MIS Midterm

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Laws and regulations have thoroughly addressed concerns about privacy and data management in private organizations and federal agencies. True False

False

Never send sensitive personal data such as credit card numbers, bank account numbers, or passwords via text or IM; only send them through Web sites that don't begin with https or cause a padlock icon to appear in the Address bar or status bar. True False

False

New technology innovations rarely influence an organization's information system strategic plan since it is so strongly determined by corporate strategy. True False

False

RAM stands for random access memory, a form of memory that holds its contents even if the current is turned off or disrupted. True False

False

Solid state storage devices (SSDs) store data in hard disk drives or optical media rather than memory chips. True False

False

Suppose a manager wishes to analyze historical trends in sales. He would use the online transaction processing (OLTP) system. True False

False

The American Recovery and Reinvestment Act Title XIII helped establish the National Fraud Alert system to help prevent identity theft. True False

False

The sql query below will only return the product ID and the total inventory for any product whose total on had value is greater or equal to 5. SELECT product_id , total_on_hand + total_on_order FROM retail.inventory WHERE total_on_hand <= 5 True False

False

The sql statement SELECT * FROM retail.inventory will return only half of the column from the inventory table. True False

False

Today, due to security concerns, most organizations avoid the database approach to data management, where multiple information systems share a pool of related data. True False

False

Two collections of attributes can have a common primary key. True False

False

Users still need help from the IT function of the organization to create customer reports using modern reporting tools. True False

False

When you receive a text message that there is a problem with your bank account and you are required you to click on a link to submit some information, you are likely facing a vishing attack. True False

False

A database management system (DBMS) serves as an interface between an application program and a database. True False

True

A database must reflect the business processes of an organization. True False

True

Downloading games from unknown websites can be risky. The software may be a Trojan horse. True False

True

In many cases, good ethics can mean good business and improved profits True False

True

It is possible to restrict access to data depending on the database user's privileges. True False

True

One of the primary roles of a senior IS manager is to provide subordinates with leadership and direction that will help the organization achieve its goals. True False

True

Secondary storage can store large amounts of data, instructions, and information more permanently than allowed with main memory. True False

True

Software as a Service (SaaS) allows businesses to subscribe to Web-delivered business application software by paying a monthly service charge or a per-use fee. True False

True

Some organizations choose to practice a form of Internet censorship by installing Internet filters on their employees' computers to prevent them from viewing sites containing pornography or other objectionable material. True False

True

Sometimes a database can contain "bad data," meaning incomplete, incorrect, inaccurate, or irrelevant records, which can be corrected or deleted through data cleansing. True False

True

The American Recovery and Reinvestment Act Title XIII includes strong privacy provisions for electronic health records (EHRs). True False

True

The GDPR obligates organizations that operate in the European Union to obtain the consent of the people they collect information about. True False

True

The data for BI (business intelligence) comes from many sources. True False

True

There are laws that require businesses to prove that their data are secure. True False

True

U.S. federal law permits employers to prevent viewing of pornography in the workplace by employees. True False

True

When a computer security incident occurs, it is recommended that the organization NOT reveal all they know in public forums. True False

True

If 10 users can run programs at the same time on the same computer, it is known as multitasking. True False

False

With the launch of Windows 10, Microsoft announced that it would publish ongoing, incremental upgrades instead of releasing new versions of the software every few years. However, IS professionals can opt out of frequent updates if they believe that making minimal changes will ensure reliable operations. True False

True

You are given the database information: retail.inventory, retail represent the database schema and inventory represent the table from the retail schema. True False

True

You work at a call center of a large bank, where you answer credit card services-related questions from customers. Lately, you have noticed an increased number of customers enquiring whether your organization initiated a call about their account. There might be a vishing scam in progress. True False

True

Your friend has a Mac that runs OS X. If she needs to run a Windows app on it, she can set it up to run Windows also. True False

