IST 205

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

According to the textbook, _________ percent of Internet users in 2016 employed ad-blocking tools.

26

The complete data set on a customer is called a:

360-degree view

LTE is ________ cellular technology.

4G

More than ________ percent of all online content is written in English.

50

The top technology job is

CIO

Which capability of digital dashboards enables users to go into greater detail?

Drill down

_________is a method for analyzing and reducing a relational database to its most streamlined form.

Normalization

The reasons why so many IS software development projects do not deliver their potential value include all of the following except:

Poor definition of user requirements

________ is a cloud-based team communication and collaboration software program that helps company employees communicate in real time.

Slack

An unintentional attack in which the perpetrator uses social skills to trick or manipulate a legitimate employee into providing confidential company information is known as:

Social engineering

Hackers used _________ to get into the Democratic National Committee computer systems.

Spear-phishing

_________ collects personal information about users without their consent.

Spyware

One of the big advantages of being an informed user and consumer of IT is that it enables you to anticipate future innovations and their potential applications

True

_________ are employees from all functional areas and levels of the organization who interact with the system, either directly or indirectly.

Users

Your southern region is not doing very well. You want to know why, so you ask for a special report showing the numbers for the southern region compared to the northern, eastern, and western regions. This is a(n) ________ report.

ad hoc

The characteristics of ERP systems include which of the following?

all of these

The end product of the _________ stage is a set of system requirements.

analysis

_________ are independently owned by a third party and connect many sellers with many buyers.

electronic exchanges

The European Union's highest court ruled that ________.

embarrassing material should be removed from search results when reques

The _________ of an information resource is the harm, loss, or damage that can result if a threat compromises that resource.

exposure

Your professor hands you a piece of paper with the number 75 on it and tells you this is your current average in the class. This is ________.

information

________________ is organized so that is has meaning and value to the recipient

information

A(n) _____ is a logical grouping of related fields.

record

The _________ approach maintains that an ethical action is the one that best protects and respects the moral rights of the affected parties.

rights

Adding functions after the project has been initiated causes ________.

scope creep

PrivacyBadger is an ad blocker that ________.

stops almost every ad and tracker

Network protocols describe __________.

the rules for communication within the network

A(n) _________ to an information resource is any danger to which a system may be exposed.

threat

If you shift your risk by using other means to compensate for the loss like purchasing insurance, you have implemented a risk _________ strategy.

transference

In a database, the primary key field is used to _________.

uniquely identify a record

The ________ approach to ethics maintains that an ethical action is the one that provides the most good or does the least harm:

utilitarian approach

In ________, recipients of your marketing notices send information about your product to their friends.

viral marketing

Which of the following is NOT a characteristic of Big Data?

viscous

With _________, phone calls are treated as just another kind of data.

voice over IP

Suppose you go through your neighborhood to figure out how many wireless networks are unsecure. This is __________.

war driving

________ is a collection of related files or tables containing data.

A database

Electronic business includes which of the following?

All of these

Alibaba started as a(n) _________ company.

Chinese

eBay is an example of which type of e-commerce?

Consumer-to-consumer

In order to get feedback from customers, some companies make use of social computing tools providing feedback via blogs, wikis, online forums and social network sites. This is known as:

Conversational marketing

________ is an operating model under which ISPs must allow customers equal access to content and applications, regardless of the source or nature of the content.

Network neutrality

_________ allows manufacturers to attach tags with antennas and computer chips on goods and then track their movement through radio signals.

RFID

_____ is the study of the impact that changes in one or more variables of a decision-making model have on other variables.

Sensitivity analysis

________ refers to erratic shifts in orders up and down the supply chain.

The bullwhip effect

Social marketplaces act as online intermediaries that harness the power of social networks for introducing, buying, and selling products and services.

True

The Volkswagen and Wells Fargo bank cases illustrate that CEOs usually lose their jobs over ethical dilemmas.

True

The goal of SCM systems is to reduce friction along the supply chain.

True

The two fundamental metrics that organizations employ in assessing their processes are efficiency and effectiveness.

True

The ________ test proposes a scenario in which a man and a computer both pretend to be women or men, and a human interviewer has to identify which is the real human.

Turing

Europeans and privacy advocates prefer the _________ model of informed consent.

opt-in

A standardized language used to manipulate data is _________.

structured query language

An information resource's _________ is the possibility that the system will be harmed by a threat.

vulnerability

________ is a group of people working in different locations.

A virtual team

A password system on a computer network is an example of which type of information security control?

Access

_________ controls restrict unauthorized individuals from using information resources.

Access

_________ issues involve the authenticity, fidelity, and correctness of information that is collected and processed.

Accuracy

_________ is a software development methodology that delivers functionality in rapid iterations which are usually measured in weeks.

Agile development

Which of the following is not true of predictive analytics?

