MIS Exam 1
During the early formation of the United States, mini influential writings criticizing British rule were published without the real names of their authors. These publications represented a form of
Anonymous expression
Autumn develops a strategic plan that will allow her organization to take advantage of opportunities and trends by
Being proactive
To successfully fight computer crime in a court of law, prosecutors and victims depend on a properly handled
Computer forensics investigation
How is data governance different from data management?
Data governance is the core component of data management
Hailey needs to query her firm's Database, Jeff needs to generate a report for his next project status meeting, and Karen needs to make some modifications to update the data in the database. Which of the following tools can they all used to complete their assigned task?
Data manipulation language
The following DBMS query is an example of what resource provided with a DBMS? SELECT * FROM Employee WHERE job_classification-"C2"
Data manipulation language
A companies risk assessment process can consider numerous threats to the computers and networks. Which of the following should an organization identify as loss events or threats to assess?
Distributed denial of service attack, email attachment with harmful worm, harmful virus. (All of the above)
Are people who work directly with information systems to get results
End users
You might be a successful information systems worker if you
Enjoy learning new techniques and enjoy working with people
An IS manager is focusing on the people component of Levitt's diamond when he or she
Ensures that the IS helpdesk is available during work hours
Which type of information system to organizations used to find structured interactions among employees or between the organizational an external customers, suppliers, or business partners?
Enterprise information system
Laws and regulations have thoroughly address concerns about privacy and data management and private organizations and federal agencies. T/F
False
The SQL query below will only return the product ID and the total inventory for any product whose total on hand value is greater or equal to five. T/F SELECT product_id ,total_on_hand + total_on_order From retail.inventory WHERE total_on_hand <=5
False
The SQL statement SELECT * FROM retail.inventory Will return only half of the column from the inventory table. T/F
False
To collections of attributes can have a common primary key. T/F
False
Today due to security concerns most organizations avoid the database approach to data management or multiple information systems share a pool of related data. T/F
False
Users still need help from the IT function of the organization to create custom reports using modern reporting tools. T/F
False
When you receive a text message there is a problem with your bank account and you were required to click on a link to submit some information, you are likely facing a vishing attack. T/F
False
Which amendment protects Americans right to freedom of religion, freedom of expression, and freedom to assemble peacefully?
First
Americans rights to freedom of religion, freedom of expression, and freedom to assemble peacefully are protected by the
First amendment
And IS manager recommends that his organization invest in improving it's customer information system so I asked more clearly defined the target market and improve service to that market. Which business strategy does this represent?
Focus
What is Hadoop and what two primary components make up the Hadoop computing environment?
Hadoop There's an open source software framework including several software modules that provide a means for storing and processing extremely large data sets. Two primary components are a data processing component and a distributed file system
In which step of the ethical decision making process is it essential to communicate well with all stakeholders and have someone they trust and respect explain why things are changing and how this will benefit them?
Implement the decision
A database system that stores entire database and random access memory is known as a
In memory database
Which element is not part of the CIA triad?
Integration
Hey successful IS manager recognizes that sustaining a competitive advantage
Means evolving to account for changes in customer needs
Pam your new marketing manager is exploring the purchase of tens of thousands of email addresses from a legitimate source for the purpose of sending product information to the masses. She has asked your opinion. Would you agree or disagree with her idea? Why or why not?
No, because it is illegal the legitimacy of the emails could be an issue and your reputation could suffer greatly.
A type of memory who's contents or not lost if the power is turned off or interrupted is said to be
Non-volatile
Compared with the traditional licensing model in which users purchase and install software, SaaS
Offers less expensive upgrades and new releases
Ethical business practices
Often raise and organizations priority with suppliers another business partners
These days the biggest threats to IT security are from
Organized groups that have ample resources including money and sophisticated tools to support their efforts
While conducting a security self-assessment of his personal laptop use, van realizes that he's putting himself at risk by
Putting off installing available software updates that he has been notified about
A collection of characteristics that belong to a single person, place, or thing for which data is maintained is a
Record
Big data veracity is a measure of
The accuracy completeness and currency of the data
The GDP our obligates organizations that operate in the European Union to obtain consent of the people they collect information about. T/F
True
US federal law permits employers to prevent viewing of pornography in the workplace by employees. T/F
True
High quality data on the operations of the business is the primary ingredient of any effort to improve
Worker efficiency or service quality
Describe the electronic product environmental assessment tool (EPEAT)
A system that enables purchasers to evaluate compare and select electronic products based on a total of 51 environmental criteria.