True

Although Roberta had signed a form preventing her doctor from sharing her personal medical records with the company she worked for, she later discovered that the doctor's office had, in fact, shared her data with her health insurance provider and her employer, which caused her to be terminated. Because the doctor's practice violated its own privacy policy, she was able to file a lawsuit under the ________. a. Health Insurance Portability and Accountability Act b. Health and Medical Records Privacy Act c. Gramm-Leach-Bliley Act d. none of these answers

a. Health Insurance Portability and Accountability Act

Which component of Leavitt's Diamond defines roles, responsibilities, and lines of authority among members of the organization, which must be understood and accepted for the organization to operate successfully? a. structure b. technology infrastructure c. people d. processes

a. Structure

_____ encompasses all the activities required to get the right product into the right consumer's hands in the right quantity at the right time and at the right cost, from acquisition of raw materials through customer delivery. a. Supply chain management b. Value chain management c. Inventory management d. Customer management

a. Supply chain management

Felicity, who works at a bank, opens multiple credit card accounts for customers without their authorization in order to improve her customer sales, and thus her apparent job performance. This behavior is explicitly forbidden by bank policies and the instructions her manager gave her. Which statement is true in this situation? a. The bank can be held responsible for Felicity's behavior despite its ethical policies. b. The bank cannot be held responsible for Felicity's actions since they were contrary to bank policies. c. This situation demonstrates how bad organizational ethics can lead to bad business results. d. The principle called respondeat superior, meaning "let the master answer," does not apply.

a. The bank can be held responsible for Felicity's behavior despite its ethical policies.

How do fair information practices in the United States and the European Union differ? a. Unlike the EU, the U.S. has no single, overarching national data privacy policy. b. Unlike the U.S., the EU has implemented numerous data privacy laws. c. Unlike the EU, the U.S. addresses potential abuses by private industry but not by the government. d. Unlike the U.S., the EU divides their data privacy laws into three ares: financial, health related, and child specific.

a. Unlike the EU, the U.S. has no single, overarching national data privacy policy.

Which of the following activities does the USA Patriot Act define? a. cyberterrorism b. identity theft c. credit card fraud d. transmitting virus programs

a. cyberterrorism

Raw facts such as a social security number or catalog item number for a shirt are known as _____. a. data b. knowledge c. information d. entities

a. data

Walter mentions to his manager that it would simplify the maintenance of their firm's relational database if changes made to data attributes in a single table would automatically be made throughout the database. What would best achieve this? a. data normalization b. selecting c. data cleansing d. concurrency control

a. data normalization

A hospital system that wants to utilize big data can use HIPAA regulations to help them _____. a. identify which data needs to be protected from unauthorized access b. find nuggets of data that are relevant to the decision making at hand c. choose a subset of data to store d. process unstructured data into a usable form

a. identify which data needs to be protected from unauthorized access

A successful IS manager recognizes that sustaining a competitive advantage _____. a. means evolving to account for changes in customer needs b. requires little effort compared with initially gaining that advantage c. is outside the IS department's roles in most organizations d. primarily involves consistency in product and service offerings

a. means evolving to account for changes in customer needs

Bubba creates a web application that allows his coworkers to generate reports providing information on sales, costs, and inventory that they need for their job functions without assistance. Bubba has developed a(n) _____. a. personal information system b. workgroup information system c. enterprise information system d. interorganizational information system

a. personal information system

A collection of characteristics that belong to a single person, place, or thing for which data is maintained is a(n) _____. a. record b. file c. attribute d. character

a. record

Kennedy's company is adopting a service-oriented architecture approach to software development. This means that _____. a. their software will be flexible enough to allow the addition of new services b. their software will consist of many program modules that do not share information c. they have decided not to build or adopt microservices in the future d. they can build software without creating application programming interfaces

a. their software will be flexible enough to allow the addition of new services

High-quality data on the operations of the business is the primary ingredient of any effort to improve _____. a. worker efficiency or service quality b. competitive advantage c. customer experiences or satisfaction d. IS security

a. worker efficiency or service quality

Because they must deal with large quantities of data from so many different sources, IS employees at financial institutions may be at increased risk of failing to comply with government regulations designed to prevent money laundering, such as the _____. a. Sarbanes-Oxley Act b. Bank Secrecy Act c. HIPAA d. PCI Data Security Standard

b. Bank Secrecy Act

How is data governance different from data management? a. Data management is the core component of data governance. b. Data governance is the core component of data management. c. Data management involves defining processes, whereas data governance does not. d. Data governance involves defining processes, whereas data management does not.

b. Data governance is the core component of data management.

