Management Information Systems - Ch. 1-4
More than ________ percent of American adults only have dial-up Internet access; this ________ a form of broadband Internet access.
30; is not
________ causes pop-up advertisements to appear on your screen.
Adware
Law enforcement uses drones for what purpose? search and rescue active shooter scenarios crime scene analysis
All of the choices are correct.
________ is the largest book publisher and bookseller in the U.S. today.
Amazon
________ is an example of efficiency.
Automating order entry
________ integrates disparate BPI initiatives to ensure consistent strategy execution.
BPM
Many organizations find ________ too difficult, too radical, too lengthy, and too comprehensive.
BPR
________ represents a huge challenge for IT departments because it means IT loses the ability to fully control and manage employee devices.
BYOD
Which of the following is an obstacle towards law enforcement agencies increasing their reliance on drones
Citizens are uneasy with drone usage by law enforcement agencies.
________ controls secure the movement of data across networks.
Communications
________ involves companies providing standard specifications for different consumer groups.
Consumer segmentation
Which of the following is a negative consequence associated with John Deere's digital transformation?
Consumers are unable to have their equipment serviced.
Which of the following is NOT an advantage of VPN?
Cost
Which of the following is NOT an organizational response to business pressures?
Creating a digital divide
________ is the result of optimizing and aligning business processes to fulfill customers' needs, wants, and desires.
Customer satisfaction
Hackers would use a botnet to perform a ________.
DDoS
A(n) ________ is located between two firewalls.
DMZ
________ is a remote attack requiring no user action.
DoS
In addition to improving their pizzas, ________ improved its ordering process with digital technologies such as a voice-ordering chatbot and a robot delivery system.
Domino's
________ is the process of converting an original message into a form that cannot be read by anyone except the intended receiver.
Encryption
________ is NOT a problem caused by computers
Ergonomics
According to Facebook executives, the Facebook and Cambridge Analytica scandal occurred because hackers got access to the database by stealing key passwords from users.
False
As anticipated by Aadhaar's opponents, the Supreme Court found that Aadhaar violates privacy rights.
False
Facebook has been harshly fined and has undergone massive restructuring as a result of the discovery of the Cambridge Analytica scandal.
False
Much of the discovery of the ways in which Cambridge Analytica and Facebook were misusing user data came from the Pew Research Center.
False
Privacy experts agree with Google that Google's double-blind encryption ensures the privacy and security of consumer information.
False
The Driver's Privacy Protection Act of 1994 does not limit who can access information about automobile registrations and drivers, only what information can be used for.
False
The IT infrastructure and IT platform are synonyms.
False
The rise of on-demand entertainment has resulted in drastically reduced revenues for organizations such as the NFL, NBA, NHL, and MLB.
False
You check your credit report annually to ensure your identity hasn't been stolen. This is an example of a property issue.
False
________ is a product used to collect data on visitors to websites that integrates with Google's ad-targeting systems.
Google Analytics
________ can identify which clicks and key words had the largest impact on a consumer's purchasing decision.
Google Attribution
Which of the following is an accuracy issue?
How can we ensure that errors in databases, data transmissions, and data processing are accidental and not intentional?
Which of the following is an accessibility issue?
How much should companies charge for permitting access to information in their databases?
IT services, IT personnel, and IT components make up the organization's ______
IT infrastructure
Which of the following does NOT contribute to the increasing vulnerability of organizational information resources?
Increasing skills necessary to be a computer hacker
________ are materials, services, and information that flow through and are transformed as a result of process activities
Inputs
Which is NOT a concern expressed by advocates over reservations about Axon's technology?
Machine learning will not be able to identify objects such as stop signs, guns, and license plates, only civilians' faces.
________ is the current strategy for many manufacturers where a company produces a large quantity of items but customizes them to match the needs and preferences of individual customers.
Mass customization
Which of the following is NOT an example of excellent alignment?
Organizations allow IT employees to develop overarching goals for the business.
________ use the hardware and software, interface with it, or use its output
People
________ issues involve collecting, storing, and disseminating information about individuals.
Privacy
________ are the instructions for combining components to process information and generate the desired output
Procedures
Which of the following is NOT a benefit of IT?
Quantity of leisure time
If a hacker takes control of equipment such as power grids or nuclear power plants, this is an example of a(n) ________ attack.
SCADA
________ is an attack in which the perpetrator uses social skills to trick or manipulate legitimate employees into providing confidential company information such as passwords.
Social engineering
Self-driving cars made by ________ have been blamed for at least two fatalities
Tesla
Business executives often know little about IT, and IT executives understand the technology but may not understand the real needs of the business.
True
ERPs are organization-wide systems that are designed to correct a lack of communication among FAISs.
True
Effectiveness focuses on doing the things that matter.
True
It costs less to operating an internet application today than it did 15 years ago
True
One thing that the popularity of open source and online studying resources has uncovered is that what learning looks like in many areas of study has drastically changed.