Describe two major perspectives on the role information systems play in supply chain management activities
A traditional view of information systems holds that organizations use information systems to control and monitor processes and to ensure effectiveness and efficiency. A more contemporary view however holds that information systems are often so intimately involved that they are part of the process itself.
Which is a true statement regarding self-service BI and analytics?
A well-managed program allows technology professionals to retain ultimate data governance
Your company has acquired joggers POC a smaller company. The integration of the information systems can take up to six months and until then joggers PLC workers will continue following their policies. You have been Tasked with ensuring that their IT practices will be safe and lead to a secure system. What advice would you give your manager regarding information security?
Authentication message being placed on sure that only does verify the access information can do so. A firewall should also be installed and share the security of the organizations access policy.
Which of the following is a provision of the USA patriot act?
Authorization of snack and peak warrants for law-enforcement agencies
Because they must deal with large quantities of data from so many different sources, I asked employees at financial institutions maybe at increased risk of failing to comply with government regulations designed to prevent money laundering, such as the the
Bank secrecy act
A slight majority 52% of 700 CIOs surveyed reported that there I S organization is viewed as a a
Business partner or peer
Assessing damage following a computer incident, investigating the unauthorized disclosure of corporate confidential data, and confirming or evaluating the Impact of industrial espionage are tasks most appropriate for
Computer forensics
What discipline combines elements of law in computer science to identify collect, examine and preserved at it from a computer systems networks and storage devices in a manner that preserve the integrity of the data gathered so that it is admissible evidence in a court of law?
Computer forensics
Because Marcus works within an I S organization viewed as a cost center in service provider buy the rest of his organization, one of his major goals is to
Consolidate IS resources and eliminate redundant functions
A Senior IS manager implements a vendor managed inventory system that reduces both the administrative costs of managing inventory in inventory holding costs. What business strategy does this represent?
Cost leadership
A high-level IS manager has his firm utilize sophisticated information systems to digitally design its products so that design defects can be detected and removed early in the process, reducing development costs. What business strategy does this represent?
Cost leadership
I seen your I S manager decides to invest in an information system that will reduce subcontractor labor cost for her organization by facilitating relocation of tools and materials to more optimal locations while rearranging workflows. What business strategy does this represent?
Cost leadership
Which of the following activities does the USA patriot act define?
Cyberterrorism
Raw fax such as a Social Security number or catalog item number for a shirt are known as
Data
Walter mentions to his manager that it would simplify the maintenance of their farms relational database if Changes made to data attributes in a single table would automatically be made throughout the database. What would best achieve this?
Data normalization
A tier 3 or 4 Data Center would be most necessary for an organization with which characteristic?
Dependent on computers to manage manufacturing operations
And upper level I asked manager propose that his organization implement a system to consolidate shipping and exception data from multiple carriers so that consumers know when they purchase will ship and when it will arrive. What business strategy does this represent?
Differentiation
Never send sensitive personal data such as credit card numbers, bank account numbers, or passwords via text or IM; only send them through websites that don't begin with HTTPS or cause a padlock icon to appear in the address bar or status bar. T/F
False
New technology innovation is rarely influence in organizations information system strategic plan since it is so strongly determined by corporate strategy. T/F
False
REM stands for random access memory form a memory that holds its contents even if the current is turned off or disrupted. T/F
False
Solid-state storage devices SSDs store data in hard drives or optical media rather than memory chips. T/F
False
Suppose a manager wishes to analyze historical trends in sales. He would use the online transaction processing OLTP system. T/F
False
The American recovery and reinvestment act title XIII helped establish the national fraud alert system to help prevent identity theft. T/F
False
A DaaS Arrangement can be especially cost effective for businesses that
Have fluctuating needs for database storage capacity
Although Roberta had signed a form preventing her doctor from sharing a personal medical records with the company she worked for, she later discovered that the doctors office had, in fact, shared her data with her health insurance provider in her employer, which caused her to be terminated. Because the doctors practice violated its own privacy policy, she was able to file a lawsuit under the
Health insurance portability and accountability act (HIPAA)
Rigorous management processes are needed to govern data in order to
Inform key business decisions with high-quality data
High quality data can increase sales by facilitating cross-selling which involves
Inviting customers to purchase an item related to what they are primarily interested in
Violating the European Union general data protection regulations and guidelines will most likely increase a successful cyber attacks
Legal consequences
Carsons supervisor has asked him to review a variety of affordable computers for possible purchase for their companies employees. Which of the following should Carson NOT consider buying?
