Intro to Management Information Systems Midterm (Module 1-8)

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

The _______________ step in the ethical decision-making process is considered the most critical.

develop a problem statement

_______________ maps the name people use to locate a Web site to the IP address that a computer uses to locate a Web site.

domain name system

ability to install and use two different operating systems on the same hardware.

dual booting

There are _______________ steps that must be taken to perform a thorough security risk assessment.

eight

The purpose of data normalization is to

eliminate data redundancies and ensure data dependencies make sense

an internal corporate network built using Internet and World Wide Web standards and products.

intranet

A network device that directs data packets to other networks until each packet reaches its destination is a

router

While there are three key components that must be in place for an organization to get real value from its BI and analytics efforts, the one that is first and foremost is the existence of a solid data management program

true

___________could provide insights that result in notifications of needed preventive maintenance or preemptive action.

predictive analysis

Data mining and time series belong in the general category of _______________ of BI/analytics.

predictive analytics

visual approach to developing database queries or requests.

query by example (QBE)

Two specific BI/analytics techniques that are in the general category of descriptive analytics are

regression analysis and visual analytics

regulations safeguard PHI (protected health information) and ePHI (electronic PHI) data gathered in the health care process and standardizes certain electronic transactions within the health care industry.

HIPAA (Health Insurance Portability and Accountability Act)

n the design of a database, it is not necessary to know how long the data must be stored

false

properties of SQL databases help ensure the integrity of data in the database.

ACID

The builders of safety-critical systems must determine when they have completed sufficient testing and sign off their approval to release the product. This is typically an easy and straight-forward decision.

false

The use of primary keys and foreign keys make it impossible to define relationships between the data in two tables of a relational database.

false

A blended threat, phishing, and virus are all examples of a(n)

ransomware

Spreadsheet, word processor, and graphics presentation software are used in the_________ sphere of influence.

single-user

Input/output devices provide data and instructions to the computer and receive results from it

true

There is a concern by some people who belong to a particular ethnic, religious, or social group that surveillance data collected by the government could be used to identify and target them and their associates

true

The fact that big data comes in many formats and may be structured or unstructured is an indicator of its

variety

Gregory can use ______to provide the most relevant and complete information regarding the target market's current level of familiarity with his company's brand.

Google

is a standard page description language for Web pages that tells the browser how to display font characteristics, paragraph formatting, page layout, image placement, hyperlinks, and the content of a Web page. It uses tags, which are codes that tell the browser how to format the text or graphics as a heading, list, or body text.

HTML

site provides a portal to 125 years of U.S. health care data.

Heathdata.gov

specifies how to address and route each packet to make sure it reaches the desired destination.

IP

A 64-bit number that uniquely identifies a computer on the Internet is a(n)

IP address

Every computer (such as a Web server) connected to the Internet must have a unique address called

IP address

A database and a database management system are the same thing.

false

Acting in an ethical manner and acting in a legal manner will always lead to the same actions.

false

A data center designed to have an expected annual downtime of less than 30 minutes and able to handle a power outage of up to four days is a tier _______________ data center.

4

What federal law gives citizens the right to expect their private information will be protected from undue investigation?

4th Amendment

How are desktop and mobile operating systems similar?

Both feature a graphical user interface (GUI).

Which of the following is not a disadvantage of self-service analytics?

It places valuable data in the hands of end users.

A 5G network will have the following advantages over a 4G network

Lower latency, greater bandwidth, and ability to support more devices.

What tool can you use to see how the app will perform on Android devices?

SDK

an approach to networking that allows network administrators to manage a network via a controller that does not require physical access to all the network devices, such as routers and switches. (abstracting network control)

SDN (software-defined networking)

a Web address that specifies the exact location of a Web page using letters and words that map to an IP address and a location on the host.

