IST 205
According to the textbook, _________ percent of Internet users in 2016 employed ad-blocking tools.
26
The complete data set on a customer is called a:
360-degree view
LTE is ________ cellular technology.
4G
More than ________ percent of all online content is written in English.
50
The top technology job is
CIO
Which capability of digital dashboards enables users to go into greater detail?
Drill down
_________is a method for analyzing and reducing a relational database to its most streamlined form.
Normalization
The reasons why so many IS software development projects do not deliver their potential value include all of the following except:
Poor definition of user requirements
________ is a cloud-based team communication and collaboration software program that helps company employees communicate in real time.
Slack
An unintentional attack in which the perpetrator uses social skills to trick or manipulate a legitimate employee into providing confidential company information is known as:
Social engineering
Hackers used _________ to get into the Democratic National Committee computer systems.
Spear-phishing
_________ collects personal information about users without their consent.
Spyware
One of the big advantages of being an informed user and consumer of IT is that it enables you to anticipate future innovations and their potential applications
True
_________ are employees from all functional areas and levels of the organization who interact with the system, either directly or indirectly.
Users
Your southern region is not doing very well. You want to know why, so you ask for a special report showing the numbers for the southern region compared to the northern, eastern, and western regions. This is a(n) ________ report.
ad hoc
The characteristics of ERP systems include which of the following?
all of these
The end product of the _________ stage is a set of system requirements.
analysis
_________ are independently owned by a third party and connect many sellers with many buyers.
electronic exchanges
The European Union's highest court ruled that ________.
embarrassing material should be removed from search results when reques
The _________ of an information resource is the harm, loss, or damage that can result if a threat compromises that resource.
exposure
Your professor hands you a piece of paper with the number 75 on it and tells you this is your current average in the class. This is ________.
information
________________ is organized so that is has meaning and value to the recipient
information
A(n) _____ is a logical grouping of related fields.
record
The _________ approach maintains that an ethical action is the one that best protects and respects the moral rights of the affected parties.
rights
Adding functions after the project has been initiated causes ________.
scope creep
PrivacyBadger is an ad blocker that ________.
stops almost every ad and tracker
Network protocols describe __________.
the rules for communication within the network
A(n) _________ to an information resource is any danger to which a system may be exposed.
threat
If you shift your risk by using other means to compensate for the loss like purchasing insurance, you have implemented a risk _________ strategy.
transference
In a database, the primary key field is used to _________.
uniquely identify a record
The ________ approach to ethics maintains that an ethical action is the one that provides the most good or does the least harm:
utilitarian approach
In ________, recipients of your marketing notices send information about your product to their friends.
viral marketing
Which of the following is NOT a characteristic of Big Data?
viscous
With _________, phone calls are treated as just another kind of data.
voice over IP
Suppose you go through your neighborhood to figure out how many wireless networks are unsecure. This is __________.
war driving
________ is a collection of related files or tables containing data.
A database
Electronic business includes which of the following?
All of these
Alibaba started as a(n) _________ company.
Chinese
eBay is an example of which type of e-commerce?
Consumer-to-consumer
In order to get feedback from customers, some companies make use of social computing tools providing feedback via blogs, wikis, online forums and social network sites. This is known as:
Conversational marketing
________ is an operating model under which ISPs must allow customers equal access to content and applications, regardless of the source or nature of the content.
Network neutrality
_________ allows manufacturers to attach tags with antennas and computer chips on goods and then track their movement through radio signals.
RFID
_____ is the study of the impact that changes in one or more variables of a decision-making model have on other variables.
Sensitivity analysis
________ refers to erratic shifts in orders up and down the supply chain.
The bullwhip effect
Social marketplaces act as online intermediaries that harness the power of social networks for introducing, buying, and selling products and services.
True
The Volkswagen and Wells Fargo bank cases illustrate that CEOs usually lose their jobs over ethical dilemmas.
True
The goal of SCM systems is to reduce friction along the supply chain.
True
The two fundamental metrics that organizations employ in assessing their processes are efficiency and effectiveness.
True
The ________ test proposes a scenario in which a man and a computer both pretend to be women or men, and a human interviewer has to identify which is the real human.
Turing
Europeans and privacy advocates prefer the _________ model of informed consent.
opt-in
A standardized language used to manipulate data is _________.
structured query language
An information resource's _________ is the possibility that the system will be harmed by a threat.
vulnerability
________ is a group of people working in different locations.
A virtual team
A password system on a computer network is an example of which type of information security control?
Access
_________ controls restrict unauthorized individuals from using information resources.
Access
_________ issues involve the authenticity, fidelity, and correctness of information that is collected and processed.
Accuracy
_________ is a software development methodology that delivers functionality in rapid iterations which are usually measured in weeks.
