WGU C724 Information Systems Management

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

An advantage to prototyping is that the user gets to do what?

"Test drive" the system before it is implemented

b and d

(Choose 2 answers) In order for a business to develop a global information system, it is important to understand the business drivers that are necessary to conduct business successfully in the global market. Examples of business drivers that a company can control include: a.) Economic conditions b.) Excellent marketing c.) Customer support d.) Trade relations

Bluetooth is a wireless protocol that connects nearby devices with peripherals at _________________.

2.4Ghz

How many layers are in the standard OSI model?

7- physical, data, network, transport, session, presentation, application

Growth

A business offers a marketing service that is offered by many other businesses in the local area. It is a highly competitive industry. The business finds an investor who gives the business enough money to expand the business into all 50 states in a short period of time. This business is using the strategy of WHAT? a.) Product differentiataion b.) Synergy c.) Growth

Visual flowchart representation of the decision and outcomes but does not use roots in the model

A decision tree analysis tool presents a WHAT? a.) Visual flow chart representation of the decision and outcomes and includes use roots in the model b.) Text based flow chart representation of the decision and outcomes but does not use roots in the model c.) Visual flowchart representation of the decision and outcomes but does not use roots in the model

Cultural Particularism

A societal norm that emotionally ties people to local brands or habits.

What is a social media activity that should be avoided by job seekers?

Any post or activity that represents discriminatory behavior.

Security policies are output from an organization's risk assessment process, which cover an organization's need for various levels of security. Auditing is an example of a security policies control. Which of the following is FALSE regarding auditing?

Auditing can only be used by the accounting department.

Action-specific verbs

Because feedback is not readily available with written communication, the content must be accurate and contain sufficient detail. Which of the following is most likely to increase the audience understanding of written communication? a.) Action-specific verbs b.) Acronyms c.) Technical terms

What is another name for a network host?

Data terminal equipment

Which of the following is a primary role of information systems managers?

Decision Making - one of the primary roles of management.

How does executive management use Executive Support Systems (ESS)?

ESS Provide High-Level Information in KPI Format - ESS compile critical data into key performance indicators for executive level monitoring and decision making.

The fundamental tenets of responsibility, accountability, and liability for all businesses and its citizens to follow

Ethical principles often form the foundation for legal regulations. Governmental agencies create these legal regulations to define which of the following? a.) The fundamental tenets of responsibility and accountability, but not liability as this is a legal issue. b.) The fundamental tenets of responsibility, accountability, and liability for all businesses and its citizens to follow. c.) The fundamental laws of responsibility, accountability, and liability for all businesses and its citizens to follow.

Instagram, Pinterest, and Snapchat have experienced significant user growth, but still trail __________________________________ in number of users and user engagement.

Facebook - still the most common social media site in the United States with 58% of adults and 71% of teens (ages 13 to 17) using the site.

Foreign Key

Field that is a primary key to another table.

Access to information

Handheld smart devices have increased productivity because, most importantly, they allow WHAT from anywhere? a.) Communication b.) Access to information c.) Collaboration

ABC Playground Company has been asked to build a new playground for a local elementary school. The project must be completed before the first day of school. What would increase the likelihood of finishing the project on time?

Have the most experienced workers complete tasks on the critical path

Network

In MIS, the WHAT component consists of hubs, communication media, and network devices and can be wired or wireless? a.) Infrastructure b.) Hardware c.) Network

optical character recognition (OCR)

Input devices and methods have included now-archaic punch cards or magnetic readers

What are the basic activities of information management?

Input, processing, and output

What's the difference between ICR and OCR

Intelligent character recognition (ICR) is an intelligent or advanced form of Optical Character Recognition (OCR)

Which of the following statement is TRUE concerning safe harbor?

It is a self-regulation component.

Why do users fail to adopt new information systems?

Lack of training or acceptance for new system.

Data dictionary

Metadata is data about the data, and it is the necessary information needed to understand and use data effectively. Where would the metadata about Customer and Product tables be stored? a.) DBMS b.) Database c.) Data dictionary d.) ERD (Entity-relationship Diagram)

The systems analyst is required to do which job?

Prepare and explain written reports and keep stakeholders updated

By advertising and selling physical products online, e-commerce allows customers to achieve all of the following, except:

Previewing and examining the projects.

Which of the following concept dictates that personnel should be given access on a need-to-know basis?

Principle of Least Privilege

Which of the following best describes the RAD methodology?

RAD (Rapid Application Development) focuses on software development with limited emphasis on planning.

SQL

Relational databases use WHAT to administer and manage databases? a.) C++ b.) Fortran c.) SQL

Social engineering is a method used by hackers to develop a ________________________________________________ to trick employees into revealing confidential information or passwords.

Relationship

Prices for goods have changed slowly, due primarily to which of the following?

Relatively slow methods of communication.

Star network

Router in middle of each computer connected to the router/hub.

Field

Sarah is a sales associate at a major bookstore. A customer calls the store to order a book, but he could only remember part of the book title. So, Sarah logs into the bookstore's DBMS and searches the book title WHAT for a listing of the book? a.) Record b.) Field c.) Metadata d.) Table

How many methods are there to increase user adoption and lower the cost of a system, post implementation?

Six - Usability Testing, Benchmarking, User Communication, Forming Internal User Group, Planning, Leveraging Existing Resources

The six formal steps that need to be followed to develop an information system is known as what?

System development life cycle

Which of the following statements regarding e-commerce is true?

The omnichannel model has replaced the e-commerce model.

System development life cycle

The six formal steps that need to be followed to develop an information system is known as what? a.) Program specifications b.) System development life cycle c.) System analytical cycle

What is the purpose of a general MIS evaluation?

To Analyze System Performance

A Web browser is required to surf the Internet. What other protocol is needed by a client computer to request a Web site via HTTP or HTTPs?

URL (uniform resource locator)

Cloud computing and __________________________________ are enabling new Internet utilization business models.

Web 2.0

Scrum software development methodology

form of agile software development that recognizes that customer needs and wants can change throughout the project. Unexpected changes and challenges, which cannot be addressed with the traditional waterfall SDLC model, can be quickly addressed

False

True or false. A business ecosystem is a network-based strategy that is a tight collection interdependent industries that provide related services and products. a.) True b.) False

False

True or false. A software analyst acts as a change agent by using design and analysis techniques to solve organizational problems using information technology. a.) True b.) False

True

True or false. Easy access to information is both an advantage and disadvantage to information management. a.) True b.) False

False

True or false. Examples of competitive forces include new market entrants, substitute products, and customer rivalry. a.) True b.) False

True

True or false. Hardware and software are examples of information technology. a.) True b.) False

True

True or false. Point-of-sale cash registers at a fast-food restaurant are an example of an information system. a.) True b.) False

False

True or false. Telephones are an example of how information systems are used in business. a.) True b.) False

False

True or false. The CIO (Chief Information Officer) is the top position and driving force in an organization that all others report to. a.) True b.) False

False

True or false. The first step before establishing global information system strategies is to determine the technology needed. a.) True b.) False

False

True or false. The key role of the CDO (Chief Data Officer) is to maintain security of IT systems. a.) True b.) False

B and C

(Select all that apply). If we intentionally harden our individual security, we can make it more difficult for criminals to steal our information assets. Which of the following recommendations will harden our individual security? a.) Make account access or changes easier b.) Manage the retention and disposal of potentially sensitive information c.) Randomize behavior

A and B

(Select all that apply). Organizations need to implement controls that will help them mitigate risks due to technological factors. Which of the following are controls to counteract risks due to the use of computers for business operations? a.) Disallowing employees to share access with other employees or customers b.) Adopting email policies and equipment to limit spam and malware on computer systems c.) Implementing an auditing control to mitigate risk from collusion

a and b

(Select all that apply). People access the Internet all the time. What is considered acceptable online conduct? a.) Be careful with the sites you visit. b.) Check content before you download it. c.) Email chain letters to friends.

A and B

(Select all that apply). What are some of the actions that savvy users do to protect their privacy? a.) Delete cookies from the computer periodically b.) Enable popup blockers c.) Do not use anonymous browsing

a and b

(Select all that apply). What can individuals do to protect their computer systems? a.) Create a computer system recovery point. b.) Do not use abandoned jump drives. c.) Do not allow automatic updates.

What is the typical broadband data speed of a 4G network?

100,000 kbps

Using the IP address of 142.212.25.1, which two bytes are managed and assigned by the Internet Service Provider?

142 and 212 - the ISP determines/manages the 1st 2 bytes

What is the primary difference between a 1G cellular network and the current 4G network?

1G enabled mobile voice telecommunication while 4G offers voice, data and video.

Using the IP address of 142.212.25.1, which two bytes are managed and assigned by the computer administrator to each individual host on the network?

25 and 1. The last two bytes are assigned to and managed by the client. The first two bytes are assigned to and managed by the ISP

Which of the following best describes the classical model in management decision making? a- the classical model supports motivational theory b- the classical management model supports collaborative decision making c- the classical management model supports planning and controlling

?

When installing a wireless network, it is important to know the number of ____________, and the best access point locations.

? (Users? or Routers? - NOT Hubs)

With GDSS, users can meet in one location, but collaboration can happen remotely

A GDSS differs from traditional DSS in what way? a.) With GDSS, users can meet in one location, but collaboration can happen remotely. b.) With GDSS, users are interacting simultaneously, but cannot do it remotely. c.) With GDSS, users meet in person in one location, and collectively participate in the decision-making process.

To implement future changes

A GIS is an example of a semi-automatic decision support system. Which of the following is NOT a benefit of the GIS to the county administrators? a.) To change ordinances b.) To enact legislations c.) To act, redirect, and redistribute funds d.) To implement future changes

Organizations can exchange data and files through cloud computing or a VPN. Which of the following is an advantage of a VPN, but not an advantage of cloud computing?

A VPN provides more secure access than cloud computing.

Schema

A WHAT is a planned design structure of a database? a.) Attribute b.) Schema c.) Field d.) Foreign key

URL

A Web browser is required to surf the Internet. What other protocol is needed by a client computer to request a Web site via HTTP or HTTPs? a.) DNS b.) FTP c.) Telnet d.) URL

What role should a change agent play when implementing a new information system?

A change agent identifies positive improvements and helps train and motivate users.

ERD

A database schema can be represented by which model? a.) ERD (Entity-relationship Diagram) b.) Data Repository c.) Foreign Keys

Levels

A decision tree tool is not viable when data contains a different number of WHAT? a.) Layers b.) Branches c.) Levels

EIS

A digital dashboard displays charts and graphs with up-to-the-minute performance indicators on sales, profit, expenses and inventory. This is an example of a(n) WHAT? a.) EIS b.) DSS c.) MIS d.) TPS

Which of the following best defines a digital signal?

A digital signal is a discrete, non-continuous electrical waveform.

Recover and protect business operations

A disaster recovery plan (DRP) is a document of procedures to do what? a.) Reimburse company for infrastructure damages b.) Keep employees safe during natural disasters c.) Recover and protect business operations

What is the relationship of a feasibility study to an information system development project?

A feasibility study is an analysis to determine if a proposed system is possible - usually completed in the systems analysis phase of a proposed program, and evaluates cost, return on investments, and the likelihood of project success.

Primary Key

A field that uniquely identifies a record, such as customer ID or student ID.

DSS

A financial consultant can use a(n) WHAT to help his/her clients select investment choices and make informed financial decisions? a.) MIS b.) TPS c.) EIS d.) DSS

What is a denial of service attack?

A hacker attempt to tie up network host resources making them unavailable.

A customer relationship management (CRM) system

A husband and wife open up a small winery on their personal property and become small-business owners. In setting up their new business, they purchase an iPad and a third-party cash register system that is designed for small-business owners. When new customers purchase bottles of wine at the winery, the customers are asked for their email addresses. The business owners would like to be able to market to these customers based on the type of wine that they like to purchase. Which of the following types of systems could be the first system that these small-business owners implement to assist with their marketing efforts? a.) A customer relationship management (CRM) system b.) An enterprise resource planning (ERP) system c.) Management information system (MIS)

Business can be resumed quickly and effectively after a disaster

A properly implemented disaster recovery plan (DRP) provides businesses with what kind of assurance? a.) Backups for operational databases will be functional after a disaster. b.) Business can be resumed quickly and effectively after a disaster. c.) Business operations will recover immediately after a disaster.

What is a radio frequency survey?

A radio frequency survey is a signal strength detection process to identify the best wireless access point locations.

A secure platform for internal use

A reliable intranet connection provides organizations and their suppliers and vendors with WHAT? a.) A secure platform for outside consumers to place orders b.) A secure platform for internal use c.) A secure platform to conduct business on the cloud

Different networks

A router connects data links from a single network and transmits data packets between WHAT? a.) Hubs installed between switches b.) Single subnets on the same network c.) Different networks

Input

A scanner is a(n) WHAT device that works similarly to a copy machine? a.) Output b.) Input c.) Touch

Infrastructure as a Service (IaaS)

A service provider provides a cloud fabric, or pooled services, including server space, servers, storage, and all other aspects of the computing platform, with the exception of the operating system and applications, which the client organization would install and manage.

Unified modeling language (UML) is a general-purpose modeling language designed to provide what?

A standard method to represent the design of a system

Executive information system

A system that facilitates and supports senior managerial decisions.

Dashboard

A system that is often the culmination of information from many data sources, allowing management to drill down into analyses is known as a WHAT? a.) Information system b.) Dashboard

Dashboard

A system that is the culmination of information from many data sources, allowing management to perform a thorough analysis.

What is the overall job function of a systems analyst?

A systems analyst focuses on analysis, design, and implementation.

Why must a systems analyst be a good communicator?

A systems analyst must be able to communicate system capabilities and benefits - and must arbitrate issues that come up during the project.

Business

A systems analyst should try to have an understanding of WHAT processes? a.) Management b.) Change c.) Business

Balanced scorecards are often used in business. What is a balanced scorecard?

A tool used by management to track and monitor staff and organizational activities - a BPM tool.

Hierarchical

A tree-like structure database is WHAT type of database? a.) Hierarchical b.) Flat file c.) Relational

Gantt chart

A visual view of tasks scheduled over time; used for planning projects.

Several independent parties or governing bodies work together to define the rules that help to manage effective network communications. Which of the following is NOT one of the governing bodies that recommend and decides on telecommunications standards?

ARPANET- The 3 governing bodies are: IOS (International organization for standardization), IEEE (Institute of Electrical and Electronics Engineers), IETF (internet engineering task force)

The division between brick-and-mortar and online operations has been erased

According to the omnichannel model, inventory volume is reduced and operations become leaner and better able to react to changes in demand because of which of the following reasons? a.) Focus is on maximizing multi-channel strategy. b.) Warehouses filled with inventory become hybrid warehouses. c.) The division between brick-and-mortar and online operations has been erased. d.) Physical retail storefronts now become distribution centers.

Consult legal counsel and retain documentation of all stolen information.

Accountability - the application of responsibility, or an obligation to accept responsibility. You accepted the responsibility of a student, and you thereby are accountable for your actions as a student.

Which of the following is NOT a typical option for creating an e-commerce presence?

Acquiring an e-commerce presence from another firm.

Because feedback is not readily available with written communication, the content must be accurate and contain sufficient detail. Which of the following is most likely to increase the audience understanding of written communication?

Action-Specific Verbs - Avoid acronyms and highly technical terms in written communication. Use short paragraphs & action-specific verbs.

Which of the following actions is the hardest, but most desirable in individuals and businesses?

Actions that are both legal and ethical.

Which of the following statements is FALSE about our actions that are ethically acceptable?

Actions that are ethically acceptable are also socially and legally acceptable.

Although teen usage of social media exceeds that of adults, what adult demographic group is experiencing an increased use of social media, with 31% of members of that age group reportedly using social media?

Adults ages 65 years and older.

Ten

After analyzing management behavior, Henry Mintzberg identified HOW MANY roles performed by organizational managers? a.) Five b.) Three c.) Ten

Understand the methods that criminals use to steal personal information

After people determine what kind of assets are irreplaceable and how vulnerable they are, what do people do next to protect against the risk of identity theft? a.) Understand the methods that criminals use to steal personal information. b.) Consult legal counsel and retain documentation of all information that might be stolen. c.) Notify the credit bureaus to be sure they have record of your credit card accounts.

Which of the following customer attributes is not helpful for accurately pricing goods to increase profit margins?

Age

What should be defined when giving an oral presentation?

All technical acronyms and terminology

Customer Relationship Management (CRM)

Allows for personalized communication to customers.

Which of the following describes the Freedom of Information Act (FOIA)?

Allows individuals to examine government records as long as it does not cause an invasion of privacy.

Database Management System

Allows multiple departments to access, analyze, and modify data that is stored in one central location.

Besides e-tailing, which of the following e-businesses utilizes its supply chain to be a platform for many others and also continuously innovates into other e-business services?

Amazon - they are continuously innovating into other areas to utilize their supply chain to be a platform for many others, and to expand into other e-business services.

The most widely used channel for business

Among all the connections - Internet, intranet, and extranet - the Internet is WHAT? a.) A type of extranet for suppliers doing business b.) The second most widely used channel for business c.) The most widely used channel for business

Business ecosystem

An IT services company, a digital marketing company, and a photographer recognize that each party brings a unique skillset to the small and medium-size businesses that they service, so they decide to work together. These three companies work together to make it easy for a business to hire all three of these companies to do work for their business. This is an example of a WHAT? a.) Virtual company b.) Business ecosystem c.) Network economics

Google search

An application that enables users to search for facts or information using voice commands is called? a.) Ask.com b.) Google search c.) Mozilla

Field

An attribute of an entity, such as name, address, or student ID.

Linux

An example of an open-source operating system would be WHAT? a.) OS X b.) Windows c.) Linux

Telephone service

An important downside to a converged computer network is that when it goes down, WHAT is disabled? a.) Electricity b.) Website c.) Telephone service

Prescriptive

Analytics includes data mining, process mining, business process modeling, complex event processing, predictive analysis, and WHAT analysis? a.) System b.) Backward c.) Prescriptive

No, a hypervisor is a computer software that enables network virtualization and is not necessary

Are hypervisors or hypervisor applications necessary in small businesses with simple networks? a.) No, a hypervisor is a computer software that enables network virtualization and is not necessary b.) Yes, hypervisor is another name for simple routers and are necessary c.) Yes, hypervisors enable data network links and are necessary

Project manager

As IT is deployed ubiquitously through the enterprise, what critical implementation role will continue to gain traction and demand? a.) Network engineer b.) Software engineer c.) Project manager

Data inconsistency

As a student taking classes, imagine if your name was misspelled in one class, but not the other, and the impact this would have on your student record. If the same attribute in related data files has different values, what is this an example of? a.) Data integrity b.) Data redundancy c.) Data inconsistency d.) Data quality audit

Liability

As the owner of a small business, which of the following would allow your clients to sue you in court for any mismanagement? a.) Responsibility b.) Accountability c.) Liability d.) Ethical principles

Data in motion

At any point in time, all data must be categorized as being in one of the three states. Data that are in main memory or RAM are categorized as being in which of the following three states? a.) Data in motion b.) Data in use c.) Data at rest

Data at rest

At any point in time, all data must be categorized as being in one of the three states. Data that are not being accessed by the CPU are considered to be in which of the following three states? a.) Data in use b.) Data at rest c.) Data in motion

Which of the following must be enforced to protect the organization's corporate data resources and to control access to the information assets?

