MIS Exam 3

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

The _________ is the scrum approach typically replaces a project manager.

scrum master

The biggest problem associated with end-user development is ________

security

Volkswagen used _________ to cheat during emissions testing.

software

Remote job entry was enabled by converting from _______.

stand-alone mainframes to mainframe and dumb terminals

You are a nice person, so you hold the door open for the person running in behind you. Since you needed to use your ID badge to open the door, the person running in behind you is __________; this is _________

tailgating; an unintentional threat to your organization

Capital One's insourcing initiative meant it had to build its reputation as a _________ company.

technology

System developers have the greatest involvement in the _________ stage of the SDLC.

testing

A(n) _________ to an information resource is any danger to which a system may be exposed.

threat

Auditing _________ the computer means auditors check inputs, outputs, and processing.

through

If you shift your risk by using other means to compensate for the loss like purchasing insurance, you have implemented a risk _________ strategy.

transference

The ________ layer of TCP/IP provides communication and packet services.

transport

A(n) _________ network is any network within your organization; a(n) _________ network is any network external to your organization.

trusted; untrusted

The _________ approach states that an ethical action is the one that provides the most good or does the least harm.

utilitarian

An information resource's _________ is the possibility that the system will be harmed by a threat.

vulnerability

Peoples State Bank decided IT _________ a core function; therefore, it decided to ________.

was not; outsource the IT function

Auditing _________ the computer means using a combination of client data, auditor software, and client and auditor hardware.

with

_______ is a two-dimensional code that can store much more information than ________

A QR code; bar codes

________ is an unauthorized access point into a wireless network.

A rogue access point

_________ issues involve the authenticity, fidelity, and correctness of information that is collected and processed.

Accuracy

_________ is the final step in the general framework for ethics.

Act and reflect on the outcome of your decision

_________ feasibility addresses the human issues of the systems development project.

Behavioral

The most current form of ransomware demands payment in the form of _________.

Bitcoins

______ is a short-range wireless network.

Bluetooth

_________ determines the point at which the cumulative dollar value of the benefits from a project equals the investment made in the project.

Breakeven analysis

________ is the most recent evolution of the modern IT infrastructure.

Cloud computing

________ is a cable medium.

Coaxial

Ashley Madison's data was first released on the _________ by ________

Dark Web; The Impact Team

________ is a disadvantage of fiber-optic cable.

Difficult to work with

_________ conversion is the least expensive.

Direct

_________ conversion is the most risky.

Direct

________ refers to learning supported by the web; ________ refers to any learning situation in which teachers and students do not meet face to face.

E-learning; distance learning

Which of the following is a problem with NextGen?

Early stakeholder input

_________ feasibility determines whether the project is an acceptable financial risk and, if so, whether the organization has the necessary time and money to successfully complete the project.

Economic

Cloud computing has the following benefit for employees:

Efficiency

Which of the following cloud computing characteristics allows organizations to share resources?

Encompasses the characteristics of grid computing

Which of the following cloud computing characteristics represents the "pay-as-you-go" concept?

Encompasses the characteristics of utility computing

_________ occurs when an unauthorized individual attempts to gain illegal access to organizational information.

Espionage

he "right to be forgotten" court order occurred in _______

Europe

According to the Chapter 3 closing case, _________ has conducted experiments on users of its website in the past; this is ________.

Facebook; legal

A legacy IT system can be easily transferred to cloud computing.

False

According to the Chapter 4 Closing Case, US governments make cybersecurity a priority.

False

Agile development ensures that the software includes every possible feature the user will require.

False

Bebbojaanland Family Park's implementation of Wi-Fi was not sustainable because it cost too much.

False

Cloud computing is the traditional way of purchasing and running your own IT infrastructure.

False

Cloud computing makes it easy to catch criminals because everything is in a centralized location that can be easily monitored.

False

Communication, control, and cost are the three benefits of outsourcing.

False

Containers were first created in 2014 and made popular by Docker, a cloud-computing service created by IBM.

False

Customers manage more than vendors in the PaaS model.

False

Customers only manage applications and data with the SaaS model.

False

Facebook is open with the public that they perform experiments on their website and always lets people know if they are part of an experiment

False

IT people are supposed to identify the system requirements in the systems analysis stage.

False

If it is unethical, it is illegal

False

Lower CASE tools automate the systems investigation, analysis, and design stages of the SDLC.

False

MANs are the largest networks.

False

Mobile computing has two major characteristics that differentiate it from other forms of computing: pervasiveness and broad reach.

False

Peoples State Bank's legacy systems were easily upgraded to engage customers online.

False

Satellite transmission systems are widely used but are being replaced by microwave data communications systems.

False

Shellcatch is only useful for large fisheries.

False

Slack is readily accepted by users of all ages.

False

Slack replaces the need for face-to-face communication.

False

State Farm, Progressive, and Allstate offer usage-based automobile insurance; these companies raise rates on drivers whose data is poor.

