ISYS exam 2
Which of the following types of reports would be the least likely output of PowerBI or Tableau?
A list of all customers and their mailing addresses
Which of the following statements best demonstrates how a data mart is used?
A specific department or division uses the data mart designed for them.
A company located in a non-EU country sells products to EU countries. The CEO has started to collect all data from website visitors and has not invested in a GDPR-compliant information system. What will be the repercussions for this company?
Administrative GDPR fines could be applied
In data communication, the _____ is a packet-switching service that operates at 25 Mbps and 622 Mbps, with a maximum speed of up to 10 Gbps.
Asynchronous Transfer Mode
How can Internet applications for software distribution help mitigate computer security problems?
By distribution of security updates and patches through downloads
In the context of a database marketing campaign, _______ tells a business how much it should spend to maintain a relationship
CLTV
Before establishing a security program, organizations should ___
Conduct basic risk analysis
A locally owned restaurant is trying to compete with another restaurant that moved into town. The owners of the locally owned restaurant have a background in application development. What is an example of how the owners can use their skills to stay competitive against the national chain?
Create a mobile app that customers could use to see promotions and collect points
A company has decided to allow a hybrid workforce with employees alternating days of the week they are expected to be in the office. The employees enjoy the flexibility. How does the organization also benefit from this?
Decreased costs associated with office space and utilities
How job deskilling lead to improved job satisfaction?
Decreased repetitive and uninteresting tasks
A company has several sales representatives. Each sales representative fills the information of the sale and client in their computer and stores it in a central database. This is an example of a ________.
Distributed processing
Which growing application of IoT is used to enhance manufacturing processes and data analytics on factory floors?
Industrial internet of things (IIoT)
A security analyst has determined that the firewall is inadequate to detect suspicious activity on the network. The analyst also wants to be notified when certain activity patterns are detected. Which of the following would provide the best solution to this situation?
Intrusion detection systems
Which statement is true of an intranet?
It helps organizations move from a calendar-based document-publishing strategy to one based on events.
Identify a true statement about data collected on the Web.
It must be used and interpreted with caution
Which of the following is one reason for the importance of protocols such as TCP/IP?
It provides a common language between different platforms
What is a potential drawback of telecommuting?
Lack of necessary supplies or equipment
__ are compatible with the IBM System/360 line introduced in 1965.
Mainframe computers
When contrasting a network model and a hierarchical model, the main difference is that a record in a network model can have:
Multiple parent and child records
An organization recently hired a new network administrator. As the network admin, they discovered that the previous admin was querying the customer data and possibly selling the information to other organizations. Based on the log files, this took place last year and has not happened since they left three months ago. What should the organization do to stay GDPR compliant?
Notify the customers of the breach within 72 hours of discovery.
Walmart self-checkouts are an example of what type of technology?
POS
Which healthcare system can make interactive medical tools available to the public
Personal health information systems
One of the new technologies with Web 3.0 is VR technology. How do retail businesses use this new technology to develop their employees?
Provides training to employees to perform job functions
A colleague introduced you to a client for you to take over the client's needs. The colleague no longer needs to be involved in the email communication (they received a promotion). What can you do to include the colleague in the email but prevent them from being accidentally caught in a reply unnecessarily?
Put the colleague's email as a BCC
Which statement differentiates between read-only memory (ROM) and random access memory (RAM)?
ROM is nonvolatile memory, whereas RAM is volatile memory.
When considering the concept of database marketing, which of the following would not be an acceptable example of the concept?
Recruit employees more effectively and at a lower cost
A restaurant has major losses due to food going to waste. Which IIoT applications are more likely to help with the problem?
Set inventory and expiration dates and shore notifications
A security analyst is arguing with the CEO of an online marketplace for adding security to a company's web server. Which is the best argument to support this goal?
Shoppers will abandon a retailer that has been hacked
Despite increased laws and regulations, why is data privacy still not protected as consumers expect?
Some loopholes prevent any ramifications.
In the context of computer crimes and attacks, the difference between phishing and spear phishing is that:
Spear phishing attacks are targeted toward a specific person or a group.
Data warehouses are sometimes called hypercubes because they _____.
Store multidimensional data
Identify the type of computer that has the highest price
Supercomputers
A business representative commented in a crowd that news reporters unintentionally heard. The story has been reported, and the CEO seeks to reprimand him. What did the business representative violate?
The business networking principle of don't say or do anything that you would not want on the front-page paper. The business networking principle of knowing how to communicate openly.
In the context of Internet services, what is Internet telephony's drawback?
The call quality of not as good as regular phone lines
A security analyst has just received an email that their hospital data has been stolen. According to a study published in 2021, which statistic best represents the result of this stolen data?
The company will incur millions in recovery costs
Not all citizens can access similar technologies in a rural community. Why is this?
The digital divide exists in rural areas due to a lack of infrastructure to support high-speed Internet.
________________ is a way to measure an information system's effectiveness.
The efficiency in delivering information
A CFO of an online marketplace has just realized a drop in revenue since the last cyber attack on the website. The security analyst's most likely explanation is _____.
The security upgrade has slowed the online marketplace
In the context of the technologies developed to improve the efficiency and quality of digital communications, _____ divides each channel into six-time slots.
Time division multiple access
Why do online classes reduce the cost of having renowned experts lecture?
Travel expenses are not a factor.
The Internet is important in helping organizations reduce expenses because ___
Web applications can be used with minimum costs
Which approach to set up a distributed database management system (DDBMS) combines the fragmentation approach and the replication approach?
allocation
Spoofing happens when:
an illegitimate program poses as a legitimate one.