Authentication and Authorization

There are multiple methods of data capture, categorized as manual or __________________________________________.

Automated

A tool used by management to track and monitor staff and organizational activities

Balanced scorecards are often used in business. What is a balanced scorecard? a.) A tool used by management to track and monitor staff and organizational activities b.) A type of dashboard that tracks goal attainment intervention c.) A methodology in business intelligence that only tracks organizational activities

Organizations are constantly encountering cyber-attacks from intruders. For instance, in late 2013, the security system of Target Stores, Inc., was compromised by which of the following type of attacker?

Black Hat - a computer hacker who acts with a criminal intent.

2.4 GHz

Bluetooth is a wireless protocol that connects nearby devices with peripherals at WHAT level? a.) 64 kbps b.) 2.4 MHz c.) 2.4 GHz

__________________________________________ is an alternative tool that requires a group of users to collectively review and analyze the alternatives, prior to making a decision.

Brainstorming

Which of the following is not a key factor to consider when evaluating a system alternative?

Brand

What must an effective business intelligence platform accomplish?

Business intelligence must help align the organization with business objectives.

Databases help businesses compile competitive transactional information, enabling management to react to changing market conditions and be more competitive

Business use databases for many reasons, so it is important to understand their basic fundamentals. Select one of the following answers about databases that is NOT correct. a.) Businesses use databases to store employee, customer, and product data to help them automate processes and get useful information for quicker decision making. b.) Databases help businesses compile competitive transactional information, enabling management to react to changing market conditions and be more competitive. c.) A database of company transactional and supply chain data, when combined with market, economics, and other government regulations, can lead to business intelligence.

Employee turnover

Businesses encounter losses as a direct result of exposure to security threats or risks. Which choice would NOT be a direct loss? a.) Employee turnover b.) Potential revenue c.) Critical operational information

Why is it imperative that modern businesses have a social media marketing strategy?

Businesses must have a social media marketing strategy to capture this new community of users and to address issues of social care.

Content provider

Businesses, such as newspapers and magazine publishers, can use which of the following models to provide news and reporting to readers? a.) Brokerage b.) Content provider c.) Advertising d.) Direct marketing

Which of the following is not considered when determining the target audience in e-commerce?

Buyer Location - important when companies are pricing their products, but it is not an important feature to consider when targeting the audience.

Which of the following is a disadvantage of buying digital goods online?

Buying digital goods online makes the buyer more prone to online fraud - Shopping online increases the chance of identity theft.

Previewing and examining the projects

By advertising and selling physical products online, e-commerce allows customers to achieve all of the following, except: a.) Interacting with the companies directly. b.) Previewing and examining the projects. c.) Maintaining operational efficiencies. d.) Receiving more information about the products.

How does the Internet help to improve a company's reputation?

By providing information about the company's vision, mission, and community efforts.

_________________________ is a project management technique that identifies critical tasks and helps reduce program delays.

CPM - Critical Path Method - helps visualize critical tasks and program end date.

What is the most important aspect of the critical path method (CPM) in project management?

CPM defines the critical and noncritical tasks

Information technology management

Casselberry College maintains secure logins for all of its students to access programs on the network, register for classes, and view their courses on the learning management system. Before they can login to the network, they must accept the user terms and conditions and promise to use the college computers responsibly. This entire process runs smoothly because of good WHAT? a.) Information management b.) Information technology management

Data auditor

Checking on the employee's appropriate access to the company's database is the responsibility of what role below? a.) Data auditor b.) Information policy administrator c.) Data administrator d.) Database administrator

Which of the following is a U.S. law stipulating what a website operator must include in a privacy policy?

Children's Online Privacy and Protection Act (COPPA) - also requires them to obtain parental permission from children under the age of 13 before collecting any information.

communicated business goal

Choose which practice aligns information technology with business objectives to manage project risk and system implementation. a.) communicated business goal b.) business process and value chain analysis c.) benchmarking products and services

What was stolen in the Chelsea Manning and Edward Snowden crimes?

Classified documents of the U.S. government - they stole hundreds of thousands of classified documents from the U.S. government.

North Americans are usually very straightforward and distrust evasive behavior. This characteristic is an example of a cultural difference in which of the following?

Communication Style - It is important to recognize cultural differences in communication style to prevent misunderstandings.

How are user expectations best managed during system implementation?

Communication and Training

Web 2.0 sites enable collaboration and interaction among users, creating a virtual online ______________________________________.

Community

Maintaining a social online presence has become the latest trend. Businesses can use which of the following models to connect online with their customers?

Community - Ex= Facebook, Google+, LinkedIn.

Database integrity

Companies must maintain WHAT by keeping their data safe from unauthorized changes? a.) Database reliability b.) Database integrity c.) Database Consistency

Software companies such as Microsoft frequently develop system updates. What should individuals do with these system updates?

Configure your computer system to receive these updates automatically.

The first Internet social media site was Six Degrees in 1997. Six Degrees was a social network site that allowed users to develop an online profile and, most importantly, to _____________________________ with other users.

Connect

Used

Consider all the different people who might have access to data in a financial organization, from the president to the managers to the tellers. In a financial DBMS, using data governance procedures, controlling who can have access to what data will affect how the data is WHAT? a.) Used b.) Collected c.) Stored

Businesses, such as newspapers and magazine publishers, can use which of the following models to provide news and reporting to readers?

Content Provider - As with traditional newspapers, cinemas, and video stores, online content providers rent or sell online access to digital content, such as music, news, video, and images. Examples include iTunes, Shutterstock.com, and Netflix.com.

Which of the following is not an effective telecommunication medium?

Copper building wire

What is the best definition of a core router?

Core routers connect large businesses to the Internet backbone.

Freemium is not a new concept in doing business. Which of the following statement regarding Freemium is false?

Core services and additional features are free of charge to users - Core services might be free, but additional features and services are usually available for an additional charge.

In which of the following business structures is an individual not held personally accountable for any liabilities, risks, and debts from business operations?

Corporations - A corporation is a separate legal entity created formally to represent the capital investments and encapsulate the risks, liabilities, and debts of a single owner or many shareholders. An individual does not share in the rewards and liabilities outside of the business arrangement.

Which of the following business structures depicts a legal entity that can encompass a big number of shareholders?

Corporations - a separate legal entity created formally to represent the capital investments and encapsulate the risks, liabilities, and debts of a single owner or many shareholders.

Which of the following actions will help us protect our computer against failure?

Create automatic backups on cloud storage.

Baiting

Criminals use low-tech attacks to steal sensitive information from individuals in public places. One method is called WHAT, which is leaving a jump drive unattended in a parking lot and waiting for someone else to pick it up and connect it to their home computer? a.) Pretexting b.) Pharming c.) Quid pro quo d.) Baiting

Phishing

Criminals use which method to send legitimate-looking emails to innocent victims, which direct them to a Website where they are asked to input personal information such as user logon and password? a.) Identity theft b.) Pharming c.) Social engineering d.) Phishing

Pharming

Criminals use which method to steal personal information by redirecting users to a legitimate, official-looking website? a.) Identity theft b.) Social engineering c.) Phishing d.) Pharming

Which of the following is NOT a process description tool?

Critical path

Automated reporting

Customer relationship management (CRM) is a strategy that companies use to handle customer interactions. One business benefit of a CRM system is WHAT? a.) Manage flow of goods b.) Automated reporting c.) Better internal communication

Business analytics consists of the tools and techniques used for the analysis and understanding of data, and include ________________________________________ modeling, statistics, and OLAP.

Data Mining

At any point in time, all data must be categorized as being in one of the three states. Data that are not being accessed by the CPU are considered to be in which of the following three states?

Data at Rest - data that are stored on secondary or tertiary storage (e.g., on a hard drive or portable media), and also data that are not being accessed by the CPU.

Flat file

Data files containing records with no structured relationships are WHAT type of database? a.) Hierarchical b.) Flat file c.) Relational

At any point in time, all data must be categorized as being in one of the three states. Data that are in main memory or RAM are categorized as being in which of the following three states?

Data in Motion - data that is being transferred over a network or are waiting in primary storage to be read or updated.

Corrupted

Data quality audits and data cleansing are important for managing data resources. What data below should be scrubbed so that they are consistent with the design of the database? a.) Audited b.) Normalized c.) Corrupted d.) Inconsistent

Data, Information, and Knowledge example

Data: The number of people below the poverty line in the region is 50,000. Information: The number of people below the poverty line increases between 2010 and 2018. Knowledge: The number of people below the poverty line has increased due to stagnating wages and cuts to social programs.

Text mining

Databases are used extensively on the Internet and in business to help managers make more informed decisions. WHAT is a popular business concept used on the Internet because it can sieve through a huge amount of unstructured data and transform it into a structured and organized format? a.) Data mining b.) Web mining c.) Text mining

GDSS

Decision makers at multiple geographic interactively collaborating depend on WHAT? a.) BPM b.) ESS c.) GDSS

Translating

Decision support systems (DSS) enable business performance management by doing WHAT to organizational strategies into operational targets? a.) Matching b.) Mapping c.) Translating

Which of the following would likely be a step in building a logical model of a system?

Defining what must be accomplished - but does not explain how it will be accomplished.

All of the following are discussion actions that social media users can perform while immersed in an activity or current event, except:

Delete - Only moderators or administrators can delete discussion posts.

(Select all that apply). What are some of the actions that savvy users do to protect their privacy?

Delete cookies from the computer periodically. Enable popup blockers.

The work breakdown structure (WBS) is a broken down list of project _________________________ required to complete a project.

Deliverables - the customer will get when the project is complete.

We need to intentionally harden our individual security to make it harder for criminals to steal our information assets by removing all paper trails to our important information. ___________________________________________ using a cross-cut shredder will help eliminate this possibility.

Destroying Sensitive Information

Standards

Developing international networks has a few problems today because of the variation in global computing WHAT? a.) Networks b.) Governance c.) Standards

Supply Chain Management (SCM)

Diane's Designer clothing wants to be the price leader in the clothing industry by cutting out the middlemen, renting warehouse space, producing easier clothing designs, and bringing products to market in less than three weeks defines what type of enterprise system? a.) Enterprise Resource Planning (ERP) b.) Customer Relationship Management (CRM) c.) Supply Chain Management (SCM) d.) Knowledge Management (KM)

EIS

Different types of information systems are based on the different levels of hierarchy in an organization. Which of the following represents the highest level of responsibility in an organization? a.) DSS b.) EIS c.) MIS d.) TPS

Which of the following is not a benefit of using SDLC when implementing an information system program?

Difficulty in Estimating Project Cost - SDLC does not provide a good project estimation. It does help control and monitor large projects.

Social media marketing managers usually hold a bachelor's or advanced degree, have ______________________________ marketing experience, and excellent communication skills.

Digital

Which of the following is NOT a legislation created to protect the integrity and confidentiality of information?

Digital Millennium Copyright Act (DMCA)

Traditionally printed material

Digital goods are available in electronic format. Which of the following is NOT an example of digital goods? a.) Traditionally printed material b.) Website templates c.) Software d.) Microsoft Word

Which of the following is a disadvantage for purchasing digital goods?

Digital goods are very difficult to return.

Musical DVDs

Digital goods refer to products that can be downloaded from the Internet. Which of the following is NOT an example of digital goods? a.) Streaming videos b.) Musical DVDs c.) Mobile apps d.) Video tutorials

Digital goods provide several benefits for e-commerce. Which of the following is not a benefit achieved from digital goods?

Digital goods require physical presence to acquire.

(Select all that apply). Organizations need to implement controls that will help them mitigate risks due to technological factors. Which of the following are controls to counteract risks due to the use of computers for business operations?

Disallowing employees to share access with other employees or customers. Adopting email policies and equipment to limit spam and malware on computer systems.

The intelligence phase in the decision-making process consists of the ___________________________________, identification, and understanding of the problem.

Discovery

The ____________ step, when managing systems implementation, consists of cataloging the system specifications in detail.

Documentation - documents all system specifications.

Votes

Due to its data capture and display ability, GIS can be a very beneficial tool for law enforcement. Which of the following data is least useful in a GIS to help fight crimes? a.) Locations b.) Traffic c.) Votes d.) Taxes

Normalization

During the database design process, WHAT takes place to eliminate data redundancy? a.) Normalization b.) Integrity review c.) Redundancy elimination

To be competitive in the marketplace, businesses should lure customers in by providing information on their websites that is _________________________________________________________________ driven.

Dynamic and Multimedia - appeals to the customer and draws them in deeper to the website.

What type of data is included in executive support systems (ESS)?

ESS data includes internal enterprise data, as well as external data from financial, industry, and trade databases.

How does executive management use executive support systems (ESS)?

ESS provide high-level information in Key Performance Indicator (KPI) format

Avoided

Effective written communication must be correct, simple, and accurate. Jargon and terminology should be WHAT? a.) Used b.) Explained c.) Avoided

Which of the following application provided by the Internet allows a business to transfer documents automatically without human intervention?

Electronic Data Interchange (EDI)

SMTP (Simple Mail Transfer Protocol)

Electronic communications has predominantly become the primary form of communications in first world countries. Which of the following protocol is used to manage and monitor the massive amount of emails that we receive every day? a.) Telnet b.) URL (Universal Resource Locator) c.) DDNS (Dynamic Domain Name System) d.) SMTP (Simple Mail Transfer Protocol)

Which of the following is a proactive technological measure that could help protect our privacy?

Email Encryption

LinkedIn provides employment recruiters with a global database of potential __________________________________________________.

Employees

There is a higher chance of failure in Information system projects if __________________________________ do not use and leverage the system on behalf of their organization.

Employees - must leverage the system on behalf of organization.

How do organizations confirm the identity of their employees before they are allowed access to the corporate data resources?

Employees must be authenticated.

Knowledge Management (KM

Employees sharing of their expertise and best practices across business units defines what type of enterprise system? a.) Enterprise Resource Planning (ERP) b.) Customer Relationship Management (CRM) c.) Supply Chain Management (SCM) d.) Knowledge Management (KM)

LinkedIn posts and profile information is typically more ______________________________________________ and occupation-related.

Employment

Encryption is an intrusive form of authentication

Encryption is the process of encoding useful information into a different format. Which of the following statements is NOT an accurate description of the encryption method? a.) Modern encryption methods maintain data integrity. b.) Encryption is an intrusive form of authentication. c.) Encryption can be performed using a mathematical formula.

_______________________________________ combine multiple tools or workbenches to support the complete software cycle.

Environments - CASE environments software is used to support complete software development cycles.

Which of the following is a set of regulations to protect Internet users from clandestine tracking and unauthorized personal data usage?

European Union's General Data Protection Regulation (GDPR)

____________________________ is defined as the process of gathering and analyzing information in order to compare performance with predetermined objectives, and to determine whether or not the objectives were achieved.

Evaluation

An organization's need for various levels of security

Every organization, big or small, must establish policies and procedures to secure and control their information assets. Security policies are output from an organization's risk assessment process. What do security policies cover? a.) An organization's need for one level of security. b.) An organization's need for a flat level of security. c.) An organization's need for various levels of security.

Airports or coffee shops, where criminals redirect users to a website that looks official and legitimate

Evil twins and pharming are two different examples of phishing. What's the best example of pharming and where it can occur? a.) Airports or coffee shops, where criminals offer free, trustworthy-looking Wi-Fi connections b.) Airports or coffee shops, where criminals hack into wireless network cards to retrieve passwords used c.) Airports or coffee shops, where criminals redirect users to a website that looks official and legitimate

What systems do upper management use for decision making?

Executive Support Systems (ESS) - provide dashboards to executive management with key performance indicators.

Group decision support systems (GDSS)

Executive management, who are interacting simultaneously in different locations to collectively participate in the decision-making process, use what type of decision-support system? a.) Simple decision support systems (DSS) b.) Group decision support systems (GDSS) c.) Executive support systems (ESS)

Which of the following is a disadvantage of using a VPN?

Expensive

One way to define user requirements is to allow users to _______________________________ with the system during development.

Experiment

The Golden Rule, or "do unto others as you would have them do unto you," belongs to which of the following ethical models for ethical behavior?

Fairness

[True/False] Commercial websites have domain names so that users can easily access the web pages by typing the domain names instead of the IP addresses into the URL. All domain names must have four parts, regardless of where the websites are located. Each part is written as a set of octets and is separated by a period.

False

[True/False] Every time we use a computer, we are exposed to the risk of getting a computer virus, even when we scan a photo onto a jump drive using a scanner or a printer.

False

[True/False] Process-centered environments are the least resourceful category due to the lack of capability of specifying analysis and design, as well as the formal software control process.

False

[True/False] Telegraph technology provided richer quality, more detailed, and a more reliable form of communication than the telephone.

False

[True/False] There are several business models that organizations can use to conduct business online. However, organizations can only use one model at a time to ensure smooth processing of online transactions.

False

[True/False] With security measures already implemented in the network systems, it is not necessary for telecommuters to use a secured connection, such as the Virtual Private Network (VPN), to gain remote access to their work servers.

False

T/F: Modular design, decision tables, decision trees, and structured PERT are process description tools.

False Correct. All of the above are process description tools except structured PERT

[True/False] The programming stage in the waterfall method of software development focuses on development and testing.

False Testing is a separate, focused stage in the waterfall model

T/F: The prototyping software development method consists of three steps.

False The prototyping method is a four-step process: user basic requirements, development of prototype, using prototype, and revising prototype.

[True/False] The prototyping software development method consists of three steps.

False - 4 Steps: (1)Determine User Needs, (2)Develop Prototype, (3)Use Prototype, (4)Revise Prototype

[True/False] Social media has transformed how individuals communicate; it is not a channel for business communications.

False - Despite security risks, businesses must implement a social media communication strategy.

[True/False] Digital goods are adequately protected as intellectual property under the historical copyright laws.

False - Digital goods can be easily and quickly copied and shared over the Internet.

[True/False] Modular design, decision tables, decision trees, and structured PERT are process description tools.

False - PERT is not a process description tool

[True/False] Software defects, also called patches, can affect system reliability and security.

False - Patches are not defects, but a fix for bugs/defects

[True/False] The virtual layer is the seventh layer of the OSI model.