URL

A network that connects large geographic regions is a

WAN

____________is not a key challenge associated with big data.

Which format the data should be stored in

The fact that _______________ is not a benefit that can be expected from following a professional code of ethics.

a code can provide an answer to every ethical dilemma

A(n)______ is the technique used to gain unauthorized access to a device or a network.

attack vector

Web client software used to view Web pages is called

browser

The primary hardware component of a computer responsible for routing data and instructions to and from the various components of a computer

bus

can be used to lock out access to a record if the record is being updated or used by someone else.

concurrency control

A key difference between grid computing, multiprocessing, and parallel processing is

grid computing relies on a community of computers acting together

Genetic algorithm and linear programming belong in the _______________ general category of BI/analytics.

optimization

Three advantages associated with a software-defined network include

the risk of human error is reduced, overall network support and operations costs are reduced, and new applications can be made available sooner

8. One means of ensuring that you are interacting with a secure Web site is to look for a Web address beginning with https

true

Four information system types based on their sphere of influence include interorganizational, personal, enterprise, and

workgroup

requires that employers obtain an employee's or applicant's written permission before running a credit check related to hiring or employment processes.

FCRA (fair credit reporting act)

a graphical representation that summarizes the steps a consumer takes in making a decision to become a customer, and it enables decision makers to see what steps are causing customers confusion or trouble.

conversion funnel

You need to create a relationship between the Transactions table and the Customers table. To do this, what foreign key must be added to the Transactions table?

customer_ID

Sensors placed in each engine report real-time data on the engine's performance and condition. This massive amount of data must be subjected to a thorough ___________process to determine the state of the engine at any given time, its performance over time, and any indications of problems.

data analytics

a network device that directs data packets to other networks until each packet reaches its destination. A router usually connects two different networks and routes data packets between them.

router

All of the following are among the advantages of green computing except:

Eliminates server virtualization needs

The perpetrator most likely to be the cause of a cyberattack is the

careless insider

Which of the following is not a function of the database management system _______________?

database data normalization and data cleansing

You're an HR director meeting with your CEO to discuss plans for a new application that will allow employees to track their own hours and earned vacation time. There are several pieces and parts that need to be coordinated, and the two of you are trying to decide which employees to bring on board for the project. She's got a ________ background and helped with this kind of thing at her prior company where she developed the initial design for some bookkeeping software. We need a__________ Zahira is our ________ I'll ask her to jump in as well.

system analyst programmer web developer

The primary difference between business intelligence and analytics is that

BI is used to analyze historical data to tell what happened or is happening right now in your business while analytics employs algorithms to determine relationships among data to develop predictions of what will happen in the future.

database is stored on a service provider's servers and accessed by the service subscriber over the Internet, with the database administration handled by the service provider.

DBaaS (database as a service)

allows consumers to request and obtain a free credit report once each year from each of the three primary consumer credit reporting companies (Equifax, Experian, and TransUnion).

FACTA (Fair and Accurate Credit Transactions Act)

component of the Hadoop environment is composed of a Procedure that performs filtering and sorting and a method that performs a summary operation.

Map/Reduce program

a wireless network that connects information technology devices close to one person.

Personal area network

Act written to protect children from pornography on the Internet but was ruled unconstitutional.

The Children's Internet Protection

Which of the following is not a key responsibility of the data governance team?

decide which database technology should be used

A collection of instructions and commands to define and describe data and relationship in a specific database is a

data definition language (possibly)

Primary key for a transaction table that would generate a unique number for each transaction. The Customer_ID field could be a primary key for the Customers table where each customer would have a different ID, but each Customer ID could be used repeatedly in the Transactions table for multiple purchases by the same customer. Similarly, a single transaction might include multiple items (Item_ID), and each Transaction_Date could apply to multiple transactions.

Activity_ID

three subclasses of computers associated with the multiple-user computer.

Server, mainframe, and supercomputer

One of the first things developers of IoT applications should focus on is building in _______________ from the start

security

the only Web site authorized by federal law to provide free credit reports under FACTA.

AnnualCreditReport.com

The growth of the Internet of Things is helping to curb the number of cyberattacks.

False

All of the following are true about General Data Protection Regulation (GDPR) except:

GDPR does not cover EU employees

an open-source software framework that includes several software modules that provide a means for storing and processing extremely large data sets. It divides data into subsets and distributes the subsets onto different servers for processing, placing the data processing software on the same servers where the data is stored. This approach creates a highly redundant computing environment that allows the application to keep running even if individual servers fail.

