breaks a big table into several smaller tables, which will in turn modify the structure of the existing or any new tables
Why is providing user support after system production a challenge?
budgets are reduced, and the implementation team takes on new tasks.
The testing stage of a sequential SDLC model in software development focuses on finding _____. Choices: loops bugs improvements
bugs (Page 56)
Database administrators (DBA)
build databases to store data to meet business needs. This is a growing profession because data are a tremendous business asset. The .... designs the databases, ensures that the databases operate efficiently, maintains data security, and applies upgrades as needed.
A systems analyst should try to have an understanding of _________________ processes.
business
When using the balanced scorecard method, quality would fall under what measurement?
business process
Businesses uses databases for many reasons, so it is important to understand their basic fundamentals such as...
businesses use databases to store employee, customer, and product data to help them automate processes and get useful information for quicker decision making. Can also lead to business intelligence when combined with market, economics, and other government regulations.
Whats the downside of wireless networks?
but the downside of wired networks is the large amount of cable required on the premises, which is awkward and often expensive to map, manage, and maintain.
What is considered when determining the target audience of e-commerce?
buyer profiles, behaviors, and demographics
How are portable decision support systems utilized?
by employees who travel a lot for business
What is a series of human or user Web visitor page requests?
clickstream
The term "generations" is used to describe changes in which type of technology?
cellular wireless standards
Transmission Control Protocol/Internet Protocol (TCP/IP)
can be shortened to IP, and is the standard communication rule of the Internet. Internet Protocol governs Internet data network rules.
CTO
chief technology officer
Pretexting
creating a believable scenario (e.g. whether innocuous or serious) for the purpose of obtaining information. For example, a user receives an official looking email that alerts them to recent successful phishing attacks, and asks them to respond with their credentials in order to ensure their validity.
(Example of dumpster diving)What is pretexting?
creating a believable scenario (whether innocuous or serious) for the purpose of obtaining information. For example, a user receives an official looking email that alerts them to recent successful phishing attacks and asks them to respond with their credentials in order to ensure their validity.
Values and behaviors that contribute to the social and psychological well-being of an organization are examples of what organizational feature?
culture
Although eye contact is important for good communication, this can imply disrespect or aggression in some ______. teams organizations cultures
cultures (Page 60)
What is an intangible benefit when evaluating information systems cost and benefits?
customer satisfaction
Information systems accept _______________ as input.
data
There are six analytical functions used by business intelligence systems, including production reports, parameterized reports, and _____. Choices: dashboards algorithms technology
dashboards (Page 64)
One of the advantages of information systems for businesses is to take raw data and turn it into information, and then transform that information into knowledge. The number of people in Florida below the poverty line is an example of
data
What is the best reason to implement a database for a growing business?
data access
Who is in charge of determining and monitoring the employees' access to the company's DBMS?
data administrator
What occurs during the transformation step in ETL?
data cleansing
Where would metadata about customer and product tables be stored?
data dictionary
What defines the policies and processes to manage and maintain the data integrity and security of a government agency?
data governance
What is data integrity?
data is accurate and consistent through its use and application time
What are the benefits of partitioning when maintaining a data warehouse database?
data manageability
What tools and techniques does business analytics consist of?
data mining, modeling, statistics, OLAP
What are the categories of business intelligence?
data mining, predictive analytics, OLAP
What is another name for a network host?
data terminal equipment
What enables analytics of operational data from various sources?
data warehouse
What is the relationship between business intelligence and a data warehouse?
data warehouse analysis leads to business intelligence
Information systems accept _____ as input and process it into ______ as output.
data,information
Who is responsible for checking on an employees' access to the company's database?
database administrator
How can database applications help managers respond to changing market conditions?
database applications enable businesses to store and analyze essential sales data
Companies must maintain _______________ by keeping their data safe from unauthorized changes.
database integrity
What is an object oriented database?
databases that contain multimedia files or executable code in records or fields.
Product requirements
define the criteria which must be met by the product. Examples of product requirements might describe what the product should do, how it should look, how long it should last, how easy it should be to use, as well as a variety of other requirements.
Project requirements
define what resources are needed for project completion and how the project will be implemented.
Why is project management essential for managing information technology?
delivering quality systems on time, managing the budget, and planning for the unexpected
What is the act of bringing a network host down?
denial of service
Big data
describes a very large depository or distributed data sets that are too complex or voluminous for traditional data processing systems to manage.
Design quality
describes the integrity, maintainability, and reusability of the system design.
What are benefits of using SDLC when implementing an information system program?
detailed staged process, ability to monitor large projects
Social media marketing coordinators
develop content and post messages on social media sites, often under the supervision of the social media marketing manager. This position does not necessarily require a college degree; however, communication, blogging, and video editing skills are essential.
Social media strategists
develop public profiles for businesses in order to enable interaction with customers about existing and new products and services. ------------- usually possess a bachelor's degree and experience in social media marketing.
Business strategy is how a business achieves its goals and outperforms its competitors. Strategic Information Systems (SIS) are used to help companies accomplish business strategies. Some of the initiatives for implementing an SIS include:
differentiating products, customer lock-in, and barrier to competitors
What is a key factor to consider when evaluating system alternative?
economic, compatibility, limitations
Social media marketing managers
direct the development and implementation of social media marketing strategies, in order to drive audience participation and promote brand loyalty and growth. -------------------- usually hold a bachelor's or advanced degree, and have digital marketing experience and excellent communication skills.