All of the statements are true

IT applications can be developed in which of the following ways?

All of these

Organizations are using social computing in which of the following functions?

All of these

Problems along the supply chain include which of the following?

All of these

Web 2.0 sites include:

All of these

Which of the following are examples of Business Processes?

All of these

Which of the manager's roles do modern information systems support?

All of these

The relationship between ethics and legality can best be described in which of the following statements?

An act can be unethical, but still be legal

In a relational database, the customer record contains information regarding the customer's last name. The last name is a(n):

Attribute

_________ accounts for the majority of e-commerce transactions.

B2B

Analytical CRM systems provide ________ by analyzing customer behavior and perceptions.

BI

_________ is an incremental approach that focuses on reducing variation in the process outputs by searching for the root causes of the variation in the process itself or among process inputs.

BPI

_________ represents a huge challenge for IT departments because it means IT loses the ability to fully control and manage employee devices.

BYOD

Managing information systems in a modern organization is challenging because:

Both of the following are correct: The systems are very expensive to acquire, operate, and maintain; and the systems are critical to the organization's operations.

______ refers to applications and technologies for consolidating, analyzing, and providing access to vast amounts of data to help users make better business and strategic decisions.

Business analytics

Organizations typically face issues related to e-tailing including:

Companies face issues in both of these areas.

In this type of e-commerce, buyers and sellers are individuals.

Consumer-to-consumer

________ is an extended ERP module.

Customer relationship management

____________ refer to an elementary description of things, events, activities, and transactions that are recorded, classified, and stored but are not organized to convey any specific meaning

Data

It is very difficult to manage data for which of the following reasons?

Data are scattered throughout organizations

The management of data across the entire organization is most accurately defined as:

Data governance

________ is an approach to managing information across an entire organization.

Data governance

which of the following is in the current order starting with the most elementary?

Data, information, knowledge

A(n) ________ report displays a greater level of detail.

Drill-down

_________ is the process of converting an original message into a form that cannot be read by anyone except the intended receiver.

Encryption

________ integrate the planning, management, and use of all of an organization's resources and are designed to tightly integrate the functional areas of the organization.

Enterprise resource planning systems

The "right to be forgotten" court order occurred in ________.

Europe

Teespring primarily relies on ________ for advertising.

Facebook

The United Nations ensures privacy laws are consistent across countries so that it is easier to do business in multiple countries.

False

The only risk companies face when using social commerce is that customers may post negative feedback.

False

The terms wireless and mobile are synonymous.

False

Data redundancy refers to:

Having copies of the same data in multiple locations

Which of the following is an accuracy issue?

How can we ensure that errors in databases, data transmissions, and data processing are accidental and not intentional?

Which of the following is an accuracy issue?

How can we ensure that the information will be processed properly and presented accurately to users?

The adoption of ________ has been an important factor in the development of the Internet of Things.

IPv6

Which of the following employees typically poses the most significant threat to information security?

IS employees

A(n) ________ is a company that provides Internet connections for a fee.

ISP

The term "digital divide" refers to the gap between:

Individuals who have access to information and communication technologies and those who do not

________ flows consist of data related to demand, shipments, orders, returns, and schedules, as well as changes in any of these data.

Information

_________ occur(s) when an attacker either threatens to steal, or actually steals, information from a company and then demands payment for not carrying out a particular act.

Information extortion

Which of the following is FALSE of the Dark Web?

It is indexed by search engines.

Google Fiber was first deployed in ________.

Kansas City

_________ reports summarize the performance of critical activities.

Key indicator

____________________ is organized and processed to convey understanding, experience, accumulated learning, and expertise as it applies to a current business problem

Knowledge

________ have the ability to accurately perform new, unseen tasks that are built on known properties learned from training or historical data that are labeled.

Machine learning systems

____________________ is a traditional function of the MIS department

Managing systems development

Using your cell phone to purchase a Coke from a vending machine is an example of:

Micropayment

________ analytics examines recent and historical data to detect patterns and predict future outcomes and trends.

Predictive

_________ analytics answers the question "what could happen?"

Predictive

Which of the following is true of prescriptive analytics?

Prescriptive analytics recommend one or more courses of action and show the likely outcome of each decision.

________ transmission systems have signals that pass through walls but they are susceptible to snooping unless encrypted.

Radio

The technology that uses radio waves to identify individual items is:

Radio-frequency identification

_________ is also called digital extortion.

Ransomware

Implementing controls to prevent threats from occurring and developing a recovery plan should the threats occur are two broad functions of:

Risk mitigation

The US intelligence community accused _________ of the hacks on the Democratic National Committee in 2015 and 2016.

Russia

The leading ERP software vendor is _________.

SAP

If a hacker takes control of equipment such as power grids or nuclear power plants, this is an example of a(n) _________ attack.

