MIS Exam 1
The amount of data produced worldwide is increasing by ___% each year. 10 50 90 It is not increasing at all.
50
Which of the following is not an example of a weak password? IloveIT 08141990 9AmGt/* Rainer InformationSecurity
9AmGt/*
_____ is a feature that must be offered by a competing organization in order to survive in the marketplace. Competitive advantage An entry barrier Strategic advantage Rapid time-to-market One-to-one marketing
An entry barrier
A(n) _____________ is a computer program designed to support a specific task or business process. Interface Application Functional area Network Database
Application
Jun is getting ready to open a store in her home town to sell unique lamp bases and shades. She has bought a laptop to use in the store for all of her operating needs. One of the first applications she needs is one to handle her accounting and checkbook. How might she obtain such an application? Open-source software Software-as-a-Service Object-oriented software Application software package Open systems
Application software package
The set of computer instructions that provides specific functionality to a user is called: Transaction processing software. Application software. General software. Systems software. Microcode.
Application software.
Which of the following is not stored in primary storage? Data to be processed by the CPU Instructions for the CPU as to how to process the data Archival data Operating system programs All of the above are stored in primary storage
Archival data
Which of the following statements is not correct? Employees have limited protection against surveillance by employers. The large majority of organizations monitor employee Internet usage. The large majority of organizations use URL filtering. As with normal first-class mail, employers cannot read employee e-mail. Employees should be aware that surveillance is legal.
As with normal first-class mail, employers cannot read employee e-mail.
Refer to IT's About Business 3.3 - Google Glass: Big Brother Really Is Watching You: Which of the following is true about the privacy issues surrounding the use of Google glass to record audio and visual information? It is possible to get the consent of everyone who is being recorded Audio and visual recordings from Google Glass can be used for any purpose, including legal proceedings Audio and visual recordings data are solely the property of Google Users of Google Glass have to announce to the public if they are going to record or photograph anything
Audio and visual recordings from Google Glass can be used for any purpose, including legal proceedings
Organizations use hot sites, warm sites, and cold sites to insure business continuity. Which of the following statements is not true? A cold site has no equipment. A warm site has no user workstations. A hot site needs to be located close to the organization's offices. A hot site duplicates all of the organization's resources. A warm site does not include actual applications.
A hot site needs to be located close to the organization's offices.
Which of the following statements concerning business processes is false? A process has inputs. A process has outputs. A process has activities that can be measured. A process creates value. A process cannot cross functional area boundaries.
A process cannot cross functional area boundaries.
A pharmaceutical company's research and development plan for a new class of drugs would be best described as which of the following? Copyrighted material Patented material A trade secret A knowledge base Public property
A trade secret
Development in software technologies result in Increased competition from established industry rivals Increased competition from new entrants into the industry Increased competition from new entrants offering substitute products or services A and B only A, B and C
A, B and C
_____ controls are concerned with user identification, and they restrict unauthorized individuals from using information resources. Access Physical Data security Administrative Input
Access
_____ issues involve who may obtain information and how much they should pay for this information. Privacy Accuracy Transferability Property Accessibility
Accessibility
Shelli runs a small boutique in Tel Aviv. She has built up a very nice client base and regularly sends her clients a newsletter. She keeps all her client data on her laptop in a password-protected file. Her decision to protect the file reflects which ethical issue related to IT? Privacy Accuracy Accountability Property (such as intellectual property) Accessibility to information
Accessibility to information
Which of the following is not an ethical issue related to IT? Privacy Accuracy Accountability Property (such as intellectual property) Accessibility to information
Accountability
______________ determines who is responsible for the actions taken. Privacy Responsibility Transferability Accountability Liability
Accountability
Reconciling bank accounts is an example of a(n): Accounting Business Process Finance Business Process Marketing Business Process Production Business Process Management Information Systems Business Process
Accounting Business Process
_____ issues involve the authenticity and fidelity of information that is collected and processed. Privacy Accuracy Transferability Property Accessibility
Accuracy
What is the relationship between advances in information technology and the practice of profiling? Advances in IT make it more difficult to profile individuals. Advances in IT have no impact on profiling. Advances in IT make it more expensive to profile individuals. Advances in IT make it easier to profile individuals.
Advances in IT make it easier to profile individuals.
The term _____ refers to clandestine software that is installed on your PC through duplicitous channels but is not particularly malicious. Alien software Virus Worm Back door Logic bomb
Alien software
Data dictionaries provide which of the following advantages to the organization? They reduce data inconsistency. They enable faster program development. They make it easier to modify data and information. Only B and C All of the above
All of the above
Increased microprocessor complexity results from which of the following? Decreasing line width Increasing transistor miniaturization Using new materials for the chip that increase conductivity Putting more transistors on the chip All of the above
All of the above
Primary storage stores which of the following for very brief periods of time? Data to be processed by the CPU Instructions for the CPU as to how to process the data Operating system programs that manage various aspects of the computer's operations All of the above
All of the above
Refer to Closing Case: Baxter: Coming to Work Right Next to You Modern industrial robots must be suited to the following situations: They can be used in the same production line as human workers They can easily be modified to learn new tasks They should be low cost and easy to install A and C only All of the above
All of the above
Secondary storage has which of the following characteristics? It is nonvolatile. It is more cost effective than primary storage. It is slower than primary storage. It can utilize a variety of media. All of the above
All of the above
The amount and type of memory that a computer possesses affects which of the following? The type of program the computer can run The speed of the computer The cost of the computer The cost of processing data All of the above
All of the above
The main types of primary storage are: Register. Random access memory. Cache memory. Read-only memory. All of the above
All of the above
Today, software comprises a larger percentage of the cost of modern computer systems than it did in the early 1950s. Which of the following reasons account(s) for this development? Hardware costs have decreased. Hardware performance has increased. Software has become increasingly complex. Building software applications remains slow, complex, and error-prone. All of the above
All of the above
Which of the following is not a strategy for mitigating the risk of threats against information? Continue operating with no controls and absorb any damages that occur. Transfer the risk by purchasing insurance. Implement controls that minimize the impact of the threat. Install controls that block the risk. All of the above are strategies for mitigating risk.
All of the above are strategies for mitigating risk.
Cybercriminals can obtain the information they need in order to assume another person's identity by: Infiltrating an organization that stores large amounts of personal information. Phishing. Hacking into a corporate database. Stealing mail. All of the above are strategies to obtain information to assume another person's identity.
All of the above are strategies to obtain information to assume another person's identity.
Business pressures on organizations are created when there are changes in Social factors Economic factors Legal factors Political factors All of the above will create business pressures.
All of the above will create business pressures.
Which of the following is not a reason why managing data is difficult over time? New systems are developed. The media the data are stored on becomes problematic. New sources of data are created. The amount of data increases exponentially. All of these are reasons why managing data is difficult over time.
All of these are reasons why managing data is difficult over time.
Which of the following is not a step in ethical decision making? Recognize the ethical issue. Get the facts. Evaluate alternative actions. Make a decision and test it. All of these are steps in ethical decision making.
All of these are steps in ethical decision making.
Which of the following statements is false? An application is a computer program designed to support a specific business process. Each functional area within an organization has only one application. A functional area information system is the same as a departmental information system. A functional area information system can obtain data from other functional area information systems. App, application, and application program all mean the same thing.
Each functional area within an organization has only one application.