What is the process of transferring data that does not need to be transformed to the data warehouse?
direct-move
The intelligence phase in the decision making process consists of the ____________________, identification, and understanding of the problem.
discovery
Incremental model
divides the product into sections which are user-tested at each stage, resulting in fewer errors in the completed system.
What is the definition of a partition in database concepts?
dividing database for manageability
What step in system implementation documents all system specifications
documentation
A process description tool _____ the details of a function and represents the processing steps in a logical format. Choices: limits documents codes
documents (Page 57)
The total number of days that the project has to be completed from start to finish is call the project _____. Choices: duration progress
duration (Page 57)
What is both an advantage and disadvantage to information management?
easy access to information
What are reasons to normalize a database?
eliminates data redundancy, reduces data complexity
There is a higher chance of failure in information system projects if ________________ do not use and leverage the system on behalf of their organization.
employees
LinkedIn posts and profile information is typically about what?
employment and occupation related
Big data analytics
enables a business to recommend products or services to customers based upon analysis of customer preferences, purchase history, and Internet search history.
Who does good IT planning help an enterprise achieve a competitive advantage?
enables faster response to market dynamics due to new entrants, new products, supplier chain, or customer
How does Web 2.0 sites create a virtual online community?
enabling collaboration and interaction among users
The digital age and technological advances made convergence possible by
enabling networks to carry digital signals, which are discrete, binary noncontinuous waveforms.
What method uses 4th generation computer languages?
end user development
What does EMS (energy management system) manage?
energy usage and reduces the operating costs in an organization
Availability
ensures that access to resources is unimpeded.
Integrity
ensures that data is produced and modified in the correct way.
Confidentiality
ensures that only authorized personnel are admitted access.
Internal and external elements that effect various parts of an organization, for instance the government, competitors, customers, and suppliers, are examples of what organizational feature?
environment
A company wants to "increase bakery production capacity" for its bakery production line. It has identified three alternative methods to do this, but also recognizes that the potential profit from each alternative is dependent on a strong or weak economy. The variations of the economy are examples of _____. Choices decisions events alternatives
events (Page 65)
Function-oriented evaluation
examines the performance of data, hardware, software, networks, and human resources.
Instagram, Pinterest, and Snapchat have experienced significant user growth, but still trail _________________ in number of users and user management.
What are needed for information systems infrastructure?
facilities
What is the required mediums for communications
fiber optics, ethernet, radio frequency
Sarah is a sales associate at a major bookstore. A customer calls the store to order a book, but he could only remember part of the book title. So, Sarah logs into the bookstore's DBMS and searches the book title _______________ for a listing of the book
field- describes one piece of information for each record.
What are software patches?
fix bugs, are expensive and time consuming
Benefits of database normalization
flexibility, consistency, and organization
Decision support systems (DSS)
focus on supporting all phases of specific decision-making processes and procedures for arriving at a solution. DSS support the entire decision-making process, but the actual decision is ultimately made by a human.
CRM (customer relationship management
focused marketing efforts, better customer experiences, automated reporting, and better cooperation to respond to customer needs. For a new business, to collect customer information online and at the register and to consolidate and merge the information to better serve customers. Your boss asks you to collect zip codes for every customer who purchases something in your store and then generate a report to show where they all come from so he can market to the low zip code areas.
classical model
focuses on rules and procedures to maximize productivity. Social needs of employees are not considered; instead, the focus is on centralized decision making and profit maximization.
Computer based actions
include those actions that require the use of a computer to apply. Several tactics and strategies exist, though each is derived from behavioral actions, strategies, and tactics. Awareness, understanding threats, minimizing or eliminating risks of loss, and acting to ensure fraud and abuse is limited or eliminated will reduce the potential for impact from computer-related sources.
Data administration
includes maintaining data integrity, recovering corrupted information, and managing users and group access to the data.
System quality
includes supportability and testability.
Run-time quality
includes system availability, manageability, operability, performance, reliability, scalability, and security.
Data Administration
including maintaining data integrity, recovering corrupted information, and managing users and group access to the data.
The number of people in Florida with incomes below the poverty line increased in the city of Tampa between 2010 and 2015 is an example of _______________________ .
information
What is the application of management techniques to collect, communicate, and process information in order to make better management decisions?
information management
Who is responsible for the risk and vulnerability assessment to prevent security breaches of company or government data?
information security analyst
What accepts data as input?
information systems
The shipping clerks at ABC Logistics complained to their supervisor that they experienced delays in uploading shipping and tracking information at certain times of the day. The network provider was contacted, who advised management at ABC that a faster fiber-optic connection was now available at a discounted rate. This type of network connectivity would greatly improve Internet speed. This is an example of___________________.
information technology management
The learning and growth perspective measures the ability of the organization to _____ in order to continue to add value to the organization. Choices innovate change scale
innovate (Page 64)
Network and computer system administrators
install and repair computer systems, as well as identify and fix network issues.
While enrolled in a traditional course at a university, you and your instructor can communicate synchronously, face-to-face, in the classroom. However, you can also communicate with your instructor synchronously outside the classroom using which internet application?
instant message
What are the four phases of the decision-making process with respect to decision support in organizations? Choices: intelligence, design, choice, and implementation OLAP, DSS, GDSS, and MSS problem definition, alternative analysis, design, and implementation
intelligence, design, choice, and implementation (Page 63)
What is a benefit of an extranet?
interact with suppliers, often via an SCM
What type of data is included in executive support systems? (ESS)
internal enterprise data, as well as external data from financial, industry, and trade databases
Among all the connections- internet, intranet, and extranet- which is the most widely used channel for business?
internet
Structured decisions
involve an established procedure, are repetitive and routine, and, therefore, can be handled in the same manner each time. Line-level managers and non-management employees typically make structured decisions.