American's rights to freedom of religion, freedom of expression, and freedom to assemble peaceably are protected by the _____. a. Fourth Amendment b. First Amendment c. COPPA d. HIPA

b. First Amendment

Which element is not part of the CIA triad? a. Integrity b. Integration c. Confidentiality d. Availability

b. Integration

Business analytics certifications in high demand include _____. a. AJAX, C#, and Sharepoint b. SAP Business Objects, Hadoop, and Ruby on Rails c. Cisco, LINUX/UNIX, and CISSP d. .NET, PHP, and Java

b. SAP Business Objects, Hadoop, and Ruby on Rails

Which of the following is a provision of the USA PATRIOT Act? a. termination of the bulk collection of telephone records and Internet metadata b. authorization of "snack and peak warrants" for law enforcement agencies c. gathering of foreign intelligence from non-Americans outside the U.S. d. requirement for judicial authorization within 72 hours after surveillance of U.S. citizens begins

b. authorization of "snack and peak warrants" for law enforcement agencies

Autumn develops a strategic plan that will allow her organization to take advantage of opportunities and trends by _____. a. staying focused on costs b. being proactive c. reacting passively d. remaining in state of flux

b. being proactive

Assessing damage following a computer incident, investigating the unauthorized disclosure of corporate confidential data, and confirming or evaluating the impact of industrial espionage are tasks most appropriate for _____. a. managed security service providers b. computer forensics c. the CIA security triad d. a security dashboard

b. computer forensics

A high-level IS manager has his firm utilize sophisticated information systems to digitally design its products so that design defects can be detected and removed early in the process, reducing development cost. What business strategy does this represent? a. high standards b. cost leadership c. differentiation d. focus

b. cost leadership

A senior IS manager decides to invest in an information system that will reduce subcontractor labor costs for her organization by facilitating relocation of tools and materials to more optimal locations while rearranging workflows. What business strategy does this represent? a. high standards b. cost leadership c. differentiation d. focus

b. cost leadership

A senior IS manager implements a vendor-managed inventory system that reduces both the administrative costs of managing inventory and inventory holding costs. What business strategy does this represent? a. high standards b. cost leadership c. differentiation d. focus

b. cost leadership

Haley needs to query her firm's database, Jeff needs to generate a report for his next project status meeting, and Karen needs to make some modifications to update the data in the database. Which of the following tools can they all use to complete their current task? a. data dictionary b. data manipulation language c. data definition language d. These tasks require different tools.

b. data manipulation language

An IS manager is focusing on the people component of Leavitt's Diamond when he or she _____. a. delegates the responsibility for creating new procedures b. ensures that the IS help desk is available during work hours c. selects new IS software and service providers d. clarifies the changes in employee roles related to a new IS

b. ensures that the IS help desk is available during work hours

A DaaS arrangement can be especially cost effective for businesses that _____. a. host their own physical backup and recovery b. have fluctuating needs for database storage capacity c. require unusual data security processes be enforced d. prefer to build and maintain their own data centers

b. have fluctuating needs for database storage capacity

In which step of the ethical decision-making process is it essential to communicate well with all stakeholders and have someone they trust and respect explain why things are changing and how this will benefit them? a. evaluate the results b. implement the decision c. choose an alternative d. identify alternatives

b. implement the decision

A type of memory whose contents are not lost if the power is turned off or interrupted is said to be _____. a. unarbitrary b. nonvolatile c. inaccessible d. nonadjacent

b. nonvolatile

CPU clock speed is the predetermined rate at which the processor _____. a. processes instructions b. produces a series of electronic pulses c. produces a number of files d. loads memory pages

b. produces a series of electronic pulses

Amazon's decision to explore the possible use of delivery drones to gain a real competitive advantage over competitors who rely on less efficient ground transportation is an example of _____. a. inbound logistics b. strategic planning c. procurement d. human resource management

b. strategic planning

Government entities may pressure upstream Internet service providers to _____. a. immediately take down particular hosted material b. track and monitor the Internet activities of individuals c. deregister domains because of their hosted content d. accept defamation or copyright infringement claims

b. track and monitor the Internet activities of individuals

Why would Claire, who has a Certified Information Systems Security Professional credential, object to shadow IT efforts at her company? a. Issues can arise over the responsibility to fix shadow IT solutions when they break. b. Shadow IT provides the opportunity to evaluate and test many more information system initiatives. c. Shadow IT systems and processes may lack necessary levels of security required to meet compliance standards. d. Shadow IT delays testing of quick solutions to business needs.

c. Shadow IT systems and processes may lack necessary levels of security required to meet compliance standards.

