MIS chapter 1 quiz

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

In 2000, operating a basic internet application cost businesses approximately ________ per month. In mid-2016, operating the same application in Amazon's cloud cost approximately ________ per month.

$150,000 $1,000

Current U.S. laws award patents for ________ years and copyright protection for ________ years.

20; life+70

More than ________ percent of American adults only have dial-up Internet access; this ________ a form of broadband Internet access.

30; is not

Porter's competitive forces model identifies ________ major forces that can endanger or enhance a company's position in a given industry.

5

________ causes pop-up advertisements to appear on your screen.

Adware

________ is an incremental approach that focuses on reducing variation in the process outputs by searching for the root causes of the variation in the process itself or among process inputs.

BPI

Many organizations find ________ too difficult, too radical, too lengthy, and too comprehensive.

BPR

________ uses a "clean sheet" perspective.

BPR

XYZ Inc. scanned the fingerprints of all of their employees and now uses these fingerprints to authenticate their employees and grant them access to different areas of the company's facilities. XYZ Inc. is utilizing which type of technology?

Biometrics

________ discovered a unique cryptographic key that triggered an unlock command for Onity hotel locks; ________ used computer code to rob hotel guests around the United States.

Brocious; cashatt

CHAPTER 2

Chapter 2

CHAPTER 3

Chapter 3

CHAPTER 4

Chapter 4

The MIT Technology Review refers to 18-22 year olds as Homo__________

Conexus

________ is a consultative function of the MIS department.

Creating business alliances with business partners

Dyn is a cloud-based internet performance management company that provides DNS services for internet websites. It was attacked with ________ in 2016.

DDoS

Hackers would use a botnet to perform a ________.

DDos

________ support(s) all managers of the organization by providing rapid access to timely information and direct access to structured information in the form of reports.

Dashboards

________ attempt(s) to duplicate work of human experts by applying reasoning capabilities, knowledge, and expertise within a specific domain.

ES

_____________ is NOT a problem caused by computers.

Ergonomics

________ occurs when an unauthorized individual attempts to gain illegal access to organizational information.

Espionage

Which of the following is a property issue?

How much should companies charge for permitting access to information in their databases? What information about individuals should be kept in databases, and how secure is the information there? Under what circumstances can one use proprietary databases? How can we ensure that errors in databases, data transmissions, and data processing are accidental and not intentional?

Which of the following is a property issue?

How should we handle illegally copying copyrighted software?

The ________ manages all systems throughout the organization and the day-to-day operations of the entire IS organization.

IS director

IT services, IT personnel, and IT components make up the organization's

IT infrastructure

________ is an example of effectiveness.

Increasing customer satisfaction

________ is a societal pressure.

Protection against terrorist attacks

Which of the following is NOT a benefit of IT?

Quantity of leisure time

A(n) ________ supports the monitoring, collection, storage, and processing of data from the organization's basic business transactions, each of which generates data

TPS (transaction processing systems)

What does recent data from the U.S. Census Bureau indicate about consumer habits?

The majority of shopping takes place offline, in brick-and-mortar stores.

Amazon is entering the freight forwarding business.

True

________ made Uber's first self-driving cars that arrived in Pennsylvania in 2016

Volvo

IBM developed ________ to answer questions on the quiz show Jeopardy!

Watson

________ is an IT system that uses natural language processing and machine learning to reveal insights from large amounts of data. It has transformed many industries including healthcare and customer service.

Watson

You get a new smartphone and throw your old one away without erasing all your data. This is ________ and is an ________ mistake.

a human error; unintentional

If you accept the potential risk, continue operating with no controls, and absorb any damages that occur, you have adopted a risk ________ strategy.

acceptance

Suppose you only study two hours for your next test. You fail the test and tell the teacher that he or she obviously did a really terrible job teaching the material. This means you aren't accepting ________ for your actions.

accountability

You can check your credit report annually for free through TransUnion, Equifax, and Experian. This allows you to catch signs of identity theft early and note any problems in your credit reports. This is an example of an ethical issue that falls into the category of ________.

accuracy

________ issues involve the authenticity, fidelity, and correctness of information that is collected and processed.

accuracy

________ uses machine learning to analyze passenger behavior and provide personalized recommendations.

carnival Corporation

A ________ site provides only rudimentary services and facilities.

cold

Obamacare was created to address the ________ approach.

common good

The IT ________ are/is the IT platform.

components

________ involves companies providing standard specifications for different consumer groups.

consumer segmentation

In the ________ phase of BPI, the BPI team establishes process metrics and monitors the improved process after the solution has been implemented to ensure the process performance remains stable.

control

Which of the following is in the current order starting with the most elementary?

data, information, knowledge

When you map out how your business currently processes customer orders to figure out how to reduce delivery time, this is part of the ________ phase of BPI.

define

________ is the result of optimizing the marketing and innovation processes.

differentiation

The goal of whaling is to trick a(n) ________ into revealing personal or corporate data.

executive

Photo tagging is a type of _________ technology.

facial recognition

The debate over CEO salaries being so much higher than other employees is an issue addressed by the ________ approach.

fairness

According to Facebook executives, the Facebook and Cambridge Analytica scandal occurred because hackers got access to the database by stealing key passwords from users.

false

As anticipated by Aadhaar's opponents, the Supreme Court found that Aadhaar violates privacy rights.