Normalization
involves correctly defining keys, tables, columns, and relationships. Flowcharting during the design phase might avoid inconsistencies in the database.
Acceptance testing
involves end user evaluation and review of the system in order to demonstrate that the system is ready for operation. The goal of testing is to ensure and improve the quality and reliability of the system.
Planning
involves identifying and preparing for future needs in order to prepare and budget for future upgrades and modifications.
work breakdown structure (WBS)
is a broken down list of all deliverables showing what the customer will get at the end of a project.
chief information officer (CIO)
is a business leader who analyzes internal business processes such as payroll and billing, reshapes the physical infrastructure and network purchases to meet business goals, and leads the workforce to implement critical IT internal projects. This position requires strong organizational and interpersonal skills. The job focus is strategic in nature: developing and implementing the corporate IT strategy. The .... must have a broad knowledge of IT.
Auditing
is a control known by quite a number of divisions and departments within an organization. to an accounting department implies that an impartial and independent third party will determine if policies and procedures have been followed, and whether fraud exists within the organization's finances.
Smartphone
is a converged device that combines a cellular phone device with a mobile computer platform.
online transaction processing (OLTP)
is a database design used for browsing and manipulating business transaction activity.
Prototyping
is a four-step process in which an experimental system is quickly and inexpensively built and provided to end users for evaluation, and is then refined based upon user feedback. The four steps of prototyping include identifying the user's basic requirements, developing the initial prototype, using the prototype, and revising and enhancing the prototype..
End user development
is a largely informal method of solutions development by end users, made possible by the availability of fourth-generation languages that enable end users to develop systems and solutions with little or no assistance from professional technical specialists.
Denial of service
is a means to disrupt, interrupt, or suspend services of an Internet host computer, not a wireless network.
Parallel adoption
is a method of system transfer in which the old system continues to operate for a period of time while the new system is implemented.
Voice over Internet Protocol (VoIP)
is a modern telecommunications technology that offers convergence between voice and data networks. VoIP is a type of broadband application, similar to video, in which voice calls are transmitted over the Internet. VoIP has rapidly replaced telephone voice traffic.
database server
is a powerful computer that stores the databases and DBMS to access and administer the database.
phishing
is a process by which a hacker posts or sends a message that appears to originate from a legitimate source. The ======= attempt requests personal information that can later be used to befriend the user in order to gain further access. The ========= message will often suggest that the recipient's account has been compromised and provide a link for the user to click to "log-in" and correct the problem. Users will then be directed to an authentic-looking fraudulent site, which captures login credentials in order to gain illegal access.
Predictive analytics
is a process in which statistics, historical data, and data mining produce models and forecasts about potential customer behavior and future business trends.
Integrated Development Environment (IDE)
is a programming environment that provides tools to developers to write code.
Secondary Storage
is accessed only through a system's input/output bus and is generally several orders of magnitude slower than primary storage technologies. On the other hand, costs per byte for ........... have historically been quite a bit less than primary storage technologies. Examples of ............. include magnetic hard disk drives, which are spinning magnetic disks with moving read and write heads, as well as newer, more modern solid state nonvolatile flash storage. ............. also includes removable media, such as magnetic floppy disks, optical discs (CDs & DVDs), and USB flash drives.
Core Competency
is an activity for which a business is a marketplace leader. This activity is central to how the employees of the business work.
Intelligent character recognition (ICR)
is an advanced form of OCR that enables the computer to learn several different fonts and handwriting styles in order to improve accuracy and recognition.
model
is an image of an item, system, or process that we create in order to imitate, follow, or duplicate whatever the model represents.
Scrum
is an incremental form of agile software development that recognizes that customer needs and wants can change throughout the project. Unexpected changes and challenges, which cannot be addressed with the traditional waterfall SDLC model, can be quickly addressed with the scrum model. Team members are often located within the end user's facility, regularly communicating with team members and the customer.
Rapid application development (RAD)
is an iterative alternative to the conventional waterfall model of software development.
electronic meeting system
is computer software that facilitates discussion and decision-making in an organization in which members may be geographically dispersed.
User quality
is concerned with system usability.
Data governance
is concerned with the management of data, including maximizing quality through effective utilization, availability, and protection. Knowing that data is merely unorganized and unstructured information, practices and policies may be created and applied generally.
Evaluation
is defined as the process of gathering and analyzing information in order to compare performance with predetermined objectives, and to determine whether the objectives were achieved.
database integrity
is ensuring that data within the database are correct, which includes keeping data safe from unauthorized changes, and ensuring data within are timely and consistent.
data quality audit
is executed to ensure that a database efficiently, consistently, and accurately accepts, stores, and produces information.
Crow's foot notation
is often used to describe the relationship between entities.
Total Cost of Ownership (TCO)
is one method for determining the economic feasibility of a system or project.
Feasibility study
is performed to determine whether the proposed system is a good investment, whether the necessary technology is available, whether the user's information specialists can manage the system, and whether the organization can adapt to the changes introduced by the new system.
Predictive analytics
is predictive modeling that utilizes statistical and machine learning techniques.
Open Source Software
is software whose source-code is freely available to developers and users. .............. is developed not by single users or companies, but by communities of connected users and groups.
Telecommunications
is technology that transmits and facilitates the transmission of information over distances, and is often used to connect multiple end users across physically remote locations.
Random Access Memory (RAM)
is temporary or short-term storage used by the processor.