SCADA

________ is the most popular query language used for interacting with a database.

SQL

_________ is the component of an operational CRM system that automatically records all the aspects in a sales transaction process.

Sales force automation

________ is the protocol of the Internet.

TCP/IP

_________ feasibility determines if the hardware, software, and communications components can be developed and/or acquired to solve the business problem.

Technical

_________ is a system in which any object, natural or manmade, has a unique identity and is able to send and receive information over a network without human interaction.

The IoT

Major scandals at Enron, WorldCom, and Tyco led to the passage of which law in 2002?

The Sarbanes-Oxley Act

"Business Process" is defined as an ongoing collection of related activities that create a product/service to an organization.

True

A filter bubble is a result of a search in which a website algorithm guesses what a user would like to see based on information about the user.

True

An organization's business processes can be a competitive advantage or disadvantage.

True

Smartphones are sensors that can be used for electronic surveillance.

True

The legal concept that gives individuals the right to recover damages done to them by other individuals, organizations, or systems is known as liability.

True

________ is a business strategy in which a company purchases its upstream suppliers to ensure that its essential supplies are available as soon as the company needs them.

Vertical integration

_________ used software to cheat during emissions testing to market its diesel cars as efficient, low emissions vehicles.

Volkswagen

Which of the following is a privacy issue?

What information about individuals should be kept in databases, and how secure is the information there?

Which of the following is a privacy issue?

What information about oneself should an individual be required to reveal to others?

Dyn is a cloud-based internet performance management company that provides DNS services for internet websites. It was attacked with _________ in 2016.

a DDoS

A wiki is _________.

a Web site on which anyone can post material and make changes to already posted material

The entire business analytics process starts with

a business problem

If you accept the potential risk, continue operating with no controls, and absorb any damages that occur, you have adopted a risk _________ strategy.

acceptance

You can check your credit report annually for free through TransUnion, Equifax, and Experian. This allows you to catch signs of identity theft early and note any problems in your credit reports. This is an example of an ethical issue that falls into the category of ________.

accuracy

The most current form of ransomware demands payment in the form of _________.

bitcoins

Bandwidth is stated in ________ per second.

bits

A _________ is a set of related steps or procedures designed to produce a specific outcome.

business process

A(n) __________ is a collection of related activities that produce a product or a service of value to an organization.

business process

In the ________ marketplace model, the reverse auction is typically used.

buy-side

When customers access a Web site and make purchases, they generate _________.

clickstream data

Ghostery is an ad blocker that ________.

collects data

A ________ system tracks all communications between the company and the customer, the purpose of each communication, and any necessary follow-up.

contact management

You want to implement an ERP system, but you do not want to buy something from SAP or Oracle. Since you are building an ERP system from scratch, this is called a(n) ________ approach to ERP implementation.

custom

A(n) ___________ is software that helps companies acquire and retain customers.

customer relationship management system

A transaction is any business event that generates ________ worthy of being captured and stored in a database.

data

All unethical actions are illegal in the United States.

false

Customers using social commerce benefit from _____________.

faster responses from vendors

A(n) _________ is a system that prevents a specific type of information from moving between untrusted networks and private networks.

firewall

An important trend is the combination of geographical information systems with _____ to form geospatial technologies.

global positioning systems

American companies can easily do business with Chinese companies. This is phenomenon is called ________.

globalization

_________ is an attack in which the perpetrator uses social skills to trick or manipulate legitimate employees into providing confidential company information such as passwords.

social engineering

A(n) _______________ interfaces between users and programmers and determines information requirements and technical specifications for new applications

system analyst

Google Project Fi customers can set up their phones as a mobile Wi-Fi router and allow their laptops or tablets to surf the Internet on their phone's data connection at no extra charge. This process is called wireless ________.

tethering

_________ are materials, services, and information that flow through and are transformed as a result of process activities.

inputs

Social ________ is the monitoring, collection, and analysis of socially generated data to make strategic decisions.

intelligence

Your professor hands you a piece of paper with the number 75 on it and tells you this is your current average in the class. Since this is your fourth year as a college student, you know you could work hard to bring up that average up to a B by the of the semester. This is _________________.

knowledge

The _________ model of informed consent permits the company to collect personal information until the customer specifically requests that the data not be collected.

opt-out

In the ________ stage of the systems development life cycle, the design specifications are translated into computer code.

programming


Set pelajaran terkait

Praxis: Chapter 3, 4, & 5 questions- Language Development in Children, Language Disorders in Children & Speech Sound Development/ Disorders

View Set

EMT Chapter 29: chest injuries Quiz (1)

View Set

Ecology Section II: Organismal Ecology; Water

View Set

CHAPTER 11 - Aggregate Demand I: IS-LM Model Construction

View Set

2.4 Integration and Strategic Management

View Set