CIS 2700 exam practice questions

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

IPv6 uses __________ bit address and it can generate _______________ unique addresses.

128; 340 x 10^36

On-demand workers typically receive their income from ______ different sources

3

Based on the statements in Topic 11, "It's hard to say exactly what percentage of jobs will eventually be automated, but some estimates suggest it could be close to _______%.

40

Which of the following is NOT true for the Uber business model?

A customer may choose to pay in cash or by a credit card

________________________ is the practice of running software from a remote server rather than on the user's computer.

Application virtualization

Which of the following is NOT a correct concept or description about Business Process Managment (BPM)?

BPM is used to support continuous initiatives for both BPI and BPR

Computers can be connected on a network via:

cabling and wireless radio waves

Which of the following is NOT a typical industry or task where robotics are used?

childcare

The internet of things (IoT) is the interconnection of any device that has a(n) _________.

connectivity

The term Homo Conexus refers to people who practice _________.

continuous computing

In the digital (online) space, there is a strong relationship between the quality of a firm's ___________, which in turn increases revenue.

customer experiences and loyalty

_________________________ is the business strategy that leverages IT to dramatically improve employee, customer, and business partner relationships; to support continuous improvement in business operations and business processes; and to develop new business models and businesses.

digital transformation

For knowledge workers, entrepreneur, managers and business leaders staying current in ______________ is essential to their careers.

emerging technologies

Almost all ICT network activities are powered by the burning of ____________________.

Fossil fuels

When a cyberattack is conducted by employees within the organization it is referred to as ______________.

Fraud

Which of the following is the business model that considers "Customer is the 'product'. Customer data is the most valuable part of the business along with his/her attention for advertising purposes"?

Free

Which type of malware uses your computer to send emails that look like they came from you to all the people in your email address book?

spamware

A(n) ________ is an inter-organizational information system.

supply chain system

An information system's _________ is the possibility (potential) that the system or network resource may be exploited by a cyber ________ to gain __________ access.

vulnerability; threat; unauthorized

Which of the following is NOT one of the important characteristics of choosing IoT for mobile communication solutions?

adaptable

_____________ is an example of efficiency.

automating order entry

_______ configuration has a main channel to which nodes or secondary channels are connected in a branchlike structure.

Bus network

The sector that reported the highest number of data breaches in 2019 was ________________.

Business

Which of the following is NOT a component addressed by the NABC model?

Business strategy

Which of the following is NOT a correct description of the Cloud Computing?

Cloud computing is a computing firm that offers services to customers without releasing information of hardware and software used in the Cloud Service Agreement (CSA).

The three objectives of data and information systems security are:

Confidentiality, integrity, availability

Which of the following is NOT one of the purposes of developing an IT Architecture?

Creates a plan to align IT with the corporate long-term objectives.

_____________ is the result of optimizing and aligning business processes to fulfill customers' needs, wants, and desires.

Customer satisfaction

Critical infrastructure, intellectual property theft, identify theft, BYOD and social networks are all examples of_____________.

Cyberattack targets

_________ is the result of optimizing the manufacturing and logistics processes

Cycle and fulfillment time reduction

An Enterprise Architecture (EA) is to add value to an organization by tackling _____________________________________.

D. Both A and C.

Which of the following is NOT one of the essential skills of an effective enterprise architect?

Data analytics

Which of the following is NOT considered essential computing resources required to support the SMAC Model for Innovation and Disruption?

Database Server

_____________-thinking managers and entrepreneurs are conducting ____________ transformation of their existing business models

Forward; digital

A(n) ________ tightly integrates the FAISs via a common database and enhances communications among the functional areas of an organization.

ERP

Which one of the following is NOT a characteristic of a Legacy System?

Effective in handling business processes

"Doing the right thing" is used as a metric for __________, and "Doing the thing right" is used as a metric for __________.

Effectiveness, Efficiency

A(n) ____________________is a large-scale application software package that supports business processes, information flows, reporting, and data analytics in complex organizations.