Sniffing
is the act of eavesdropping on network traffic in order to acquire traffic data packets and decoding.
Hypertext Transfer Protocol (HTTP)
is the communications protocol at the foundation of all communication of the World Wide Web.
synergy
is the cooperation between several businesses to produce a better product or service than would be possible if each business worked independently.
strategic-oriented evaluation
is the determination of whether the information system outputs enable management to make strategic decisions that will help develop and achieve the future mission and vision of the organization.
chief operations officer (COO)
is the director of operations responsible for the oversight of internal operations on a day-to-day basis and for monitoring production quotas. The ... ensures that the limited resources are used to provide the maximum value for stakeholders. This role communicates the organization's mission statement to employees.
Open System Interconnection (OSI)
is the foundation for data communication protocols. OSI consists of seven layers and is an international standard that governs or guides the development of data communication protocols. The seven OSI layers are: application, presentation, session, transport, network, data link, and physical.
Conceptual data model
is the highest level model, containing the least amount of detail within the data. It maps the scope of the enterprise data architecture model and help support system and documentation requirements. This model is typically used in developing master reference data, such as in an enterprise-wide database.
Conceptual data models
is the highest level model, containing the least amount of detail within the data. this model maps the scope of the enterprise data architecture model and help support system and documentation requirements. This model is typically used in developing master reference data, such as in an enterprise-wide database.
Liability
is the legal state of being responsible. An example would be the CEO and CFO who have certified the accuracy and validity of financial documentation and who would be legally penalized should errors be found.
Microprocessor
is the most advanced integrated circuit and holds millions of integrated circuits in a semiconductor chip. They are programmable devices that process instructions and incorporate the four functions of a computer central processing unit (CPU), which includes fetch, decode, execute and store.
Internet of Things (IoT)
is the network of products (or things) that can be connected, communicate with each other and with the environment, and transfer data over a network. Examples include a sensor in an automobile that alerts the driver when the air pressure is low or a washing machine that is WI-FI enabled.
ETL
is the process associated with data warehouse updates and backup.
Systems analysis
is the process of analyzing an organizational problem that can be solved with an information system.
data cleansing
is the process of correcting or removing duplicated, incomplete, improperly formatted, inaccurate, or duplicated data from a database.
Telecommunication
is the process of exchanging information between various entities over electrical, electromagnetic, or digital networks.
Data mining
is the process of identifying hidden patterns and relationships in large databases and applying rules to that data in order to predict future behavior.
Rationalization
is the process of minimizing or eliminating bottlenecks in processes and streamlining procedures.
Supply Chain
is the sequence of processes involved in getting raw materials for a product all the way to the production and distribution of a product into the hands of the customer.
Waterfall Model
is the traditional systems development method, so named because each stage must be completed before moving on to the next stage.
Computer aided software engineering (CASE)
is the use of computer methods to organize and manage software development in information systems.
Information Systems
is to get useful information to the right people within an organization to support decision making and operations. Effective information systems can help companies streamline business processes and planning, as well as help with data storage, data management and data security.
Quality of Service (QoS)
is used to measure performance for specific types of data communications and ensure that communications are effectively transmitted.
What is an advantage of a wireless LAN?
it allows visitors to access the internet
Why is WPA critical to wireless networks?
it is a tunneling encryption protocol that secures wireless data transmissions
What is considered to be low level security risk during system post implementation?
it is characterized by noticeable impact to the organization
How does a corporation benefit from a business intelligence program?
it provides automated data collection and reporting reducing labor cost
How does executive management use executive support systems (ESS)?
it provides high level information in KPI format for executive level monitoring and decision making.
What is the function of the data integration service in business intelligence?
it serves as the depository of all extracted data for the load function of the data warehouse
What is a good management technique for securing information?
keep passwords private, be alert to impersonators trying to get your information, and read privacy policies.
Understanding why the poverty line increased in the city of Tampa is an example of
knowledge
What is another term used to describe data mining?
knowledge discovery
Predictive analytics is predictive modeling that utilizes statistical and _____ learning techniques. Choices: machine computer software
machine (Page 64)
What is the main role of the chief security officer (CSO)?
maintaining corporate security, both physically and digitally
What are the responsibilities of a project manager?
make team assessments and evaluations, demonstrate leadership and have good communication skills, establish project milestone and deliverables
Define data integrity
making sure that all data values are correct, accurate, and consistent
Malware One high-profile example of a malware threat is SQL Injection, which uses vulnerabilities in the most popular type of database, SQL, to modify, delete, or steal information.
malicious software applications
What is malware?
malicious software applications, utilities, or merely code, which could be a virus, Trojan horse, worm, or spyware. Malware is spread through a variety of methods, either via direct download (intentional or not), as a part of another application or utility (e.g. Trojan horse), website visit (e.g. drive-by download), or merely by being connected to the Internet or affected network (e.g. worm).
chief financial officer (CFO)
manages the company's cash flow and evaluates and communicates financial risks. The ..... is the financial planner and is responsible for analyzing the company's financial strengths and weaknesses. This individual must be transparent and accountable, providing financial data and advice to stakeholders. The .... often works as a strategic partner with the CEO.
How are methods of data capture categorized?
manual or automated
There are multiple methods of data capture and they can be categorized as Hint, displayed below _____. import or export manual or automated digital or voice
manual or automated (Page 58)
Written communication can occur in the form of letters, electronic mail, memos, reports, and ______. presentations manuals aids
manuals (Page 60)
Most large corporations have several information systems to support their functional business areas. The system that processes raw metal into a car frame is______________.
manufacturing and production
Most large corporations have several information systems to support their functional business areas. The system that processes raw metal into car frame is...
manufacturing and production
Systems design models typically consist of diagrams, charts, and _____. Choices: input maps data
maps (Page 57)
physical data models
may exist within the logical data model, containing greater detail, such as database tables and key indexes.