False - The 7th layer is the PHYSICAL layer

[True/False] The Digital Millennium Copyright Act (DMCA) is an international treaty on copyright law adopted in 1996.

False - The DMCA is a U.S. copyright law.

[True/False] Information is a valuable asset and not everyone in the world can be trusted with it. Therefore, we need to protect our valuable information from those with poor intentions. The protection of our information assets is a discipline known as data security.

False - The protection of our information assets is known as Information Security.

[True/False] Implementing devices in our computer systems to help in identity and approved equipment verification is a defensive method of technological measures.

False - This is a proactive method.

[True/False] The LinkedIn model benefits business organizations only, and has dramatically altered the employment and career environment.

False - it has benefited the entire recruitment community.

[True/False] The process of turning information into an unreadable format to prevent unauthorized access is known as decryption.

False - it is called encryption.

Which of the following is NOT part of the systems analysis process?

Feasibility Study - 4 steps = Problem Definition, Root Cause Identification, Solution Definition, and Information Requirements.

FedEx is a successful business. Which of the following statements regarding FedEx is false?

FedEx uses big data to find flaws, boost production, and root out counterfeiters - Although it does use big data to find flaws, fix processes, and boost the efficiency of its production, it does not use big data to root out counterfeiters.

Organizations must follow procedures to store or transfer their financial information as outlined in which of the following legislation?

Financial Services Modernization Act (aka Gramm-Leach-Bliley Act) of 1999 - requires organizations and individuals to adhere to rules and procedures for storing and transferring financial information.

Data scrubbing

Financial institutions perform WHAT on visitors' data they collect on their websites to detect and create a list of potential customers whom they will send invitations to apply for credit cards or line of equity loans? a.) Data mining b.) Data governance c.) Data administration d.) Data scrubbing

Data normalization

For a DBMS to be efficient and more functional, data redundancy needs to be eliminated. This can be accomplished by creating smaller tables, with stable data structures, using what process? a.) Data administration b.) Data dictionary c.) Data normalization d.) Data retrieval

Banking transactions

For an individual or a business, data can be uploaded to the Internet in many forms. Which of the following data should NOT be communicated on the Internet? a.) Banking transactions b.) Data streaming c.) Personnel files d.) Web pages

Data cleansing

For the DBMS of a financial institution to function properly, WHAT should be performed after a data quality audit on tables that are merged or imported? a.) Data cleansing b.) Data redundancy c.) Data mining

Knowledge Management (KM)

Foster a culture of sharing experiences and information throughout a business by creating teams defines what type of enterprise system? a.) Enterprise Resource Planning (ERP) b.) Customer Relationship Management (CRM) c.) Supply Chain Management (SCM) d.) Knowledge Management (KM)

The owner can have better communications with customers

Frank works for a small landscaping company. He is trying to convince the owner to invest in information technology. Which of the following justifications should he use when he approaches his boss? a.) The owner can better protect the privacy of his customer data. b.) The owner can have better communications with customers. c.) The owner will immediately begin saving money.

Freemium is not a new concept in doing business. Which of the following statement regarding Freemium is accurate?

Freemium involves digital pricing strategies.

What are group decision support systems (GDSS)?

GDSS enable interactive collaboration support for multiple decision makers at multiple geographic locations.

The privacy of sexual predators is not violated because it is public information

Geographic Information Systems (GIS) provide cities, states, municipalities, and even the public, with information such as property tax delinquencies, value of our houses, and addresses of sexual predators. Which of the following statements is FALSE? a.) The benefits provided by the GIS outweighs the violation of privacy of those involved b.) The privacy of sexual predators is not violated because it is public information c.) The property taxes of our houses are obtained by sites such as Zillow.com and realtor.com d.) The use of GIS is legal, but it may or may not be ethically and socially acceptable by some people

Standards

Global business challenges are typically no worse than domestic business challenges, except for the distance. Knowing the challenges upfront can alleviate some of the problems in the end. Of those listed, which is the easiest to solve? a.) Personnel b.) Standards c.) Reliability d.) Speed

What are the three primary activities associated with business performance management?

Goal selection, Attainment Measurement, and Achievement Intervention

Which of the following businesses earns much of its revenues from online advertising and by providing e-business services to hundreds of millions of individuals and businesses?

Google - earns much of its revenues from online advertising and by providing e-business services to hundreds of millions of individuals and businesses.

Which system supports creative thinking and allows users to interact simultaneously at multiple geographic locations to collectively participate in decision making?

Group Decision Support System (GDSS)

Executive management, who are interacting simultaneously in different locations to collectively participate in the decision-making process, use what type of decision-support system?

Group Decision Support Systems (GDSS) - Remote collaboration amongst management teams is supported by GDSS.

Executive management, who are interacting simultaneously in different locations to collectively participate in the decision-making process, use what type of decision support?

Group decision support system (GDSS)

ABC Playground Company has been asked to build a new playground for a local elementary school. The project must be completed before the first day of school. Which of the following steps would increase the likelihood of finishing the project on time?

Have the most experienced workers complete tasks on the critical path.

Health analytics

Healthcare companies can use the data collected from WHAT tools to help their customers design a fitness activity plan? a.) Supply chain management (SCM) b.) Customer relationship management (CRM) c.) Health analytics

Total Cost of Ownership (TCO)

Helps establish feasibility.

Text mining

High-quality information is typically derived through the devising of patterns and trends through means such as statistical pattern learning.

Robin Hood is a heroic outlaw in English folklore who robbed the rich to help the poor. He fought against the Sheriff of Nottingham and the reign of King John. Which of the following statement is TRUE regarding Robin Hood?

His actions were considered ethically and socially acceptable, but legally unacceptable.

Organizations need to include redundancy in their business disaster recovery plan by creating duplicate facilities. Which of the following sites offer offsite office space that allow recovery within minutes to hours?

Hot Sites

They are behavioral in nature and require minimal information system support as they deal with unstructured and less systematic issues

How are management's interpersonal roles supported by information systems? a.) They are behavioral in nature and require minimal information system support as they deal with highly structured and less systematic issues. b.) They are behavioral in nature and require minimal information system support as they deal with unstructured and less systematic issues. c.) They are behavioral in nature and require significant information system support as they deal with unstructured and less systematic issues.

Communication and training

How are user expectations best managed during system implementation? a.) Communication and training b.) User involvement in implementation c.) User involvement in analysis

Database applications enable businesses to store and analyze essential sales data

How can database applications help managers respond to changing market conditions? a.) Database applications arm businesses with big data to make important decisions. b.) Database applications enable businesses to store and analyze essential sales data. c.) Database applications enables businesses to develop and market new products.

Employees must be authenticated

How do organizations confirm the identity of their employees before they are allowed access to the corporate data resources? a.) Employees must be authenticated b.) Employees must be authorized c.) Employees must read the information policies

Both small and large enterprises use firewalls to prevent intrusion

How do small businesses and large enterprises protect themselves from network intrusions? a.) Small businesses do not connect directly to the Internet, whereas large enterprises use core routers. b.) Both small and large enterprises use firewalls to prevent intrusion. c.) Small businesses use detection intrusion operating systems, whereas large enterprises use firewalls.

Business intelligence provides automated data collection and reporting reducing labor cost

How does a corporation benefit from a business intelligence program? a.) Business intelligence re-engineers processes, making companies more productive b.) Business intelligence provides new data that was previously not available c.) Business intelligence provides automated data collection and reporting reducing labor cost

Human resources can target and recruit applicants based on specific qualifications or skills

How has LinkedIn impacted business? a.) Human resources can target and recruit applicants based on specific qualifications or skills. b.) Businesses can market to hundreds of millions of possible customers. c.) LinkedIn enables business customer loyalty programs.

Social media has replaced where people get their news

How has social media influenced the dissemination of news and current events? a.) Social media has replaced where people get their news. b.) Social media has replaced Internet news content sites. c.) Social media has replaced where people get their entertainment.

Social media platforms broadcast events instantaneously, which individual users can share

How has social media transformed and disrupted the coverage of news and current events? a.) Social media platforms enable individual users to broadcast images and videos of news to TV networks as it happens. b.) Social media platforms enable individual users to broadcast news to radio from the actual scene. c.) Social media platforms broadcast events instantaneously, which individual users can share.

E-learning supports the health care demand by training workers more quickly

How is information technology impacting the health care industry? a.) Information technology eliminates data entry errors. b.) E-learning supports the health care demand by training workers more quickly. c.) Records are maintained electronically and allow easy access to anyone who needs them.

Public relations use social media to respond to negative news quickly, as well as for promoting positive news

How is social media an effective public relations tool? a.) Public relations use social media to build individual customer relationships and brand recognition. b.) Public relations use social media to respond to negative news quickly, as well as for promoting positive news. c.) Public relations use social media to communicate their business plans.

What question does the SWOT analysis best answer?

How is the marketplace structured, and how will the business best interact with an e-commerce presence? - SWOT (Strengths, Weaknesses, Opportunities, Threats) analysis is conducted to better understand the organization, and is conducted when addressing the marketplace question.

Three

How many computer memory classifications are there? a.) Two b.) Four c.) Three

What is the difference between ICR and OCR?

ICR is an Intelligent or Advanced Form of OCR - ICR stands for Intelligent Character Recognition and is more accurate than Optical Character Recognition (OCR).

Cost effectiveness

IT is important because it helps businesses streamline processes that increase productivity and profits. What IT benefit does this exemplify? a.) Communication b.) Cost effectiveness c.) Product development d.) Globalization

Product development

IT is important because it helps ensure new, quality products reach the market faster and to more customers and suppliers. This is an example of which IT benefit? a.) Product development b.) Globalization c.) Communication d.) Cost effectiveness

What is the objective of the systems analysis stage in the waterfall method?

Identify User System and Software Requirements.

Organizations must implement procedures to defend themselves against risks from vulnerabilities and threats to their daily operations. Which of the following is NOT a procedure that would be helpful in protecting organizations against risks and vulnerabilities?

Identify potential markets for the organization.

What is the most critical step in systems analysis?

Identifying information requirements

Understand which assets are irreplaceable and how they are vulnerable

Identity theft can be very devastating to innocent victims. What is the first step that people can take to help lessen the severity of risk and to help mitigate or eliminate other risks if their identities are stolen in the future? a.) Protect access to information assets. b.) Understand which assets are irreplaceable and how they are vulnerable. c.) Understand the methods that criminals use to steal personal information. d.) Consult legal counsel and retain documentation of all stolen information.

at multiple locations and then handed off to the next division or location as the day ended

If Apple Computer and Mitsubishi-Hitachi began a global joint venture, where would the information system development likely take place? a.) at one or the other location, not both b.) at one location at a time until part of the project is complete and then passed to the next location c.) at multiple locations and then handed off to the next division or location as the day ended

Transaction

If a student decides to switch classes because she wants a different teacher, this would be considered a WHAT to the college's information system and would involve interaction with its accounting or human resource systems? a.) Credit b.) Payment c.) Transaction

Data integrity

If you receive two copies of the same catalog from a clothing company in your mailbox with a little variation in the first name on the address label, this would be a violation of what rule? a.) Data reliability b.) Data redundancy c.) Data integrity

Consult legal counsel and retain documentation of all stolen information

If your identity has been stolen, what should you do? a.) Protect access to your information assets b.) Understand the methods that criminals used to steal the personal information c.) Understand which assets are irreplaceable and how they are vulnerable d.) Consult legal counsel and retain documentation of all stolen information

Enterprise Resource Planning (ERP)

Implementing this system would tie together many systems and automate tasks so employees could do their jobs more efficiently defines what type of enterprise system? a.) Enterprise Resource Planning (ERP) b.) Customer Relationship Management (CRM) c.) Supply Chain Management (SCM) d.) Knowledge Management (KM)

Data governance

In a Fortune 500 company such as IBM, WHAT is concerned with the management of data, including maximizing quality through effective utilization, availability, and protection? a.) Data governance b.) Database administration c.) Information policy

Architecture

In a global information system (GIS), what is the basic structure of the information system required to coordinate international business activities called? a.) Architecture b.) Software c.) Hardware

Out in the field

In business, mobile smart devices are most beneficial where? a.) At the main office b.) In the home office c.) Out in the field

Vacuum tube

In computer evolution, the integrated circuit replaced what device? a.) CPU b.) RAM c.) Vacuum tube

Acceptable use

In order to keep company computers secure, users must agree to WHAT type of policy stipulated by the organization in order to access a company network or the Internet? a.) Identity management b.) Information audit c.) Acceptable use

Spyware

In order to monitor web surfing activities, what might a retailer install onto their customer's computers? a.) Worm b.) Trojan horse c.) Spyware d.) Virus

IoT

In the near future, most devices, such as home appliances, automobiles, and consumer product packages, will be connected to the Internet. What is this field of networking called? a.) 5G b.) IoT c.) WAN

Which of the following customer attributes helps price goods more accurately?

Income Level

Rights

Individuals are allowed to weigh decision choices based on legal or legislative precedent. This is the foundation for which of the following ethical approaches? a.) Rights b.) Common good c.) Utilitarian d.) Virtue

There are many ways individuals can help protect themselves from threats to their privacy. Choose the best option.

Information Security Education - provides individuals with knowledge of potential risks and threats to privacy and help individuals understand the value of their information assets.

Which of the following application provided by the Internet allows a business to store helpful documents to be accessed by its stakeholders, either for free or for a fee?

Information repositories

Information technology enables faster response to market dynamics due to new entrants, new products, supplier chain, or customer

Information technology should be organized in a way to help businesses run more efficiently. How does good IT planning help an enterprise achieve a competitive advantage? a.) Information technology enables faster response to market dynamics due to new entrants, new products, supplier chain, or customer b.) Information technology requires larger labor pools to digest data, leading to better business practices c.) Information technology enables more management layers in the decision-making process

What is the best way for individuals to safeguard their computers against malware?

Install the latest anti-malware and antivirus programs.

Malware

Installing the latest antivirus applications onto your computer is one way to protect your computer from WHAT type of software which can be used to steal information or spy on users? a.) Malware b.) Application c.) Adware

While enrolled in a traditional course at a university, you and your instructor can communicate synchronously, face-to-face, in the classroom. However, you can also communicate with your instructor SYNCHRONOUSLY outside the classroom using which of the following Internet applications?

Instant message

_________________________________ environments are the most common and are suitable for the entire system development life cycle, from analysis to maintenance.

Integrated - the integrated environments type of CASE tools is the most common SDLC analysis.

Porters 5 competitive forces

Intensity competitive rivalry bargaining power of customers bargaining power of suppliers threat of new entrants threat of substitutes

Not all organizations utilize an extranet. However, an extranet can provide certain benefits. Which of the following IS a benefit of an extranet?

Interact with suppliers - often via an SCM

Which of the following is a great, free, and ubiquitous source of information for systems analysts?

Internet

Mobile

Internet access via WHAT devices is growing exponentially, surpassing Internet access by fixed, desktop computers? a.) Antenna b.) Bluetooth c.) Mobile

The converged communications structure is based on what?

Internet, audio communications, and the PSTN

Most people now use smartphones daily for every aspect of their lives, which includes work, communicating with friends and family, entertainment, shopping, and even health-related activities. Which of the following statements regarding smartphones is FALSE?

It does not have an operating system like those on desktops and laptops.

Which of the following statement about the IP version 4 (IPv4) addressing scheme is true?

It has 4 bytes, which is equivalent to 32 bits.

What is qualitative risk analysis?

It involves the measurement of probability and consequences of risks - looks at the consequences of risk and estimates the impact of those risks on the organization.

Which of the following is NOT a characteristic of a Net marketplace?

It is a single organization that controls the construction and maintenance of relationships for a relatively small number of other organizations

Which of the following statements is FALSE regarding safe harbor?

It is a way to improve information security training.

Which of the following is a characteristic of a Net marketplace?

It provides more focus on individual transactions versus lasting relationships.

What will happen if an e-business does not take any action to sustain the advantages brought by e-business?

It will receive heavy responses from competitors and newcomers - Online business can be quite lucrative. Therefore, e-companies must effectively and continuously maintain a sustainable advantage to circumvent attempts from competitors from invading the marketspace.

Improved processes

Joe and Mary work for a tax preparation company that is implementing new computer technology. What is a likely impact of this new technology to their jobs? a.) Improved processes b.) Reduced stress c.) More job security

Store backup data in the cloud

Joe is responsible for managing the IT department for a local medical records company. His town is in a high risk area for tornadoes. How should Joe prepare for the possibility of a tornado hitting the company facilities? a.) Store daily data backup data on a server in a warehouse located in his community b.) Store backup data in the cloud c.) Watch weather forecasts daily d.) Install weather tracking devices at the facility

Keep passwords private

Keeping information and information technology secure involves good management techniques. Which of the following items is a good management technique for securing information? a.) Locking up laptops b.) Use security software c.) Being smart about wi-fi d.) Keep passwords private

Data centers

Large databases typically reside in WHAT, which are clusters of computers called servers, running software applications that enable business transactions? a.) The cloud b.) Data centers c.) Computers

What is one of the benefits of adequate budgeting for user support?

Less reliant on outside consultants

A decision tree tool is not viable when data contains a different number of ___________________________________________________.

Levels - information gained in decision trees may become biased in favor of attributes with more levels.

As the owner of a small business, which of the following would allow your clients to sue you in court for any mismanagement?

Liability

Which social media platform is NOT a disruptive technology based on the ability for people to comment or share current events, ideas, or opinions?

LinkedIn

Which of the following best defines a work breakdown structure (WBS)?

List of broken down project deliverables

Conceptual

Logical, physical, and WHAT data models are used by businesses to map processes to data requirements? a.) Conceptual b.) Relational c.) Hierarchical

What is considered to be a low level security risk during system post-implementation?

Low level is characterized by noticeable impact to the organization.

______________________ CASE tools support development activities, such as design, testing, debugging, and maintenance.

Lower

Database administrator

Maintaining the integrity of a company's database is the responsibility of which person below? a.) Data administrator b.) Information policy administrator c.) Data auditor d.) Database administrator

(Select all that apply). If we intentionally harden our individual security, we can make it more difficult for criminals to steal our information assets. Which of the following recommendations will harden our individual security?

Manage the retention and disposal of potentially sensitive information. Randomize behavior.

Dysfunctional

Management conformity and uniformity often results in WHAT type of decision? a.) Innovative b.) Productive c.) Dysfunctional

GDSS

Management decision-making is supported by IT through various systems including WHAT? a.) OLTP b.) LAN c.) GDSS

Which of the following is not a component of a feasibility study?

Managerial

Which of the following statement regarding e-commerce is false?

Many brick-and-mortar retailers have replaced all their supply chains with elements of e-commerce. (B&M retailers have augmented, not replaced, all their supply chains with elements of e-commerce.)