false

Data and information are synonyms

false

You check your credit report annually to ensure your identity hasn't been stolen. This is an example of a property issue.

false

Winemakers have turned to drones to combat ________.

global warming

American companies can easily do business with Chinese companies. This is phenomenon is called ________.

globalization

Your student ID is an example of something the user ________.

has

As teams have begun utilizing available technologies to help steal signs, challenge calls, and in general, assist in various aspects of the game, MLB ________.

has to adapt rules and regulations, such as limiting access to live game broadcast and not replay footage

Online advertising has caused newspapers to ________ subscription prices and ________ advertising rates.

increase, decrease

The IS function has become ________ strategic within organizations, so a growing number of CIOs are coming from ________.

increasingly; other business units

________ are materials, services, and information that flow through and are transformed as a result of process activities.

inputs

Biometrics is an example of something the user ________.

is

You decide to specialize in marketing for your first career. You take an entry-level position as XYZ Corp. This means you are a ________.

knowledge worker

________ are professional employees such as financial and marketing analysts, engineers, lawyers, and accountants.

knowledge workers

Ransomware negatively affected the city of Atlanta in many ways. Which vulnerability was the main cause of the problems?

lack of management support

Suppose you slip in the hallway and break your arm. You sue the school for not properly marking the wet spot that caused you to slip. This is an example of ________.

liability

Buyer power is high when buyers have ________ choices from whom to buy and low when buyers have ________ choices.

many; few

Supplier power is high when buyers have ________ choices from whom to buy and low when buyers have ________ choices.

many; few

________ is the current strategy for many manufacturers where a company produces a large quantity of items but customizes them to match the needs and preferences of individual customers.

mass customization

In the ________ phase of BPI, the BPI team identifies relevant process metrics and collects data to understand how the metrics evolve over time.

measure

Europeans and privacy advocates prefer the ________ model of informed consent.

opt in

Companies prefer the ________ model of informed consent.

opt out

The ________ model of informed consent permits the company to collect personal information until the customer specifically requests that the data not be collected.

opt-out

Sarah received an email that claimed to be from her bank. The email asked her to provide her password. Sarah later found out that the email was not from her bank and that she had given sensitive information to someone who gained access to her accounts. This is an example of a ________.

phishing attack

________ controls prevent unauthorized individuals from gaining access to a company's facilities.

physical

Cambridge Analytica's data collection of Facebook users has been used to impact and affect which area the most?

politics

The best-known framework for analyzing competitiveness is ________'s competitive forces model.

porter

Intellectual property is NOT protected under ________ laws.

privacy

Freightos allows shippers to ___________

receive bids from freight forwarders

________ are people and equipment that perform process activities.

resources

The pursuit of the "American dream" and our ability to choose our religious orientation is a reflection of the ________ approach.

rights

________ is a deliberate act that involves defacing an organization's website, potentially damaging the organization's image and causing its customers to lose faith.

sabbotage

Procurement processes are NOT completed by ________

sales

________ is an attack in which the perpetrator uses social skills to trick or manipulate legitimate employees into providing confidential company information such as passwords.

social engineering

Some are concerned that the use of Aadhaar's information will further impede ________.

social mobility

________ is pestware that users your computer as a launch pad for unsolicited e-mail, usually advertising for products and services.

spamware

A(n) ________ interfaces between users and programmers and determines information requirements and technical specifications for new applications.

systems analyst

The BYOD phenomenon is a ________ pressure.

technology

One of the major roadblocks for installation of broadband fiber-optic lines in rural areas is ________.

that streamlined FCC rules for installation only apply to Internet Service Providers and telephone and cable companies, and not county agencies, making the process more convoluted and lengthy

Auditing ________ the computer means auditors check inputs, outputs, and processing.

through

Your company decides to purchase security insurance from Travelers Insurance in case your systems get hacked and employee information is stolen. This is an example of risk ________.

transference

Business executives often know little about IT, and IT executives understand the technology but may not understand the real needs of the business.

true

Privacy advocates are not questioning whether Axon's software will transform the legal and lethal limits of policing but how it will change policing and who will profit the most from these changes.

true

The IT components make up the IT platform

true

The internet makes customers more powerful.

true

privacy rights apply to individuals, groups, and institutions

true

Cybercrime is typically nonviolent but lucrative.

truthful

Cyberterrorism is typically carried out by individuals or groups whereas cyberwarfare is carried out by nation states or nonstate actors such as terrorists.

truthful

IT security is the business of everyone in an organization.

truthful

One thing that the popularity of open source and online studying resources has uncovered is that what learning looks like in many areas of study has drastically changed.

truthful

Minimizing the organization's carbon footprint and otherwise striving for "green IT" is an example of a ________ approach.

utiliarian

The ________ approach states that an ethical action is the one that provides the most good or does the least harm.

utilitarian


Set pelajaran terkait

YCIHS Intensive Reading—Greek and Latin Roots (use with IXL.com)

View Set

Microeconomics Chapter 6: Taxes and Subsidies

View Set

Bus Law Ch 14 Business Organizations

View Set

Specialized Life Insurance Policies

View Set

Chapter 17 Multiple Choice Questions

View Set

Reality Shock PP Transition into RN

View Set

Environmental systems and societies units 1 and 2 (and parts of 3)

View Set