Which of the following is not a role that information systems play in businesses processes? Establish standards Execute the process Capture and store process data Monitor process performance Detect problems with the process
Establish standards
In your new position, you are told that you will be working with a business analyst. What would you expect this work to entail? Review computer code Explain the business process Test programs Identify new technology that might benefit the organization Create Web sites and pages
Explain the business process
The _____________ ethical standard states that ethical actions treat all human beings equally. Common good Fairness Rights Utilitarian Well-being
Fairness
A VPN is a network within the organization. True False
False
A mainframe is a type of server. True False
False
A password refers to "something the user is". True False
False
A supercomputer is the term given to the latest technology. True False
False
An individual or organization faced with an ethical decision is basically considering whether to break the law. True False
False
As hardware costs have decreased over the past 20 years, software costs have also decreased. True False
False
Computer code is generally efficient, well designed, and contains very few errors. True False
False
Computer hardware and software are designed to be general purpose. True False
False
Computers can run any type of program regardless of the amount and type of memory that the computer has. True False
False
Cyberterrorism is usually carried out by nations. True False
False
Dumpster diving is always illegal because it involves trespassing on private property. True False
False
Having one backup of your business data is sufficient for security purposes. True False
False
If your computer loses its power supply, you will not lose the contents of your random access memory, because it is not volatile. True False
False
Improvements in information technologies are leading to a decreasing number of ethical problems. True False
False
In general, employees have high legal protection against surveillance by employers. True False
False
Magnetic tape provides faster access to data than magnetic disks. True False
False
Microcontrollers are computer chips that are embedded in products and technologies of various types and sizes. True False
False
Off-the-shelf application software consists of specific software programs developed for a particular company by a software vendor. True False
False
Risk analysis involves determining whether security programs are working. True False
False
Sequential access is a type of data access that is associated primarily with magnetic disks. True False
False
Supervisory control and data acquisition (SCADA) systems require human data input. True False
False
The "safe harbor" framework details how the European Union exports data about U.S. citizens. True False
False
The cost per megabyte of storage is greater for traditional hard disk storage than for PC memory cards. True False
False
The individual's right of privacy supersedes the public's right to know. True False
False
The mouse is the most common input device. True False
False
The right of privacy is absolute. True False
False
The security of each computer on the Internet is independent of the security of all other computers on the Internet. True False
False
The user interface is the most sophisticated on enterprise operating systems and the least sophisticated on desktop operating systems. True False
False
You start a dog-walking service, and you store your client's records on your cell phone. You don't need to worry about information security. True False
False
Zero-day attacks use deceptive e-mails to acquire sensitive personal information. True False
False
A(n) _____ is a logical grouping of characters into a word, a small group of words, or a complete number. Byte Field Record File Database
Field
A(n) _____ is a logical grouping of related records. Byte Field Record File Database
File
Managing account collections is an example of a(n): Accounting Business Process Finance Business Process Marketing Business Process Production Business Process Management Information Systems Business Process
Finance Business Process
Which of the following statements concerning firewalls is not true? Firewalls prevent unauthorized Internet users from accessing private networks. Firewalls examine every message that enters or leaves an organization's network. Firewalls filter network traffic according to categories of activities that are likely to cause problems. Firewalls filter messages the same way as anti-malware systems do. Firewalls are sometimes located inside an organization's private network.
Firewalls filter messages the same way as anti-malware systems do.
_____ are electronic storage devices that contain no moving parts. Hard drives Flash memory devices Streaming tape devices DVDs CDs
Flash memory devices
What does a systems analyst do? Manages an IS service Writes computer code Interfaces between end users and programmers Forecasts technology trends Creates Web sites and pages
Interfaces between end users and programmers
Which of the following is not a characteristic of secondary storage? It is nonvolatile. It is more cost effective than primary storage. It is slower than primary storage. It cannot utilize any media except chips. None of the above
It cannot utilize any media except chips.
The workforce in developed countries is exhibiting all of the following trends except: It is becoming more diversified. It includes more women. It includes more single parents. It includes fewer persons with disabilities. It includes more minority-group members.
It includes fewer persons with disabilities.
Which of the following is not a function of the operating system? It allocates CPU time and main memory to programs running on the computer. It provides an interface between the user and the hardware. It supervises the overall operation of the computer. It increases the complexity of the system to the user. None of the above
It increases the complexity of the system to the user.
Which of the following statements is false? Credit card companies usually block stolen credit cards rather than prosecute. People tend to shortcut security procedures because the procedures are inconvenient. It is easy to assess the value of a hypothetical attack. The online commerce industry isn't willing to install safeguards on credit card transactions. The cost of preventing computer crimes can be very high.
It is easy to assess the value of a hypothetical attack.
The characteristics of magnetic tape include all of the following except: It is the fastest magnetic storage medium. It is the cheapest magnetic storage medium. It provides sequential access to the data. It has greater storage capacity than thumb drives. It is often used for archival storage.
It is the fastest magnetic storage medium.
Which of the following is not a characteristic of today's typical software? It s efficient. It is full of errors. It is poorly designed. It is expensive. It is an art as well as a science.
It s efficient.
_____ are segments of computer code embedded within an organization's existing computer programs that activate and perform a destructive action at a certain time or date. Viruses Worms Trojan horses Back doors Logic bombs
Logic bombs
_____ are software programs that hide in other computer programs and reveal their designed behavior only when they are activated. Viruses Worms Trojan horses Back doors Logic bombs
Logic bombs
If you wished to store a large amount of archival data for a long period of time, you would choose which of the following? Magnetic disk Magnetic tape Read-only chips Cache chips Thumb drives
Magnetic tape
A _____ is used in large enterprises for extensive computing applications that are accessed by thousands of concurrent users. Supercomputer Mainframe Midrange computer Microcomputer Laptop computer
Mainframe
A ___________ is an example of a computer system that is designed to accommodate multiple users simultaneously. Microcomputer Mainframe Laptop Palmtop Wearable computer
Mainframe
Hyo runs an ice cream store with her family. Which of the following activities is a part of their fulfillment process? Receiving goods from their supplier Making ice cream Recording daily sales revenue Recording goods received Making a custom-order ice cream cake
Making a custom-order ice cream cake
Which of the following statements concerning the management of information resources is not true? They have an enormous strategic value within an organization and therefore are relied on. Information systems are expensive to acquire, operate, and maintain. Computers are decentralized throughout the organization, which makes it harder to manage. Managing mainframes has become more difficult. Managing information resources is divided between the MIS department and end users.
Managing mainframes has become more difficult.
Collecting sales tax is an example of a(n): Accounting Business Process Finance Business Process Marketing Business Process Production Business Process Management Information Systems Business Process
Marketing Business Process
Applying copyrights and trademarks is an example of a(n): Accounting business process Finance business process Marketing business process Production business process Management information systems business process
Marketing business process
_____ provide(s) companies with a single version of the truth for their data. Data warehouses Data marts Databases Master data management Enterprise information management
Master data management
Why are many organizations turning to NoSQL databases to manage big data? NoSQL databases do not allow for missing data NOSQL databases can process unstructured as well as structured data NoSQL databases have a finite amount of data they can handle NoSQL databases are less expensive than other databases
NOSQL databases can process unstructured as well as structured data
Which of the following statements concerning technology pressures on modern businesses is true? Technology changes so rapidly that organizations should wait before they release new technology-based products. New technologies offer alternative service options. New technologies will never replace existing technologies. The amount of information on the Internet remains stable from year to year. The important information on the Internet is fee-based.
New technologies offer alternative service options.