Agile development
Which of the following is not true of predictive analytics?
All of the statements are true
IT applications can be developed in which of the following ways?
All of these
Organizations are using social computing in which of the following functions?
All of these
Problems along the supply chain include which of the following?
All of these
Web 2.0 sites include:
All of these
Which of the following are examples of Business Processes?
All of these
Which of the manager's roles do modern information systems support?
All of these
The relationship between ethics and legality can best be described in which of the following statements?
An act can be unethical, but still be legal
In a relational database, the customer record contains information regarding the customer's last name. The last name is a(n):
Attribute
_________ accounts for the majority of e-commerce transactions.
B2B
Analytical CRM systems provide ________ by analyzing customer behavior and perceptions.
BI
_________ is an incremental approach that focuses on reducing variation in the process outputs by searching for the root causes of the variation in the process itself or among process inputs.
BPI
_________ represents a huge challenge for IT departments because it means IT loses the ability to fully control and manage employee devices.
BYOD
Managing information systems in a modern organization is challenging because:
Both of the following are correct: The systems are very expensive to acquire, operate, and maintain; and the systems are critical to the organization's operations.
______ refers to applications and technologies for consolidating, analyzing, and providing access to vast amounts of data to help users make better business and strategic decisions.
Business analytics
Organizations typically face issues related to e-tailing including:
Companies face issues in both of these areas.
In this type of e-commerce, buyers and sellers are individuals.
Consumer-to-consumer
________ is an extended ERP module.
Customer relationship management
____________ refer to an elementary description of things, events, activities, and transactions that are recorded, classified, and stored but are not organized to convey any specific meaning
Data
It is very difficult to manage data for which of the following reasons?
Data are scattered throughout organizations
The management of data across the entire organization is most accurately defined as:
Data governance
________ is an approach to managing information across an entire organization.
Data governance
which of the following is in the current order starting with the most elementary?
Data, information, knowledge
A(n) ________ report displays a greater level of detail.
Drill-down
_________ is the process of converting an original message into a form that cannot be read by anyone except the intended receiver.
Encryption
________ integrate the planning, management, and use of all of an organization's resources and are designed to tightly integrate the functional areas of the organization.
Enterprise resource planning systems
The "right to be forgotten" court order occurred in ________.
Europe
Teespring primarily relies on ________ for advertising.
The United Nations ensures privacy laws are consistent across countries so that it is easier to do business in multiple countries.
False
The only risk companies face when using social commerce is that customers may post negative feedback.
False
The terms wireless and mobile are synonymous.
False
Data redundancy refers to:
Having copies of the same data in multiple locations
Which of the following is an accuracy issue?
How can we ensure that errors in databases, data transmissions, and data processing are accidental and not intentional?
Which of the following is an accuracy issue?
How can we ensure that the information will be processed properly and presented accurately to users?
The adoption of ________ has been an important factor in the development of the Internet of Things.
IPv6
Which of the following employees typically poses the most significant threat to information security?
IS employees
A(n) ________ is a company that provides Internet connections for a fee.
ISP
The term "digital divide" refers to the gap between:
Individuals who have access to information and communication technologies and those who do not
________ flows consist of data related to demand, shipments, orders, returns, and schedules, as well as changes in any of these data.
Information
_________ occur(s) when an attacker either threatens to steal, or actually steals, information from a company and then demands payment for not carrying out a particular act.
Information extortion
Which of the following is FALSE of the Dark Web?
It is indexed by search engines.
Google Fiber was first deployed in ________.
Kansas City
_________ reports summarize the performance of critical activities.
Key indicator
____________________ is organized and processed to convey understanding, experience, accumulated learning, and expertise as it applies to a current business problem
Knowledge
________ have the ability to accurately perform new, unseen tasks that are built on known properties learned from training or historical data that are labeled.
Machine learning systems
____________________ is a traditional function of the MIS department
Managing systems development
Using your cell phone to purchase a Coke from a vending machine is an example of:
Micropayment
________ analytics examines recent and historical data to detect patterns and predict future outcomes and trends.
Predictive
_________ analytics answers the question "what could happen?"
Predictive
Which of the following is true of prescriptive analytics?
Prescriptive analytics recommend one or more courses of action and show the likely outcome of each decision.
________ transmission systems have signals that pass through walls but they are susceptible to snooping unless encrypted.
Radio
The technology that uses radio waves to identify individual items is:
Radio-frequency identification
_________ is also called digital extortion.
Ransomware
Implementing controls to prevent threats from occurring and developing a recovery plan should the threats occur are two broad functions of:
Risk mitigation
The US intelligence community accused _________ of the hacks on the Democratic National Committee in 2015 and 2016.
