Management Information Systems - Ch. 1-4

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

More than ________ percent of American adults only have dial-up Internet access; this ________ a form of broadband Internet access.

30; is not

________ causes pop-up advertisements to appear on your screen.

Adware

Law enforcement uses drones for what purpose? search and rescue active shooter scenarios crime scene analysis

All of the choices are correct.

________ is the largest book publisher and bookseller in the U.S. today.

Amazon

________ is an example of efficiency.

Automating order entry

________ integrates disparate BPI initiatives to ensure consistent strategy execution.

BPM

Many organizations find ________ too difficult, too radical, too lengthy, and too comprehensive.

BPR

________ represents a huge challenge for IT departments because it means IT loses the ability to fully control and manage employee devices.

BYOD

Which of the following is an obstacle towards law enforcement agencies increasing their reliance on drones

Citizens are uneasy with drone usage by law enforcement agencies.

________ controls secure the movement of data across networks.

Communications

________ involves companies providing standard specifications for different consumer groups.

Consumer segmentation

Which of the following is a negative consequence associated with John Deere's digital transformation?

Consumers are unable to have their equipment serviced.

Which of the following is NOT an advantage of VPN?

Cost

Which of the following is NOT an organizational response to business pressures?

Creating a digital divide

________ is the result of optimizing and aligning business processes to fulfill customers' needs, wants, and desires.

Customer satisfaction

Hackers would use a botnet to perform a ________.

DDoS

A(n) ________ is located between two firewalls.

DMZ

________ is a remote attack requiring no user action.

DoS

In addition to improving their pizzas, ________ improved its ordering process with digital technologies such as a voice-ordering chatbot and a robot delivery system.

Domino's

________ is the process of converting an original message into a form that cannot be read by anyone except the intended receiver.

Encryption

________ is NOT a problem caused by computers

Ergonomics

According to Facebook executives, the Facebook and Cambridge Analytica scandal occurred because hackers got access to the database by stealing key passwords from users.

False

As anticipated by Aadhaar's opponents, the Supreme Court found that Aadhaar violates privacy rights.

False

Facebook has been harshly fined and has undergone massive restructuring as a result of the discovery of the Cambridge Analytica scandal.

False

Much of the discovery of the ways in which Cambridge Analytica and Facebook were misusing user data came from the Pew Research Center.

False

Privacy experts agree with Google that Google's double-blind encryption ensures the privacy and security of consumer information.

False

The Driver's Privacy Protection Act of 1994 does not limit who can access information about automobile registrations and drivers, only what information can be used for.

False

The IT infrastructure and IT platform are synonyms.

False

The rise of on-demand entertainment has resulted in drastically reduced revenues for organizations such as the NFL, NBA, NHL, and MLB.

False

You check your credit report annually to ensure your identity hasn't been stolen. This is an example of a property issue.

False

________ is a product used to collect data on visitors to websites that integrates with Google's ad-targeting systems.

Google Analytics

________ can identify which clicks and key words had the largest impact on a consumer's purchasing decision.

Google Attribution

Which of the following is an accuracy issue?

How can we ensure that errors in databases, data transmissions, and data processing are accidental and not intentional?

Which of the following is an accessibility issue?

How much should companies charge for permitting access to information in their databases?

IT services, IT personnel, and IT components make up the organization's ______

IT infrastructure

Which of the following does NOT contribute to the increasing vulnerability of organizational information resources?

Increasing skills necessary to be a computer hacker

________ are materials, services, and information that flow through and are transformed as a result of process activities

Inputs

Which is NOT a concern expressed by advocates over reservations about Axon's technology?

Machine learning will not be able to identify objects such as stop signs, guns, and license plates, only civilians' faces.

________ is the current strategy for many manufacturers where a company produces a large quantity of items but customizes them to match the needs and preferences of individual customers.

Mass customization

Which of the following is NOT an example of excellent alignment?

Organizations allow IT employees to develop overarching goals for the business.

________ use the hardware and software, interface with it, or use its output

People

________ issues involve collecting, storing, and disseminating information about individuals.

Privacy

________ are the instructions for combining components to process information and generate the desired output

Procedures

Which of the following is NOT a benefit of IT?

Quantity of leisure time

If a hacker takes control of equipment such as power grids or nuclear power plants, this is an example of a(n) ________ attack.

SCADA

________ is an attack in which the perpetrator uses social skills to trick or manipulate legitimate employees into providing confidential company information such as passwords.

Social engineering

Self-driving cars made by ________ have been blamed for at least two fatalities

Tesla

Business executives often know little about IT, and IT executives understand the technology but may not understand the real needs of the business.

True

ERPs are organization-wide systems that are designed to correct a lack of communication among FAISs.

True

Effectiveness focuses on doing the things that matter.

True

It costs less to operating an internet application today than it did 15 years ago

True

One thing that the popularity of open source and online studying resources has uncovered is that what learning looks like in many areas of study has drastically changed.

True

The traditional function of the MIS department centers on the idea that end users do not have the required technical expertise to address IT issues.

True

Wendy's was one of the first companies in the fast food industry to utilize self-serve kiosks.