Secured access

Many businesses require their employees use VPN to gain remote access to the corporate network. Which of the following is an advantage of VPN? a.) Secured access b.) Greater flexibility c.) Reduced expense

The measurement function of business intelligence creates a hierarchy of benchmarking and _____________________________________.

Metrics - Measurement creates a hierarchy of benchmarking and metrics that provide management with a status of the business performance management goals.

Which of the following factors does not help e-businesses accurately target individual customers?

Mobile Devices

Understanding whether the intended e-commerce users will be customers, suppliers, and/or employees is an important component of an e-commerce plan. What other issue must be addressed during this time?

Mobile Payment Options

Mobile e-commerce can provide companies with an avenue to gain and keep their customers. Nevertheless, mobile e-commerce cannot help businesses actively market to their customers in which of the following ways?

Mobile e-commerce helps to solicit post-purchase feedback from customers - Although companies can use mobile e-commerce to solicit some post-purchase feedback from their customers, it is not the main purpose for mobile e-commerce.

Which of the following describes how the modular design process description tool works?

Modular design uses building blocks to represent a system.

Which of the following is NOT a method for gathering user requirements?

Monitor users

Moore's Law

Moore's Law says that computing power and storage capacity will continue to increase or double approximately every two years.

The Internet has contributed to a complex network system. Businesses continue to grow and develop a need for more computer-enabled productivity which results in what?

More complexity due to the need for more systems and better improvements in their processing capabilities.

Manufacturing and production

Most large corporations have several information systems to support their functional business areas. What is the system that processes raw metal into a car frame? a.) Marketing and sales b.) Human resources c.) Accounting and finance d.) Manufacturing and production

Human resources

Most large corporations have several information systems to support their functional business areas. What is the system that helps improve employee productivity by managing the workforce? a.) Marketing and sales b.) Human resources c.) Accounting and fiance d.) Manufacturing and production

It does not have an operating system like those on desktops and laptops

Most people now use smartphones daily for every aspect of their lives, which includes work, communicating with friends and family, entertainment, shopping, and even health-related activities. Which of the following statements regarding smartphones is FALSE? a.) It has unique sensors and functions built for mobility b.) It has ample processing power and electronic storage c.) It does not have an operating system like those on desktops and laptops d.) It combines a cellular phone device with a mobile computer platform

Business ecosystems

Network of businesses involved in delivering a product through mutual cooperation.

Communication style

North Americans are usually very straightforward and distrust evasive behavior. This characteristic is an example of a cultural difference in which of the following? a.) Time orientation b.) Communication style c.) Stereotyping

Interact with suppliers

Not all organizations utilize an extranet. However, an extranet can provide certain benefits. Which of the following is a benefit of an extranet? a.) Interact with employees b.) Interact with suppliers c.) Interact with customers d.) Store and share information

Reporting

OLAP (Online Analytical Processing) databases are used for WHAT, such as being used for regional sales? a.) Reporting b.) Warehousing c.) Compiling

Lengthy ETL load phase

OLAP databases are multidimensional, that is, data sets are referred to as cubic. What is a disadvantage of a multidimensional database? a.) Fast query performance b.) Database aggregation c.) Lengthy ETL load phase

Cold sites

Offsite office space awaiting occupancy, equipment, personnel, and utility service, allowing recovery within days.

Hot sites

Offsite office space with available and up-to-date systems and service connections, requiring only adequate or prioritized staffing, allowing recovery within minutes to hours.

Warm sites

Offsite office space with available systems and service connections, requiring staffing and updates allowing recovery within hours to days.

The advent of the Internet has revolutionized our lives, becoming a vast resource for information, utility, and productivity. Which statement below about the Internet is FALSE?

Once you upload your data to the Internet, it will be available to the public.

Plan daily operations

One benefit of a supply chain management system is to WHAT of the company? a.) Outsource technical functions b.) Automate office functions c.) Plan daily operations

Newsletters are often Internet-published bulletins that are distributed to users and typically cover what?

One general or specific topic of interest

Data manipulation language

One of the capabilities of a database management system is that it allows users to easily modify the data using which of the following? a.) Any computer language b.) Hypertext markup language c.) Data definition language d.) Data manipulation language

Experiment

One way to define user requirements is to allow users to WHAT with the system during development? a.) Train b.) Code c.) Experiment

Separation of Duties

One way to reduce the possibility of fraud and abuse of data resources is to apply which concept of information security, which ensures that personnel's responsibilities and duties are separated from their access? a.) Separation of Duties b.) Information Security c.) Principle of Least Privilege

What is the downside of oral communication outside formal presentations?

Oral communication is not documented and, therefore, subject to misinterpretation.

Which of the following best describes oral communication?

Oral communication is the transfer of information via verbal and visual content.

Which of the following factors deals with the potential loss of business from the dismissal or death of an important key manager?

Organizational Factors

Ensuring that employees are authenticated to prove their unique identity

Organizations have a responsibility to protect information assets and to control access. How do organizations ensure that only authorized personnel have access to the corporate data resources? a.) Ensuring that employees do not share the organization's data resources with customers. b.) Ensuring that employees maintain the confidentiality of the organization's data resources. c.) Ensuring that employees are authenticated to prove their unique identity.

Tailgating

Organizations must be concerned with a low-tech attack that allows unauthorized personnel access to sensitive or restricted areas merely by overtly or covertly following an authorized employee through a controlled access entry point. What is the technical term for this low-tech method? a.) Pretexting b.) Dumpster Diving c.) Baiting d.) Tailgating

Public Company Accounting Reform and Investor Act (aka Sarbanes-Oxley Act) of 2002

Organizations must follow procedures to ensure the accuracy, integrity, and security of their financial information as outlined in which of the following legislation? a.) Public Company Accounting Reform and Investor Act (aka Sarbanes-Oxley Act) of 2002 b.) Health Insurance Portability and Accountability Act (HIPAA) of 1996 c.) Financial Services Modernization Act (aka Gramm-Leach-Bliley Act) of 1999

Identify potential markets for the organization

Organizations must implement procedures to defend themselves against risks from vulnerabilities and threats to their daily operations. Which of the following is NOT a procedure that would be helpful in protecting organizations against risks and vulnerabilities? a.) Identify potential markets for the organization b.) Identify critical business operations c.) Measure risks that threaten the organization d.) Implement planning, measures, and controls to mitigate the risks

Warm sites

Organizations need to include redundancy in their business disaster recovery plan by creating duplicate facilities. Which of the following sites offer offsite office space that allow recovery within hours to days? a.) Shared hot sites b.) Warm sites c.) Cold sites d.) Hot sites

What is the meaning of outcomes in decision theory?

Outcomes are the Consequences of an Event.

What is information system output?

Output is the act of transferring processed data to users.

What is the major difference between private industrial networks and Net marketplaces?

Ownership and/or control of the network - Private industrial networks are owned by a single large corporation, whereas Net marketplace brings together thousands of businesses.

What is the name of a chart representing tasks using an activity-on-arrow diagram?

PERT chart

What does PSDN stand for?

Packet Switched Data Networks

Transmit information in discrete, parsed data encapsulated in packets

Packet switching refers to a computer network's ability to do what? a.) Transmit information in non-discrete, data encapsulated packets b.) Transmit information in discrete, non-parsed packets c.) Transmit information in discrete, parsed data encapsulated in packets

What are the two fundamental protocols that can describe modern telecom networks?

Packet transmission and TCP/IP protocol.

Strategic information system

Palm Beach Real Estate Company created a mobile application to allow prospective clients to view information about beachfront properties from their smartphone. No other local real estate agents currently offer such technology. This mobile app is an example of a(n) WHAT? a.) Executive information system b.) Decision support system c.) Strategic information system

What information can be gained by sniffing a wireless network?

Passwords and Login IDs

Synergy

Penny Dollar and Nickel Dollar stores decide to pool their markets to lower costs and hopefully generate more profits. This is referred to as WHAT? a.) Synergy b.) Economics c.) Competency

How do social media platforms play an increasing role in shaping events?

People can use this medium to influence reserved bystanders.

Mobile e-commerce targets a certain niche. Which of the following communication devices is not one of them?

Personal Computers

Criminals use which method to steal personal information by redirecting users to a legitimate, official-looking website?

Pharming

Criminals use which method to send legitimate-looking emails to innocent victims, which direct them to a Website where they are asked to input personal information such as user logon and password?

Phishing

What are podcasts, and why are they a good source of information for systems analysts?

Podcasts are audio files that that contain educational content.

System quality problems can include which of the following?

Poor data input quality

Relatively slow methods of communication

Prices for goods have changed slowly, due primarily to which of the following? a.) Too much communication. b.) Too many products selling online. c.) Relatively slow methods of communication. d.) Operational inefficiencies resulting in higher operating costs.

Which of the following is an appropriate definition of Fair Information Practices (FIP)?

Principles that govern the collection and use of information about individuals - Created in 1973, FIP forms the basis for most U.S. and European laws.

Which of the following is NOT an interactive multimedia resource published online to inform and educate stakeholders?

Printed Text

Which of the following is not a characteristic of a private industrial network?

Private industrial networks provide more of a focus on individual transactions versus lasting relationships - Net marketplaces, not private industrial networks, provide more of a focus on individual transactions versus lasting relationships.

Which of the following is not a category from Henry Mintzberg's management behavior roles?

Problem Solver - 3 categories include: interpersonal, decisional, informational roles.

Which of the following can be disseminated to millions of consumers through social media, reducing marketing costs compared to traditional print, radio, and television advertising?

Product Marketing

Which of the following is not a primary role of a systems analysts?

Project Manager

What are three levels of risks associated with system design and implementation?

Project Structure, Size, Team Technical Background - project structure, project size, and technical capabilities are three key risks.

Training new users

Project management is essential for managing information technology for many reasons, including everything except which of the following? a.) Planning for the unexpected b.) Delivering quality systems on time c.) Managing the budget d.) Training new users

Businesses, news networks, government agencies, and nonprofit organizations are all actively using social media to primarily do what?

Promote and market their organizations.

The rapid advancement of information technology has created a huge problem for the human right to privacy. Besides stimulating economic progress and world trade, international agencies such as the Organization for Economic Co-operation and Development (OECD) work to _______________________________________________.

Promote but NOT implement international laws to protect the privacy of human beings.

Management information system

Provides timely and accurate information that enables managers to manage their departments more efficiently

Organizations must follow procedures to ensure the accuracy, integrity, and security of their financial information as outlined in which of the following legislation?

Public Company Accounting Reform and Investor Act (aka Sarbanes-Oxley Act) of 2002.

What are the classifications of cloud computing?

Public, Private, and Hybrid

Which of the following is not an organizational change category to consider when implementing a new information system?

Quality - Automation, along with rationalization or paradigm shifts are the desired critical outcomes of business implementation of a new or upgraded information system.

Which of the following technologies is used to track inventory and can be read hundreds at a time, even if the tag is covered?

RFID

Productive

RFID technology helps companies to be more WHAT with inventory management because they eliminate the need for physical handling of materials during cycle counting? a.) Effective b.) Smart c.) Productive

RAD is a method in which products can be developed faster and with higher quality through prototyping and early testing. What does RAD stand for?

Rapid application development

Social media has enhanced customer relationship management by enabling companies to best educate customers about new and existing products and services in ________________________________________________.

Real-Time

A disaster recovery plan (DRP) is a document of procedures to do what?

Recover and protect business operations.

As an employee of a retailing business, which of the following defines your obligations to your clients?

Responsibility - a perceived moral or legal duty that someone possesses to control or handle a specific or general task.

Network Engineer

Responsible for the layout, installation, and maintenance of all information technology network components.

Individuals are allowed to weigh decision choices based on legal or legislative precedent. This is the foundation for which of the following ethical approaches?

Rights - The rights approach values rights specified by society and allows individuals to weigh decision choices based on legal or legislative precedent.

Organizational risk factors

Risks that stem from hierarchies, policies, and procedures. These factors naturally allow organizations to operate as successful businesses, but also help to define categories risks, vulnerabilities, and threats, and create targets for criminals

Electronic communications has predominantly become the primary form of communications in first world countries. Which of the following protocol is used to manage and monitor the massive amount of emails that we receive every day?

SMTP - (simple mail transfer protocol) the popular mail protocols include IMAP and POP3

_____________________________ is the ability of a network to to grow user and services without forklift upgrades.

Scalability

Many businesses require their employees use VPN to gain remote access to the corporate network. Which of the following is an advantage of VPN?

Secured access

The AUP specifies acceptable and tolerable uses of an organization's computer systems, equipment, and information assets

Security policies are output from an organization's risk assessment process, which cover an organization's need for various levels of security. Acceptable use policy (AUP) is an example of a security policies control. Which of the following is TRUE regarding AUP? a.) The AUP specifies acceptable and tolerable uses of an organization's computer systems, equipment, and information assets b.) The AUP determines if the user follows the policies and procedures stipulated by the organization c.) The AUP defines the authorization and authentication of users

One way to reduce the possibility of fraud and abuse of data resources is to apply which concept of information security, which ensures that personnel's responsibilities and duties are separated from their access?

Separation of Duties

Risk of information loss caused by environmental events

Several factors contribute to the increasing vulnerability of information systems. Which of the following risk factors play an important role in contributing to the increasing vulnerability of information systems? a.) Implementing the principle of least privilege. b.) Risk of information loss caused by governmental sources. c.) Risk of information loss caused by environmental events.

ARPANET

Several independent parties or governing bodies work together to define the rules that help to manage effective network communications. Which of the following is NOT one of the governing bodies that recommend and decides on telecommunications standards? a.) IOS b.) IEEE c.) IETF d.) ARPANET

Virtual credit card

Shoppers are strongly encouraged to use secure forms of payment for online purchases. A WHAT is a special credit card number that requires the use of special two-factor authentication code gained via secure communication from a sponsoring bank before a transaction is permitted? a.) Virtual credit card b.) Prepaid debit card c.) Charge and sign credit transaction

Which of the following portable device combines the functionality of the phone technology with the computing of a desktop or laptop?

Smartphone

___________________________ will soon surpass desktop computers accessing the internet.

Smartphones

Which social media site is the second most popular with teens behind instagram?

Snapchat - 41% usage rate among teens.

What is the method used by hackers to develop a relationship with users in order to extract information?

Social Engineering - a method used by hackers to develop a relationship with users in order to extract information.

What do you call the web-based applications that allow user content to be created and shared over the Internet?

Social Media

Social e-commerce has become an important Internet tool for businesses to connect with their customers. Which of the following is not a benefit for companies to use social e-commerce as a business tool?

Social e-commerce allows customers to shop and buy products online - SOCIAL e-commerce is a way for companies to connect with their customers; the goal is not to sell products.

Media

Social networks must be targeted by businesses since social networking is WHAT type of channel? a.) Marketing b.) Business c.) Media

We make our ethical decisions based on the principles of right and wrong that we learn from our upbringing and our exposure to different ______________________________________.

Societies - Ethics is defined as the principles of right and wrong that we acquire through life-long experiences and different environments that guides us in our behaviors, but it can change as a person moves to a different society.

Licenses

Software WHAT must be managed by the IT organization to ensure the business is compliant with software vendors? a.) Codes b.) Licenses c.) Programs

Which of the following occurs during the acquisition phase?

Software and hardware are procured.

Automation

Software applications benefit business because they enable process WHAT? a.) Elimination b.) Automation c.) Redundancy

Software as a Service (SaaS)

Software licensed and hosted on centralized or distributed servers that belong to a service provider. Users access this software using a connection to the Internet and a web browser.

Vertical Application

Software that designed for a specific business.

[Select all that apply]. Which business structures are less formal?

Sole Proprietorship Partnerships

What do we mean by speed and amplification in social media?

Speed is the ability to share information in seconds, and amplification is the re-posting news in a community.

________________________________________ decisions involve an established procedure, and are repetitive and routine.

Structured - can be handled in the same manner each time.

High demand

Supply Chain Management (SCM) is a popular analytics application that can help a manufacturing company control its operating costs. Which of the following does not contribute to inefficiencies in the supply chain activities? a.) Underutilized plant capacity b.) High demand c.) High inventory level d.) Parts shortage

Knowledge Management (KM)

Supportive, collaborative, culture that includes corporate learning to foster corporate efficiency and gain value from intellectual assets defines what type of enterprise system? a.) Enterprise Resource Planning (ERP) b.) Customer Relationship Management (CRM) c.) Supply Chain Management (SCM) d.) Knowledge Management (KM)

The six formal steps that need to be followed to develop an information system is known as what?

System development life cycle (SDLC) 6 steps that must be performed sequentially

Testing and maintenance

System development life cycle (SDLC) consists of seven stages. The sixth stage in SDLC is WHAT? a.) Designing the recommended system b.) Determining information requirements c.) Testing and maintenance

What are the components of system-level security?

System-level security consists of the architecture, policy, and process levels.

What does SDLC stand for?

Systems Development Life Cycle

Why are good communication skills necessary for systems analysts?

Systems analysts interact with internal and external resources.

____________________________________ is an economic feasibility method.

TCO

What is total cost of ownership (TCO)?

TCO is a Study to Determine Economic Feasibility

The Internet standard defines how computers and devices route communications traffic from one network to another over the Internet. What is this Internet standard known as?

TCP/IP

_________________________ is a universal telecommunication network protocol that most operating systems can recognize.

TCP/IP

Social media benefits to businesses are made possible because social media offers both location-specific and time-specific _______________________________________________________________.

Targeting - Businesses can now target customers according to location-specific and time-specific campaigns.

Which of the following factors deals with employee training to mitigate the risks to an organization?

Technological Factors - include: training, careful planning, and intelligent acquisition of technology and services that will help an organization mitigate the risks that they are exposed to.

System development life cycle (SDLC) consists of seven stages. The sixth stage in SDLC is ____________________________________.

Testing and Maintenance - 7 Stages Include: (1)Planning, (2)Systems Analysis/Requirements, (3)System Design, (4)Development, (5)Integration/Testing, (6)Implementation, (7)Operations/Maintenance

Security policies are output from an organization's risk assessment process, which cover an organization's need for various levels of security. Acceptable use policy (AUP) is an example of a security policies control. Which of the following is TRUE regarding AUP?

The AUP specifies acceptable and tolerable uses of an organization's computer systems, equipment, and information assets.

Which of the following crimes affected the security of this country?

The Chelsea Manning and Edward Snowden leaks.