Data dependency
means information stored in a database table determines other information stored in the same table.
Data Integrity
means that the data is accurate and consistent through its use and application time.
In systems modeling and design, the structured systems model is _________________
methodical and process oriented
Types of relationships in a relational database model
one-to-one, one-to-many
Freemium is not a new concept in doing business. What is true of freemium?
mobile phone apps and games, free product samples and trial versions offered to users, product quality and available features can be tightly controlled
What is the purpose of a network sniffer?
monitor network traffic
The internet has contributed to a complex network system. Businesses continue to grow and develop a need for more computer-enabled productivity which results in what?
more complexity due to the need for more systems and better improvements in their processing capabilities.
Wireless LAN networks are _____________
more scalable than wired networks.
Input devices
mouse, keyboard, touchscreens, voice recognition, microphones, scanner, etc.
computer systems analyst
must combine business knowledge with technical expertise. The primary responsibility of a systems analyst is to analyze a user's needs and determine the most efficient and effective solution.
What does network strategies involve?
network based thinking, pooling resources, and expanding contracts to be more successful and competitive
the IoT (internet of things) is a growing topic in business and a hot IT career field. What best describes IoT?
network of physical devices exchanging data in real-time with embedded chips to communicate performance over the internet.
Porter's 5 competitive forces include
new market entrants, substitute products, customers, suppliers, and competitive rivalry
Porters 5 competitive forces include
new market entrants, substitute products, customers, suppliers, and competitive rivalry
What are examples of competitive forces?
new market entrants, substitute products, customers, suppliers, competitive rivalry
What involves correctly defining keys, tables, columns, and relationships?
normalization
What takes place during the database design process to eliminate data redundancy?
normalization
Social Engineering
normally low tech attacks used to trick individuals into disclosing information, providing access, or changing their patterns. Examples include phishing, spear-phishing (i.e. targeted phishing), dumpster diving, baiting, tailgating, and quid pro quo.
What is social engineering?
normally low tech attacks used to trick individuals into disclosing information, providing access, or changing their patterns. Examples include phishing, spear-phishing (i.e. targeted phishing), dumpster diving, baiting, tailgating, and quid pro quo.
What is the difference between and object-oriented database model and a relational model?
object-oriented are designed to store audio or mixed media, while relational links tables of records
Spoofing
occurs when network access is obtained without authorization, and can occur on both wired and wireless networks. This type of hack can occur because protocols in some wireless communication networks do not provide authentication mechanisms.
behavioral model
of management recognizes that actual management behavior is less systematic or predictable than classical management theory would suggest.
What are tuples and how are they used in databases?
one record or data set in a row. A record in a row or table
asynchronous
one way communication, such as email and global overnight mail
Information technology is used everywhere: where you work, where you live, and where you play. Keeping track of financial information and making transfers at anytime, from home, without waiting in line is an example of what?
online banking
Information technology is used everywhere; where you work, where you live, and where you play. Keeping track of financial information and making transfers at anytime, from home, without waiting in line is an example of what?
online banking
Learning and research with a computer and the internet from anywhere, anytime is an example of what?
online learning
IT managers, project managers, and architects
organize, direct, coordinate, and plan IT-related activities, people, and projects within an organization.
Primary Storage
otherwise known as CPU cache and random access memory (RAM), are typically referred to as volatile flash memory, meaning that information storage is temporary and can only be stored until power is removed.
entity relationship diagram (ERD)
outlines the business processes and subsequent relationships and possible data requirements.
What does PSDN stand for?
packet switched data networks
What are 2 fundamental protocols that can describe modern telecom networks?
packet transmission and TCP/IP protocol
Two fundamental elements are used in modern networking infrastructure:
packet transmission and the TCP/IP protocol.
There are three popular methods of system implementation: direct, prototyping, and ______. Choices: waterfall parallel PERT
parallel (Page 58)
What are discussion actions that social media users can perform while immersed in an activity or current event?
participate, share, shape, and influence discussions
Why is partitioning done when administering relational database systems?
partitioning is done to improve performance
What information can be gained by sniffing a wireless network?
passwords and Login ID's
How do social media platforms play an increasing role in shaping events?
people can use this medium to influence reserved bystanders
When determining business benefits from implementing a strategic information system, several factors need to be considered. Businesses need to consider their business objectives, look at who their customers are, create justification for the project and then seek support. What would be the first step in determining benefits?
perform a strategic analysis
What is the typical data size of big data?
petabytes
Utility Software
programs perform periodic system maintenance activities, such as virus detection, storage space consolidation, backup and recovery, intrusion detection, and access authentication monitoring.
What are 3 levels of risks associated with system design and implementation?
project structure, size, and team technical background
Businesses, news networks, government agencies,and nonprofit organizations are all actively using social media to primarily do what?
promote and market their organizations
A ________ is a set of rules applied to data switched networks to ensure quality and accuracy of signal transmission and reception.
protocol
Manual keying is the simplest, but most _____ data capture method. scanned protracted accurate
protracted (Page 58)
What are e-Tailers?
provide a venue for the sale of physical goods, can be traditional brick-and-mortar retailers
Group decision support systems (GDSS)
provide interactive collaboration support for multiple decision makers at multiple geographic locations through digital communication and the use of numerous resources and tools.