_____ is a method for analyzing and reducing a relational database to its most streamlined form. Structured query Normalization Query by example Joining Relational analysis
Normalization
The concept of _____ refers to competing computing products working together. Open-source software Software-as-a-Service Object-oriented software Application software packages Open systems
Open systems
_____ is software whose source code is available at no cost to developers and users. Freeware Shareware Open systems Open-source software Software-as-a-Service
Open-source software
The main system control program is the _____. Operating system Cache software Virtual memory Security monitor Multithread register
Operating system
Privacy advocates prefer which model of informed consent? Opt-in Opt-out Either A or B Neither A nor B
Opt-in
Which of the following is not a type of primary storage? Random access memory Registers Cache Read-only memory Optical
Optical
Shelli runs a small boutique in Tel Aviv. Her intern was checking the boutique's Facebook page and noticed some negative comments. He deleted them. At the end of the day, when they were closing up, he told Shelli about the comments and what he had done. Shelli was not pleased, and she told him so. Why wasn't Shelli pleased? She didn't like hearing anything negative about her store. People are free to say what they wish. She thought he should ask her before he deleted them. He wasn't supposed to be checking Facebook. All of these are reasons for Shelli's not being pleased.
People are free to say what they wish.
Jun is getting ready to open a store in her home town to sell unique lamp bases and shades. What kind of computer does she need at this point? Mainframe computer Server Supercomputer Personal computer iPad
Personal computer
Jun really likes your Apple iPad and wants to get one for her lamp business. What kind of computer would the iPad replace? Mainframe computer Workstation Server Personal computer Smartphone
Personal computer
A _____ attack uses deception to fraudulently acquire sensitive personal information by masquerading as an official e-mail. Zero-day Denial-of-service Distributed denial-of-service Phishing Brute force dictionary
Phishing
For the following entity-relationship diagram, what could the primary key be in the Grade entity? Untitled-2 Primary key in Student entity Primary key in Course entity Its own primary key. Primary key made up of the primary keys in Student entity and Course entity It doesn't need a primary key.
Primary key made up of the primary keys in Student entity and Course entity
_____ tell the database management system which records are joined with others in related tables. Primary keys Secondary keys Common attributes Common files Common fields
Primary keys
_____ activities create value for which customers are willing to pay, whereas _____ activities do not add value directly to the firm's products or services. Support, primary Human resource management, inbound logistics Procurement, operations Primary, support Accounting, outbound logistics
Primary, support
Shelli runs a small boutique in Tel Aviv. She accepts credit cards and writes the number on her copy of the receipt in case there is a problem later. This practice involves which ethical issue related to IT? Privacy Accuracy Accountability Property (such as intellectual property) Accessibility to information
Privacy
Shelli runs a small boutique in Tel Aviv. She has built up a very nice client base and regularly sends her clients a newsletter. A new bakery business down the block wants to buy Shelli's client list from her. If Shelli does sell the list, which ethical issue related to IT would be involved? Privacy Accuracy Accountability Property (such as intellectual property)
Privacy
Shelli runs a small boutique in Tel Aviv. She has built up a very nice client base and regularly sends her clients a newsletter. Clients fill out a form to join her mailing list. Shelli indicates on the form that client information will not be shared without permission. This policy illustrates which ethical issue related to IT? Privacy Accuracy Accountability Property (such as intellectual property) Accessibility to information
Privacy
_____ issues involve collecting, storing, and disseminating information about individuals. Privacy Accuracy Transferability Property Accessibility
Privacy
Refer to IT's About Business 5.3: Database Solution for the German Aerospace Center: The challenges associated with data collection from satellites include the following except: Capturing data in real time Storing data at the satellite Transferring data from the satellite to central databases Storing current and past data collected from the satellites Processing data to compare current and past information to predict future events
Processing data to compare current and past information to predict future events
Which of the following processes involves the warehouse, purchasing, and accounting functional areas? Procurement Fulfillment Order entry Accounts receivable Payroll
Procurement
Managing purchasing is an example of a(n): Accounting Business Process Finance Business Process Marketing Business Process Production Business Process Management Information Systems Business Process
Production Business Process
Shelli runs a small boutique in Tel Aviv. Her intern just came to her with a new design for her Web site. Shelli really likes the design, and she informs the intern that he is quite the artist. Section reference 1The intern responds that he found the design on the Internet. Shelli replies that they can't use it. Her decision reflects which ethical issue related to IT? Privacy Accuracy Accountability Property (such as intellectual property) Accessibility to information
Property (such as intellectual property)
Data dictionaries perform all of the following functions except: Providing information on each record. Providing information on why attributes are needed in the database. Defining the format necessary to enter data into the database. Providing information on the name of each attribute. Providing information on how often attributes should be updated.
Providing information on each record.
_____________ is(are) the part of primary storage that holds a software program (or a portion of it) and small amounts of data when they are brought from secondary storage. Read-only memory Random access memory Cache memory Registers Flash memory
Random access memory
Which of the following statements concerning the difficulties in protecting information resources is not correct? Computing resources are typically decentralized. Computer crimes often remain undetected for a long period of time. Rapid technological changes ensure that controls are effective for years. Employees typically do not follow security procedures when the procedures are inconvenient. Computer networks can be located outside the organization.
Rapid technological changes ensure that controls are effective for years.
The type of primary storage where certain critical instructions are safeguarded because the storage is nonvolatile and the instructions can be read only by the computer and not changed by the user is called: Read-only memory. Random access memory. Cache memory. Registers. Flash memory.
Read-only memory.
A(n) _____ is a logical grouping of related fields. Byte Field Record File Database
Record
Hyo runs an ice cream store with her family. Which of the following activities is a part of their procurement? Send an order to a supplier. Decide what to order. Record daily sales revenue. Record goods received. Send a check to a supplier.
Record daily sales revenue.
_____________ means accepting the consequences of your decisions and actions. Privacy Responsibility Transferability Accountability Liability
Responsibility
The ____________ ethical standard states that an ethical action is the one that best protects and respects the moral rights of the affected parties. Common good Fairness Rights Utilitarian Well-being
Rights
_____ is the process in which an organization assesses the value of each asset being protected, estimates the probability that it will be compromised, and compares the probable costs of an attack with the costs of protecting the asset. Risk management Risk analysis Risk mitigation Risk acceptance Risk transference
Risk analysis
Which of the following statements about IT's role in society is false? IT has created employee flexibility. Robots can do many routine tasks. Robots can handle unfamiliar situations. IT can be used to help doctors diagnose diseases. Telepresence robots can act as the eyes and ears of a business manager.
Robots can handle unfamiliar situations.
_____ are fields in a record that have some identifying information but typically do not identify the record with complete accuracy. Primary keys Secondary keys Duplicate keys Attribute keys Record keys
Secondary keys
Which of the following is not a component of the central processing unit? Registers Control unit Secondary storage Arithmetic-logic unit Keyboard
Secondary storage
Hyo runs an ice cream store with her family. Which of the following activities is a part of their procurement process? Recording their daily sales revenue Sending an order to their sugar supplier Making the ice cream Setting up an employee schedule Taking an order for an ice cream cake
Sending an order to their sugar supplier
Jun has been in business selling unique lamp bases and shades for two years in her first location. She is getting ready to open a second location two towns over. What kind of computer does she need at this point? Mainframe computer Server Supercomputer Personal computer iPad
Server
_____ involves building an inappropriate trust relationship with employees for the purpose of gaining sensitive information or unauthorized access privileges. Tailgating Hacking Spoofing Social engineering Spamming
Social engineering
In order to protect their software from illegal distribution, vendors often rely on _____. Secure packaging Private security agents Software licensing Internet-based distribution methods Personal honesty
Software licensing
Which of the following is not an example of the growing initiative called green IT? Designing an IT infrastructure to support sustainability. Building systems that monitor carbon throughout the organization. Asking vendors about compliance on environmental standards. Building computer applications that use less energy. Designing energy-efficient data centers.
Building computer applications that use less energy.
Which of the following statements is false? BPM begins with process modeling. Process modeling is a graphical depiction of all the steps in a process. BPM uses Web-enabled technologies for user interfaces. Business activity monitoring is used to measure and manage business processes. Business activity monitoring is a type of scheduled reporting.