Cost-benefit analysis

The Ford Pinto example illustrates that which analysis is the best way to make well-informed business decisions? a.) Break-even analysis b.) Cost-benefit analysis c.) Risk-benefit analysis

To increase the number of unique IP addresses

The IP version 6 (IPv6) addressing scheme was developed in 2006 for what purpose? a.) To decrease the number of unique IP addresses b.) To increase the number of unique IP addresses c.) To recycle the number of unique IP addresses d.) To improve the performance of the IPv4 addressing scheme

More complexity due to the need for more systems and better improvements in their processing capabilities

The Internet has contributed to a complex network system. Businesses continue to grow and develop a need for more computer-enabled productivity which results in what? a.) More complexity due to the need for more systems and better improvements in their processing capabilities b.) The need for less powerful systems due to cloud computing handling processing power c.) Less complexity due to the need for more systems and better improvements in their processing capabilities

The client has control over the applications residing on the server

The Internet is organized as a client/server system. Which of the following statement is FALSE regarding the client/server architecture? a.) All the applications reside on the server b.) The client has control over the applications residing on the server c.) The client sends messages requesting services from the server on the network d.) The client/server architecture maximizes traffic on the network

Ethical principles often form the foundation for legal regulations. Governmental agencies create these legal regulations to define which of the following?

The fundamental tenets of responsibility, accountability, and liability for all businesses and its citizens to follow.

We live in a diverse culture in this country, with people who came from different nationalities and backgrounds. Which of the following statement about ethics is FALSE?

The government selects one specific culture to codify the ethics into laws.

Strategic agenda

The important characteristics of a balanced scorecard are focused on what? a.) Implementation issues b.) Strategic agenda c.) Management decisions

Dynamic Random-Access Memory (DRAM)

The main memory of a computer system; requires constant refreshing.

Information management

The management of organizational processes and systems; helps the organization reduce costs and adds value to products; helps the organization make better managerial decisions.

Query

The marketing manager for an airline company can perform a WHAT on the Members table in their DBMS to identify frequent fliers who qualify for their credit card program? a.) Query b.) Report c.) Retrieval

Metrics

The measurement function of business intelligence creates a hierarchy of benchmarking and WHAT? a.) KPI (Key Performance Indicator) b.) Relation c.) Metrics

Spice and goods trading on the Silk Route

The origin of global markets was WHAT? a.) Production in the 19th and 20th centuries b.) Expansion of domestic and multinational manufacturing c.) Spice and goods trading on the Silk Route

Knowledge

The practical application of information.

Geographic Information Systems (GIS) provide cities, states, municipalities, and even the public, with information such as property tax delinquencies, value of our houses, and addresses of sexual predators. Which of the following statements is FALSE?

The privacy of sexual predators is not violated because it is public information.

What is risk management in system security?

The process of identifying, analyzing, and responding to risk - helps understand system vulnerabilities and possible security risks, and taking active effort to reduce risk impact.

Knowledge management

The process of sharing knowledge across business units and among employees of a business is called a(n) WHAT? a.) Customer relationship management b.) Information management c.) Knowledge management

Security

The purpose of information security is to protect the information from illegal use and unauthorized access. Which of the following is NOT part of the triad encompassing the three categories of threats to information assets? a.) Security b.) Availability c.) Integrity d.) Confidentiality

Promote and implement international laws to protect the privacy of human beings

The rapid advancement of information technology has created a huge problem for the human right to privacy. Besides stimulating economic progress and world trade, international agencies such as the Organization for Economic Co-operation and Development (OECD) work to WHAT? a.) Promote but not implement international laws to protect the privacy of human beings b.) Promote and implement international laws to protect the privacy of human beings

Information technology management

The shipping clerks at ABC Logistics complained to their supervisor that they experienced delays in uploading shipping and tracking information at certain times of the day. The network provider was contacted, who advised management at ABC that a faster fiber-optic connection was now available at a discounted rate. This type of network connectivity would greatly improve Internet speed. This is an example of WHAT? a.) Information technology management b.) Information management

Information technology

The use of computer and telecommunications systems for storing, retrieving, and sending information; comprised of hardware, software, data, and networks.

Online businesses can operate more easily and freely than brick and mortar businesses

There are many reasons why online businesses must be held accountable to the laws and regulations in the localities and countries in which they operate. Which of the following is NOT one of the reasons? a.) Online businesses create lasting relationships with their customers and are more accountable. b.) Online businesses can respond quickly to the various pressures within the business environment. c.) Online businesses are more flexible and swift in their perception of the market. d.) Online businesses can operate more easily and freely than brick and mortar businesses.

Information security education

There are many ways individuals can help protect themselves from threats to their privacy. Choose the best option. a.) Research techniques online b.) Information security education c.) Ask a friend what they do

Automated

There are multiple methods of data capture, categorized as manual or WHAT? a.) Optical b.) Scanned c.) Automated

Quid pro quo

There are several low-tech attacks that criminals can use to steal sensitive information from individuals in public places. One of the most common methods is WHAT, in which individuals are offered a gift for completing an application for a credit card? a.) Pretexting b.) Pharming c.) Quid pro quo d.) Baiting

Separation of duties

There are two primary concepts within Information Security. WHAT concept stipulates that duties and access are to be disseminated among multiple people, so that the possibility of abuse and fraud are reduced or eliminated? a.) Separation of duties b.) Accountability c.) Principle of least privilege

Principle of least privilege

There are two primary concepts within information security. WHAT concept, otherwise known informally as need-to-know, indicates that access should only be provided to those who need it to complete tasks in their job? a.) Separation of duties b.) Accountability c.) Principle of least privilege

What are measurement, analytics, reporting, collaboration, and knowledge management?

These are common functionalities of business intelligence.

Which of the following statement regarding private industrial networks and Net marketplaces is false?

They are created and/or sponsored by the government.

Which of the following statements regarding private industrial networks and Net marketplaces is true?

They are professional and industrial networks - that include connections to governments, non-profit institutions, and service professionals.

Which of the following is a characteristic of a legacy or old analog network?

They carried continuous electronic waveforms.

Project Manager

They deliver quality systems on time, manage the budget, and plan for the unexpected (they do not train new users).

Why must a systems analyst be a good coordinator

They must always be able to communicate system capabilities and benefits

Decision support system

This system uses models and statistical analysis to help decision makers solve problems

Serve organizational goals

To be a strategic information system, an information system must do WHAT? a.) Serve organizational goals b.) Beat rivals c.) Collaborate with competitors

Dynamic and multimedia

To be competitive in the marketplace, businesses should lure customers in by providing information on their websites that is WHAT kind of driven? a.) Static and text b.) Dynamic and text c.) Dynamic and multimedia

Which of the following is not a reason for providing company information on the Internet?

To discourage customers from visiting the traditional storefront.

What is the primary purpose for publishing company information on the Internet?

To educate stakeholders on the company's mission and vision, production information, and community efforts.

What is the focus of a functional evaluation of a management information system?

To evaluate the quality and functionality of information and output - focuses on data, hardware, software, and networks.

The IP version 6 (IPv6) addressing scheme was developed in 2006 for what purpose?

To increase the number of unique IP addresses.

Which of the following is NOT a benefit for individuals to take information security training?

To understand the concept of safe harbor - this is a framework developed by the U.S. Department and European Commission.

TCO includes technology platform costs

Total cost of ownership (TCO) is a useful strategy when evaluating information systems cost and benefits. What does TCO entail? a.) TCO includes cost of goods b.) TCO includes overhead burden c.) TCO includes technology platform costs

Digital goods are available in electronic format. Which of the following is NOT an example of digital goods?

Traditionally Printed Material

What type of management information systems do operational and middle management use for structured decisions?

Transactional Processing Systems

Packet switching refers to a computer network's ability to do what?

Transmit information in discrete, parsed data encapsulated in packets.

______________________________ analysis reveals patterns of behavior, such as currency fluctuations, which can affect a stock or an entire industry or market.

Trend

[True/False] 4G networks provide IP based voice, data, and multimedia traffic.

True

[True/False] A legal feasibility study is appropriate when dealing with government agencies in which information and data might be sensitive.

True

[True/False] A virtual private network (VPN) provides a secure, encrypted, and remote connection between employees and the company's server via a third-party Internet service provider.

True

[True/False] Hiring managers frequently search multiple social media networks in order to identify inconsistencies in a candidate's background and experience.

True

[True/False] Input is the act of capturing or collecting data from an organization or environment.

True

[True/False] Microsoft Visio enables systems analysts to create professional diagrams that simplify complex information through collaboration tools and data-linked diagrams.

True

[True/False] Social media can be both harmful and helpful to a business or organization.

True

[True/False] The factors that most influence the success of an information system are the functionality of the system, the quality of the data, the usefulness of the system, system usage, system efficiency, and user satisfaction.

True

[True/False] The internet of Things (IoT) will enable automated, just in time e-commerce transactions.

True

[True/False] The user requirements analysis determines inputs, outputs, process steps, and data storage needs.

True

[True/False] When a systems analyst acts as a consultant, he or she interacts with the users to understand their needs and requirements.

True

[True/False] When considering social media in investment strategies, the source of the data may affect whether the use of the information is a violation of insider trading regulations.

True

[True/False] Input is the act of capturing or collecting data from an organization or environment.

True Input is the act of providing data to a computer system for processing

T/F: Microsoft Visio enables systems analysts to create professional diagrams that simplify complex information through collaboration tools and data-linked diagrams.

True Microsoft Visio is one of many tools that help system analysts diagram their solutions

T/F: The factors that most influence the success of an information system are the functionality of the system, the quality of the data, the usefulness of the system, system usage, system efficiency, and user satisfaction.

True There are several factors that influence the success of an information system.

[True/False] Integrating e-business aspects into a business operation can have a significant influence on business and potentially lasting effects on its business environment.

True - E-business aspects include using electronic communications and implementing workflow applications into a business operation.

[True/False] Because of operational efficiencies and the speed of the Internet, businesses that operate digitally may be much better at responding to requirements and changes than traditional brick-and-mortar businesses.

True - Operational efficiencies and the speed of the Internet help e-businesses respond and react quickly to changes within the business environment, more so than their traditional brick-and-mortar counterparts.

[True/False] Wireless networks enable businesses and their customers or suppliers to collaborate and share data on premises.

True - Wireless LANs allow visitors (customers or suppliers) to access the internet and their information systems for collaboration and decision making.

[True/False] Communist countries such as North Korea and China are most likely to utilize the common good ethical approach to maintain discipline and order in the country.

True - this approach values choices and motivations that perpetuate value for everyone, to sustain a positive whole-community benefit, despite individual income or position.

False

True or false. A business benefit of enterprise resource planning (ERP) systems is ease of use. a.) True b.) False

False

True or false. A customer relationship management system provides a business with an opportunity to allow customers to know which products are currently available by displaying them on a website. a.) True b.) False

False

True or false. A storage device consists of all the components that work together to process data into useful information. a.) True b.) False

True

True or false. A system where businesses work together to create a product or service for a customer is called a supply chain management system. a.) True b.) False

False

True or false. A transaction processing system is created to meet a specific business goal and to provide a competitive advantage. a.) True b.) False

True

True or false. Based on statistics from various consultant groups, a majority of strategic Information systems projects fail to meet schedule or budget. a.) True b.) False

False

True or false. Businesses are more successful if they align business objectives with information systems. a.) True b.) False

True

True or false. Businesses invest in information systems for a number of reasons, including to achieve operational excellence, develop new products and services, improve decision making, and promote competitive advantage. a.) True b.) False

False

True or false. CTOs have emerged as a critical strategic role in recent years in large organizations due to cyber attacks. a.) True b.) False

False

True or false. Hardware, software, data, and networks make up information systems. a.) True b.) False

True

True or false. Information systems help managers to perform long-range strategic planning, decision making, and to assess external threats and opportunities. a.) True b.) False

True

True or false. Information technology has both created and eliminated jobs. a.) True b.) False

False

True or false. Information technology managers should not try to standardize software and hardware when developing a global information system for an organization. a.) True b.) False

False

True or false. Modern forms of information technology include digital calculators, computer systems of many sizes and applications, and Morse code. a.) True b.) False

True

True or false. One of the possible ethical or societal issues that arise from the increasing globalization of technology is violating legal statutes. a.) True b.) False

False

True or false. Organizational structure does not have an effect on the success or failure when implementing information systems. a.) True b.) False

True

True or false. Organizations gain many benefits from knowledge management systems, but one of the most important benefits is that the systems make best practices available for employees at any time so they can learn the most effective and efficient ways of doing things. a.) True b.) False

True

True or false. The ATM (automated teller machine) at a bank is an example of an information system. a.) True b.) False

True

True or false. The ability to build a responsive IT infrastructure is one of the key issues facing information systems management. a.) True b.) False

True

True or false. The key role of a database analyst is to plan, design, implement and sustain database needs for an organization. a.) True b.) False

False

True or false. The key role of the CTO (Chief Technology Officer) is to provide vision and leadership for IT initiatives. a.) True b.) False

False

True or false. The terms information technology and information systems have the same definition and can be used interchangeably. a.) True b.) False

False

True or false. Two types of business strategies include growth and product competition. a.) True b.) False

True

True or false. Web Developers will continue to be in high demand because the Internet will continue to transform the way society and business interact and operate in the 21st Century. a.) True b.) False

Culture

Two factors that have contributed to the globalization of business are the availability of inexpensive communication and improved transportation. These factors have also contributed to the creation of a common global WHAT? a.) Software b.) Culture c.) Information system

What is UML?

UML (Unified Modeling Language) is a general purpose, standard software development modeling language used to model and help visualize systems

What is UML?

UML is a General Purpose Modeling Language - used to model and help visualize systems.

Mobile payment options

Understanding whether the intended e-commerce users will be customers, suppliers, and/or employees is an important component of an e-commerce plan. What other issue must be addressed during this time? a.) Purpose for creating e-commerce presence b.) Business and revenue models to use c.) Vision and mission statement d.) Mobile payment options

Biometrics is the study and measuring of individual body characteristics, and is often used in computer security. Biometrics falls under which of the following methods?

Unique Identity

Upper CASE tools are important to analysts in the project planning phase. What is meant by Upper CASE tools?

Upper CASE tools support software modeling and analysis.

What is the safest way to access a public Wi-Fi?

Use a Virtual Private Network

What is not a development stage in the waterfall model?

User Requirements - This is addressed in the system design.

Resistance

User adoption and management support during the implementation phase is required because of change WHAT? a.) Methods b.) Complexity c.) Resistance

Geographic Information Systems

Using connections to numerous databases containing data concerning locations, crimes, taxes, traffic, votes, and environmental and life science data, geospatial analysis can help government administrators to understand demographic trends, population density changes, attribute concentrations

Which of the following category of ethical models for ethical behavior approach assesses the consequences and/or outcomes of an action to determine the greatest good or least harm for the greatest number, regardless of the justice or fairness of or to the individual?

Utilitarian Approach - evaluates the consequences and/or outcome of an action to generate the maximum benefits for those involved.

Software

Various types of WHAT enable companies to utilize their information systems hardware and networks more effectively? a.) Software b.) Technology c.) People

Social media is influencing how the population receives news by enabling ______________________________ distribution.

Viral

Which of the following ethical models values human behaviors that allow us to act in aspirational ways?

Virtue - ethical approach which values human behaviors that allow us to act in aspirational ways, such as compassion, trustworthiness, honesty, generosity, kindness, autonomy, courage, and obedience.

__________________________ aids are helpful in maintaining audience interest, as well as helping the presenter follow and control the presentation.

Visual

Voice over Internet Protocol (VoIP)

VoIP is a type of broadband application, similar to video, in which voice calls are transmitted over the Internet.

Cultural particularism

WHAT are societal norms instilled in populations that tie them emotionally to local brands or habits? a.) Product expectation b.) Cultural particularism

Texting

WHAT can have a negative impact on employees' interpersonal skills and ability to build business relationships? a.) Social networking b.) Telecommuting c.) Texting

Environments

WHAT combine multiple tools or workbenches to support the complete software cycle? a.) Tools b.) Workbenches c.) Environments

Structured

WHAT decisions involve an established procedure, and are repetitive and routine? a.) Semi-structured b.) Unstructured c.) Structured

Integrated

WHAT environments are the most common and are suitable for the entire system development life cycle, from analysis to maintenance? a.) Process b.) Method c.) Integrated

Normalization

WHAT involves correctly defining keys, tables, columns and relationships? a.) Flow charting b.) Referential integrity c.) Normalization

Information technology management

WHAT is concerned with the management of resources that facilitate access to information? a.) Database management system b.) Information technology management c.) Knowledge management

Scalability

WHAT is the ability of a network to to grow user and services without forklift upgrades? a.) Expandability b.) Portability c.) Scalability

Information

WHAT is the meaningful organization of data? a.) Information b.) Knowledge

ETL (Extraction, transfer, and load)

WHAT is the process associated with data warehouse updates and backup? a.) ETL (Extraction, transfer, and load) b.) 1NF c.) Normalization

Data integrity

WHAT means that the data is accurate and consistent through its use and application time? a.) Data integrity b.) Normalization c.) Fidelity

Scrum

WHAT method can address unexpected changes or challenges that cannot be addressed effectively with SDLC? a.) RAD (Rapid-application development) b.) Agile c.) Scrum

Smartphones

WHAT will soon surpass desktop computers accessing the internet? a.) Servers b.) Laptops c.) Smartphones

Why is WPA critical to wireless networks?

WPA (Wi-Fi Protected Access) is a tunneling encryption protocol that secures wireless data transmissions.

Supply chain management (SCM)

Walmart uses WHAT type of software to plan and distribute products from the warehouses to the local stores? a.) Health analytics b.) Customer relationship management (CRM) c.) Supply chain management (SCM)

Organizations need to include redundancy in their business disaster recovery plan by creating duplicate facilities. Which of the following sites offer offsite office space that allow recovery within hours to days?

Warm Sites - offer offsite office space with available systems and service connections, require staffing and updates, allowing recovery within hours to days.

Community

Web 2.0 sites enable collaboration and interaction among users, creating a virtual online a.) Forum b.) Network c.) Community

Web mining can only identify associations, correlations, and significant relationships from data collected from the Internet

Web data mining helps businesses gather intelligence data and make important decisions. Which of the following statements is TRUE regarding web mining? a.) Web mining uses clickstream applications to analyze the data collected from the Internet. b.) Web mining can only identify associations, correlations, and significant relationships from data collected from the Internet. c.) Web mining can handle one database stored in one location at a time. d.) Web mining analyzes a website's traffic by keeping track of the clicks that a user makes.

The Internet was initially developed using a telephone connection. Which of the following is an innovative application provided by the Internet?

Web enabled storefront

Which of the following application provided by the Internet allows an online retailer to conduct business?

Web enabled storefront

What is a rich site summary (RSS)?

Web feed formats used by publishers - Systems analysts can tap RSS for current information and best practices. It is often called really simple syndication.