What is the key role of the CIO
provide vision and leadership for IT initiatives
What is a characteristic of a Net marketplace?
provides more focus on individual transactions versus lasting relationships
computer support specialist
provides technical support to customers and employees through direct interaction or telecommunications.
What is the variable in project management that must be monitored when managing information technology to ensure it is completed on time, within budget, according to specs, and with high quality and low risk?
quality
Social media has enhanced customer relationship management by enabling companies to best educate customers about new and existing products and services in ____________________.
real time
Spiral Model
recognizes the need to review or repeat earlier stages as the project progresses.
Business process
redesign involves the analysis, simplification, and redesign of organizational processes.
What can a GIS (Geographic Information System) be used for?
redirect/redistribute funds, build schools, approve commercial sites, demographic analysis to predict sales
It is a good practice to _________________ data that is backed up on a regular basis.
reduce
Software
refers to pre-packaged sets of coded instructions that end-users directly interact with, in order to indirectly communicate with the other major components of the information system to get tasks done.
Business intelligence (BI)
refers to the infrastructure used for warehousing, integrating, reporting, and analyzing business environment data. BI consists of databases, data warehouses, and analytical platforms.
Many risks to business operations exist, including the major categories of natural and man-made sources, and intentional and unintentional risks. Examples include
risks from flooding, lightning, power outages, and natural disasters, as well as theft, intrusion, sabotage, and accidental damage or destruction.
Referential Integrity
rules that ensure that the relationships of data between tables is consistent. rules prevent a user from adding a record to a table containing a foreign key unless there is a similar record in the linked table.
Moores Law
says that computing power and storage capacity will continue to increase or double approximately every two years.
What is the ability of a network to grow user and services without forklift upgrades?
scalability
Optical character recognition (OCR) is a semi-automated system that uses a _____ to read characters. touch screen scanner stylus
scanner (Page 58)
A _____________ is a planned design structure database
schema
What is included or defined in a project, including goals, deliverables, costs, and deadlines?
scope
What method can address unexpected changes or challenges that cannot be addressed effectively with SDLC?
scrum
May businesses require their employees use VPN to gain remote access to the corporate network. What is an advantage of VPN?
secured access
To be a strategic information system, an information system must ______________________ .
serve organizational goals
Domain Name Service (DNS)
server-based service that translates human language Web address or URL into an IP address, which is used.
Online community manager
serves as the liaison between the organization and the online community through message boards, social media, and email distribution groups, maximizing brand loyalty and website traffic. ---------- typically have a bachelor's degree and experience with video editing, Adobe tools (such as Photoshop), and website development.
The characteristics of a GDSS include ease of use, flexibility to incorporate different perspectives and decision-making styles, automated record keeping for future analysis, and _____ participant communication. Choices: simultaneous linear progressive
simultaneous (Page 65)
What is the description of a flat file database?
single table database
What is a flat file database?
single table with no structured relationships
What are characteristics of a net marketplace
small in comparison to private industrial networks, online platform host where transactions may take place between a seller and a buyer, provide more of a focus on individual transactions versus lasting relationships
What will soon surpass desktop computers accessing the internet?
smart phones
What portable device combines the functionality of the phone technology with the computing of a desktop or laptop?
smartphone
The output from area is used to create input for another, thereby lowering costs and generating more profit is what?
synergy
Social e-commerce has become an important internet tool for businesses to connect with their customers. Which of the following is not a benefit for companies to use social e-commerce as a business tool?
social e-commerce allows customers to shop and buy products online.
What is the method used by hackers to develop a relationship with users in order to extract information?
social engineering
What do you call the web-based applications that allow user content to be created and shared over the internet?
social media
Allowing people to connect and express themselves, from the comfort of their computers, when otherwise they may have been too shy or introverted to do so, is an example of what?
social networking
Various types of _____________________ enable companies to utilize their information systems hardware and networks more effectively.
software
Metrics and measurement tools are used to analyze _______. performance software codes complexity
software codes (Page 61)
What does the programming stage in the waterfall method of software development focus on?
software development, proving, and integration
chief security officer (CSO)
sometimes also called the chief information security officer (CISO), is the highest level executive concerned with the overall security functions and policies of a business. (Note that larger organizations may also have a CISO reporting to a ....). The .... identifies business protection goals, works with the other executives to identify and analyze risks, and prioritizes security needs. The .... works with vendors and consultants to ensure both physical and data security. The .... must have up-to-date knowledge and experience in information security because it is a rapidly changing field. Important traits for this position include good judgment and excellent planning ability. Depending on the organization, the .... may report directly to the CEO, the COO, the CIO, or some other C-level executive such as the chief risk officer (CRO).
information policy
specifies the rules for acquiring, distributing, standardizing, regulating, and organizing information.
What is meant by speed and amplification in social media?
speed is the ability to share information in seconds, and amplification is the re-posting news in a community.
According to the Henry Mintzberg model, a manager in an informational role acts as which of the following? Choices: spokesperson mediator leader
spokesperson (Page 63)
ERP (enterprise resource planning)
standardized business procedures that allow for more consistency within the business and remove redundancy. Typically uses one database to store all information needed by various business units and increases operational efficiency. Implementing this system and automate tasks so employees could do their jobs more efficiently.
Global business challenges are typically no worse than domestic business challenges except for the distance. What problem can be alleviated by knowing the challenges up front?
standards
Referential integrity
stops database inconsistency by creating relationships between tables using primary and foreign keys.