In the context of ethical issues of information technologies, restricting access to the Web is a type of _____.
censorship
Which text form needs to be unscrambled using a decryption key?
ciphertext
Many computers have been stolen from a university computer lab. Which solution should the security team implement?
corner bolts
What additional factors play a role in a customer's decision to purchase a product or service other than focus and differentiation?
cost
Comprehensive security measures must ensure that access to an organization's _______ is granted only to authorized users and trusted business partners.
extranets
If you want to search for a restaurant that a friend recommends, but you don't remember the restaurant's name, which tool is more likely to help you find the restaurant?
facebooks graph search
A disadvantage of Power BI is that it only accepts data from relational databases in the cloud.
false
A server company has another site set up in a different region than the main servers in case of a disaster. It is expected that the hot site should be up and running as soon as the replacement servers are brought up.
false
A server is a set of programs for controlling and managing computer hardware and software.
false
Computers perform all tasks using a combination of arithmetic and logical operations.
false
Conventional computing methods are able to efficiently process and manage big data.
false
Database marketing works by using multivariate analysis, data segmentation, and automated tools to transform marketing from a proactive to a reactive process.
false
In the context of mobile networking, 3G networks have decreased the quality of Internet telephony or Voice over Internet Protocol (VoIP).
false
Spreadsheet software is more powerful than financial planning software.
false
When using mirror disks, if one of the two disks containing the same data fails, the other disk also fails.
false
In the context of directories on the Web, a human-powered directory uses crawlers to collect data.
false (users)
The Advanced Research Projects Agency Network (ARPANET) owns the Internet.
false, no one does
Jane has decided she wants a camo-colored ATV for her birthday. She is looking at different manufacturers, unsure of what model she wants. If a single dealership carries both models and she likes them equally, what will likely be the deciding factor for her choice?
final costs
A customer is looking to buy a new car. They cannot reach anyone on the phone at the local car dealership. Predict what the customer will most likely do next.
go online and find another dealership
Java and C++ are examples of _____.
high level languages
Jared makes two copies of an antivirus software package he bought and sold one of the copies to Joshua. How would Jared's actions be classified in this situation?
illegal and unethical
In the context of using information technologies for a competitive advantage, distinguish the best strategy by focusing on the following:
increasing revenue by selling existing products to new customers.
The advantage of the _____ access method is that both sequential and random access can be used to access records, depending on the number being accessed.
indexed sequential
In computer and network security, _____ refers to the accuracy of information resources within an organization.
integrity
If boundaries such as maximum and minimum values allowed for a field are a requirement for a data model, which component would be responsible for that feature?
integrity rules
To enable communication between a video card and memory, you would use a(n) _____.
internal bus
Internet protocol IP operates at the network layer because:
it uses IP addresses to route packets
A DSL requires a modem because:
it uses a medium for analog signals to connect to a digital device.
If a program does not require separate documentation, it is written in what language?
javascript
A(n) _____ is a common output device for soft copy.
liquid crystal display
A security analyst has seen the system performance slow after installing a logic design application. The application contains a Trojan program, but the performance issue spreads across the network. What is the most likely cause of this issue?
logic bomb
What should the industry do if they realize the buyer power is too high?
make it difficult to switch providers
Advertising and marketing analytics, in-app analytics, and performance analytics are three popular types of ________ analytics.
mobile
What is an example of a client-based e-mail program?
mozilla thunderbird
In the URL http://www.rentalmarti.com/suv/news.html Which part indicates the name of the document?
news.html
Choose the correct code in which the source code must be translated into in order to make a computer understand a program.
object
How has technology helped small businesses differentiate themselves?
offer better and faster customer service
Syndication feeds are one way of announcing the availability of a _____.
podcast
By using just-in-time delivery of goods, a company can reduce costs by _______.
requiring raw material only when needed
__ is a computer crime that involves destroying or disrupting computer services.
sabotage
In data encryption, the HTTPS in a browser address bar indicates a safe HTTP connection over _____.
secure sockets layer
You want to isolate a part of the LAN dedicated to processing internal files, so external nodes don't need access. What process can you use to do this?
segmenting
In the context of Web and network privacy, an acceptable use policy is a:
set of rules specifying a system's legal and ethical use and the consequences of non-compliance.
A small organization is proliferating, using its personnel to enter data and run manual queries for patterns. What would you recommend the business do to use the personnel better?
start using microsoft access
Which object-oriented language is used to develop apps for macOS and iOS?
swift
In the context of big data, velocity is _________.
the speed with which the data has to be gathered and processed
Line phone devices are an example of __
thin clients
Netflix replacing Blockbuster is an example of what type of Five Force?
threat of new entrants
A grocery retailer offering club cards that give customers big discounts is one example of an overall cost leadership strategy.
true
According to the Children's Online Privacy Protection Act (COPPA), any information collected from children must have parental consent.
true
An organization's comprehensive security plan should include procedures for installing software patches and updates regularly.
true
Apache Hadoop is the most commonly used platform for big data analytics.
true
Business intelligence (BI) uses scorecards and dashboards to support decision-making activities, whereas business analytics (BA) uses data mining tools and predictive modeling.
true
If a drive in a redundant array of independent disks (RAID) system fails, data stored on it can be reconstructed from data stored on the remaining drives.
true
Information technologies have led to job deskilling.
true
Inkjet printers produce characters by projecting onto paper electrically charged droplets of ink that create an image.
true
If high-speed Internet was not available for developing countries, what is available for their citizens to use instead?
wireless and mobile networks