Russia
The leading ERP software vendor is _________.
SAP
If a hacker takes control of equipment such as power grids or nuclear power plants, this is an example of a(n) _________ attack.
SCADA
________ is the most popular query language used for interacting with a database.
SQL
_________ is the component of an operational CRM system that automatically records all the aspects in a sales transaction process.
Sales force automation
________ is the protocol of the Internet.
TCP/IP
_________ feasibility determines if the hardware, software, and communications components can be developed and/or acquired to solve the business problem.
Technical
_________ is a system in which any object, natural or manmade, has a unique identity and is able to send and receive information over a network without human interaction.
The IoT
Major scandals at Enron, WorldCom, and Tyco led to the passage of which law in 2002?
The Sarbanes-Oxley Act
"Business Process" is defined as an ongoing collection of related activities that create a product/service to an organization.
True
A filter bubble is a result of a search in which a website algorithm guesses what a user would like to see based on information about the user.
True
An organization's business processes can be a competitive advantage or disadvantage.
True
Smartphones are sensors that can be used for electronic surveillance.
True
The legal concept that gives individuals the right to recover damages done to them by other individuals, organizations, or systems is known as liability.
True
________ is a business strategy in which a company purchases its upstream suppliers to ensure that its essential supplies are available as soon as the company needs them.
Vertical integration
_________ used software to cheat during emissions testing to market its diesel cars as efficient, low emissions vehicles.
Volkswagen
Which of the following is a privacy issue?
What information about individuals should be kept in databases, and how secure is the information there?
Which of the following is a privacy issue?
What information about oneself should an individual be required to reveal to others?
Dyn is a cloud-based internet performance management company that provides DNS services for internet websites. It was attacked with _________ in 2016.
a DDoS
A wiki is _________.
a Web site on which anyone can post material and make changes to already posted material
The entire business analytics process starts with
a business problem
If you accept the potential risk, continue operating with no controls, and absorb any damages that occur, you have adopted a risk _________ strategy.
acceptance
You can check your credit report annually for free through TransUnion, Equifax, and Experian. This allows you to catch signs of identity theft early and note any problems in your credit reports. This is an example of an ethical issue that falls into the category of ________.
accuracy
The most current form of ransomware demands payment in the form of _________.
bitcoins
Bandwidth is stated in ________ per second.
bits
A _________ is a set of related steps or procedures designed to produce a specific outcome.
business process
A(n) __________ is a collection of related activities that produce a product or a service of value to an organization.
business process
In the ________ marketplace model, the reverse auction is typically used.
buy-side
When customers access a Web site and make purchases, they generate _________.
clickstream data
Ghostery is an ad blocker that ________.
collects data
A ________ system tracks all communications between the company and the customer, the purpose of each communication, and any necessary follow-up.
contact management
You want to implement an ERP system, but you do not want to buy something from SAP or Oracle. Since you are building an ERP system from scratch, this is called a(n) ________ approach to ERP implementation.
custom
A(n) ___________ is software that helps companies acquire and retain customers.
customer relationship management system
A transaction is any business event that generates ________ worthy of being captured and stored in a database.
data
All unethical actions are illegal in the United States.
false
Customers using social commerce benefit from _____________.
faster responses from vendors
A(n) _________ is a system that prevents a specific type of information from moving between untrusted networks and private networks.
firewall
An important trend is the combination of geographical information systems with _____ to form geospatial technologies.
global positioning systems
American companies can easily do business with Chinese companies. This is phenomenon is called ________.
globalization
_________ is an attack in which the perpetrator uses social skills to trick or manipulate legitimate employees into providing confidential company information such as passwords.
social engineering
A(n) _______________ interfaces between users and programmers and determines information requirements and technical specifications for new applications
system analyst
Google Project Fi customers can set up their phones as a mobile Wi-Fi router and allow their laptops or tablets to surf the Internet on their phone's data connection at no extra charge. This process is called wireless ________.
tethering
_________ are materials, services, and information that flow through and are transformed as a result of process activities.
inputs
Social ________ is the monitoring, collection, and analysis of socially generated data to make strategic decisions.
intelligence
Your professor hands you a piece of paper with the number 75 on it and tells you this is your current average in the class. Since this is your fourth year as a college student, you know you could work hard to bring up that average up to a B by the of the semester. This is _________________.
knowledge
The _________ model of informed consent permits the company to collect personal information until the customer specifically requests that the data not be collected.
opt-out
In the ________ stage of the systems development life cycle, the design specifications are translated into computer code.
programming