DBMS

What application does one use to query and administer databases? a.) DBMS b.) SQL c.) Microsoft Access

Application suites

What are application programs bundled together called? a.) Application suites b.) Cloud applications c.) Software packages

These are common functionalities of business intelligence

What are measurement, analytics, reporting, collaboration, and knowledge management? a.) These are the five management roles identified by Henry Mintzberg b.) These are common functionalities of business intelligence c.) These are the best practices of management

Peer-to-peer topologies connect each user in a network directly

What are peer-to-peer network topologies? a.) Peer-to-peer topologies are hierarchical networks b.) Peer-to-peer topologies connect each user in a network directly c.) Peer-to-peer topologies connect each user to the mainframe

Podcasts are audio files that contain educational content

What are podcasts, and why are they a good source of information for systems analysts? a.) Podcasts are content channels that can be read b.) Podcasts are sources of information that are accessed by Apple devices c.) Podcasts are audio files that contain educational content

Database manageability

What are the benefits of partitioning when maintaining a data warehouse database? a.) Database replication b.) Reduced storage c.) Database manageability

Public, private, and hybrid

What are the classifications of cloud computing? a.) Public, private, and hybrid b.) In-house, remote, and hybrid c.) Virtual, multi-core, and distributed

Volume, variety, and velocity

What are the three V's used to describe Big Data? a.) Volume, validity, and veracity b.) Volume, variety, and velocity c.) Validity, velocity, and vast

1NF, 2NF, 3NF

What are the three norms in normalization? a.) 1N, 2N, 3N b.) 1NF, 2NF, 3NF c.) Conceptual, logical, and Independent

Goal selection, attainment measurement, and achievement intervention

What are the three primary activities associated with business performance management? a.) Goal selection, attainment measurement, and achievement intervention b.) Goals, systems, and feedback c.) Objectives, processes, and intelligence

Packet transmission and TCP/IP protocol

What are the two fundamental protocols that can describe modern telecom networks? a.) Asynchronous transfer mode and ATM b.) Packet transmission and TCP/IP protocol c.) Circuit transmission and analog signals

Classical and behavioral models

What are the two management models that have influenced our understanding of the decision-making process in organizational management? a.) Structured and unstructured b.) Classical and behavioral models c.) IT supported and mathematical

Project structure, size, and team technical background

What are three levels of risks associated with system design and implementation? a.) Critical path, work breakdown, and change b.) Project structure, size, and team technical background c.) Cost, schedule, and user acceptance

Mobility, cost, and scalability

What are three reasons that more businesses are deploying wireless networks? a.) Multimedia, flexibility, and cost b.) Mobility, cost, and scalability c.) Security, mobility, and cost

Sniffing, spoofing, and probing

What are three risks to wireless networks? a.) Sniffing, denial of service, and unauthorized access b.) Sniffing, spoofing, and probing c.) Denial of service, security, and sniffing

A tuple is one record or data set in a row

What are tuples and how are they used in databases? a.) A tuple is a collection of sequenced data fields b.) A tuple is one record or data set in a row c.) A tuple is a database field

Presentation and staging

What are two key elements that make up the data warehouse? a.) Presentation and staging b.) Data and information c.) Rules and models

Cloud computing involves all resources connected over the Internet

What best describes a cloud-computing system? a.) Cloud computing involves outsourcing infrastructure services only b.) Cloud computing involves all resources connected over the Internet c.) Cloud computing means off-site data centers

Clickstream records where a user clicks on a web page

What best describes the meaning of clickstream? a.) Clickstream records where a user clicks on a web page. b.) Clickstream measures the number of unique visitors to a web site. c.) Clickstream is a type of foreign key.

Migration is moving data and applications to another computer

What best describes the meaning of data "migration"? a.) Migration is moving data and applications to another computer b.) Migration means upgrading operating system c.) Migration is replacing outdated hardware

Information systems help the enterprise be more productive, reducing size and personnel

What best describes the result of information system impact on a business enterprise? a.) Information systems increase labor cost due to increased information flow. b.) Information systems increase layers of management due to increase information. c.) Information systems slow down decision making process due to more data. d.) Information systems help the enterprise be more productive, reducing size and personnel.

The network engineer is responsible for the layout, installation and maintenance of all IT network components

What best describes the role of a Network Engineer? a.) The network engineer is responsible for the layout, installation and maintenance of all IT network components. b.) The network engineer supports desktops and software applications. c.) The network engineer administers the security of the database.

A systems analyst is responsible for recommending information technology to meet organizational needs

What best describes the role of a Systems Analyst? a.) A systems analyst is responsible for recommending information technology to meet organizational needs. b.) A systems analyst is responsible for the efficiency of corporate IT systems. c.) A systems analyst is responsible for a project completion on time and budget.

Data mining is used to analyze business databases, while big data analyzes big data sets

What can be described as a difference between "data mining" and "big data"? a.) Data mining is used to analyze business databases, while big data analyzes big data sets. b.) Data mining does not use artificial intelligence, while big data uses simple algorithms. c.) There is no difference; both are the same.

Security measures

What can be used to counter the risks, vulnerabilities, and threats experienced by managers in organizations? a.) Internet police b.) Security measures c.) Common sense

Workbenches

What category of CASE (Computer-Aided Software Engineering) does Microsoft Visual Basic fall under? a.) Tools b.) Environments c.) Workbenches

Touch

What computer input capability has Microsoft Windows 8 enabled? a.) Voice b.) Gesture c.) Touch

Structured query language

What computer language is used with relational database applications? a.) Javascript b.) Cobol c.) Structured query language

Network card

What do computer systems that will be interconnected in a network require? a.) Wi-fi b.) Hard drive c.) Network card

Velocity means real time analytics

What do people mean by velocity when describing Big Data? a.) Velocity means ability to update database. b.) Velocity means real time analytics. c.) Velocity means ability to execute data integrity.

Packet Switched Data Networks

What does PSDN stand for? a.) Packet Switched Data Networks b.) Packet Standard Data Node c.) Protocol Standard Data Network

Information technology has reduced bureaucracy by increasing access to information

What impacts has information technology had on organization behavior? a.) Information technology has made the IT organization lead business decision making. b.) Information technology has increased bureaucracy by increasing access to information. c.) Information technology has reduced bureaucracy by increasing access to information.

Passwords and Login IDs

What information can be gained by sniffing a wireless network? a.) VPN access to a corporate network b.) Passwords and Login IDs c.) Root level access to a computer

Provocative photos

What information displayed in social media can disqualify a job candidate? a.) Professional blogs b.) Provocative photos c.) Professional associations

Data warehousing replaces costly ERP systems

What is NOT a data warehousing benefit to business? a.) Data warehousing replaces costly ERP systems. b.) Data warehousing improves decision making. c.) Data warehousing delivers business Intelligence.

QoS is used to measure performance of data communications

What is QoS (Quality of Service)? a.) QoS is used to ensure fiber optic network performance b.) QoS is used to measure performance of data communications c.) QoS is mostly used to measure data switched networks

UML is a general purpose modeling language

What is UML (Unified Modeling Language)? a.) UML is a general purpose modeling language b.) UML is a hypertext language c.) UML is a computer language, like C++

Packet switching does not need a dedicated network connection

What is a benefit of packet switching? a.) Packet switching does not need a dedicated network connection. b.) Packet switching compiles all data to be transmitted in one packet. c.) Packet switching cannot handle multi-media transmission, which can be expensive to send.

A data mart is a data warehouse subset

What is a data mart? a.) A data mart is a small data warehouse. b.) A data mart is used only by small businesses. c.) A data mart is a data warehouse subset.

Schema is a planned design of the data organization

What is a database schema? a.) Schema is a planned design of the data organization. b.) Schema are used when referring to foreign key and primary key. c.) Schema is a term used by DBMS and stands for a structured query.

A hacker attempt to tie up network host resources making them unavailable

What is a denial of service attack? a.) Denial of service is a spoof b.) A hacker attempt to tie up network host resources making them unavailable c.) Denial of service is a network probing process

The scheduling challenges that occur when planning simultaneous events

What is a disadvantage of the group decision-support systems (GDSS)? a.) The lack of interactive collaborative tools b.) The network limitations c.) The scheduling challenges that occur when planning simultaneous events

Relational databases allow easy access to information

What is a key benefit to business organizations for using a relational database? a.) Relational databases are inexpensive. b.) Relational databases allow easy access to information. c.) Relational databases are easy to implement.

Mobile access to the Internet is growing exponentially

What is a key trend in mobile communications that businesses must be aware of? a.) Mobile networks will replace wired networks. b.) Mobile access to the Internet is growing exponentially. c.) Mobile communications is faltering because of lack of security.

A network management application retrieves and analyzes network traffic data

What is a network management application? a.) A network management application is a sniffer. b.) A network management application is the operating system needed in computer networks. c.) A network management application retrieves and analyzes network traffic data.

A radio frequency survey is a signal strength detection process to identify the best wireless access point locations

What is a radio frequency survey? a.) A radio frequency survey is a signal strength detection process to identify the best wireless access point locations b.) A radio frequency survey is used to partition the spectrum for wireless networks c.) A radio frequency survey is performed to understand what spectrum wireless networks should use

Web feed formats used by publishers

What is a rich site summary (RSS)? a.) Systems analysts' information channel b.) Web feed formats used by publishers c.) Websites used specifically by systems analysts

It is simpler to use than a DBMS

What is an advantage of using the traditional file environment? a.) Users can perform advanced queries on the tables. b.) It is simpler to use than a DBMS. c.) There is a dependency between the software program and the data.

Object oriented databases contain multimedia files or executable code in records or fields

What is an object oriented database? a.) Object oriented databases contain multimedia files or executable code in records or fields. b.) Object oriented databases contain simple data with no relationships. c.) Object oriented database is another term for relational database.

Data terminal equipment

What is another name for a network host? a.) Host computer b.) Data terminal equipment c.) Network server

Knowledge discovery

What is another term used to describe data mining? a.) Relational cognizance b.) Information analysis c.) Knowledge discovery

Low level is characterized by noticeable impact to the organization

What is considered to be a low level security risk during system post-implementation? a.) Low level is characterized by complete loss of organizational capabilities b.) Low level is characterized as severe impairment to an organization c.) Low level is characterized by noticeable impact to the organization

When a group suppresses dissent and alternative points of view

What is groupthink? a.) When a group suppresses dissent and alternative points of view b.) When a group uses GDSS c.) When a group shares alternative points of view d.) When a group collaborates effectively

Core routers 'collapse' the network into a backbone for high bandwidth communication

What is meant by a 'Core' router? a.) Core routers are all routers that connect to the Internet. b.) Core routers are a single routing protocol. c.) Core routers 'collapse' the network into a backbone for high bandwidth communication.

Multi-core microprocessors allow for parallel processing

What is meant by a multi-core microprocessor? a.) Multi-core microprocessors are primary memory devices b.) Multi-core microprocessors allow for parallel processing c.) Multi-core microprocessors are memory devices

Decision maker provides the necessary insight, judgment, and evaluation

What is meant by an unstructured decision-making process? a.) Decision maker provides the necessary insight, judgment, and evaluation. b.) Decision maker uses an established routine. c.) Decision maker uses outside consultants. d.) Decision maker uses information technology and algorithms.

Master data are objects shared across the enterprise

What is meant by master data in entity-relationship modeling? a.) Master data is a table of business definitions. b.) Master data are objects shared across the enterprise. c.) Master data is the entity in hierarchical databases.

Scalability refers to the ability to grow user base and data services with ease, built into the infrastructure

What is meant by wireless networks being scalable? a.) Scalability refers to the ability to expand range built into the infrastructure. b.) Scalability refers to the ability to grow at fixed costs. c.) Scalability refers to the ability to grow user base and data services with ease, built into the infrastructure.

Redundancy

What is not a benefit of database normalization? a.) Redundancy b.) Organization c.) Flexibility d.) Consistency

User requirements

What is not a development stage in the waterfall model? a.) User requirements b.) Conversion c.) Systems analysis

It involves the measurement of probability and consequences of risks

What is qualitative risk analysis? a.) It involves the measurement of high level security breach impact b.) It involves the measurement of probability and consequences of risks c.) It involves the measurement and cost associated with quality failures

The process of identifying, analyzing, and responding to risk

What is risk management in system security? a.) The process of identifying, analyzing, and responding to risk b.) The process of cataloging risks c.) The process of security breach prevention

Internet of Things means connectivity of all devices to enable service automation

What is the Internet of Things (IoT)? a.) Internet of Things means every user in the world having access to the internet. b.) Internet of Things means connectivity of all devices to enable service automation. c.) Internet of Things means online e-commerce on every product and service.

Employers validate qualifications, references, and skills

What is the benefit of employers researching social media information on job candidates? a.) Employers evaluate the types of friends candidates keep. b.) Employers validate qualifications, references, and skills. c.) Employers evaluate candidates' personal interests.

Extraction means getting data from database sources

What is the best definition for data extraction? a.) Extraction means copying a database to data warehouse. b.) Extraction means backing up the data warehouse. c.) Extraction means getting data from database sources.

Core routers connect large businesses to the Internet backbone

What is the best definition of a core router? a.) Core routers are used in fiber optics networks b.) Core routers connect large businesses to the Internet backbone c.) Core routers have few protocol capabilities

Data integrity is a process to ensure data is not corrupted

What is the best definition of data integrity? a.) Data integrity means data is current. b.) Data integrity is a process to ensure data is not corrupted. c.) Data integrity means data is secure and reproducible.

The flat file design is a single table database

What is the best description of a flat file database? a.) Flat file databases are hierarchical in nature. b.) Flat file databases are prevalent today because they provide relational functions. c.) The flat file design is a single table database.

Data is digitized, enclosed in packets, and transmitted

What is the best description of how a packet switched network works? a.) Data is transmitted in a virtual circuit. b.) Data is digitized and transmitted in fixed packet size and rates. c.) Data is digitized, enclosed in packets, and transmitted.

The ability to review and target candidates based on their background

What is the business benefit of a social media website like LinkedIn? a.) The ability to reduce wages due to proliferation of candidates. b.) The ability to review and target candidates based on their background. c.) The ability to always find the right candidates.

Partitioning means dividing a database for manageability

What is the definition of a partition in database concepts? a.) Partitioning means distributing a database for availability. b.) Partitioning means dividing a database for manageability. c.) Partitioning means backing up database for business continuity.

ICR is an intelligent or advanced form of OCR

What is the difference between ICR (Intelligent Character Recognition) and OCR (Optical Character Recognition)? a.) ICR is an intelligent or advanced form of OCR b.) ICR uses optical bar codes, whereas OCR recognizes characters c.) ICR is intelligent and not prone to errors, like OCR

A LAN connects computer systems locally, whereas a WAN connects systems over a long distance

What is the difference between a LAN and a WAN? a.) A LAN is a large network, whereas a WAN is a small network. b.) A LAN connects computer systems locally, whereas a WAN connects systems over a long distance. c.) A LAN consists of a client server network, whereas a WAN has client server and mainframe systems.

First degree means users are connected; second degree means they share mutual contacts

What is the difference between a first degree connection and second degree connection on LinkedIn? a.) First degree means a current employee; second degree means a top candidate. b.) First degree means a top candidate; second degree means a back up candidate. c.) First degree means users are connected; second degree means they share mutual contacts.

Object oriented are designed to store audio or mixed media, while relational link tables of records

What is the difference between an object-oriented database model and a relational model? a.) Object oriented are used for hierarchical links, while relational are linked by common key attributes. b.) Object oriented are designed to store audio or mixed media, while relational link tables of records. c.) Object oriented is a centralized database model, while relational is decentralized.

Data mining and analytics are interchangeable; both are processes to identify new patterns in data

What is the difference between data mining and analytics? a.) Data mining looks at operational data, whereas analytics looks at transactional databases. b.) Data mining and analytics are interchangeable; both are processes to identify new patterns in data. c.) Data mining is used in mainframes, whereas analytics is used in client-server environments.

Data mining examines and reveals patterns in a structured DBMS, while web mining discovers patterns in a less structured format, such as the Internet

What is the difference between data mining and web mining? a.) Data mining examines and reveals patterns in a non-relational DBMS, while web mining discovers patterns in a less structured format, such as the Internet. b.) Data mining examines and reveals patterns in a structured DBMS, while web mining discovers patterns in a less structured format, such as the Internet. c.) Data mining examines and reveals patterns in a structured DBMS, while web mining discovers patterns in a non-relational DBMS. d.) Data mining examines and reveals patterns in a less structured format such as the Internet, while web mining discovers patterns in a structured DBMS.

M-commerce is e-commerce transacted using mobile, wireless smart devices

What is the difference between m-commerce and e-commerce applications? a.) M-commerce is business to business, while e-commerce is business to consumer b.) M-commerce is government e-commerce c.) M-commerce is e-commerce transacted using mobile, wireless smart devices

Wireless, mobile networks

What is the fastest growing infrastructure and information system facing the millennial? a.) Smart devices b.) Wireless, mobile networks c.) Satellite communications

To evaluate the quality and functionality of information and output

What is the focus of a functional evaluation of a management information system? a.) To evaluate reporting capability for decision making b.) To evaluate the query response time c.) To evaluate the quality and functionality of information and output

A network bridge links two network LANs together

What is the function of a network bridge? a.) A network bridge is a simple switch. b.) A network bridge connects virtual hosts together. c.) A network bridge links two network LANs together.

The cloud administrator assesses and improves cloud infrastructure needs.

What is the function of the cloud administrator job? a.) The cloud administrator monitors and provides cloud resources b.) The cloud administrator controls who offers cloud services c.) The cloud administrator assesses and improves cloud infrastructure needs

The data integration service serves as the depository of all extracted data for the load function of the data warehouse

What is the function of the data integration service in business intelligence? a.) The data integration service gathers and logically mixes business and master data b.) The data integration service helps extract value from the data c.) The data integration service serves as the depository of all extracted data for the load function of the data warehouse

Malware infection

What is the greatest business security threat from social media applications? a.) Hacking b.) Malware infection c.) Denial of service attack

Computer speeds are increasing exponentially

What is the implication of Moore's law? a.) Computers will become robots b.) Computer speeds are increasing exponentially c.) Computers will process biological signals

The hard drive is a device that stores data

What is the main purpose of the hard drive? a.) The hard drive boots the computer b.) The hard drive is the main memory system c.) The hard drive is a device that stores data

The way they communicate with their stakeholders

What is the major difference between a rigidly defined brick-and-mortar depiction of a business and one that is purely an e-business? a.) The way they communicate with their stakeholders. b.) The type of customers they have. c.) The type of products they sell. d.) The way they operate their business.

