MSIS 2103 Quiz 1-8
A kilobyte is 1024 bytes. A megabyte is 1024 kilobytes. A gigabyte is 1024 megabytes. What is a petabyte?
1024 terabytes
Your Internet Service Provider (ISP) says that your network runs at 50 gigabit per second. This is the _______.
Bandwidth
When you sign onto a LAN through WiFi, you have a ______ IP address and the LAN router has a _______ IP address.
Dynamic, Static
A manufacturing company that uses an enterprise information system will likely use a(n) ________________.
ERP
One method of keeping information secure when sent over the Internet or stored on a computer is_______.
Encryption
A(n) _________ shows the relationships between the tables in a relational database.
Entity Relationship Diagram
A relational database can have a many to many relationship between entities.
False
All computer devices communicate over a network using computer languages such as Python or C#.
False
All legal actions are ethical.
False
Because a properly designed relational database only has single data entry, it is common to put calculated variables in the database.
False
Data is information put into context.
False
Google Maps is a GPS system that utilizes a GIS system to provide information about the physical world.
False
Information is defined as facts, knowledge, and skill acquired by a person through experience or education.
False
Information on the Internet has a limited life and is deleted after a period of time.
False
Learning objective four is to develop skill in using Excel by applying it to solve problems.
False
Malware is software to protect your computer from anti-malware attacks by viruses, spying tools, ransomware, and trojan horses.
False
Professional organizations such as auditors do not have ethical codes because their members are professionals and as such have a basic understanding of their profession and professional behavior.
False
The "law of small numbers" says that any sample will have a distribution that is representative of the population, regardless of sample size. The "law of small numbers" is valid for selecting sample size.
False
The available Distributed File Systems or NoSQL databases must be purchased and are closed source systems.
False
Every table has a primary key. When the primary key of one table is in another table it is called a _______ key.
Foreign
The fraud triangle is a model for explaining the factors that cause someone to commit occupational fraud. It consists of three components which, together, lead to fraudulent behavior: 1. Perceived unshareable financial need 2. Perceived opportunity The third component is:
Rationalization
Someone is quiet and appears aloof. You predict that they would not have a successful career as a comedian. What bias would potentially invalidate your prediction?
Illusion of validity
You always take exams wearing the same shirt, because when you wear that shirt you make a good grade on the exam. This is an example of what bias?
Illusion-correlation bias
When you take out renter's insurance, you are practicing ________.
Risk transference
In order to perform a skill, the knowledge must be internalized. This is called ________ knowledge.
Tacit
If you are negotiating the price of a used car with the owner, you always want to make an offer before asking the owner's selling price. Why?
The first price mentioned creates the starting point in the negotiation
Risk is the probability of a bad thing happening multiplied by the impact of its occurrence.
True
The representative heuristic is one of the reasons that first impressions on meeting someone are so important.
True
When you use a credit card, you are using several different companies information systems.
True
When should you use visualizations?
When you want to convey information that is not apparent from the raw data.
When you are showing data that sums to a total, which type of chart should not be considered?
Pie Chart
When you need to show percentages in a chart the best type of chart to use is _______.
Pie Chart
When you use the Internet you run the risk of __________.
All of the above: Blackmail, Extortion, Financial Theft, Identity Theft
Metadata defines the _________.
All of the above: Format of date fields, Required data fields, Database business rules, Number of characters in a text field
How do businesses make money on the Internet?
All of the above: Paid for obtaining customers, Paid for content, Selling product, Paid for showing advertising
You are being asked to join an organization. You are told that the members are very friendly and everyone has a great time at events the organization holds. You conclude that joining this organization will help you raise your GPA. Of what bias are you possibly guilty?
Insensitive to predictability
If an interviewer ignores your past history of success, he is guilty of which bias?
Insensitive to prior outcomes
How can you recognize phishing email?
It may have a link for you to click to access a message.
Which of the following is legal but unethical.
Martin Skorelli raising the price of a medication by 5000%
Moore's law states that______________.
The number of transistors on a chip doubles every 12 to 18 months.
The common element of enterprise systems is which of the following?
They have one database
When someone at work says "it's just business". You should
Think about the ethics of their actions
Heuristics can lead to predictable biases and inconsistencies.
True
Through the use of apps (application software) your smart phone can access devices that are connected to a network. What technology does the smart phone use to connect to the network?
WiFi, Cellular Radio
Integrity means keeping information secure from unauthorized changes. You can do this by using a hard to guess password. Which of the following is the best password?
XVG$4u5i6&n
A protocol is which of the following?
a standard
When you post a review on a business, you are _____________.
providing content