Nettops
Is/are considered to be the most important element in computer-based information systems
People
Bubba creates a web application that allows his coworkers to generate reports providing information on sales, cost, and inventory that they need for their job functions without assistance. Bubba has developed a
Personal information system
CPU clock speed is the predetermined rate at which the processor
Produces a series of electronic pulses
Alli has noticed that people at her Company spend a lot of time researching the reasons for and correcting errors in the data they must use for their job functions. Usually when a mistake is discovered, it has already been propagated into multiple places, requiring a considerable cleanup effort. Alli realizes that improving the quality of the data at her firm will change this situation by
Raising productivity
After a successful Cybertek the fun spent on repairing affected systems, restoring loss data, and performing a post incident analysis are considered part of the
Recovery cost
Business analytics certifications in high demand include
SAP business objects, Hadoop, and Ruby on Rails
Why does the process of building software for safety critical systems take much longer and cost much more than building software for high-quality systems?
Safety critical systems are those whose failure may cause human injury or death. Software developers working on safety critical systems must be highly trained and experienced professionals. Extreme measures must be taken to identify and remove software defects from the earliest stages of development.
Hardware utilization can be improved biologically dividing the resources of a single physical server to create multiple logical servers. This approach is known as
Server virtualization
Why would Claire who has It's notified information system security professional credential, object to shadow IT efforts at her company?
Shadow IT systems and processes me like necessary levels of security required to meet compliance standards
Amazons decision to explore the possible use of delivery drones to gain a real competitive advantage over competitors who rely on less efficient ground transportation is an example of
Strategic planning
Which component of Levitt's diamond defines roles Responsibilities and lines of authority among members of the organization which must be understood and excepted for the organization to operate successfully?
Structure
Felicity who works at a bank opens multiple credit card accounts for customers without their authorization in order to improve her customer sales and thus her a parent job performance. This behavior is explicitly for bidden by bank policies and instructions for manager gave her which statement is true in this situation?
The bank can be held responsible for Felicity's behavior despite its ethical policies
Define Internet censorship and explain how it can be imposed at several different points between the speaker and his or her audience.
The control or suppression of the publishing or accessing of information on the Internet. Government entities may pressure upstream Internet service providers to limit access to certain websites. Websites reject the use of certain keywords and search engine searches and track and monitor the Internet activities of individuals.
A health insurance firm is hit by a successful cyber attack. The value of the assets stolen or damaged due to the cyber attack is considered
The direct impact of the cyber attack
One of the advantages of off the shelf software is that
The initial cost is lower because the software firm can spread the development costs ever many customers
Kennedy's company is adopting a service oriented architecture approach to software development. This means that
Their software will be flexible enough to allow the addition of new services
Describe to ethical dilemmas that often confront developers working on safety critical software.
They must carefully weigh cost and ease of use issues in developing a system that is safe and that also appeals to customers. Another key issue is deciding when sufficient software testing has been performed.
Government entities may pressure upstream Internet service providers to
Track and monitor the Internet activities of individuals
A database management system DBMS serves as an interface between an application program and a database. T/F
True
An employee who is about to be laid off by his organization since threatening emails to his boss stating he he is going to delete sensitive data. This employee can be charged under the computer fraud and abuse act. T/F
True
Downloading games from unknown websites can be risky. The software may be a Trojan horse. T/F
True
If an IS organization is viewed as a cost center/service provider, it's strategic planning process is typically directed in word and focused on determining how to do what it is currently doing but doing it cheaper, faster, and better. T/F
True
In many cases good ethics can mean good business and improved profits. T/F
True
It is possible to restrict access to data depending on the database users privileges. T/F
True
One of the primary roles of a senior IS manager is to provide subordinates with leader ship and direction that will help the organization achieve its goals. T/F
True
Secondary storage can store large amounts of data, instructions, and information more permanently than allowed with my memory. T/F
True
Software as a service allows businesses to subscribe to web delivered business application software by paying a monthly service charge or a per use fee. T/F
True
Some organizations choose to practice a form of Internet censorship by installing Internet filters on their employees computers to prevent them from viewing sites containing pornography or other objectionable material. T/F
True
The American recovery and reinvestment act title XIII include strong privacy provisions were electronica health records (EHRs) T/F
True
When a computer security incident occurs, it is recommended that the organization not reveal all they know in public forums. T/F
True
With the launch of windows 10 Microsoft and I said it would publish on going incremental upgrades instead of releasing new versions of the software every few years. However I asked professionals can opt out of frequent updates if they believe that making minimal changes well I'm sure reliable operations. T/F
True
You are given the database information: retail. Inventory, retail represent the database schema and inventory represent the table from the retail schema. T/F
True
Your friend has a Mac that runs OSX. If she needs to run a Windows app on it she can set it up to run windows also. T/F
True