What discipline combines elements of law and computer science to identify, collect, examine, and preserve data from computer systems, networks, and storage devices in a manner that preserves the integrity of the data gathered so that it is admissible as evidence in a court of law? a. CIA implementation b. risk assessment c. computer forensics d. security policy

c. computer forensics

A tier 3 or 4 data center would be most necessary for an organization with which characteristic? a. small with few employees b. prepared to process manual customer orders manually c. dependent on computers to manage manufacturing operations d. impacted by long-term but not short-term business disruptions

c. dependent on computers to manage manufacturing operations

An upper-level IS manager proposes that his organization implement a system to consolidate shipping and exception data from multiple carriers so that consumers know when their purchase will ship and when it will arrive. What business strategy does this represent? a. high standards b. cost leadership c. differentiation d. focus

c. differentiation

You might be a successful information systems worker if you _________. a. prefer a slow-paced environment where technology rarely changes b. prefer to work only on the computer and are not interested in the business c. enjoy learning new techniques and enjoy working with people d. are good at book-keeping, like an accountant

c. enjoy learning new techniques and enjoy working with people

Which type of information system do organizations use to define structured interactions among employees or between the organizational and external customers, suppliers, or business partners? a. personal information system b. workgroup information system c. enterprise information system d. interorganizational information system

c. enterprise information system

A database system that stores the entire database in random access memory is known as a(n) _____. a. relational database b. HDFS database c. in-memory database d. NoSQL database

c. in-memory database

Rigorous management processes are needed to govern data in order to _____. a. evade external regulations that manage risk associated with financial data b. support haphazard or incomplete business processes c. inform key business decisions with high-quality data d. isolate data architecture management from security management

c. inform key decisions with high-quality data

Violating the European Union General Data Protection Regulation guidelines will most likely increase a successful cyberattack's _____. a. direct impacts b. recovery costs c. legal consequences d. reputation damage

c. legal consequences

Carson's supervisor has asked him to review a variety of portable computers for possible purchase for their company's employees. Which of the following should Carson NOT consider buying? a. laptops b. notebooks c. nettops d. tablets

c. nettops

Compared with the traditional licensing model in which users purchase and install software, SaaS _____. a. can be accessed from fewer devices per license b. provides more reliable access in areas with no Internet service c. offers less expensive upgrades and new releases d. requires more maintenance on the part of customers

c. offers less expensive upgrades and new releases

After a successful cyberattack, the funds spent on repairing affected systems, restoring lost data, and performing a post-incident analysis are considered part of the _____. a. direct impact b. business disruption c. recovery cost d. legal consequences

c. recovery cost

After completing a security self-assessment, Hal decides to improve his practices related to use of social media sites such as Facebook. How can he make his social media use safer? a. access social media sites via a VPN b. change his password to one that includes only numbers and is eight characters long c. review, understand, and if necessary adjust his privacy settings for these sites d. run his antivirus software just before he logs in to these sites

c. review, understand, and if necessary adjust his privacy settings for these sites

Hardware utilization can be improved by logically dividing the resources of a single physical server to create multiple logical servers. This approach is known as _____. a. real-time task scheduling b. multithreading c. server virtualization d. multiprocessing

c. server virtualization

The purpose of business intelligence is to _____. a. provide access to novel tools to end users b. reduce the cost of data processing c. support improved decision making d. improve employee morale

c. support improved decision making

Big data veracity is a measure of _____. a. the degree of organization or structure of the data b. the data's worth for decision making in a given scenario c. the accuracy, completeness, and currency of the data d. the rate at which data in an area is becoming available

c. the accuracy, completeness, and currency of the data

One of the advantages of off-the-shelf software is that ________________. a. an organization does not have to pay for features that are not required and never used b. the software always matches current work processes and data standards c. the initial cost is lower because the software firm can spread the development costs over many customers d. the software contains important features, thus eliminating the need for future modification and customization

c. the initial cost is lower because the software firm can spread the development costs over many customers