Hadoop

specially denoted text or graphics on a Web page, that, when clicked, open a new Web page containing related content.

Hyperlinks

All of the following are true about 5G, or fifth generation of cellular networks except: a.Taking advantage of 5G requires significant investment b.It supports lightning fast internet speeds, of at least 20 gigabits per second c.It does not mean that a hospital can serve more patients d.Downloading a movie takes about 25 seconds, as compared to the 10 minutes it took over 4G

It does not mean that a hospital can serve more patients

an open-source relational DBMS developed, distributed, and supported by Oracle.

MySQL

____________automation allows cloud services to continually evaluate performance and make changes as needed to optimize performance and minimize costs.

Self-optimizing

An individual who combines strong business acumen, a deep understanding of analytics, and a healthy appreciation of the limitations of their data, tools, and techniques to deliver real improvements in decision making is a(n)

data scientist

Cloud service providers can offer various ________capabilities to help ensure that tenants have access to their cloud resources at all times.

disaster recovery

a person, place, or thing (object) for which data is collected, stored, and maintained.

entity

is a means to offer limited network access to people external to the organization such as selected customers and suppliers.

extranet

Organizations are using the Internet of Things (IoT) to capture and analyze streams of sensor data to detect patterns and anomalies—not after the fact, but while they are occurring—in order to have a considerable impact on the event outcome.

false

Three commonly used approaches to cloud computing are public cloud computing, private cloud computing, and __________cloud computing.

hybrid

Public cloud computing offers three key benefits to organizations including

increased redundancy in the event of disaster, reduced costs, and flexible computing capacity

___________provide data and instructions to the computer and receive results from it.

input/output devices

The primary advantage associated with the use of an in-memory database to process big data is that _

it provides access to data at rates much faster than storing data on some form of secondary storage

When you create the relationship from the Customers table to the Transactions table, what type of relationship should you configure?

many-many (possibly)

A faulty sensor or a bad network connection can result in __________or IoT sensor data that lacks a time stamp indicating when the reading occurred.

missing data

The five broad categories of BI/analytics techniques include

optimization, descriptive analytics, and text and video analysis, simulation, and predictive analytics

The purpose of client-side programming is to

provide an interface to allow the client computer to request services of the server computer

one whose failure may cause human injury or death.

safety-critical system

A private cloud computing environment can provide more data security than a public cloud computing environment.

true

An organization may require high-quality data to avoid fines and penalties for non-conformance to regulatory requirement

true

Choosing what data to store and where and how to store the data are two key challenges associated with big data.

true

Each user should conduct a security self-assessment test.

true

Common issues encountered when moving to public cloud computing include complex pricing arrangements, performance issues, inadequate data security, and

vendor lock-in

a measure of the quality of big data

veracity

systems software that controls the computer systems and devices on a network. Some SDN solutions use robust software controllers that are categorized as network operating systems.

NOS (network operating system)

One of the driving reasons behind the need for data management is to manage risk associated with the misstatement of financial data.

true

database enables hundreds or even thousands of servers to operate on the data, providing faster response times for queries and updates.

NoSQL

A _______________ differs from a _______________ in that it provides a means to store and retrieve data that is modelled using some means other than the simple two-dimensional tabular relations.

NoSQL database and relational database

For decades, organizations have collected operational, sales, and financial data with their __________________systems, which put data into databases quickly, reliably, and efficiently but did not support the type of data analysis that today's businesses and organizations require.

OLTP (online transaction processing)

is a form of software that is distributed, typically for free, with the source code studied, changed, and improved solely by the original developers.

Open-source software

comes from a variety of sources and does not fit neatly into traditional relational database management systems.

Unstructured data

All of the following are a type of biometric authentication except:

VPN recognition

The right to freedom of expression is one of the most important rights for free people in the United States. The _______________ was adopted to guarantee this right and others.

