MIS Final

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which of the following is true of unsupervised data mining?• A) Analysts do not create a model or hypothesis before running the analysis.• B) Neural networks are a popular unsupervised data mining application.• C) Unsupervised data mining requires tools such as regression analysis.• D) Unsupervised data mining requires analysts to fit data to suggested hypotheses.

A) Analysts do not create a model or hypothesis before running the analysis.•

________ is defined as information containing patterns, relationships, and trends of various forms of data.• A) Process mining• B) Business process management• C) Business intelligence• D) Spatial intelligence

Business Intelligence

Which of the following statements is a characteristic of outsourcing?• A) Management should have expertise on a subject before it can decide to outsource.• B) An outsource vendor transfers the responsibility of risk management to the development group.• C) To achieve quality, it is easier to hire another vendor than it is to rehire internal staff.• D) Outsourcing leads to increased financial risk.

C) To achieve quality, it is easier to hire another vendor than it is to rehire internal staff.

With ________, statistical techniques can identify groups ofentities that have similar characteristics.• A) regression analysis• B) cluster analysis• C) expert systems• D) neural networks

Cluster analysis

________ are information systems that support the management and delivery of documents including reports,Web pages, and other expressions of employee knowledge.• A) Decision Support Systems (DSS)• B) Online Analytical Processing (OLAP) applications• C) Content Management Systems (CMS)• D) Data Transfer Protocols (DTP)

Content Management Systems (CMS)

Artificial intelligence (AI) requires a large amount of ____ in order to learn, represent knowledge, and process natural language.• A) Time.• B) Consumers.• C) Developers.• D) Data.

Data

________ is the process of obtaining, cleaning, organizing, relating, and cataloging source data.• A) Data entry• B) Data acquisition• C) Data mining• D) Data encryption

Data acquisition

________ protect databases and other organizational data.• A) Cookies• B) Payloads• C) Data safeguards• D) Data strings

Data safeguards

What is one way humans can survive the workplace shift caused by artificial intelligence?• A) Stop experimenting• B) Develop skills machines cannot do• C) Create personal goals• D) Discourage creativity

Develop skills machines cannot do

A robotic fast-food worker is far-fetched and something that may occur far in the future.

False

Aligning information systems with organizational strategy is a one-time process

False

An information system need not relate to any business process ,but a business process should relate to at least one information system.

False

Artificial intelligence is the ability of a machine to simulate all human tasks

False

As problems caused by human errors are accidental and not malicious, they are not considered as security threats to the information system

False

Business processes, information systems, and applications have the same characteristics and components.

False

Data mart is another term used for a data warehouse.

False

Data warehouses do not include data that are purchased from outside sources.

False

If a scrum project terminates because of budget or time limitations, the customer will not receive any result for the time and money expended.

False

In Business Process Modeling Notation (BPMN), dotted arrows depict the flow or sequence of the activities in a process

False

In market-basket terminology, confidence is the probability that two items will be purchased together.

False

In the context of information security, safeguards increase work efficiency by making common tasks easier.

False

In the context of responsibilities involved in job positions in the IS industry, a technical writer develops test plans, and designs and writes automated test scripts

False

It is safer to use the same password for all the Web sites

False

Only desktops can be connected smart devices

False

Outsourcing does not present any risks related to ending an agreement

False

Replacing an outsource vendor who is integrated into the business can be done without a lot of expenditure or duplication of effort

False

The losses due to human error are minimal; hence, organizations tend to ignore these losses.

False

The structure of the IS department remains constant across organizations.

False

________ is the term used to denote viruses, worms, and Trojan horses.• A) Malware• B) Cookie• C) Firewall• D) Spam

Malware

________ records the source, format, assumptions and constraints, and other facts about the data.• A) Clickstream data• B) Dimensional data• C) Outsourced data• D) Metadata

Metadata

________ occurs when someone deceives by pretending to be someone else.• A) Hacking• B) Usurping• C) Sniffing• D) Pretexting

Pretexting

________ analysis is a way of analyzing and ranking customers according to their purchasing patterns.• A) TQM• B) CRM• C) Market-basket• D) RFM

RFM

A common business application of decision trees is to classify loans by likelihood of default.

True

A data mart is a data collection that addresses a particular functional area of the business.

True

A steering committee is a group of senior managers from the major business functions that works with the chief information officer to set the IS priorities

True

A work breakdown structure (WBS) is a hierarchy of tasks required to complete a project.

True

An application is a combination of hardware, software, and data components that accomplishes a set of requirements.

True

Data mining is the application of statistical techniques to find patterns and relationships among data for classification and prediction.

True

Drive-by sniffers monitor and intercept wireless traffic at will.

True

Granularity is a term that refers to the level of detail represented by the data.

True

Hadoop is an open-source program supported by the Apache Foundation4 that implements MapReduce on potentially thousands of computers.

True

In case of Software as a Service (SaaS), hardware and both operating system and application software are leased

True

In the context of responsibilities involved in job positions in the IS industry, a business analyst works with business leaders to develop systems that implement business strategy and goals.

True

In the system definition phase of the SDLC, schedule feasibility is difficult to determine because it is hard to estimate the time it will take to build the system.

True

Knowledge management is the process of creating value from intellectual capital and sharing it with those who need it.