Business activity monitoring is a type of scheduled reporting.
Jun has bought an accounting package for her business, which involves selling unique lamp bases and shades. She wants to hire some part-time help to assist her in implementing and becoming comfortable with the new software. Which of the follow skill sets would be the most beneficial for this worker to possess? Business processes Operating systems Programming languages HTML Open systems
Business processes
A(n) _____ represents a single character, such as a letter, number, or symbol. Byte Field Record File Database
Byte
Which of the following is not a source for external data? Commercial databases Corporate databases Sensors Satellites Government reports
Corporate databases
Data aggregators sell digital dossiers to companies that want to know their customers better. This practice is called ________. Customer relationships Customer profiling Customer intimacy Customer knowledge Spying
Customer intimacy
_____ occurs when various copies of the data agree. Data isolation Data integrity Data consistency Data redundancy Application/Data dependence
Data consistency
_____ is a formal approach to managing data consistently across an entire organization. Database management Enterprise information management Data warehousing Data governance Data mart
Data governance
You have moved to a different apartment, but your electricity bill continues to be sent to your old address. The Post Office in your town has which problem with its data management? Data redundancy Data inconsistency Data isolation Data security Data dependence
Data inconsistency
Not including alphabetic characters in a Social Security Number field is an example of _____. Data isolation Data integrity Data consistency Data redundancy Application/data dependence
Data integrity
_____ occurs when applications cannot access data associated with other applications. Data isolation Data integrity Data consistency Data redundancy Application/Data dependence
Data isolation
_____ occurs when the same data are stored in many places. Data isolation Data integrity Data consistency Data redundancy Application/Data dependence
Data redundancy
The process of profiling: Increases individual privacy. Decreases individual privacy. Has no effect on individual privacy. Is illegal in more than half of the states. Is legal but unethical.
Decreases individual privacy.
Which of the following is not a Section Reference 1 by organizations to business pressures? Delay releases of innovated products. Build strategic systems that enable an organization to increase market share or profits. Provide tools that satisfy customers so they don't go to a competitor. Manufacture customized goods at a lower cost. Conduct business electronically with customers and business partners.
Delay releases of innovated products.
Which of the following statements is correct? An individual's right to privacy is absolute. Determining and enforcing privacy regulations can be difficult. An individual's right to privacy supersedes the needs of society. Advances in information technologies have not affected individual privacy. The Internet has increased individuals' privacy.
Determining and enforcing privacy regulations can be difficult.
To access a specific piece of information, _____ are usually faster than _____. Sequential access storage devices, direct access storage devices Direct access storage devices, sequential access storage devices Streaming tape devices, DVDs Optical storage devices, random access memory Sequential access storage devices, thumb drives
Direct access storage devices, sequential access storage devices
_____ is(are) a written description of a computer program's functions. Explanatory instructions Documentation Graphical user interface Plug and play README files
Documentation
Ted works in his family's bakery business. They supply bread and rolls to neighboring restaurants, and they have their own store front where they sell breads, rolls, pastries, cookies and cupcakes. Ted wants to start a Cookie Club that gives each member (joining is free) a free cookie after they have purchased a dozen. This idea reflects which one of Porter's five competitive forces? threat of entry of new competitors bargaining power of suppliers bargaining power of customers threat of substitute products rivalry among existing firms in an industry
bargaining power of customers
In the relational database model, related tables can be joined when they contain common _____. primary keys rows records columns files
columns
Porter's _____ help(s) companies identify general strategies, whereas his _____ help(s) to identify specific activities where companies can use the strategies for greatest impact. value chain model, competitive forces model primary activities, support activities competitive forces model, primary activities competitive forces model, value chain model value chain model, support activities
competitive forces model, value chain model
Refer to IT's About Business 3.2 - The Dot Clones: It is easy to replicate online business models because of the following reasons eCommerce website and their business models are easy to replicate eCommerce websites can be easily sold and rebranded eCommerce websites do not require a large amount of investment eCommerce website cannot have a presence in more than one country
eCommerce website and their business models are easy to replicate
How does society keep owners of electronic bulletin boards from disseminating offensive or untrue content? This is a difficult question because it involves the conflict between _____ on the one hand and _____ on the other. the public, the individual the public, ethics freedom of speech, privacy the individual, freedom of speech ethics, security
freedom of speech, privacy
Porter's competitive forces model helps organizations identify _____, whereas his value chain model helps organizations identify specific _____. competitive opportunities, activities general strategies, activities activities, competitive opportunities activities, general strategies primary activities, support activities
general strategies, activities
Walmart's automatic replenishment system, which enables the company to reduce inventory storage requirements, is an example of which strategy for competitive advantage? cost leadership differentiation innovation operational effectiveness customer-orientation
cost leadership
When Amazon welcomes you by name back to its Web site on your second visit, it is employing which strategy for competitive advantage? cost leadership differentiation innovation operational effectiveness customer-orientation
customer-orientation
Rank the following in terms of dollar value of the crime, from highest to lowest. robbery - white collar crime - cybercrime white collar crime - extortion - robbery cybercrime - white collar crime - robbery cybercrime - robbery - white collar crime white collar crime - burglary - robbery
cybercrime - white collar crime - robbery
Which of the following is(are) designed to use your computer as a launch pad for sending unsolicited e-mail to other computers? Spyware Spamware Adware Viruses Worms
Spamware
_____ programs are often used to analyze financial data. Database Word processing Spreadsheet Graphics Communications
Spreadsheet
Buyer power is _____ when buyers have many choices from whom to buy and _____ when buyers have few choices. high, the same high, low low, low low, high low, the same
high, low
Today's customers have ________. less knowledge about products less sophistication difficulty in finding information about products higher expectations difficulty in comparing prices
higher expectations
Employees in which functional areas of the organization pose particularly grave threats to information security? human resources, finance human resources, management information systems finance, marketing operations management, management information systems finance, management information systems
human resources, management information systems
A _____ refers to the fastest computing engines available at any given time. Supercomputer Mainframe Midrange computer Microcomputer Laptop computer
Supercomputer
To model the weather or simulate nuclear weapons testing, you would most likely use a(n): Mainframe computer. Workstation. Supercomputer. Personal computer. Active badge.
Supercomputer.
Which of the following is not an advantage of open-source software? It produces high-quality code. It produces code that can be changed to meet the user's needs. Bugs are discovered quickly. Support is available only through online communities of core developers. It produces reliable code.
Support is available only through online communities of core developers.
The set of computer programs used to manage hardware resources is called: Microsoft Office Suite. Application software. General software. Systems software. Personal application software.
Systems software.
Refer to IT's About Business 1.3 - Different Types of Robots ______________ enable an individual to maintain a consistent connection with co-workers, customers, or clients. Drones Telepresence Robots Autonomous Cars Remote Sensors
Telepresence Robots
How does the Internet affect the way you purchase your textbooks? The Internet gives you fewer choices. The Internet increases your bargaining power. The Internet provides you with less information. The Internet decreases your bargaining power. The Internet increases your switching costs.
The Internet increases your bargaining power.
The data in a data warehouse have which of the following characteristics? They are organized by subject. They are coded in different formats. They are updated in real time. They are typically retained for a defined, but limited, period of time. They are organized in a hierarchical structure.
They are organized by subject.
Organizations are turning to data governance for which of the following reasons? They have too little data. They are responding to federal regulations. Their data are typically structured. Their data are usually located in the organization's databases. Data across their organizations are generally consistent.
They are responding to federal regulations.