False

Telecommuting means you have to drive a long distance to work.

False

The Eritean Internet is highly censored (citizens can only look at certain websites).

False

The FBI did the best they could to inform the Democratic National Committee about the hackers

False

The IT steering committee is comprised of the top IT managers in an organization.

False

The latest version of teleconferencing is telepresence.

False

The main problem with Project Fi is that it is completely insecure since it uses Wi-Fi hotspots.

False

Tracking cell phones is illegal.

False

Volkswagen's "Diesel Dupe" was limited mostly to the United States.

False

XML and HTML are both markup languages used to create the look and feel of the internet.

False

You need to be particularly careful of tailgating at airport terminals.

False

_______ launched EDEN to improve the efficiency and effectiveness of its dock operations.

FedEx

_______ is a cable medium.

Fiber-optic

John Hancock issues a free _________ to monitor customer's health status.

Fitbit

Only a few ________ satellites are needed for global coverage.

GEO

________ satellites are the most expensive to build and launch.

GEO

________ is NOT an example of a data aggregator.

Google

________ computing makes scalability easy

Grid

________ is a page-description language for specifying how text, graphics, video, and sound are placed on a web page document.

HTML

________ is the next evolution of HTML that allows pages to execute more quickly so that they resemble smartphone apps.

HTML5

_______ is an advantage of coaxial cable.

High bandwidth

135.62.128.91 is an example of an ________ address

IPv4

________ is the most commonly used IP addressing scheme.

IPv4

________ was developed because we have run out of IP addresses in the original IP addressing scheme.

IPv6

The ________ functions as a transport mechanism; the ________ is an application.

Internet; World Wide Web

Which of the following is FALSE of the Dark Web?

It is indexed by search engines.

Medium-range wireless networks are ________ technology.

LAN

A large number of ________ satellites are needed for global coverage.

LEO

Satellite telephone services are provided through ________ satellites.

LEO

________ satellites move a little relative to a point on the Earth.

MEO

_________ is the fourth step in the general framework for ethics.

Make a decision and test it

________ transmission systems are relatively inexpensive but must have unobstructed line of sight.

Microwave

________ is a short-range wireless network.

NFC

________ is designed to be embedded in mobile devices and can be used with mobile wallets. It is a _________-range wireless network technology.

NFC; short

________ is an operating model under which ISPs must allow customers equal access to content and applications, regardless of the source or nature of the content.

Network neutrality

The _________ identifies the firm's overall mission, the goals that follow from that mission, and the broad steps required to reach these goals.

Organization strategic plan

Which of the following is the correct order of networks from smallest to largest?

PAN, LAN, MAN, WAN

________ rely entirely on readers for their power, are less expensive, and can be read only up to 20 feet.

Passive RFID codes

________ is a possible solution to the ransomware problem but is not recommended by the FBI.

Pay the ransom

Which of the following cloud computing characteristics allows a dynamic assignment of computing resources based on customer demand?

Pools computing resources

_________ issues involve collecting, storing, and disseminating information about individuals.

Privacy

In April 2015, Google announced its new wireless service, ________.

Project Fi

_______ is a disadvantage of telecommuting.

Promotion time

________ cloud services may be free or offered on a pay-per-usage model.

Public

________ cloud vendors provide applications, storage, and other computing resources as services over the internet

Public

________ clouds are shared, easily accessible, multicustomer IT infrastructures that are available nonexclusively to any entity in the general public)

Public

_________ measures management's effectiveness in generating profits with its available assets by dividing the net income generated by a project by the average assets invested in the project.

ROI

________ is the first step in the general framework for ethics.

Recognize an ethical issue

________ is a set of rules that define how messages can be exchange among different network systems and applications.

SOAP

With the ________ delivery model, cloud computing vendors provide software that is specific to their customers' requirements.

SaaS

________ is the most widely used service model.

SaaS

Which of the following cloud computing characteristics addresses the business need to increase or decrease capacity when necessary (for example, retailers frequently need much more computational capacity on Black Friday)?

Scalability

_________ is an attack in which the perpetrator uses social skills to trick or manipulate legitimate employees into providing confidential company information such as passwords.

Social engineering

_________ is an unintentional threat.

Social engineering

_________ is pestware that users your computer as a launch pad for unsolicited e-mail, usually advertising for products and services.

Spamware

Which of the following is the correct order of the evolution of the modern IT infrastructure?

Stand-alone mainframes, mainframe and dumb terminals, standalone PCs, LANs, enterprise computing, cloud and mobile computing

The _________ is a _________ way to track cell phones.

StingRay; legal

________ is an Indian MOOC service.

Swayam

A URL that begins with https uses _________

TLS

_______ does not allow participants to communicate face to face.

Teleconferencing

________ is the wireless transmission and receipt of data gathered from remote sensors.

Telemetry

_________ is an advantage of the buy option.

Time

_________ is NOT a major task of the IT steering committee.

Training the top managers from each functional area

Customers manage the most with the IaaS service model compared to the PaaS and SaaS service models.