True

Whitelisting allows nothing to run unless it is on the whitelist.

True

You are a nice person, so you hold the door open for the person running in behind you. Since you needed to use your ID badge to open the door, the person running in behind you is tailgating.

True

________ is a remote attack requiring user action.

Virus

IBM developed ________ to answer questions on the quiz show Jeopardy!

Watson

________ is an IT system that uses natural language processing and machine learning to reveal insights from large amounts of data. It has transformed many industries including healthcare and customer service.

Watson

A ________ attack is a targeted attempt to steal sensitive information from a company, such as financial data or personal details about employees.

Whaling

Carelessness using unmanaged devices is ________ and is an ________ mistake.

a human error; unintentional

You leave your laptop at your desk while you go to the restroom. This is ________ and is an ________ mistake.

a human error; unintentional

Suppose you only study two hours for your next test. You fail the test and tell the teacher that he or she obviously did a really terrible job teaching the material. This means you aren't accepting ________ for your actions.

accountability

When you figure out that customer orders are delayed because you do not have enough employees picking orders in the warehouse, you are in the ________ phase of BPI.

analysis

The entire basis of a whaling attack is to ________.

appear as authentic as possible with actual logos, phone numbers, and various other details used in communications that come from fake email addresses

The ________ coordinates and manages new systems development projects.

applications development manager

The proliferation of ________ in ballparks has enabled teams to more efficiently steal signs.

cameras

Consumers ________ put a freeze on their credit with the three credit bureaus; this is ________ for consumers.

can; not an appealing fi

The John Deere Operations center is a(n) ________ platform.

cloud computing

Obamacare was created to address the ________ approach.

common good

The ________ approach highlights the interlocking relationships that underlie all societies.

common good

Companies purchase digital dossiers to ________.

create customer intimacy

Primary activities ________ add value directly to the firm's products or services; support activities ________ add value directly to the firm's products or services.

do; do not

The threat of new competitors will enter your market is high when entry is ________ and low when there are ________ barriers to entry

easy; significant

The goal of whaling is to trick a(n) ________ into revealing personal or corporate data.

executive

Photo tagging is a type of ________ technology.

facial recognition

The ________ component of body camera software had caused many to express fears over the need for probably cause for searches, or stop and frisk encounters.

facial recognition

The ________ approach posits that ethical actions treat all human beings equally, or, if unequally, then fairly, based on some defensible standard.

fairness

Supplier power is high when buyers have ________ choices from whom to buy and low when buyers have ________ choices.

few; many

Winemakers have turned to drones to combat ________.

global warming

As teams have begun utilizing available technologies to help steal signs, challenge calls, and in general, assist in various aspects of the game, MLB ________.

has to adapt rules and regulations, such as limiting access to live game broadcast and not replay footage

In the ________ phase of BPI, the BPI team identifies possible solutions for addressing the root causes, maps the resulting "to be" process alternatives, and selects and implements the most appropriate solution.

improve

When you decide to start automating order entry by creating a website instead of forcing people to call into Inside Sales to place orders, you are in the ________ phase of BPI.

improve

The connected golf course will include all of the following except ________

instant messaging

Typing in your password to access a system is an example of something the user ________.

knows

Buyer power is high when buyers have ________ choices from whom to buy and low when buyers have ________ choices.

many; few

IT makes managers ________ productive and ________ the number of employees who can report to a single manager

more; increases

Europeans and privacy advocates prefer the ________ model of informed consent.

opt-in

Suppose your university automatically logs you off of a university computer after 15 minutes of disuse. This is an example of a(n) ________ control.

physical

Intellectual property is NOT protected under ________ laws.

privacy

Suppose you only study two hours for your next test. If you understand that means you may not do well on that test and you are willing to accept the lower grade, it means you are taking ________ for your actions.

responsibility

Procurement processes are NOT completed by _____

sales

Yachting teams use ________ to chase boats in real time.

sensor data

Compliance with government regulations is a ________ pressure.

societal

Keystroke loggers and screen scrapers are examples of ________.

spyware

A(n) ________ creates the computer code for developing new systems software or maintaining existing systems software.

systems programmer

One of the major roadblocks for installation of broadband fiber-optic lines in rural areas is ________.

that streamlined FCC rules for installation only apply to Internet Service Providers and telephone and cable companies, and not county agencies, making the process more convoluted and lengthy

A(n) ________ to an information resource is any danger to which a system may be exposed.

threat

When you go through the checkout line at your local grocery store, this is a(n) ________ that could be processed by a(n) _______

transaction; TPS

Auditing ________ the computer means using a combination of client data, auditor software, and client and auditor hardware.

with


Set pelajaran terkait

AP GOV - TIMOTHY CHRISTIAN ROELOFS

View Set

Principles of Biology Lab 1 (DNA Biology & Technology)

View Set

PHYS 1303, Chap. 2, Homework, Prof. Kaim, DMC

View Set

Course Point Fund. of Nursing- CH. 20

View Set

Chapter 15 Mastering Homework+Practice Test

View Set

Chapter 15: Scalp Care, Shampooing, and Conditioning

View Set

IT213 Mid term Exam Study Guide 1-3

View Set