Risk management _____ include promoting a project management culture within an organization. methods strategies processes
strategies (Page 59)
Knowledge management systems (KMS)
strive to reach organizational goals by making the best use of corporate knowledge.
What kind of decisions involve an established procedure, are repetitive and routine, and can be handled in the same manner each time?
structured
What computer language is used with relational database applications?
structured query language
Iterative development models
such as Agile, develop system requirements and solutions through collaborative, self-organized, cross-functional teams. The agile model encourages adaptive planning and development, fast delivery, continuous improvement, and flexibility in response to change1.
System Software
such as an operating system, direct and control the hardware components of the IS.
leveraging existing resources
such as instruction manuals, white papers, and Internet forums, additional documentation and training can be developed with limited time and expense.
KM (knowledge management)
supportive, collaborative, culture that includes corporate learning to foster corporate efficiency and gain value from intellectual assets. Employees sharing of their expertise and best practices across business units.
Penny Dollar and Nickel Dollar stores decide to pool their markets to lower costs and hopefully generate more profits. This is referred to as __________________________.
synergy (cooperation of two or more companies, many times gained through the process of a merger to gain efficiency and growth)
What are the stages in the waterfall model?
system design, programming, testing, conversion, and production and maintenance
The six formal steps that need to be followed to develop an information system is known as what?
system development life cycle
A ______ uses analysis and design techniques to solve business problems, then develops and implements the systems using information technology. systems analyst programmer database administrator
systems analyst (Page 60)
What does Microsoft Visio enable?
systems analysts to create professional diagrams that simplify complex information through collaboration tools and data-linked diagrams
The _____ stage in the waterfall methodology focuses on defining the software architecture for the system. Choices: systems analysis systems design testing
systems design (Page 56)
Customer relationship management (CRM)
systems use technology to merge marketing with business processes to strengthen customer relationships and organize customer information.
Social media benefits to businesses are made possible because social media offers both location specific and time time specific ____________________ .
targeting
What is a component of a feasibility study?
technical and economic
Businesses face difficult decisions regarding their hardware needs. Constant changes in __________________ can lead to obsolescence.
technology
Businesses face difficult decisions regarding their hardware needs. Constant changes in ___________________________ can lead to obsolescence.
technology
What best describes what is included in a company's business intelligence infrastructure? Choices: the infrastructure required to access information for reporting the infrastructure required to warehouse, integrate, analyze, and report business data the infrastructure required to store, communicate, and share information
the infrastructure required to warehouse, integrate, analyze, and report business data (Page 64)
What is the most common SDLC analysis?
the integrated environments type of CASE tools
What is the biggest impact to global business?
the internet
Describe referential integrity
the process of building relationships between tables based on keys.
When communicating, what is important for IT professionals to understand during the system development process?
the user knowledge and background of target audience
Why did relational database models replace hierarchical database models in business applications?
they are simpler table relationships than hierarchical databases
What is a disadvantage for purchasing digital goods?
they are very difficult to return
Why are data warehouses beneficial to business managers?
they can be mined or analyzed for trends or patterns
Digital goods provide several benefits for e-commerce. What is a benefit achieved from digital goods?
they can be purchased and downloaded instantly, they do not have a physical presence to acquire
What is a characteristic of a legacy or old analog network?
they carried continuous electronic waveforms
Why must a systems analyst be a good communicator?
they must be able to communicate system capacities and benefits.
dynamically optimized pricing
this tactic is used to set prices according to market pressures, including locality, demand level, competitors pricing, the time of the day, week, or year, and a customer's willingness to pay.
Five competitive forces
threat of new entrants, threat of substitute products or services, bargaining power of customers (buyers), bargaining power of suppliers, and intensity of competitive rivalry.
Enterprise resource planning systems (ERP)
tightly integrate functional areas such as accounting, finance, project management, inventory control, purchasing, human resources, customer retention, sales, and marketing into one single, comprehensive system.
SEO specialists
to boost website rankings through analysis, testing marketing techniques, and creating new social media and web content. ------------ typically hold bachelor's degrees and are experienced in HTML and CSS.
What is the primary purpose for publishing company information on the internet?
to educate stakeholders on the company's mission and vision, production information, and community efforts
What are reasons for providing company information on the internet?
to entice potential customers to shop, to educate stakeholders on product status, specifications, features and capabilities, and to inform customers of upcoming sales and events
What is the focus of a functional evaluation of a management information system?
to evaluate the quality and functionality of information and output
How does FedEx use big data?
to find flaws, fix processes, and boost efficiency of its production
Transaction processing systems (TPS)
to obtain routine production and exception reports in order to make structured decisions. Middle managers and business analysts require more sophisticated analytical tools and custom reports in order to make semi-structured decisions.
A decision support system (DSS) consists of four components, including data management, model management, knowledge management, and ______. Choices: network management user interface management process management
user interface management (Page 65)
Prescriptive analytics
uses optimization and simulation to recommend solutions and decisions to management.
Object oriented systems development
uses the object as the unit of design, and is based on the concepts of class and inheritance. Objects that belong to a class will all have similar features, and objects may inherit properties or conditions from other classes. For example, numerous automobiles belong to the class of automobiles, and numerous trucks belong to the class of trucks, but both inherit the property of vehicle from the vehicle class.
Data Retrieval
using queries, data is retrieved and combined.