True

Distance learning refers to any learning situation in which teachers and students do not meet face to face.

True

E-parking apps are illegal in some large cities because those companies charged for something they did not own, free public parking.

True

End-user development is also called Shadow IT.

True

Enterprise networks are composed of embedded LANs and a WAN.

True

Ethernet is a common LAN protocol.

True

Facebook frequently runs experiments on its website.

True

Hypertext is the underlying concept defining the structure of the WWW

True

It is illegal to block Wi-Fi hotspots in places like hotels.

True

John Hancock and Vitality partnered to monitor employee wellness and lower premiums for consumers engaged in healthy activities.

True

Many users experienced extortion as a result of the Ashley Madison data breach.

True

Modern smartphones exhibit a process called dematerialization.

True

PANs are the smallest networks.

True

People tend to violate security procedures because the procedures are inconvenient.

True

Privacy rights apply to individuals, groups, and institutions.

True

Project Fi brings wireless services to more than 120 countries worldwide.

True

San Francisco and Boston are investing in networks of sensors in parking spaces to help people find open spaces.

True

Satellite TV runs using GEO satellites.

True

Social engineering is an unintentional threat on the part of the employee.

True

The computing resources from the evolution of the modern IT infrastructure are cumulative; this means some organizations still use mainframes today.

True

The core tenet of agile development is to do only what you have to do to be successful right now.

True

The development process in RAD is iterative.

True

The internet is an untrusted network.

True

The recent trend indicates that CEOs lose their jobs after data breaches. In theory, this should impact the "lack of management support" factor that increases the vulnerability of organizational information resources.

True

________ allows MIS professionals to search for needed web services by creating public or private searchable directories of these services.

UDDI

Which of the following cloud computing characteristics allows organizations to use a single physical server for multiple purposes?

Virtualization

________ is a disadvantage of telecommuting.

Visibility

A network between Mars and the Earth would be a ________.

WAN

_______ is a wide-area wireless network.

WiMAX

Careless Internet surfing is _________ and is an _________ mistake.

a human error; unintentional

Marriott did NOT claim blocking Wi-Fi was ________.

a way for them to make money

If you accept the potential risk, continue operating with no controls, and absorb any damages that occur, you have adopted a risk _________ strategy.

acceptance

Private clouds provide IT activities and applications as a service over ________

an intranet

A(n) _________ is a software package that attempts to identify and eliminate viruses and worms.

anti-malware system

The _________ is/are a prioritized inventory of present applications and a detailed plan of projects to be developed or continued during the current year.

application portfolio

RFID was developed to replace _______

bar codes

A _________ site provides only rudimentary services and facilities.

cold

A(n) ________ portal is intended for broad and diverse audiences, and it offers routine content, some of it in real time.

commercial

The _________ approach highlights the interlocking relationships that underlie all societies.

common good

A(n) ________ portal offers a personalized, single point of access through a web browser to critical business information located inside and outside an organization.

corporate

If a company wants to write some computer code, it would choose to ________.

customize a prewritten application

The _________ approach states that the morality of an action is based on whether the action itself is right or wrong under a series of rules, rather than based on the consequences of that action.

deontology

The deliverable of the system _________ phase is the set of technical system specifications.

design

The US Office of Personnel Management hack involved the loss of _________ information.

employee

St. Louis Cardinal scouting director Christopher Correa hacked the Houston Astros' system. This was an example of _________

espionage

The _________ of an information resource is the harm, loss, or damage that can result if a threat compromises that resource.

exposure

The _________ approach posits that ethical actions treat all human beings equally, or, if unequally, then fairly, based on some defensible standard.

fairness

Which of the following is the correct order of the SDLC?

investigation, analysis, design, programming/testing, implementation, operation/maintenance

Biometrics is an example of something the user _________.

is

Cloud computing costs ________ and is ________ flexible than an on-premise system.

less; more

If you limit your risk by implementing controls that minimize the impact of the threat, you have implemented a risk _________ strategy.

limitation

The IT steering committee is comprised of ________.

managers from each functional area

Ashley Madison is an online dating and social network service targeting ________

married people

The _________ model of informed consent prohibits an organization from collecting any personal information unless the customer specifically authorizes it.

opt-in

Some homeowners objected to Pacific Gas & Electric's smart meters because of ________ concerns.

privacy

Security is greatest when using a ________ cloud.

private

The main problem with ________ transmission systems is their signals experience propagation delay.

satellite


Set pelajaran terkait

chapter 19-36 auto technology study guide

View Set

Chapter 12: Mobile, Linux, & macOS

View Set

Project Management - Intro to Project Management

View Set

Consumer Protection: The Children's Online Privacy Protection Act

View Set

ECON 480 OSU labor economics final exam e-campus

View Set

Interior Design Final Exam Review Packet

View Set