Registers have all of the following characteristics except: They are a type of primary storage. They can store only extremely limited amounts of instructions and data. They provide the fastest storage. They are slower than RAM. All of the above are characteristics of registers.
They are slower than RAM.
Compared to data warehouses, data marts have which one of the following characteristics? They cost less. They have longer lead times for implementation. They provide for central rather than local control. They contain more information. They are more difficult to navigate.
They cost less.
Refer to IT's About Business 2.3 - "Bring Your Own Device" Can Cause Problems: Hamilton Fraser's human resource department created an acceptable use policy for their employees' personal communication devices for the following reason: They didn't want their employees wasting time playing games on their iPhones They didn't want the corporate data to be accessible on mobile devices that were lost/misplaced They wanted to monitor how their employees were spending their time They didn't want their employees to use social media while working They only wanted employees to use Android devices
They didn't want the corporate data to be accessible on mobile devices that were lost/misplaced
The most important benefit of knowledge management systems is: They improve customer service. They make best practices available to employees. They enable the organization to retain scarce knowledge when employees retire. They improve employee morale. They make product development more efficient.
They make best practices available to employees.
Which of the following is not a characteristic of strong passwords? They are difficult to guess. They contain special characters. They are not a recognizable word. They are not a recognizable string of numbers. They tend to be short so they are easy to remember.
They tend to be short so they are easy to remember.
_____ describe the activities of the business, whereas _____ categorize(s), aggregate(s), and evaluate(s) data generated by the organization's activities. Transaction data, master data Source data, transaction data Operational data, master data Master data, source data Business dimensional data, databases
Transaction data, master data
A URL that begins with https rather than http indicates that the site transmits using an extra layer of security called transport layer security. True False
True
A byte represents a particular alphanumeric character or a simple mathematical operation. True False
True
A code of ethics is a collection of principles that are intended to guide decision making by members of the organization. True False
True
A thin-client system is a desktop computer that doesn't have locally installed software. True False
True
An optical storage device is a form of secondary storage device on which data are recorded and read by laser in a computer's disk drive. True False
True
Application software cannot be run on computer hardware without systems software. True False
True
Companies who develop software for sale license that software for use to protect their product from being copied and distributed illegally. True False
True
Computer technologies become obsolete faster than other technologies in the organization. True False
True
Cyberterrorism and cyberwarfare can attack supervisory control and data acquisition (SCADA) systems to cause widespread physical damage. True False
True
Digital video disks (DVDs) have higher storage capacities than CD-ROMs. True False
True
Each generation of computer hardware has exhibited increased processing power and decreased costs. True False
True
Human errors cause more than half of the security-related problems in many organizations. True False
True
IT security is the responsibility of everyone in the organization. True False
True
In most cases, cookies track your path through Web sites and are therefore invasions of your privacy. True False
True
Laptop, notebook, and netbook computers cost more than desktops because of their portability. True False
True
Minicomputers are relatively small, inexpensive computers that perform the same functions as mainframe computers, but to a limited extent. True False
True
Open systems refers to a model of computer products - hardware, operating systems, and application software - that allow any computing device to be seamlessly connected to and interact with any other computing device. True False
True
Organizations use authentication to establish privileges to systems operations. True False
True
Organizations utilize layers of controls because they face so many diverse threats to information security. True False
True
Packaged application software addresses a specific or unique business need for a company. True False
True
Personal application software consists of widely used packages such as word processing, spreadsheet, communications, and graphics software. True False
True
Primary storage is the main memory of a computer, in which small amounts of data that will be used immediately are stored. True False
True
Public-key encryption uses two different keys, one public and one private. True False
True
Random access memory is that part of primary storage that holds a software program (or a portion of it) and small amounts of data when they are brought from secondary storage. True False
True
Software can be copyrighted. True False
True
Software consists of computer programs, which are sequences of instructions for the computer. True False
True
Software is typically quite complex. True False
True
Source data automation uses various technologies to input data with minimal human intervention. True False
True
The Platform for Privacy Preferences automatically communicates privacy policies between a commerce Web site and its visitors. True False
True
The area located between two firewalls within an organization is called the demilitarized zone. True False
True
The computing skills necessary to be a hacker are decreasing. True False
True
The flow of information among countries is called transborder data flows. True False
True
The higher the level of an employee in organization, the greater the threat that he or she poses to the organization. True False
True
The operating system supervises the overall operation of the computer. True False
True
The opt-out model of informed consent allows a company to collect personal information until the customers specifically requests otherwise. True False
True
Trojan horses are software programs that hide in other computer programs and reveal their designed behavior only when they are activated. True False
True
Voice recognition is an example of "something a user does" authentication. True False
True
When you interview for a job at a company, it is likely that the company will Google you and search social networking sites for information on you. True False
True
Refer to Closing Case: Target Provides a Surprise: which of the following is not a source of information used by Target to profile their customers? Shopping patterns for each guest Online shopping activities User's e-mail correspondences Customer's public records Customer's credit information
User's e-mail correspondences
Refer to IT's About Business 3.1: Pinterest: Pinterest's user agreements allows Correct Users to pin images that they have created Users to pin images from any website Users to pin images others have pinned A and C A, B and C
Users to pin images that they have created
The ____________ ethical standard states that an ethical action is the one that provides the most good or does the least harm. Common good Fairness Rights Utilitarian Well-being
Utilitarian
_____ are segments of computer code that attach to existing computer programs and perform malicious acts. Viruses Worms Trojan horses Back doors Logic bombs
Viruses
Refer to IT's About Business Section Reference 1: 1.1 - Warby Parker : Which of the following statements is false? Warby Parker is using IT to provide better customer experience Warby Parker is using IT to reduce it's cost to increase profit margins Warby Parker's innovative IT based business model can be easily replicated
Warby Parker is using IT to reduce it's cost to increase profit margins
Which of the following is not a benefit of being an informed user of IT? Understanding what is "behind" applications you use in your organization. Providing input to enhance your organization's applications. Helping to select new applications. Keeping abreast of new technologies. Working in the IT side of the organization.
Working in the IT side of the organization.
The data in a data warehouse: are updated constantly in real time. are updated in batch mode, approximately once per day. are not updated. are purged constantly as new data enter. are available for MIS analysts, but not users.
are not updated.
In a university's relational database, the student record contains information regarding the student's last name. The last name is a(n): attribute. entity. primary key. object. file.
attribute.