True

OLAP provides the ability to sum, count, average, and perform other simple arithmetic operations on groups of data.

True

One of the major functions of the information systems department is to develop, operate, and maintain applications

True

Operational data is structured for fast and reliable transaction processing.

True

Outsourcing is the process of hiring another organization to perform a service

True

SQL injection attack occurs when users enter an SQL statement into a form in which they are supposed to enter a name or other data

True

Technical safeguards involve the hardware and software components of an information system.

True

The four fundamental categories of BI analysis are reporting, data mining, BigData, and knowledge management.

True

The purpose of the data administration group is to protect data and information assets by establishing data standards and data management practices and policies.

True

The security of online transactions has increased with the use of https

True

The senior management must establish a company-wide security policy that states the organization's posture regarding the data that it gathers

True

The systems development life cycle (SDLC) is a process that can be used to develop both information systems and applications.

True

The three primary activities in the BI process are to acquire data, perform analysis, and publish results

True

There are activities in business processes that do not involve an information system.

True

Unauthorized data disclosures are possible due to human error .

True

In a business process, a role refers to ________.• A) a physical repository• B) the movement of data• C) a collection of data• D) a collection of activities

a collection of activities

With ________, the sender and receiver transmit a message using different keys.• A) asymmetric encryption• B) block cipher• C) symmetric encryption• D) stream cipher

asymmetric encryption

During the requirements definition stage of developing an information system, the project team will consist mostly of________.• A) programmers and testers• B) testers and business users• C) business and systems analysts• D) database designers and administrators

business and systems analysts

If an organization does not develop programs in-house, then the development group of the IS department will be staffed primarily by________ who work with users, operations, and vendors to acquire and install licensed software and to set up the system components around that software.• A) programmers and development personnel• B) PQA test engineers• C) business and systems analysts• D) technical writers

business and systems analysts

A ________ is a network of activities, repositories, roles, resources, and flows that interact to accomplish a business function.• A) business stature• B) business analysis• C) business process• D) business policy

business process

The responsibilities of a ________ include advising the chief information officer, executive group, and project managers on emerging technologies.• A) technical writer• B) chief financial officer• C) system analyst• D) chief technology officer

chief technology officer

According to Brooks' Law, adding more people to a late project will ________.• A) guarantee efficiencies• B) speed up the project• C) create diseconomies of scale• D) reduce the need for coordination

create diseconomies of scale

The first step in the system definition phase of the systems development life cycle (SDLC) is to ________.• A) plan the project• B) conduct a feasibility study• C) determine the goals and scope• D) form the project team

determine the goals and scope

In the context of KM systems, ________ attempted to directly capture employee expertise.• A) expert networks• B) expert systems• C) expert analyses• D) expert decisions

expert systems

Which of the following is classified as a technical safeguard?• A) cookies• B) firewalls• C) key escrow• D) passwords

firewalls

The final phase of the systems development life cycle (SDLC) is________ A) implementing the system• B) determining the requirements• C) maintaining the system• D) designing system components

maintaining the system

Which of the following shows the products that customers tend to buy together? A) regression analysis• B) market-basket analysis• C) neural networks• D) cluster analysis

market-basket analysis

Which of the following shows the products that customers tend to buy together?• A) regression analysis• B) market-basket analysis• C) neural networks• D) cluster analysis

market-basket analysis

Which of the following is a right of users of information systems?• A) installing programs and applications of their choice• B) making hardware modifications when desired• C) receiving effective training• D) obtaining the configuration of their choice

receiving effective training

In a Business Process Modeling Notation (BPMN) diagram, a________ symbol represents an activity.• A) dotted arrow• B) rectangle• C) diamond• D) solid arrow

rectangle

Which of the following is an example of a supervised data mining technique?• A) cluster analysis• B) market-basket analysis• C) regression analysis• D) click streaming

regression analysis

Which of the following is a function of the steering committee for an IS department?• A) writing program code• B) imparting training• C) adapting software• D) setting IS priorities

setting IS priorities

In order for a computer to pass the ____, a human should have a conversation with it and not be able to tell if it was a machine or a human.• A) Super test• B) language test• C) supervised data mining• D) click streaming

supervised data mining

With ________, data miners develop a model prior to the analysis and apply statistical techniques to data to estimate parameters of the model. A) cluster analysis• B) unsupervised data mining• C) supervised data mining• D) click streaming

supervised data mining

A ________ works with users to determine system requirements, designs and develops job descriptions and procedures, and helps determine test plans.• A) system analyst• B) business analyst• C) user support representative• D) systems auditor

system analyst

Tasks in the ________ phase of the SDLC include building and testing system components and converting users to the new system.• A) system definition• B) component design• C) system maintenance• D) system implementation

system implementation

The SDLC process follows a linear sequence from requirements to design to implementation. Therefore, the SDLC process is also known as the ________.• A) waterfall method• B) swim-lane method• C) scrum process• D) agile development method

waterfall method


Set pelajaran terkait

Chapter 11: Protein Sorting and Transport: The Endoplasmic Reticulum, Golgi Apparatus, and Lysosomes

View Set

ACCOUNTING 111 EXAM 1 Chapter 2 REVIEW

View Set

4.7-8 Misrepresentation, Concealment, and Fraud definitions (Property)

View Set

MORT 275 - Mortuary Law I - Quiz 4

View Set