_____ are people who work directly with information systems to get results. a. System analysts b. Database administrators c. System developers d. End users

d. End users

Which amendment protects Americans' rights to freedom of religion, freedom of expression, and freedom to assemble peaceably? a. Second b. Third c. Fourth d. First

d. First

_____ is/are considered to be the most important element in computer-based information systems. a. Bandwidth b. Software applications c. Standard operating procedures d. People

d. People

A company's risk assessment process can consider numerous threats to the computers and networks. Which of the following should an organization identify as loss events or threats to assess? a. distributed denial-of-service attack b. email attachment with harmful worm c. harmful virus d. all of the above

d. all of the above

During the early formation of the United States, many influential writings criticizing British rule were published without the real names of their authors. These publications represented a form of _____. a. slander b. First Amendment expression c. incitement to crime d. anonymous expression

d. anonymous expression

A slight majority (52%) of 700 CIOs surveyed reported that their IS organization is viewed as a _____. a. cost center or service provider b. value chain c. game changer d. business partner or peer

d. business partner or peer

To successfully fight computer crime in a court of law, prosecutors and victims depend on a properly handled _____. a. security education initiative b. intrusion detection system c. corporate security risk assessment d. computer forensics investigation

d. computer forensics investigation

An IS manager recommends that his organization invest in improving its customer information system so as to more clearly define the target market and improve service to that market. What business strategy does this represent? a. high standards b. cost leadership c. differentiation d. focus

d. focus

Collaboration between two or more organizations that lowers costs and reduces manual effort among employees is enabled by a(n) _____. a. personal information system b. workgroup information system c. enterprise information system d. interorganizational information system

d. interorganizational information system

High-quality data can increase sales by facilitating cross-selling, which involves _____. a. delivering a generalized shopping experience to customers b. ensuring customers pay a fair, correct price for each product they purchase c. encouraging customers to buy a comparable but higher-end product d. inviting customers to purchase an item related to what they are primarily interested in

d. inviting customers to purchase an item related to what they are primarily interested in

Helen is 72 years old and is a retired school teacher on a fixed income. She would like to buy a new computer so that she can communicate via email, follow friends and family on social media, and occasionally access recipes and gardening tips from the Web. An important thing to consider is that Helen has arthritis in her hands, making it difficult for her to work with small buttons and gadgets. So, of the following options, her best choice is probably a(n) ________. a. smartphone b. e-book c. desktop d. nettop

d. nettop

Ethical business practices _____. a. create a negative discrepancy between employee and organizational values b. increase employee turnover when workers feel their actions are overly restricted c. are usually more expensive for a business over the long term than unethical ones d. often raise an organization's priority with suppliers and other business partners

d. often raise an organization's priority with suppliers and other business partners

While conducting a security self-assessment of his personal laptop use, Vann realizes that he is putting himself at risk by _____. a. upgrading his operating system too often b. installing both firewall and antivirus software at the same time c. purchasing new anti-malware software before it has been reviewed by other consumers d. putting off installing available software updates that he has been notified about

d. putting off installing available software updates that he has been notified about

Allie has noticed that people at her company spend a lot of time researching the reasons for and correcting errors in the data they must use for their job functions. Usually when a mistake is discovered, it has already been propagated into multiple places, requiring a considerable clean-up effort. Allie realizes that improving the quality of the data at her firm would change this situation by _____. a. increasing sales b. improving decision making c. facilitating innovation d. raising productivity

d. raising productivity

What do AT&T, Computer Sciences Corporation, Dell SecureWorks, IBM, Symantec, and Verizon have in common? a. they recently suffered massive data breaches b. they pioneered bring your own device policies c. they have reduced their security risk to zero d. they are managed security service providers

d. they are managed security service providers

A well-designed series of rules or algorithms is a key component of which stage of the ETL process? a. extract b. edit c. load d. transform

d. transform


Set pelajaran terkait

lecture 2 security principles(NOT IN BOOK)

View Set

EDTPA making good choices study guide

View Set

test 1- operations and production management

View Set