Access controls involve _____ before _____. biometrics, signature recognition authentication, authorization iris scanning, voice recognition strong passwords, biometrics authorization, authentication
authentication, authorization
A listing of all courses offered at your university would be considered _____, whereas a listing of all courses required in your major would be considered _____. information, data knowledge, information information, knowledge data, information data, knowledge
data, information
A purchase of books in the college bookstore is ___________. The report at the end of the day showing sales totals for the day is ____________. information, knowledge information, data data, information data, database data item, business intelligence
data, information
As a manager in your company, you expect to retrieve ______ from operational systems and present it as _________ to your boss, who will react based on his ____________. knowledge, information, data information, data, knowledge data, information, knowledge data, information, experience information, experience, wisdom
data, information, knowledge
Which of the following is the correct hierarchy from the lowest level to the highest level? knowledge, information, data information, data, knowledge data, information, knowledge data, information, experience information, experience, wisdom
data, information, knowledge
Over the past 20 years, hardware costs have _____, while software costs have _____. increased, increased decreased, decreased decreased, increased increased, decreased increased, remained level
decreased, increased
Which strategy for competitive advantage involves offering different products, services, or product features? cost leadership differentiation innovation operational effectiveness customer-orientation
differentiation
In a _____ attack, a coordinated stream of requests is launched against a target system from many compromised computers at the same time. phishing zero-day worm back door distributed denial-of-service
distributed denial-of-service
Moore's Law predicted that microprocessor complexity would ______. double every year double every two years increase slowly decrease slowly decrease rapidly
double every two years
Bob is using public key encryption to send a message to Ted. Bob encrypts the message with Ted's _____ key, and Ted decrypts the message using his _____ key. public, public public, private private, private private, public none of these
public, private
New technologies can produce new products very _____, which _____ the threat from substitute products. Selected Answer: Incorrect [None Given] Answers: slowly, decreases slowly, increases slowly, does not affect quickly, increases quickly, does not affect
quickly, increases
In a relational database, every row represents a(n) _____. file record attribute primary key secondary key
record
In _____, the organization takes concrete actions against risks. risk management risk analysis risk mitigation risk acceptance risk transference
risk mitigation
In _____, the organization purchases insurance as a means to compensate for any loss. risk management risk analysis risk mitigation risk acceptance risk transference
risk transference
Refer IT's About Business 2.1 - Sharing Bicycles. Alta's competitive advantage stems from the fact that they have a unique product or service they have un-replicable business model they have a first mover advantage they are the cost leader in their industry none of the above
they have a unique product or service
A _____ is any danger to which an information resource may be exposed. vulnerability risk control threat compromise
threat
Information-based industries are most susceptible to which one of Porter's five forces? threat of entry of new competitors bargaining power of suppliers bargaining power of customers threat of substitute products rivalry among existing firms in an industry
threat of substitute products
Refer to IT's About Business 2.4 - The Surui Tribe of the Amazon: The Surui Tribe's use of technology demonstrates how IT can be used to to conserve natural resources to prevent deforestation to catch criminals to create carbon off-sets to create awareness about environmental problems
to prevent deforestation
A _____ is intellectual work that is known only to a company and is not based on public information. copyright patent trade secret knowledge base private property
trade secret
Dumpster diving is: always illegal because it is considered trespassing. never illegal because it is not considered trespassing. typically committed for the purpose of identity theft. always illegal because individuals own the material in the dumpster. always legal because the dumpster is not owned by private citizens.
typically committed for the purpose of identity theft.
What is _____ is not necessarily _____. illegal, unethical ethical, illegal unethical, illegal unethical, legal ethical, legal
unethical, illegal
In a database, the primary key field is used to _____. specify an entity create linked lists identify duplicated data uniquely identify a record uniquely identify an attribute
uniquely identify a record
Tacit knowledge has which of the following characteristics? codified objective unstructured rational technical
unstructured
Enterprise resource planning systems were designed to process transactions faster. evolved because newer technologies made older systems obsolete. use a common database for all functional areas. are utilized to conduct site analyses. all the above statements are true.
use a common database for all functional areas.
Random access memory is _____ and _____. volatile, temporary nonvolatile, permanent nonvolatile, temporary volatile, permanent volatile, inexpensive
volatile, temporary
What are the three distinct characteristics that distinguish big data from traditional data? volume, variety and veracity volume, velocity and verification volume, velocity and variety volume, verification and variety
volume, velocity and variety
An information system's _____ is the possibility that the system will be harmed by a threat. vulnerability risk control danger compromise
vulnerability
A _____ is a document that grants the holder exclusive rights on an invention for 20 years. copyright patent trade secret knowledge base private property notice
patent
The costs of delivering products in the _____ channel are much higher than delivering products in the _____ channel. e-commerce, digital digital, e-commerce digital, physical physical, financial physical, digital
physical, digital
When data are normalized, attributes in the table depend only on the _____. secondary key common attribute primary key common row common record
primary key
An organization's IT components include all of the following except: a network programs procedures a database monitors
procedures
_____ is (are) data that have been organized to have meaning and value to a recipient. Insights Information Knowledge Experience Wisdom
Information
Which of the following statements is false? BPM is a task-oriented approach. BPM can help companies reduce costs. BPM can help companies increase revenue. BPM can improve customer satisfaction. BPM can improve organizational flexibility.
BPM is a task-oriented approach.
Refer to IT's About Business 2.5 - Massachusetts Mutual Transforms Its Information Systems: What kind of transformation did Massachusetts Mutual Transforms undergo? BPI BPR BPM
BPR
Refer to IT's About Business 2.2 - Chevron: The changes over the past few years at Chevron were brought about by __________ and __________ at the company level and ____________ at the local level. BPI, BPM, BPR BPR, BPI, BPM BPM, Six Sigma, BPR BPR, BPM, BPI
BPR, BPM, BPI
The cost of a stolen laptop includes all of the following except: Loss of intellectual property Loss of data Backup costs Loss of productivity Replacement cost
Backup costs
You have just been hired by the largest manufacturer in your area to join their management trainee program. You enjoyed your "computer course" in college and hope that you'll be able to put that knowledge to good use. Which of the following might you expect to do during the management training program? Code a new application Recommend new technologies that might impact the organization Design a new application Become familiar with tools to support using data for decision making Work 9-5 in your office
Become familiar with tools to support using data for decision making
In the data hierarchy, the smallest element is the _____. Record Bit Byte Character File
Bit
Place the following members of the data hierarchy in their correct order: Bit - byte - field - record - database - file Bit - field - byte - record - file - database Byte - bit - record - field - database Bit - byte - field - record - file - database Bit - record - field - byte - file - database
Bit - byte - field - record - file - database
The title of the executive who is in charge of the people who design and build information systems, the people who use those systems, and the people responsible for managing those systems is the CEO CFO CIO CIS CIT
CIO
The type of primary storage, located closest to the CPU, where the computer can temporarily store blocks of data used most often is called: Read-only memory. Registers. Random access memory. Cache memory. Flash memory.
Cache memory.
Jun has bought an accounting package for her business, which involves selling unique lamp bases and shades. She and a part-time employee are getting up to speed on the package but are having trouble matching her business processes to the software. What does Jun have to do to make the software more effective? Change the UI Change the way the program works Change her business processes to match the software Install an updated version of the software Hire another part-time worker to help
Change her business processes to match the software
Various organizations that promote fair and responsible use of information systems often develop a _____. Code of ethics Strategic plan Mission statement Responsibility charter Goals outline
Code of ethics
The computing skills necessary to be a hacker are decreasing for which of the following reasons? More information systems and computer science departments are teaching courses on hacking so that their graduates can recognize attacks on information assets. Computer attack programs, called scripts, are available for download from the Internet. International organized crime is training hackers. Cybercrime is much more lucrative than regular white-collar crime. Almost anyone can buy or access a computer today.
Computer attack programs, called scripts, are available for download from the Internet.
_____ are sequences of instructions used to direct the workings of a computer. Computer programs Microcode instructions Assembler commands Systems software Input/output instructions
Computer programs
Refer to IT's About Business Section Reference 1: 1.2 - Internet Registry Enhances Island Nation's Economy, Which of the following statements is true about the ways Tokelau has benefited by giving the use the its top level country domain .tk to Freedom Registry? Freedom Registry sells the .tk domain name at a cost and pays Tokelau a portion of its earnings Freedom Registry earns revenue from advertising on expired websites that is shared with Tokelau
Freedom Registry earns revenue from advertising on expired websites that is shared with Tokelau
Which of the following processes involves the warehouse, sales, and accounting functional areas? Procurement Fulfillment Order entry Accounts Receivable Payroll
Fulfillment
___________ include B2B and B2C. Enterprise resource planning systems Computer-based information systems Functional area information systems Interorganizational information systems
Functional area information systems
Which one of the following statements is false? Businesses tend to view government regulations as expensive constraints on their activities. Government deregulation reduces competition. IT support is essential for compliance with many new regulations. IT has been used to identify patterns of behavior associated with terrorist activities. Information ethics can destroy the morale of a company's employees.