First Amendment

Four drivers that set the information strategy and determine information system investments include corporate strategy, technology innovations, innovative thinking, and

business unit strategy

a class of software used to meet organization-wide business needs and typically shares data with other enterprise applications used within the organization.

enterprise

Programming languages are commonly used to perform data analysis and build application software, system software, embedded systems, Web sites, and

games

The strategic planning process for the IS organization and the factors that influence it depend on how the organization is perceived by the rest of the organization.

guarantees that only the most current technology solutions will be employed

Computer forensics is a discipline that combines elements of _______________ and computer science.

law

One of the consequences of a successful cyberattack that can lead to monetary penalties for organizations that fail to comply with data protection regulations is

legal consequences

Two potential benefits of obtaining a certification in an IS subject area are:

new career possibilities and a potential increase in salary

A collection of attributes about a specific entity is a

record

The three primary types of end user license agreements are individual/multiuser, network/multiuser, and

single-user

A class of computer used by people on the move to run personal productivity software, access the Internet, read and prepare email and instant messages, play games, listen to music, access corporate applications and databases, and enter data at the point of contact.

single-user portable computer

Managers of the business functions most affected by a new information system have a key responsibility to ensure that

the people, processes, and human structure components are fully addressed

The primary intent of a code of ethics is to define desired behavior.

true

What information does Gregory's team need to have on hand as they're setting prices for each item in their company's new line of shoes?

Current level of the market's familiarity and preference for his company's brand Competitors' prices on similar items Perceived value of differentiating factors for his company's shoes

Which of the following is not associated with the implementation of server virtualization?

Increase in the number of software licenses that must be purchased

All of the following are true about SQL except: a.It was first called a Structured English Query Language, or Sequel b.It uses keywords such as SELECT, FROM, and WHERE c.It does not support relational database design d.Microsoft Access and Oracle database support it

It does not support relational database design

a model used to introduce new systems into the workplace in a manner that lowers stress, encourages teamwork, and increases the probability of a successful implementation.

Leavitt's Diamond

Naomi is a market researcher for her company, which designs and manufactures carpets and rugs. She travels globally to conferences and trade shows to track current trends in her industry. During one trip, Naomi learns about a new dye technique that results in more resilient color at a lower cost. She brings the relevant information back to her team and other experts in her company to discuss the feasibility of implementing this technique in their products. Which part of her company's supply chain will be most directly affected by these changes? The new dye technique is implemented before competitors discover and implement similar techniques. At this point, Naomi's job role is likely to be seen as a________

Operations game changer

Three ways IS organization can be perceived by the rest of the organization that influence IS strategy are

cost center, business partner, and game changer

Data governance is a subset of data management.

false

Five actions an organization must take in the event of a successful cyberattack include incident notification, protection of evidence and activity logs, incident containment, eradication, and incident

follow-up

Three subject areas where federal statutes have been implemented to protect the personal data of U.S. citizens include financial data, children's personal data, and

health information

Peoples' lives are at stake here. We don't want this interfering with any of our scheduled surgeries, and we need to know how this might affect any emergency surgeries. This software is classified as a _____________ meaning it gets our highest priority attention from our most qualified technicians throughout the upgrade process.

safety-critical system

The NSA is required to obtain permission from the Foreign Intelligence Surveillance Court (FISC) to access the telephone metadata records of U.S. citizens, which are now held by telecommunication companies rather than by the government.

true

The contemporary view of information systems is that they are often so intimately involved in an organization's value chain that they

true

All of the following are a part of cloud computing services except: a.Platform as a service (PaaS) b.Infrastructure as a service (IaaS) c.Software as a Service (SaaS) d.Information as a Service (IaaS)

Information as a Service (IaaS)

a methodology for planning, coordinating, and controlling any change made to a system.

change management

A networking approach wherein many clients (end user computing devices) request and receive services from servers (host computers) on the network is

client/server

To pull more information and insights from existing data sets. What analytics tool will help them explore this data to identify patterns they can use to make predictions about which strategies will work best for each identified population?

data mining

is a large database that holds business information from many sources in the enterprise, covering all aspects of the company's processes, products, and customers.

data warehouse

The goal of the________ step of the ETL process is to take the source data from all the various sources and convert it into a single format suitable for processing.