Enterprise system

Programmers have developed AI applications that can diagnose human illnesses, make financial forecasts, and schedule routes for delivery vehicles. These kinds of problems would usually require humans with a lot of education and experience. Which of the following terms best describes the type of AI program used in this example?

Expert Systems

A network configuration that allows an organization to make limited access available to its partners, suppliers, and customers is called a(n) _______________.

Extranet

Which of the following AI applications is the subject of much controversy when used by the police or other law enforcement agencies?

Facial recognition programs that can track and monitor the location and movement of individuals under surveillance by law enforcement officers.

As pointed out in the textbook, carbon emissions will lead the increase in GMT. What does GMT stand for?

Global Mean Temperature

The ___________ the value of the assets to the company and to cybercriminals, the ________ the risk is to the company and the ________ the level of security needs to be.

Higher, greater, higher

_______ integrates AI with cognitive computing to streamline the medical processes.

IBM Watson

Three mobile network technologies that have created new ways of working do NOT include:

IP

Which of the following guide the process of planning, acquiring, building, modifying, and interfacing with deployed IT resources in a single department within an organization?

IT architectures

Which of the following is NOT true about IT's impacts on future jobs and the quality of life?

IT will provide rules to automate human judgement in decision-making.

The base resources for the SDDC are computation, storage, networking, and security, which can be accomplished by using ____________ from a cloud computing service provider.

IaaS

Which of the following is NOT considered one of major support for Business Processes?

Identify external processes for partnership

Which of the following is NOT a goal of business process re-engineering?

Increase cycle time.

The threats to information security are ________, and the greatest threat is ____________.

Increasing; human

The following are CRM mistakes EXCEPT:

Involving key business stakeholders from the outset

In the Opening Case of Topic 5, the City of Cedar Park installed a Smart Water Network (FlexNet) to improve customer services. Which one of the following is NOT an exact description of benefits provided by this new smart water communication network?

It is a two-way system that allows customers to call in and find out their real-time water consumption.

Which of the following is NOT considered an advantage of using IoT for data collection in wireless communication?

It is small and can be easily embedded in products for data collection without security concerns.

Which of the following characteristics is NOT a factor when determining if a job is a strong candidate for being performed by robotic or other types of machines?

Jobs that are service driven

_____________ allow(s) employee computers and servers to be connected into one network.

LAN

From a technology perspective, CRM refers to the methodologies and software tools to ____________ customer data:

Leverage

In general, the _____ is responsible for corporate-level and shared IT resources; the ______ are responsible for departmental IT resources.

MIS department; end users

A supply chain involves the following three flows:

Materials, data, and payments

The principle of _____________________________ applies to ERP vendor selection.

Measure twice, cut once

The S-M-A-C model has been used for business "Innovation and Disruption." Which of the components will provide ubiquitous services?

Mobile Device

Which of the following is NOT considered as one of the wireless transmission media?

Modem

The short-range wireless network that is best-suited for touchless credit card transaction is ______________.

Near-field communication

Bandwidth is measured in ________ per second.

bits

Which of the following model matches the description that "customers pay for a service that they don't have time to do themselves but is fulfilled by people with time, but short on money?"

On-demand

The inconsistency between competing demand to use IT and have an online presence which guarding against potential threats to personal safety and privacy is called the privacy _____________.

Paradox

Many companies now use AI programs that contribute to organizational efficiency and effectiveness. One type of AI program uses data from CRM or customer transaction history to identify customers that are most likely to make a purchase in response to a sales promotion campaign. This application of AI programming is referred to as ______________.

Predictive analytics

Which of the following is NOT one of the six elements of quality of life that can be impacted by ICT?

Privacy

Based on the eTicketing Process, an example, given in Topic 3 of your e-Textbook, it has four major steps. Which of the following steps is the simplest process as compared to the other three?

Receive a ticket

Based on the textbook, which one of the following is NOT one of the FOUR factors to preserve the environment?