Traits of a social media marketing manager
usually hold a bachelor's degree, have digital marketing experience, and excellent communication skills
How does social media enable distribution of information?
viral
Malware
virus infection
Utility software
virus software (Norton, anti virus)
Business intelligence reporting tools help to Hint, displayed below _____ data in many different ways and play an important role in decision making. Choices: extract visualize import
visualize (Page 64)
What are the 3 V's used to describe big data?
volume, velocity, variety
E-Commerce
was born out of the connection and facilitation of the trade of goods and services between buyers and sellers via computer networks, or the Internet.
Common Business Oriented Language (COBOL)
was the first computer software language for business applications
What application provided by the internet allows an online retailer to conduct business?
web enabled storefront
What is a rich site summary (RSS)?
webbed formats used by publishers
worm
website visit (e.g. drive-by download), or merely by being connected to the Internet or affected network
What is data inconsistency
what happens when the same attribute has different values because the data is stored in more than one location
Extranet
which allows an organization to communicate directly or provide specific resources to suppliers, customers, regulatory entities, and other external users.
Data Dictionary
which defines and manages the data types and structures that dictate how the database is organized.
Digital Dashboard
which displays charts and graphs showing up-to-the-moment performance indicators on sales, profit, expenses, and inventory on an executive's computer.
Web enabled storefront
which enables the facilitation of ecommerce, yet another channel for a business to conduct business through.
Program/Charter level policy
(aka strategic level) frameworks are documents that establish the security program, define specific or general risks that it will be responsible for handling, and specify its purpose, extent, objectives, responsibilities (including the command structure within the security department), and enforcement.
Pharming
A high-tech attack that is an act of using malicious code to redirect users to a website that mimics the appearance of an official page, but that merely collects sensitive information such as names, addresses, phone numbers, usernames and passwords, and security questions and answers. One particularly insidious example of pharming is DNS poisoning, which changes the DNS record for a specific site to redirect all requests and web access to another specific site, even without providing the user with a fraudulent phishing message.
Baiting
A low tech attack where an attacker depends on the victim's greed or curiosity to provide sensitive information. An example might be an intentionally dropped USB drive left openly in a busy parking lot. A victim, through greed or curiosity might take such a device and plug it into a corporate computer, perhaps attempting to identify or return it to its owner or merely to obtain the value of the materials contained, but receive malicious code.
Tailgating
A low-tech attack that allows unauthorized personnel access to sensitive or restricted areas merely by overtly or covertly following an authorized employee through a controlled access entry point. Organization entry points are often protected by electronic badge access, which may be circumvented by not allowing a door to close properly, or authorized personnel who are not observant, are ignorant of or not properly trained in information security, intentionally or unintentionally allowing an unauthorized person to enter an otherwise locked door.
Record
A set of related fields, also called a tuple, that describe one occurrence of an entity, such as a customer.
Vulnerabilities
A weakness in the technology, process and procedure, or people involved with any given information asset. Such ,,,,,,,,,,,,,,, may include weaknesses in the technologies used, including their configurations, and the security policies that are enforced or not within an organization.
Field
An attribute of an entity, such as name, address, or student ID.
Risks
The potential for loss, commonly associated with the monetary and non-monetary impact to such a ,,,,,,,,,,, as well as the probability of occurrence.
Utilitarian approach
This approach assesses the consequences and/or outcomes of an action to determine the greatest good or least harm for the greatest number, regardless of the justice or fairness of or to the individual.
Virtue approach
This approach values human behaviors that allow us to act in aspirational ways, including compassion, trustworthiness, honesty, generosity, kindness, autonomy, courage, obedience, and many more.
Fairness approach
This approach values individual moral rationality, otherwise referred to as the Golden Rule, or "do unto others as you would have them do unto you," asks society to reflect on the consistent treatment of others based on the desires of how an individual expects to be treated.
Rights approach
This approach values rights specified by society, which may be largely based on the analysis of other ethical approaches, and allows individuals to weigh decision choices based on legal or legislative precedent.
Zero Day Attack
a threat or attack that exploits known or unknown vulnerabilities in software. Software developers quickly patch vulnerabilities once known, though identifying these vulnerabilities takes time. Once found and fixed, developers must send patches to all affected or potentially affected users, which, unfortunately, does not occur consistently. In other cases, the public release of patches is used as a tool for malware authors to reverse engineer and easily attack those who have not updated their systems in time.
Issue specific policies
address specific issues or concerns that a security policy is needed, or even controversial areas where the company takes a given position on an issue. Examples include policies for:
Cyber Criminal
an individual or organization interested in exploiting computers and networks for the purpose of generating revenue. Note that organized crime has a very active presence in cybercrime.
Hacktivist
an individual or organization interested in vandalism, cyber-terrorism, or hacking for a stated cause or purpose.
Behavioral actions
are actions by which individuals may help to avoid data theft, but that may have little to do with the computer-based actions mentioned below.
Online Analytical Processing (OLAP)
are analytical, fixed databases containing data that are used for making decisions. Enables business to create new records, update records, and delete records providing real time information for decision making.
Ethics
are moral principles and concepts, rules of behavior, and often the underpinning of codes of conduct based on accepted standards of right and wrong.
Relational Database
are one of the most common database models in use today and are based upon the relational model of data, which is a method of structuring data using relationships, in rows and columns. It is a type of database that connects tables of records together with complex relationships.
Cookies
are small text files that are placed on a computer when a user visits a website, enabling the website to identify that user on future visits.
Multidimensional databases
are typically relational databases that store data in a cube and allow businesses to visualize data assets in multidimensions to see what is happening in real time.
Object Databases
are used when media or other types of files are required because multimedia files and diagrams or blueprints such as those generated by computer aided design (CAD)1 are more complex and not easily sorted by columns and rows. they are not hierarchical models.