extract

Encouragement of self-service analytics almost assuredly will eliminate the risk of erroneous analysis and reporting and the problem of different analyses yielding inconsistent conclusions

false

JavaScript, VBA Script, HTML, CSS, and Ajax are server-side programming languages, while PHP, C++, Java, Python, and Ruby on Rails are client-side programming languages.

false

A network topology in which all network devices connect to one another through a single central device called the hub node is a

star network

a network device that keeps a record of the Media Access Control (MAC) address of all the devices connected to it and uses this information to determine to which port a packet of data should be directed. Switches connect computers, printers, phones, and servers to the network.

switch

Many Web sites use Cascading Style Sheets (CSS) to define the design and layout of Web pages, and Extensible Markup Language (XML) to define the content, and hypertext mark-up language to join the content with the design

true

By designing a cloud to function fluidly across multiple providers, a business can reduce its ______ limitations and increase its ability to shift services between providers.

vendor lock-in

You're helping to on-board a new employee who will be spending some time working from home as well as traveling twice a month for meetings with clients. Employee: Actually, I just bought a new tablet recently that I really like. Will I be able to use that tablet for work? You: Yes, we have a ___________ so you can use your tablet to access company computing resources and applications. Employee: That's good to hear. Will you have to make any changes to it before I can use it for work? You: We'll scan it for any security vulnerabilities and apply the necessary_____________ to close those gaps. Employee: Does that mean my tablet will be safe going forward? You: Not necessarily. For example, a(n)________________ could take advantage of a newly discovered vulnerability before it's patched.

BYOD policy patches zero day attack

not a specific goal of green computing.

Combating global climate change

Emma is ordering a new desktop computer for her work as graphic designer. She wants to make sure she has the latest technology so the computer can render graphics quickly, store large files, and display colors accurately. Which of these options is the most current variety of RAM that Emma can order for her computer? Emma plans to back up her data to the cloud daily; however, she wants to maximize budget-friendly storage space available locally on her computer without any special equipment. What is the best type of storage to meet Emma's needs? Emma needs a monitor that will be easily viewable from multiple angles and will produce bright, sharp images. She's been advised that a(n) __________ monitor, which does not rely on a backlight, will give her the best performance.

DDR4 HDD OLED

My students need a user-friendly app for recording and mixing music. They've been using Apple's GarageBand on my old computer. What operating systems will GarageBand work on? GarageBand works on ______computers. You might be able to find similar software for other operating systems, though. I also need my students to be able to use some new VR software and a video editing app that work only on Windows. Does that mean I'll have to buy two computers? No, you could use______ to run both operating systems on the same computer.

MAC dual booting

You've been hired by a large travel and tourism agency to upgrade their security systems. There are several specific areas of concern they'd like you to address and make recommendations. First, the agency is concerned about protecting their internal network where they host some servers, databases, and several workstations. Due to their global exposure with travel activities around the world, they've experienced some fairly sophisticated attacks on their network. You discover they're using an older firewall that simply isn't designed to protect against today's technologies. What would be a better alternative to protect their network resources?

NGFW

Which of the following is not a true statement about the software as a service model.

The SaaS subscriber must manage service levels and availability, so there may be a need to add hardware, software, or communications capacity as the number of users increases.

Which of the following is not an advantage associated with database-as-a-service (DaaS)?

The customer has complete responsibility for database security access and database backup.

Which of the following are non-technical skills not commonly associated with an effective Information system worker?

ability to work in a static, boring environment where there is little change

A key difference between the U.S. and EU fair information practices is that _______________.

although numerous laws have been implemented over time, no single overarching national data privacy policy has been developed in the United States

Because citizens' right to privacy is based upon a(n) _________ of privacy, company policies are needed that specify for employees what information and electronic services are subject to search.

expectation

The operating system plays no role in controlling access to system resources to provide a high level of security against unauthorized access to the users' data and programs as well as record who is using the system and for how long

false

A _______________ is a collection of similar entities while a(n) _______________ is a characteristic of an entity.