Reproduce

Which of the following is NOT a basic function of TCP in Internet communication?

Responsible for disassembling and reassembling data packets

Autonomous vehicles are powered by AI that learns how to safely drive passengers from one place to another. Which of the following terms best describes this type of autonomous vehicle?

Robotics and AI

Natural language processing (NLP) programs can read and understand a social media post and assign a score indicating how favorable or unfavorable the users have felt about the company when they wrote the post. This application of AI programming is referred to as _________________.

Sentiment analysis

The central feature of all ERP systems is referred to as a _________________.

Shared data repository

The three facets of sustainability are__________________________.

Society, economy, environment

_________ collects personal information about users without their consent.

Spyware

________ is a traditional function of the MIS department.

Staffing, training, and developing IS skills

The consulting firm Gartner developed a five-stage maturity model that organizations can use to determine their readiness for implementation of AI technology. Which of the following is not one of the five AI maturity stages identified by Gartner?

Strategic

To achieve sustainability companies and government must engage in ___________________ development activities.

Sustainable

As detailed in Topic 4, what is the acronym TSaaS?

Technology Solutions as a service

Managing information systems in modern organizations is a difficult and complex task. Which of the following factors does NOT contribute to this?

Technology becomes cheaper to acquire, operate, and maintain.

Which of the following is NOT considered critical to the results of "becoming an informed user?"

The more you know about what computing resources, the more you know how to use IT to entertain your daily life.

Advanced persistent threats (APT) are carried out as _____________.

Under the Radar attacks

Which of the following is not an application of facial recognition technology that people consider to be "good" applications that have a positive impact on people and society?

When used by employers to identify job applicants that may be prone to mental health conditions like depression or mood disorders.

A computer security specialist who breaks into protected systems and networks to test and assess their security is a ________________ hacktivist.

White Hat

On‐demand workers are typically ______________________.

Younger, optimistic, urban‐based

In developing countries, the two main sustainability issues are:

access to clean water, lack of food security

When you decide to start automating order entry by creating a website instead of forcing people to call into Inside Sales to place orders, you are in the _________ phase of BPI.

improve

In recent years, companies such as Walmart and Amazon.com have offered streaming videos for rent on their Web sites. This is an example of how new technology has ___________________________________.

increased the barriers to new entrants

The IS function has become ________ strategic within organizations, so a growing number of CIOs are coming from _________.

increasingly; other business units

There are three flows in a typical supply chain, the ___________ flow consists of data related to market demands, customer orders, goods return, as well as product details in any of these data.

information

Much of the complexity in implementing an enterprise system is due to getting new apps or system modules to _________ with legacy systems.

interface

BPI is typically performed by ___________.

knowledge workers

Business models designed to serve today's on-demand economy are based on time, convenience, and ____________ service.

location-based

If there are _________ alternatives to an organization's products or services, then the threat of substitutes is high; if there are _________ alternatives, then the threat is low.

many; few

The goal of building a Cloud Service Agreement is to the terms that are most ________________ to the business needs.

meaningful

A set of complex processes involved in providing customers what they ordered on-time and all customer services related to on-time delivery of a product is referred to as _____________________.

order fulfillment

A computer-based information system (CBIS) can be viewed from different perspectives. If you consider a CBIS that has six major components - hardware, software, database, networks, procedures, and people, which represent the ______________ view.

physical

Which one of the following is NOT one of the characteristics/benefits of virtualization?

process-simplification (no redundant processes)

A threat that a perpetrator uses social skills to trick or manipulate a legitimate user's trust into providing confidential company information is known as _______________.

social engineering


Set pelajaran terkait

Chapter 14 - Closing the Residential Transaction

View Set

Ch 7: Practice test : Strategy: Innovation

View Set

PF- 4 It Pays to Save, Savings Account, & Special Savings Accounts- 10/24/17(Tue.)- 10/30/17(Mon.)- Q: 1- Saving

View Set