Ownership and/or control of the network

What is the major difference between private industrial networks and Net marketplaces? a.) Who is the third party managing the network b.) Goals to achieve c.) Ownership and/or control of the network d.) Amount of transactions conducted

Outcomes are the consequences of an event

What is the meaning of outcomes in decision theory? a.) Outcomes are the consequences of an event b.) Outcomes are possibilities thought by the agent c.) Outcomes are the feedback mechanism to decision theory

Microsoft Windows

What is the most common client-level operating system in business? a.) Microsoft Windows b.) Unix c.) OS X

Prepackaged production reports

What is the most common use of business intelligence in corporations? a.) Data mining b.) Analytics c.) Prepackaged production reports

Sniffing

What is the most prevalent hacker attack on wireless networks? a.) Probing b.) Sniffing c.) Spoofing

Identify user system and software requirements

What is the objective of the systems analysis stage in the waterfall method? a.) Define the software architecture b.) Identify user system and software requirements c.) Identify the hardware platform

A systems analyst focuses on analysis, design, and implementation

What is the overall job function of a systems analyst? a.) A systems analyst executes qualitative risk assessments b.) A systems analyst focuses on analysis, design, and implementation c.) A systems analyst develops system design processes

1G enabled mobile voice telecommunication while 4G offers voice, data and video

What is the primary difference between a 1G cellular network and the current 4G network? a.) 1G offered digital circuits while 4G offers packet switching b.) 1G is the fastest network and is used for converged technology while 4G are voice only c.) 1G enabled mobile voice telecommunication while 4G offers voice, data and video

Reduce losses related to losses in confidentiality, availability and integrity

What is the primary goal of information security? a.) Eliminate all losses associated with risks. b.) Reduce losses related to losses in confidentiality, availability and integrity. c.) Reduce losses regardless of the cost.

Direct move

What is the process of transferring data that does not need to be transformed to the data warehouse? a.) Clean transfer b.) Direct move c.) Stream

A sniffer is used to monitor network traffic

What is the purpose of a network sniffer? a.) A sniffer is used to hack into networks b.) A sniffer is used to monitor network traffic c.) A sniffer is used to improve QoS

Data warehouse analysis leads to business intelligence

What is the relationship between business intelligence and a data warehouse? a.) Data warehouse analysis leads to business intelligence. b.) There is no relationship between business intelligence and data warehouses. c.) Business intelligence must be stored in a data warehouse.

Repeaters are used to amplify signals as they travel in a network

What is the role of repeaters in telecommunication networks? a.) Repeaters are used to amplify signals as they travel in a network. b.) Repeaters store transmitted data in case there is an error in transmission. c.) Repeaters are used to send data to multiple devices in the network.

b

What is the salary range of new and emerging social media jobs? a.) $30,000-$50,000 b.) $45,000-$70,000 c.) $80,000-$100,000

100,000 kbps

What is the typical broadband data speed of a 4G network? a.) 64 kbps b.) 100,000 kbps c.) 2.4 kbps

Petabytes

What is the typical data set size of big data? a.) Petabytes b.) Bytes c.) Terabytes

TCO is a study to determine economic feasibility

What is total cost of ownership (TCO)? a.) TCO is a study to determine economic feasibility b.) TCO is a development life cycle method c.) TCO is a waterfall economic analysis

Pointers

What is used to show the relationship between data fields and tables in entity-relationship models? a.) Circles b.) Pointers c.) Bolding

Predictive analytics

What item below is considered a category of business intelligence? a.) Relational mapping b.) Data warehousing c.) Predictive analytics

Understanding the purpose of creating an e-commerce is addressed in which of the following questions?

What job(s) will the e-commerce presence satisfy? - Developing a presence with e-commerce requires the organization to understand its purpose in creating an e-commerce page.

The project team would create vision and mission statements in alignment with the organization's overall mission, then seek to understand the audience, market conditions, development timeline, and preliminary budget. This assignment is addressed in which of the following questions?

What job(s) will the e-commerce presence satisfy? - the project team will create vision and mission statements and then seek to understand market conditions.

Data cleansing

What occurs during the transformation step in ETL? a.) Data formatting b.) Data stream c.) Data cleansing

Social media

What other sources of information besides a resume, cover letter, and interviews are employers using when evaluating candidates? a.) Social media b.) Social network c.) Social profile

3/4

What portion of small businesses fear potential damage from social media? a.) 1/3 b.) 1/2 c.) 3/4

How is the marketplace structured, and how will the business best interact with an e-commerce presence?

What question does the SWOT analysis best answer? a.) How is the marketplace structured, and how will the business best interact with an e-commerce presence? b.) What business and revenue models are best for e-commerce implementation? c.) What job(s) will the e-commerce presence satisfy? d.) Who is the target audience(s and how will they access e-commerce sites?

Application

What software allows computer users to perform activities, functions, or tasks? a.) Routing b.) Application c.) Operating

Spreadsheet

What software would be used by accountants to create digital ledgers? a.) Word processing b.) Presentations c.) Spreadsheet

Chief Security Officer

What strategic role has emerged as critical in recent years in large organizations due to cyber attacks? a.) Chief Database Officer b.) Chief Security Officer c.) Chief Legal Officer d.) Chief Technology Officer

Executive support systems (ESS)

What systems do upper management use for decision making? a.) Online analytical processing systems (OLAP) b.) Online transaction processing systems (OLTP) c.) Executive support systems (ESS)

It creates analytical databases that help expedite custom queries

What tasks does the analytics services element of business intelligence perform? a.) It creates analytical databases that help expedite custom queries. b.) It performs the predictive analytics function. c.) It performs the data integrity algorithm.

Transactional processing systems

What type of management information systems do operational and middle management use for structured decisions? a.) Data warehouse systems b.) Transactional processing systems c.) Analytical processing systems

Classified documents of the U.S. government

What was stolen in the Chelsea Manning and Edward Snowden crimes? a.) Classified documents of the U.S. government b.) Users' personal information c.) Corporations' customer credit card information

It will receive heavy responses from competitors and newcomers

What will happen if an e-business does not take any action to sustain the advantages brought by e-business? a.) The business will sustain itself with affecting components. b.) Customers will continue to shop online. c.) It will receive heavy responses from competitors and newcomers.

When should oral communication be avoided?

When Conveying Documentation - Documentation should be presented in writing for the audience to read.

When would client computers using TCP/IP in a client/server network not be able to communicate with each other?

When a client computer is offline and not connected to the Internet

The company gets access to enterprise applications

When a company acquires SaaS (Software as a Service) in cloud computing, what do they actually get? a.) The company gets the computer platform b.) The company gets the software in perpetuity c.) The company gets access to enterprise applications

Numerous methods

When a piece of data is in one of the three states (at rest, in motion, or in use), people can employ WHAT to countermeasure threats or vulnerabilities to that particular data? a.) Two specific methods b.) Numerous methods c.) One specific method

The user knowledge and background of target audience

When communicating, what is important for IT professionals to understand during the system development process? a.) The legacy systems model b.) The system networking platform c.) The user knowledge and background of target audience

Users

When installing a wireless network, it is important to know the best access point locations and the number of WHAT? a.) Routers b.) Hubs c.) Users

Decision analysis is used with complex issues that require mathematical analysis

When is decision analysis used by management? a.) Decision analysis is used when management is indecisive. b.) Decision analysis is used when dealing with structured decisions. c.) Decision analysis is used with complex issues that require mathematical analysis.

Documentation

When managing systems implementation, WHAT step consists of cataloging the system specifications in detail? a.) Conversion b.) Aquisition c.) Documentation

When conveying documentation

When should oral communication be avoided? a.) When meeting with people from other cultures b.) When working on global projects c.) When conveying documentation

Circuit switch

When streaming data or voice, which type of switched network is used? a.) Packet switch b.) Circuit switch c.) Analog switch

Data integrity

When there are mistakes or errors in the data, it is a violation of WHAT rule? a.) Data redundancy b.) Data integrity c.) Data inconsistency

Calculations

When using a decision tree, WHAT can become complex when uncertain values exist, or if multiple outcomes are linked oriented? a.) Analysis b.) Outcomes c.) Calculations

Production and operations

Which main business function is responsible for converting resources into goods or services as efficiently as possible? a.) Production and operations b.) Sales and marketing c.) Finance and accounting d.) Human resources

End user development

Which method below uses fourth generation computer languages? a.) End user development b.) Agile c.) RAD

A small business owner installs Microsoft Office suite on all the computers in his office

Which of the following action is considered ethical, social, and legally acceptable? a.) An employee searches the corporate data resources for sensitive information about his neighbor or friends b.) A small business owner installs Microsoft Office suite on all the computers in his office c.) A high school student copies, uses, and distributes Taylor Swift music videos to his classmates

Create automatic backups on cloud storage

Which of the following actions will help us protect our computer against failure? a.) Do not store data on the cloud b.) Create automatic backups on cloud storage c.) Only store data on a hard drive d.) Store all data on a jump drive

Electronic Data Interchange

Which of the following application provided by the Internet allows a business to transfer documents automatically without human intervention? a.) Information repositories b.) Electronic Data Interchange c.) Electronic communications d.) Web forms

Web enabled storefront

Which of the following application provided by the Internet allows an online retailer to conduct business? a.) Web forms b.) Electronic communications c.) Web enabled storefront d.) Fax machine

A digital signal is a discrete, non-continuous electrical waveform

Which of the following best defines a digital signal? a.) A digital signal is a packet b.) A digital signal is a discrete, non-continuous electrical waveform c.) A digital signal is a frequency driven medium

A system of nodes and links

Which of the following best describes a telecommunications network? a.) A system of nodes and links b.) The internet c.) A telephone system

BPM is collection of analytics and processes that enable organizations achieve goals and objectives

Which of the following best describes business performance management (BPM)? a.) BPM is a methodology that relies on business intelligence to fix processes. b.) BPM is a methodology of knowledge sharing from business intelligence. c.) BPM is collection of analytics and processes that enable organizations achieve goals and objectives.

Freeware is copyrighted software that can be used for free

Which of the following best describes freeware? a.) Freeware is copyrighted software that can be used for free b.) Freeware is hardware components that can be used for free c.) Freeware is open-source software that can be modified

A method or algorithm that uses statistics and data mining to forecast models

Which of the following best describes predictive analytics? a.) A method that uses data mining techniques to solve operational challenges b.) A method or algorithm that uses statistics and data mining to forecast models c.) A process that integrates data to help management make changes d.) A process that uses business data to report operational information

Referential integrity is the process of building relationships between tables based on keys

Which of the following best describes referential integrity? a.) Referential integrity applies only in hierarchical database. b.) Referential integrity is the process of building relationships between tables based on keys. c.) Referential integrity is the relationship between primary keys.

Data mining is the process of analyzing data to gain insight or intelligence

Which of the following best describes the process of data mining? a.) Data mining is the process of organizing data for database design. b.) Data mining is the process of creating intelligent databases. c.) Data mining is the process of analyzing data to gain insight or intelligence.

WSNs are spatially distributed sensors.

Which of the following best describes wireless sensor networks (WSNs)? a.) WSNs are spatially distributed sensors. b.) WSNs are antenna mesh. c.) WSNs are highly powered access points.

Utilitarian approach

Which of the following category of ethical models for ethical behavior approach assesses the consequences and/or outcomes of an action to determine the greatest good or least harm for the greatest number, regardless of the justice or fairness of or to the individual? a.) Utilitarian approach b.) Rights approach c.) Virtue d.) Fairness approach

Accessibility

Which of the following category of generalized ethical issues refers to creation of barriers to access? a.) Privacy b.) Accuracy c.) Accessibility d.) Property

b

Which of the following companies has created a network-based strategy with other businesses? a.) Happy Hair is a hair salon catering to young teenagers. The business works hard to keep up with the current trends that teenagers are following for their hair styles, such as current TV shows and pop musicians. The business has been so successful that the owner is considering opening a new location. b.) Chic Computers is a business that sells laptops and tablets. The business works with various laptop and tablet manufacturers and also multiple cell phone carriers to offer a few products from each manufacturer and carrier. The result for consumers is that they can go to one store and learn about the laptop and tablet options available from multiple companies, including pricing.

Principle of Least Privilege

Which of the following concept dictates that personnel should be given access on a need-to-know basis? a.) Separation of Duties b.) Principle of Least Privilege c.) Information Security

The Chelsea Manning and Edward Snowden leaks

Which of the following crimes affected the security of this country? a.) Scams, fraud, and identity theft b.) The Chelsea Manning and Edward Snowden leaks c.) Corporate loss

Income level

Which of the following customer attributes helps price goods more accurately? a.) Customer age b.) Income level c.) Purchase price d.) Ethnic group

Allows individuals to examine government records as long as it does not cause an invasion of privacy

Which of the following describes the Freedom of Information Act (FOIA)? a.) Provides the right to be left alone from individuals, organizations, and the state. b.) Allows individuals to examine government records as long as it does not cause an invasion of privacy. c.) Provides principles and standards that teach us what is right and wrong. d.) Provides principles that govern the collection and use of information about individuals.

Virtue

Which of the following ethical models values human behaviors that allow us to act in aspirational ways? a.) Utilitarian b.) Rights c.) Virtue d.) Fairness e.) Common Good

Technological factors

Which of the following factors deals with employee training to mitigate the risks to an organization? a.) Technological factors b.) Environmental risk factors c.) Organizational factors

To understand the concept of safe harbor

Which of the following is NOT a benefit for individuals to take information security training? a.) Guard against loss from low-tech methods b.) Guard against loss from high-tech methods c.) To understand the value of their information assets d.) To understand the concept of safe harbor

Lower implementation costs

Which of the following is NOT a benefit of information technology? a.) Lower implementation costs b.) New product development c.) Faster communication d.) Increased globalization

Business strategy

Which of the following is NOT a benefit to business from social media apps? a.) Business strategy b.) User generated feedback c.) Targeted sales promotions

Cost-benefit analysis

Which of the following is NOT a component of an organization's framework for security and control? a.) Risk assessments b.) Information systems controls c.) Cost-benefit analysis

Abstract data model

Which of the following is NOT a data model used when mapping business processes, relationships, and data requirements? a.) Physical data model b.) Abstract data model c.) Conceptual data model

Digital Millennium Copyright Act (DMCA)

Which of the following is NOT a legislation created to protect the integrity and confidentiality of information? a.) Sarbanes-Oxley Act (SOX) b.) Digital Millennium Copyright Act (DMCA) c.) Health Insurance Portability and Accountability Act (HIPAA) d.) Gramm-Leach Bliley Act (GLBA)

Database backup

Which of the following is NOT a pitfall when maintaining a data warehouse database? a.) ETL load phase b.) Database backup c.) Data validation d.) Data cleansing

Use anonymous browsing.

Which of the following is NOT a safe way to access a public Wi-Fi? a.) Use a Virtual Private Network (VPN) connection. b.) Use a secure connection to a remote desktop. c.) Use anonymous browsing.

Valuation analysis

Which of the following is NOT a trading use that has emerged from investors applying social media? a.) Sentiment analysis b.) Trend analysis c.) Valuation analysis

Acquiring an e-commerce presence from another firm

Which of the following is NOT a typical option for creating an e-commerce presence? a.) Purchasing e-commerce services from a service provider. b.) Purchasing e-commerce services from off-the-shelf software. c.) Acquiring an e-commerce presence from another firm. d.) Creating an e-commerce presence from scratch.

Printed text

Which of the following is NOT an interactive multimedia resource published online to inform and educate stakeholders? a.) Printed text b.) Audio clips c.) Written text d.) Video clips

Incentives

Which of the following is NOT an organizational feature that managers should consider when building and using information systems? a.) Politics b.) Structure c.) Environment d.) Incentives

Expert consultants

Which of the following is a NOT an element of business intelligence? a.) Expert consultants b.) Managerial methods c.) Analytics toolset

Children's Online Privacy and Protection Act (COPPA)

Which of the following is a U.S. law stipulating what a website operator must include in a privacy policy? a.) Gramm-Leach Bliley Act (GLBA) b.) General Data Protection Regulation (GDPR) c.) Children's Online Privacy and Protection Act (COPPA) d.) Health Insurance Portability and Accountability Act (HIPAA)

They carried continuous electronic waveforms

Which of the following is a characteristic of a legacy or old analog network? a.) They carried continuous electronic waveforms b.) They did not have capacity or bandwidth limitations c.) They require packet switched networks

A logical model is an abstraction of a system

Which of the following is a definition of a systems analysis logical model? a.) A logical model is an abstraction of a system b.) A logical model is a type of data diagram c.) A logical model is UML

Internet

Which of the following is a great, free, and ubiquitous source of information for systems analysts? a.) Internet b.) Textbooks c.) Library

Decision making

Which of the following is a primary role of information systems managers? a.) Performance review b.) Hiring c.) Decision making

Email encryption

Which of the following is a proactive technological measure that could help protect our privacy? a.) Antivirus b.) Anti-malware c.) Email encryption d.) Intrusion protection

European Union's General Data Protection Regulation (GDPR)

Which of the following is a set of regulations to protect Internet users from clandestine tracking and unauthorized personal data usage? a.) European Union's General Data Protection Regulation (GDPR) b.) Health Insurance Portability and Accountability Act (HIPAA) c.) Children's Online Privacy and Protection Act (COPPA) d.) Organization for Economic Co-operation and Development (OECD)

Joe is extracting information from existing data to better understand his customers and identify potential risks

Which of the following is an accurate example of why a business should use predictive analytics? a.) Joe is extracting information from existing data to better understand his customers and identify potential risks. b.) Mary is using historical data so she can know what will happen in her business next year.

Principles that govern the collection and use of information about individuals

Which of the following is an appropriate definition of Fair Information Practices (FIP)? a.) Principles that govern the collection and use of information about individuals. b.) Allows individuals to examine government records as long as this examination does not cause an invasion of privacy. c.) Provides principles and standards that teach us what is right and wrong. d.) Provides the right to be left alone from individuals, organizations, and the state.

Organization for Economic Co-operation and Development (OECD)

Which of the following is an international establishment of laws that help to protect fundamental human right to privacy? a.) Organization for Economic Co-operation and Development (OECD) b.) Health Insurance Portability and Accountability Act (HIPAA) c.) European Union's General Data Protection Regulation (GDPR) d.) Children's Online Privacy and Protection Act (COPPA)

World Intellectual Property Organization (WIPO) Copyright Treaty

Which of the following is an international law or agreement created to combat increasing piracy software and digital goods? a.) Gramm-Leach Bliley Act (GLBA) b.) Digital Millennium Copyright Act (DMCA) c.) Sarbanes-Oxley Act (SOX) of 2002 d.) World Intellectual Property Organization (WIPO) Copyright Treaty

Virtual networks function through network virtualization

Which of the following is correct about virtual networks? a.) Virtual networks function through network virtualization. b.) Virtual networks are a conceptual design. c.) Virtual networks connect virtual hosts together.