True
The traditional function of the MIS department centers on the idea that end users do not have the required technical expertise to address IT issues.
True
Wendy's was one of the first companies in the fast food industry to utilize self-serve kiosks.
True
Whitelisting allows nothing to run unless it is on the whitelist.
True
You are a nice person, so you hold the door open for the person running in behind you. Since you needed to use your ID badge to open the door, the person running in behind you is tailgating.
True
________ is a remote attack requiring user action.
Virus
IBM developed ________ to answer questions on the quiz show Jeopardy!
Watson
________ is an IT system that uses natural language processing and machine learning to reveal insights from large amounts of data. It has transformed many industries including healthcare and customer service.
Watson
A ________ attack is a targeted attempt to steal sensitive information from a company, such as financial data or personal details about employees.
Whaling
Carelessness using unmanaged devices is ________ and is an ________ mistake.
a human error; unintentional
You leave your laptop at your desk while you go to the restroom. This is ________ and is an ________ mistake.
a human error; unintentional
Suppose you only study two hours for your next test. You fail the test and tell the teacher that he or she obviously did a really terrible job teaching the material. This means you aren't accepting ________ for your actions.
accountability
When you figure out that customer orders are delayed because you do not have enough employees picking orders in the warehouse, you are in the ________ phase of BPI.
analysis
The entire basis of a whaling attack is to ________.
appear as authentic as possible with actual logos, phone numbers, and various other details used in communications that come from fake email addresses
The ________ coordinates and manages new systems development projects.
applications development manager
The proliferation of ________ in ballparks has enabled teams to more efficiently steal signs.
cameras
Consumers ________ put a freeze on their credit with the three credit bureaus; this is ________ for consumers.
can; not an appealing fi
The John Deere Operations center is a(n) ________ platform.
cloud computing
Obamacare was created to address the ________ approach.
common good
The ________ approach highlights the interlocking relationships that underlie all societies.
common good
Companies purchase digital dossiers to ________.
create customer intimacy
Primary activities ________ add value directly to the firm's products or services; support activities ________ add value directly to the firm's products or services.
do; do not
The threat of new competitors will enter your market is high when entry is ________ and low when there are ________ barriers to entry
easy; significant
The goal of whaling is to trick a(n) ________ into revealing personal or corporate data.
executive
Photo tagging is a type of ________ technology.
facial recognition
The ________ component of body camera software had caused many to express fears over the need for probably cause for searches, or stop and frisk encounters.
facial recognition
The ________ approach posits that ethical actions treat all human beings equally, or, if unequally, then fairly, based on some defensible standard.
fairness
Supplier power is high when buyers have ________ choices from whom to buy and low when buyers have ________ choices.
few; many
Winemakers have turned to drones to combat ________.
global warming
As teams have begun utilizing available technologies to help steal signs, challenge calls, and in general, assist in various aspects of the game, MLB ________.
has to adapt rules and regulations, such as limiting access to live game broadcast and not replay footage
In the ________ phase of BPI, the BPI team identifies possible solutions for addressing the root causes, maps the resulting "to be" process alternatives, and selects and implements the most appropriate solution.
improve
When you decide to start automating order entry by creating a website instead of forcing people to call into Inside Sales to place orders, you are in the ________ phase of BPI.
improve
The connected golf course will include all of the following except ________
instant messaging
Typing in your password to access a system is an example of something the user ________.
knows
Buyer power is high when buyers have ________ choices from whom to buy and low when buyers have ________ choices.
many; few
IT makes managers ________ productive and ________ the number of employees who can report to a single manager
more; increases
Europeans and privacy advocates prefer the ________ model of informed consent.
opt-in
Suppose your university automatically logs you off of a university computer after 15 minutes of disuse. This is an example of a(n) ________ control.
physical
Intellectual property is NOT protected under ________ laws.
privacy
Suppose you only study two hours for your next test. If you understand that means you may not do well on that test and you are willing to accept the lower grade, it means you are taking ________ for your actions.
responsibility
Procurement processes are NOT completed by _____
sales
Yachting teams use ________ to chase boats in real time.
sensor data
Compliance with government regulations is a ________ pressure.
societal
Keystroke loggers and screen scrapers are examples of ________.
spyware
A(n) ________ creates the computer code for developing new systems software or maintaining existing systems software.
systems programmer
One of the major roadblocks for installation of broadband fiber-optic lines in rural areas is ________.
that streamlined FCC rules for installation only apply to Internet Service Providers and telephone and cable companies, and not county agencies, making the process more convoluted and lengthy
A(n) ________ to an information resource is any danger to which a system may be exposed.
threat
When you go through the checkout line at your local grocery store, this is a(n) ________ that could be processed by a(n) _______
transaction; TPS
Auditing ________ the computer means using a combination of client data, auditor software, and client and auditor hardware.
with