Government deregulation reduces competition.
Refer to Opening Case - What to Do About WikiLeaks?: Which of the following is false about WikiLeaks? Anyone can submit files to WikiLeaks. The most controversial expose involved the U.S. government. Governments and companies are using network forensics to identify intruders who break into systems. Because of WikiLeaks, governments and companies are trying to use data leak prevention software to prevent unauthorized downloads. WikiLeaks is legally protected in the U.S. because it is merely a conduit for the documents.
Governments and companies are using network forensics to identify intruders who break into systems.
The _____ allows users to exert direct control of icons on the computer screen. Systems software Application software Graphical user interface Plug-and-play Operating system
Graphical user interface
Which of the following is not a reason why software currently comprises a larger percentage of the cost of modern computer systems than it did in the early 1950s? Hardware costs have increased. Hardware performance has increased. Software has become increasingly complex. Building software applications remains slow, complex, and error-prone. None of the above
Hardware costs have increased.
For many organizations, business process reengineering Is easy to implement. Is not disruptive to implement. Has little impact on facilities. Is inexpensive. Has a major impact on the corporate culture.
Has a major impact on the corporate culture.
Managing pay and payroll is an example of a(n): Accounting Business Process Finance Business Process Marketing Business Process Human Resources Business Process Management Information Systems Business Process
Human Resources Business Process
_____ is/are the computer hardware, software, and communications technologies that are used by IT personnel to produce IT services. IT components IT services Information technology An information system A computer-based information system
IT components
IT personnel use _____ to produce _____. IT components, IT services computer-based information systems, IT architecture IT infrastructure, IT architecture IT infrastructure, IT platform IT components, IT architecture
IT components, IT services
The IT infrastructure is comprised of _______ and ________. IT components, IT personnel IT components, IT services IT services, IT personnel IT personnel, computer-based information systems Computer-based information systems, IT personnel
IT components, IT services
Which of the following statements about the potential impact of IT on non-managerial workers is true? IT will create more jobs than it eliminates. Employees will feel a higher degree of loyalty towards their company. IT could cause employees to experience a loss of identity. The flexibility of IT can minimize stress on the job.
IT could cause employees to experience a loss of identity.
Which of the following statements is false? IT ultimately decreases the number of managers and experts. IT makes managers more productive. IT increases the number of employees who can report to a single manager. IT reduces stress by giving managers more time to make decisions. IT decreases the number of promotional opportunities.
IT reduces stress by giving managers more time to make decisions.
Creating specific application software using an organization's own resources is called ____. Outsourcing Consultant-based development In-house development Contract software Documentation
In-house development
Which of the following is not an overall trend in software? Increased complexity Increased cost Increased number of errors Increased amount of mainframe software written by users Increasing percentage of the costs of information systems
Increased amount of mainframe software written by users
The overall trends in software include all of the following except: Increased complexity. Increased cost. Increased number of defects. Increased security. Increasing percentage of the costs of modern computer systems.
Increased security.
Competitive advantage for an organization manifests itself as all of the following except: Lower costs Higher quality Increased time to market Increased profits Increased speed
Increased time to market
Arrange the hierarchy of terms to describe memory capacity in the correct sequence, from smallest to largest: Megabyte - kilobyte - gigabyte - terabyte - exabyte - petabyte Exabyte - petabyte - terabyte - gigabyte - megabyte - kilobyte Kilobyte - megabyte - gigabyte - terabyte - petabyte - exabyte Petabyte - exabyte - kilobyte - gigabyte - kilobyte - terabyte Kilobyte - gigabyte - megabyte - exabyte - petabyte - terabyte
Kilobyte - megabyte - gigabyte - terabyte - petabyte - exabyte
_____ conveys understanding, accumulated learning, and expertise as they apply to a current problem. Data Information Knowledge Experience Wisdom
Knowledge
_____ is a process that helps organizations identify, select, organize, disseminate, transfer, and apply expertise that are part of the organization's memory and typically reside inside the organization in an unstructured manner. Discovery Knowledge management Decision support Online analytical processing Data mining
Knowledge management
_____ can be exercised to solve a problem, whereas _____ may or may not be able to be exercised to solve a problem. Knowledge, information Data, information Information, data Information, knowledge Data, knowledge
Knowledge, information
Which of the following is not a cause of inadequate alignment between IT and business? A lack of communication Different objectives Not understanding each group's expertise Lack of IT knowledge on the part of the business executives Lack of funds
Lack of funds
______________ is a legal concept that gives individuals the right to recover the damages done to them by other individuals, organizations, or systems. Privacy Responsibility Transferability Accountability Liability
Liability
Which of the following does not affect the speed of the machine instruction cycle? Clock speed Word length Bus width Line width Physical design of the chip
Line width
Which of the following statements is correct? International privacy and security laws are very consistent. Consistent international privacy and security laws help companies with their regulatory requirements from country to country. Consistent international privacy and security laws enable information to flow freely among countries. The absence of consistent international privacy and security laws has led to a complex global legal framework. Consistent international privacy and security laws are followed by all countries.
The absence of consistent international privacy and security laws has led to a complex global legal framework.
Which of the following is not an example of business - IT alignment? The company goals are clear to every IT and business employee. The company ensures that IT employees understand how the company makes money. The company views IT as a way to support the business but not as a way to create new revenue streams. IT professionals rotate into business departments. The company views customer service as extremely important.
The company views IT as a way to support the business but not as a way to create new revenue streams.
You receive an e-mail from your bank informing you that they are updating their records and need your password. Which of the following statements is true? The message could be an industrial espionage attack. The message could be a phishing attack. The message could be a denial of service attack. The message could be a back door attack. The message could be a Trojan horse attack.
The message could be a phishing attack.
You start a new job, and the first thing your new company wants you to do is create a user ID and a password. Which of the following would be a strong password? The name of the company Your last name Your birthdate Your initials (capitalized) and the number of the floor you are on The name of the company spelled backward
The name of the company spelled backward
Which of the following is not a component of hardware? Primary and secondary storage The operating system Input and output technologies The central processing unit Communication technologies
The operating system
Your company's headquarters was just hit head on by a hurricane, and the building has lost power. The company sends you to their hot site to minimize downtime from the disaster. Which of the following statements is true? The site will not have any servers. The site will not have any workstations, so you need to bring your laptop. The site is probably in the next town. The site should be an almost exact replica of the IT configuration at headquarters. The site will not have up-to-date data.
The site should be an almost exact replica of the IT configuration at headquarters.
Which of the following statements about your future role as a manager is false? The people I manage will likely be dispersed geographically. The size of my team will likely be smaller than teams of today. There will be less emphasis on office politics. Many of my decisions will be "real time". I will need IT tools to handle the data I utilize to make decisions.
The size of my team will likely be smaller than teams of today.
The amount and type of memory that a computer possesses affects all the following except: The type of program the computer can run. The speed of the computer. The cost of the computer. The cost of processing data. The speed of data entry.
The speed of data entry.
You start a new job, and human resources gives you a ten-page document that outlines the employee responsibilities for information security. Which of the following statements is most likely to be true? The document recommends that login passwords be left on a piece of paper in the center desk drawer so that others can use the laptop if necessary. You are expected to read the document, and you could be reprimanded if you don't follow its guidelines. You can back up sensitive data to a thumb drive so you can take them home to work with. The document indicates that you can leave your laptop unlocked if you leave your desk for less than an hour. The document permits you to lend your laptop to your brother for the weekend.
You are expected to read the document, and you could be reprimanded if you don't follow its guidelines.
Knowledge workers handle day-to-day operations within an organization. make tactical decisions. advise middle managers. make routine decisions. are generalists.
advise middle managers.