file and attribute

The class of computer used to support workgroups from a small department of two or three workers to large organizations with tens of thousands of employees and millions of customers is the

multi-user computer

Organizations must take strong measures to ensure secure, private, and reliable computing experiences for their employees, customers, and business partners.

organizational, network, application, and end user

We've been prioritizing security upgrades and improved processes over the past year. However, a_______________ would give us a more detailed and thorough assessment of existing vulnerabilities and threats. Unfortunately, we can never eliminate all vulnerabilities unless we just stop doing business. Once we get the report, we can determine how much investment is needed to reach a level of_____that balances security costs with a level of risk we're comfortable with. It's good to do a risk assessment every year. In the meantime, we can use a______to help track key perform

security audit reasonable assurance security dashboard

The two basic types of software are application software and

system software

Which of the following statements is true about strategic planning?

(all of the above) Helps managers identify initiatives Involves more complex considerations Within the IS department a strategic goal aligns with the larger corporate objectives

Next, they're concerned about ways their network has been exposed to viruses due to employees using company computers to visit international Web sites with questionable security. What can you add to the network to offer the company better control over which Web sites are approved for business interactions? After deploying several of the recommended security improvements, you suggest that the final and most important step in protecting the organization's security perimeter is

Proxy server end-user education

A federal law that focuses on unlawful access to stored communications to obtain, alter, or prevent authorized access to a wire or electronic communication while it is in electronic storage.

Stored Wire and Electronic Communications and Transactional Records Access Statute

An organization that monitors, manages, and maintains computer and network security for other organizations is called a_________ service provider.

managed security

When implementing a new information system in an organization, effects on the four key components defined by Leavitt's Diamond must be considered in order to increase the probability of a successful implementation. To do this, you must first identify how these components show up in your organization. Identify which major component of the organization is being highlighted in each scenario.

Technology-Dr Baggett Structure-Raul Process-Gina People-Dr. Michaels

_______________ is not a benefit of promoting a work environment in which employees are encouraged to act ethically.

The employees' tendency to act in a manner that seems ethical to them will be suppressed and instead they will act in a manner that will protect them from punishment.

All of the following are true about data science and big data except: a.No digital data is stored in traditional databases b.Data scientists use skills in data management, statistics, and software development c.Data science involves preparing, manipulating, and analyzing large amounts of digital data d.Digital data is growing at the rate of 2.5 quintillion bytes per day

No digital data is stored in traditional databases

a software design approach based on the use of discrete pieces of software (modules) to provide specific functions (such as displaying a customer's bill statement) as services to other applications.

Service-oriented architectur

When comparing off-the-shelf software to proprietary software, which of the following statements is not true:

The initial cost of the off-the-shelf software is likely greate

Identify the type of information system most relevant to each scenario.

Workgroup information system-Latoya Personal information system-Reginald Inter-organizational information system-Cam Enterprise information system-Shanna

We use a sophisticated ___________ process to plan, track, and control each change. We've also conducted extensive testing on clones of your existing systems, and will allow time during the maintenance window for additional testing during and after the upgrade.

change management

The process of detecting and then correcting or deleting incomplete, incorrect, inaccurate, or irrelevant records that reside in a database is called

data cleansing

The individual who is responsible for planning, designing, creating, operating, securing, monitoring, and maintaining databases is the

database administrator

The process of building software for safety-critical systems takes much longer and is much more expensive because

extreme measures must be taken to identify and remove defects starting at the very earliest stages of software development

Safety-critical systems are easy to learn and use because they perform quickly and efficiently, they meet their users' needs, and they operate safely and reliably.

false


संबंधित स्टडी सेट्स

John Locke, Jean Jacques Rousseau and Thomas Hobbes (Social Contract Theory) 8-25-17 - 8-27-17

View Set

Google Apps (Part 2) Unit 7: Payroll & Deductions

View Set

History Chapter 4: Federalism Section 3

View Set

Psychology Chapter 12 Compilation Set

View Set

MS-500 Test, MS-500 - Module 4, MS-500 - Module 1, MS-500 - Module 3, MS-500 - Module 2, MS500

View Set