An organization's information technology architecture: provides a guide for current operations. provides a blueprint for future directions. integrates the information requirements of the organization and all users. is analogous to the architecture of a house. all of the above
all of the above
Refer to IT's About Business 5.4: Hospital Improves Patient Care with Data Warehouse: A single source of all patient data, accessible to multiple hospitals will have the following benefit aid in medical research reduce duplicate tests eliminate the need for patients to do their own record keeping faster transfer of high-volume image data across different locations all of the above
all of the above
Historically, management information systems have focused on capturing, storing, managing, and reporting _____ knowledge. tacit explicit managerial geographical cultural
explicit
The process of moving data from various sources into the data warehouse is called: uploading. extracting, transforming, and loading. online transaction processing. master data management. online analytical processing.
extracting, transforming, and loading.
Ted works in his family's bakery business. They supply bread and rolls to neighboring restaurants, and they have their own-store front where they sell breads, rolls, pastries, cookies and cupcakes. Ted wants to build a web site for the business that will allow customers to order cookies and cupcakes for later pickup. Is this idea a strategic information system in alignment with the business in support of a cost leadership strategy likely to provide long term competitive advantage a support activity within the value chain
in alignment with the business
Office automation systems support only the clerical staff. are comprised of software that is used to develop documents and spreadsheets. include report generators. are a type of interorganizational system. are usually developed in-house.
include report generators.
For most companies, the Web _____ the threat that new competitors will enter the market by _____ traditional barriers to entry. Selected Answer: Incorrect [None Given] Answers: decreases, increasing increases, decreasing increases, increasing decreases, decreasing
increases, decreasing
The _____ complexity of software results in a _____ potential for errors. decreasing, decreasing decreasing, increasing increasing, decreasing increasing, level increasing, increasing
increasing, increasing
The list of all your purchases from Amazon (books bought, price paid, dates) is defined as ___________. data information knowledge experience wisdom
information
An organization's _____ consists of the physical facilities, IT components, IT services, and IT management that will support the entire organization. information technology architecture information technology infrastructure information technology information system computer-based information system
information technology infrastructure
Which strategy for competitive advantage involves introducing new products and putting new features in existing products? cost leadership differentiation innovation operational effectiveness customer-orientation
innovation
As an individual student in your university's student database, you are a(n) _____ of the STUDENT class. instance individual representative entity relationship
instance
A database management system is primarily a(n) _____. file-handling program data-modeling program interface between applications and a database interface between data and a database interface between queries and a database
interface between applications and a database
The threat of competitors' entering a market is very high in industries that perform a(n) _____ role and in industries where the primary product or service is _____. intermediation, physical broker, physical sales, financial financial, digital intermediation, digital
intermediation, digital
At your university, students can take more than one class, and each class can have more than one student. This is an example of what kind of relationship? one-to-one one-to-many many-to-one many-to-many some-to-many
many-to-many
Refer to Closing Case - IBM's Watson: IBM Watson differs from other information systems' capabilities in the following manner: it can store vast amounts of information it can search through a large amount of information it can process natural language commands it can process large amounts of information in response to a query and assign confidence measures to a set of possible solutions it can selectively update information based on current trends on the Internet
it can process large amounts of information in response to a query and assign confidence measures to a set of possible solutions
The most overlooked people in information security are: consultants and temporary hires. secretaries and consultants. contract laborers and executive assistants. janitors and guards. executives and executive secretaries.
janitors and guards.
When companies attempt to counter _____ by requiring users to accurately select characters in turn from a series of boxes, attackers respond by using _____. keyloggers, screen scrapers screen scrapers, uninstallers keyloggers, spam screen scrapers, keyloggers spam, keyloggers
keyloggers, screen scrapers
If Amazon uses a list of all your purchases (books bought, price paid, dates) to recommend other books to you, then it is applying its _____. data information knowledge experience wisdom
knowledge
You are registering for the next semester at your university. You take into account your major, the courses you need, the prerequisites for each course, the times you take each course, and the professors teaching each section, as well as your work schedule. You are using _____ to select your class schedule. information knowledge experience wisdom data
knowledge
Which of the following factors is not increasing the threats to information security? smaller computing devices downstream liability the Internet limited storage capacity on portable devices due diligence
limited storage capacity on portable devices
The threat of competitors' entering the automobile manufacturing industry is _____ because barriers to entry are so _____. low, low high, high high, low low, high
low, high
Unintentional threats to information systems include all of the following except: malicious software tailgating power outage lack of user experience tornados
malicious software
IT will impact managers' jobs in all of the following ways except: managers will have time to get into the field managers can spend more time planning managers can spend more time "putting out fires" managers can gather information more quickly none of the above
managers can spend more time "putting out fires"
If there are _____ substitutes for an organization's products or services, then the threat of substitutes is _____. many, high few, low few, high many, low few, negligible
many, high
Producing customized items in large quantities is called: strategic systems. customer focus. continuous improvement. mass production. mass customization.
mass customization.
The Bodymetrics body scanner is best characterized as an example of: mass production. customer focus. real-time customer input. mass customization. continuous improvement.
mass customization.
Producing identical items in large quantities is called: strategic systems. customer focus. continuous improvement. mass production. mass customization.
mass production.
Explicit knowledge has which of the following characteristics? objective personal slow costly to transfer ambiguous
objective
Which strategy for competitive advantage involves improving the manner in which an organization executes its internal business processes? cost leadership differentiation innovation operational effectiveness customer-orientation
operational effectiveness
Ted works in his family's bakery business. They supply bread and rolls to neighboring restaurants, and have their own store-front where they sell breads, rolls, pastries, cookies, and cupcakes. Ted thinks he should put free Wi-Fi in the store front (which seats about 15 people). This idea reflects which one of Porter's five competitive forces? threat of entry of new competitors bargaining power of suppliers bargaining power of customers threat of substitute products rivalry among existing firms in an industry
rivalry among existing firms in an industry
The visibility of Internet applications on the Web makes proprietary systems more difficult to keep secret. This is an example of which of Porter's five forces? threat of entry of new competitors bargaining power of suppliers bargaining power of customers threat of substitute products rivalry among existing firms in an industry
rivalry among existing firms in an industry
Traditional data formats change ______ while big data formats change _______. slowly, rapidly rapidly, slowly slowly, incrementally both formats of data change at the same rate
slowly, rapidly
The digital divide is an example of which type of societal pressure? social responsibility government regulations protection against terrorism ethics information overload
social responsibility
Voice and signature recognition are examples of: something the user is. something the user wants. something the user has. something the user knows. something the user does.
something the user does.
Biometrics are an example of: something the user is. something the user wants. something the user has. something the user knows. something the user does.
something the user is.
Passwords and passphrases are examples of: something the user is. something the user wants. something the user has. something the user knows. something the user does.
something the user knows.
A standardized language used to manipulate data is _____. MS-Access Oracle query-by-example language structured query language data-manipulation language
structured query language
For the following entity-relationship diagram, the attributes you would NOT expect to see in the Computer entity are Untitled-1 manufacturer. type (laptop or desktop). memory size. disk size. student's dorm room.
student's dorm room.
Market pressures include which of the following? the global economy weak competition a homogeneous workforce weak customers high-cost offshore labor
the global economy
In a process called _____, a company allows nothing to run unless it is approved, whereas in a process called _____, the company allows everything to run unless it is not approved. whitelisting, blacklisting whitelisting, encryption encryption, whitelisting encryption, blacklisting blacklisting, whitelisting
whitelisting, blacklisting
An organization's e-mail policy has the least impact on which of the following software attacks? virus worm phishing zero-day spear phishing
zero-day