Difficulty in estimating project cost

Which of the following is not a benefit of using SDLC when implementing an information system program? a.) Detailed staged process b.) Ability to monitor large projects c.) Difficulty in estimating project cost

IP

Which of the following is not a circuit switching protocol? a.) Frame Relay b.) IP c.) ATM

Managerial

Which of the following is not a component of a feasibility study? a.) Economic b.) Technical c.) Managerial

Competition

Which of the following is not a factor that must be considered when implementing a new information system? a.) Technical ability b.) User c.) Resistance to change d.) Competition

Brand

Which of the following is not a key factor to consider when evaluating a system alternative? a.) Brand b.) Compatibility c.) Limitations d.) Economic

Normalization prevents inaccurate data entry

Which of the following is not a reason to normalize a database? a.) Normalization prevents inaccurate data entry b.) Normalization eliminates data redundancy c.) Normalization reduces data complexity

Select team

Which of the following is not a step in the decision-making process? a.) Select team b.) Develop alternatives c.) Define problem

Scheduling

Which of the following is not a systems implementation phase? a.) Testing b.) Conversion c.) Scheduling d.) Development

DOS

Which of the following is not a telecommunications network protocol? a.) DOS b.) PPP c.) FTP d.) TCP/IP

Row-to-column

Which of the following is not a type of relationship in a relational database model? a.) One- to-one b.) One to-many c.) Row-to-column

POP

Which of the following is not a wireless telecommunication networking protocol? a.) Wi-Fi b.) POP c.) Bluetooth

Copper building wire

Which of the following is not an effective telecommunication medium? a.) CAT 5 cable b.) Fiber optics cable c.) Copper building wire

Model

Which of the following is not an element in decision theory? a.) Acts b.) Model c.) Payoffs

Quality

Which of the following is not an organizational change category to consider when implementing a new information system? a.) Automation b.) Quality c.) Rationalization

A network of servers is set up to share and manage client data across multiple satellite offices for a healthcare provider so the staff at any location can access the same data

Which of the following is the best description of an information system? a.) A network of servers is set up to share and manage client data across multiple satellite offices for a healthcare provider so the staff at any location can access the same data. b.) A restaurant's important recipes are stored in a database on their desktop computer. c.) A program is written to create mailing labels for marketing company.

It is a self-regulation component

Which of the following statement is TRUE concerning safe harbor? a.) It is a self-regulation component. b.) The U.S. firms must protect and enforce privacy based on the U.S. government regulation. c.) It is a framework run and enforced by the U.S. Department of Commerce. d.) It allows U.S. firms to collect and store personal information of U.S. citizens.

Many brick-and-mortar retailers have replaced all their supply chains with elements of e-commerce

Which of the following statement regarding e-commerce is false? a.) E-commerce helps to stem the flow of supply chain, while improving efficiency. b.) Many brick-and-mortar retailers have replaced all their supply chains with elements of e-commerce. c.) E-commerce provides companies with an online presence. d.) E-commerce has taken market share from traditional commerce models in a variety of industries.

The omnichannel model has replaced the e-commerce model

Which of the following statement regarding e-commerce is true? a.) E-business enabled distribution systems are a little more efficient and reliable than brick-and-mortar establishments. b.) Many brick-and-mortar retailers have replaced their supply chains with elements of e-commerce. c.) The omnichannel model has replaced the e-commerce model. d.) E-commerce has taken market share from traditional commerce models in all industries.

They are created and/or sponsored by the government

Which of the following statement regarding private industrial networks and Net marketplaces is false? a.) They are created and/or sponsored by the government. b.) They allow connections within an industry to create closer collaborative ties. c.) They are professional and industrial networks. d.) They are maintained by third parties.

They are professional and industrial networks

Which of the following statement regarding private industrial networks and Net marketplaces is true? a.) They are maintained by the government. b.) They are professional and industrial networks. c.) They allow connections across industries to create closer collaborative ties. d.) They are created and/or sponsored by the government.

Actions that are ethically acceptable are also socially and legally acceptable

Which of the following statements is FALSE about our actions that are ethically acceptable? a.) Actions that are ethically acceptable may or may not be politically acceptable. b.) Actions that are ethically acceptable may or may not be legally acceptable. c.) Actions that are ethically acceptable may or may not be socially acceptable. d.) Actions that are ethically acceptable are also socially and legally acceptable.

It is a way to improve information security training

Which of the following statements is FALSE regarding safe harbor? a.) It is a framework developed by the U.S. Department of Commerce and European Commission. b.) It is a way to improve information security training. c.) The U.S. firms must protect and enforce privacy independent of government regulation. d.) It allows U.S. firms to collect and store personal information from EU citizens.

An advantage to wireless communication is that information is available from anywhere, but the main disadvantage is that networks cannot easily be reconfigured because there is no physical wiring

Which of the following statements is false? a.) Wireless networks communicate through the air via the radio frequency spectrum, and can easily be configured because of the lack of physical wiring. b.) An advantage to wireless communication is that information is available from anywhere, but the main disadvantage is that networks cannot easily be reconfigured because there is no physical wiring. c.) Security and hacking is the main disadvantage to wireless communication.

Defining what must be accomplished

Which of the following would likely be a step in building a logical model of a system? a.) Describing methods of implementation b.) Describing how something will be accomplished c.) Defining what must be accomplished

b

Which of these choices best describes a knowledge management system? a.) A ski resort collects customer information when a new reservation is made. That customer information is sent to the children's ski school that is on property so that they can market the ski school to customers with young children. b.) A large company with hundreds of employees creates a new department called Technical Writing. This new department will be responsible for collecting information from the employees and writing documentation to be shared with clients as well as internal documentation that will aid in employee training in the future.

a

Which of these choices best describes an ERP system? a.) A large theme park company enters information about a potential employee into a system during the hiring process. The same system is used by the company's management team to enter information about the employee's assigned roles and about their work performance. Everyone on the management team can access information in the system, and some pieces of the system are secure allowing only top level administrators to have access. The system is also used by the Accounting team to determine hours worked each week for payroll purposes. b.) A receptionist at a recruiting company enters information about a potential candidate into a spreadsheet and emails key pieces of information to the recruiter responsible for that area. Only the receptionist has access to the spreadsheet.

Threat of substitutes

Which one of Michael Porter's five competitive forces does this describe: Switching from one product or service to another similar product or service with little cost? a.) Threat of substitutes b.) Threat of new entrants c.) Bargaining power of suppliers

b

Which one of the following scenarios describes a strategic information system? a.) Papa Jack's Pizza restaurant implemented a new system to help manage employee schedules and help with routine questions about inventory. b.) We Be Fit gym implemented a new system to determine trends and identify new operational methods in order to improve customer service.

Facebook

Which social media site do teens use the most? a.) Snapchat b.) Pinterest c.) Facebook

LinkedIn

Which social media site has made employee recruitment more economical and efficient? a.) Twitter b.) Facebook c.) LinkedIn

Facebook

Which social media site is the most commonly used? a.) Facebook b.) Twitter c.) Instagram

Group Decision Support System

Which system supports creative thinking and allows users to interact simultaneously at multiple geographic locations to collectively participate in decision making? a.) Geographic Information System b.) Decision Support System c.) Group Decision Support System

Instant message

While enrolled in a traditional course at a university, you and your instructor can communicate synchronously, face-to-face, in the classroom. However, you can also communicate with your instructor synchronously outside the classroom using which of the following Internet applications? a.) Bulletin board b.) Email c.) Instant message d.) Blog

Information policy administrator

Who is responsible for acquiring, organizing, and distributing information for the organization? a.) Information policy administrator b.) Data administrator c.) Data auditor d.) Database administrator

Relational databases have simpler table relationships than hierarchical databases

Why did relational database models replace hierarchical database models in business applications? a.) Relational databases don't use SQL, which is used in hierarchical databases. b.) Relational databases have simpler table relationships than hierarchical databases. c.) Relational databases are less expensive than hierarchical databases.

OLAP is a database used for analyzing business data

Why is an OLAP (Online Analytical Processing) database considered business intelligence? a.) OLAP is a database used for analyzing business data. b.) OLAP is a transactional database used in data mining. c.) OLAP is a database that leads to predictive analytics.

Organizations have difficulty defining business objectives

Why is it a challenge for businesses to invest in strategic information technology projects? a.) Organizations have difficulty finding good project managers. b.) Organizations do not have the necessary financial means. c.) Organizations have difficulty defining business objectives.

Businesses must have a social media marketing strategy to capture this new community of users and to address issues of social care

Why is it imperative that modern businesses have a social media marketing strategy? a.) Businesses must have a social media marketing strategy to capture this new community of users and to address issues of social care b.) Businesses must target social media because all transactions now are electronic c.) Businesses must target social media because it has replaced TV and radio

When a strategic information system fails to deliver outcome, the business can fail

Why is it important to have effective project management of new information system? a.) When a strategic information system fails to deliver outcome, the business adjusts and succeeds. b.) When a strategic information system fails to deliver outcome, the business can fail. c.) When an strategic information systems fails to deliver outcome, the business re-groups and offshores operations.

Analytics would affect the database performance

Why is it not good practice to perform analytics on an online transaction processing database? a.) Analytics would duplicate operational data. b.) Analytics would corrupt transaction data. c.) Analytics would affect the database performance.

Partitioning is done to improve performance

Why is partitioning done when administering relational database systems? a.) Partitioning is done to reduce cost. b.) Partitioning is done to improve performance. c.) Partitioning centralizes the database.

Budgets are reduced, and the implementation team takes on new tasks

Why is providing user support after system production a challenge? a.) Budgets are reduced, and the implementation team takes on new tasks b.) Users are busy dealing with other job responsibilities c.) Systems typically do not perform

Additional cost for business software is from upgrades, expansion, and training

Why is there additional cost associated when purchasing business software applications? a.) Additional cost comes in the form of penalties for license pirating b.) Additional cost when purchasing business software is due to the need for suites c.) Additional cost for business software is from upgrades, expansion, and training

A systems analyst must be able to communicate system capabilities and benefits

Why must a systems analyst be a good communicator? a.) A systems analyst must be a good communicator because he/she is the project manager b.) A systems analyst must be able to communicate system capabilities and benefits c.) A systems analyst must be a good communicator because he/she will use the system

Social media is a ubiquitous marketing channel

Why should businesses have a social media strategy? a.) Social media is an e-commerce business platform. b.) All business over the Internet comes from social media. c.) Social media is a ubiquitous marketing channel.

Security

Wired networks may not be advantageous because of the large amount of cables involved, but they provide businesses with network reliability and WHAT? a.) Speed b.) Bandwidth c.) Security

More scalable than wired networks

Wireless LAN networks are WHAT? a.) More scalable and reliable than wired networks b.) More reliable than wired networks c.) More scalable than wired networks

Productivity

Wireless LAN networks support the on-premise workforce, making them more mobile, which increases WHAT and access to real-time information? a.) Mobility b.) Collaboration c.) Productivity

What does WSN stands for?

Wireless Sensor Networks

Business process management

With which of the following is business performance management most frequently mistaken? a.) Business process management b.) Business procurement management c.) Business profitability management

What category of CASE does Microsoft Visual Basic fall under?

Workbenches

Which of the following is an international law or agreement created to combat increasing piracy software and digital goods?

World Intellectual Property Organization (WIPO) Copyright Treaty - an international treaty developed to combat increasing piracy of software and digital goods, allowing organizations to more easily seek out and prosecute violators of their copyright.

Asynchronous

You are working on a project with a colleague in India and you have a technical question. Realizing that it is nearly midnight in India, you send her an email. This is an example of WHAT type of communication? a.) Asynchronous b.) Synchronous c.) Standard

The latest security patches

You can protect your computer against risks and threats by making sure that you are always running the latest version of your software. Along the same line, you can also download and install which of the following applications to help protect your computer? a.) The latest security patches b.) The latest version of plug-ins c.) The latest version of web browser

Product ID

You have created a database to store the products sold in a department store so they can be managed, updated, and manipulated more easily. The store manager wants to create a query to show the items that are selling today. Which would be an appropriate field to sort the data? a.) Product Category b.) Product Size c.) Product Description d.) Product ID

Forecasting

You were hired by a company to administer survey questionnaires to customers entering a major shopping mall. The data mining software is capable of doing WHAT for consumers' future purchases based on the items they had bought in the past? a.) Classification b.) Associations c.) Forecasting

Associations

You were hired by a company to administer survey questionnaires to customers entering a major shopping mall. The data mining software is capable of identifying WHAT based on the customers' shopping habits; for instance, how often did the customers buy socks when they buy a new pair of sneakers? a.) Classification b.) Associations c.) Forecasting

Data quality audit

Your FICO score is one of the factors used in determining your ability to get a mortgage loan. If credit bureaus such as Equifax and TransUnion contain outdated and inaccurate financial information of individuals, they should immediately conduct WHAT to survey the accuracy and completeness of the data in the database? a.) Data cleansing b.) Data quality audit

Customer Relationship Management (CRM)

Your boss asks you to collect zip codes for every customer who purchases something in your store and then generate a report to show where they all come from so he can market to the low zip code areas defines what type of enterprise system? a.) Enterprise Resource Planning (ERP) b.) Customer Relationship Management (CRM) c.) Supply Chain Management (SCM) d.) Knowledge Management (KM)

Which of the following is a definition of a systems analysis logical model?

[NOT DATA DIAGRAM, NOT UML] ABSTRACTION maybe? I really think it's a DATA DIAGRAM, but it was marked wrong.

a and c

[Select all that apply]. Which business structures are less formal? a.) Sole proprietorship b.) Corporations c.) Partnerships

True

[True/False] 4G networks provide IP based voice, data, and multimedia traffic. a.) True b.) False

False

[True/False] 4G networks, also called Long-Term Evolution (LTE), offer data transmission speeds of 64 kbps in the Ultra High Frequency band. a.) True b.) False

False

[True/False] A Geographic Information Systems (GIS) is a system developed to collect, process, analyze, and store all types of data. a.) True b.) False

False

[True/False] A data warehouse enables businesses to store analytical data and business intelligence from multiple sources. a.) True b.) False

False

[True/False] A disaster recovery plan (DRP) must include measures that are preventive, detective, and corrective. Examples of preventive measures include network and physical security intrusion detection systems (IDS). a.) True b.) False

True

[True/False] A virtual private network (VPN) provides a secure, encrypted, and remote connection between employees and the company's server via a third-party Internet service provider. a.) True b.) False

True

[True/False] Although a Geographic Information Systems (GIS) captures and analyzes spatial or geographical data, it can be used by operations in industries such as engineering, transportation and logistics, telecommunications, insurances, and food. a.) True b.) False

True

[True/False] Although software patches fix bugs, they are expensive to code and can take time. a.) True b.) False

False

[True/False] Among all the administrators' roles (the database administrator, the data administrator, the information policy administrator, and the data auditor) the database administrator is the most important role since s/he is in charge of designing the physical database for the organization. a.) True b.) False

True

[True/False] An Energy Management System (EMS) can help to manage energy usage and reduce operating costs in an organization. Google's Nest Labs automatic thermostat is an example of an EMS. a.) True b.) False

False

[True/False] An important issue concerning budgeting for the cost of a computer is to keep the hardware cost in perspective, relative to the software cost. If you are paying thousands of dollars for special software, then you will want to pay as little as possible for the computer hardware. a.) True b.) False

True

[True/False] Business intelligence enables flexible, deep data investigative capabilities. a.) True b.) False

False

[True/False] Business intelligence is obtained by performing analytics on OLTP (Online Transaction Processing) databases. a.) True b.) False

True

[True/False] Businesses can integrate both Supply Chain Management (SCM) and Customer Relationship Management (CRM) into their organizations to merge, mine, organize, and manage their data. For instance, point-of-sale (POS) orders from the CRM can immediately trigger a restock request in the SCM. a.) True b.) False

False

[True/False] Clickstream applications can provide online retailers with information such as the web pages that the user visits and/or the products that the they are interested in. Many online retailers, such as Amazon.com and ebates.com, use the information collected from the clickstream applications to monitor and track their customers' spending habits. a.) True b.) False

False

[True/False] Coaxial cable is the required medium for telecommunication transmissions. a.) True b.) False

True

[True/False] Communist countries such as North Korea and China are most likely to utilize the common good ethical approach to maintain discipline and order in the country. a.) True b.) False

False

[True/False] Companies that have more than 1,000 employees with a diverse product portfolio are too small to benefit from a data warehouse application. a.) True b.) False

False

[True/False] Digital goods are adequately protected as intellectual property under the historical copyright laws. a.) True b.) False

True

[True/False] During data cleansing and normalization, the structure of some tables will be affected. For instance, a big table could be broken into several, smaller tables or a few small tables could be combined into a big table. a.) True b.) False

True

[True/False] Environmental risks alone can be easily addressed. However, the human factor increases the challenge of mitigating environmental risks. a.) True b.) False

False

[True/False] Every time we use a computer, we are exposed to the risk of getting a computer virus, even when we scan a photo onto a jump drive using a scanner or a printer. a.) True b.) False

False

[True/False] Financial corporations, such as CitiGroup, Inc., employ web mining to reveal any correlations and associations among customer variables in their database, and to predict future customers' banking behaviors. a.) True b.) False

False

[True/False] Healthcare companies and hospitals cannot destroy their patients' records; they must keep their data forever, just in case they need to retrieve information for potential malpractice lawsuits from their patients. a.) True b.) False

False

[True/False] Implementing devices in our computer systems to help in identity and approved equipment verification is a defensive method of technological measures. a.) True b.) False

True

[True/False] In a healthcare organization, policies concerning data governance of clients' information would include creating information policy, planning for the types and quantities of data, designing the database, and predicting or monitoring how users utilize the data. a.) True b.) False

True

[True/False] In many organizations, employees are allowed different levels of access to the data in the database. Database access rights can be assigned based on their seniority, duties, and responsibilities. a.) True b.) False

False

[True/False] In-memory computing is a business intelligence tool that uses increased memory for data processing to provide an alternative to data warehouses. A computer's ROM is used for in-memory computing. a.) True b.) False

False

[True/False] Information is a valuable asset and not everyone in the world can be trusted with it. Therefore, we need to protect our valuable information from those with poor intentions. The protection of our information assets is a discipline known as data security. a.) True b.) False

True

[True/False] Input is the act of capturing or collecting data from an organization or environment. a.) True b.) False

True

[True/False] Integrating e-business aspects into a business operation can have a significant influence on business and potentially lasting effects on its business environment. a.) True b.) False

False

[True/False] Mainframes, unlike microcomputers, allow users unlimited and flexible access to computing power. a.) True b.) False

True

[True/False] Microsoft Visio enables systems analysts to create professional diagrams that simplify complex information through collaboration tools and data-linked diagrams. a.) True b.) False

False

[True/False] Modular design, decision tables, decision trees, and structured PERT are process description tools. a.) True b.) False

False

[True/False] On the Internet, relational databases are connected to web-enabled forms to capture data automatically and allow for instant data retrieval for real-time online processing. Relational databases are useful in business because they handle large amounts of data that have been downloaded and stored in multiple locations from the Internet. a.) True b.) False

False

[True/False] Organizational information policy stipulates that all printed documents in an organization should be destroyed immediately. a.) True b.) False

True

[True/False] Personal conduct is often the weakest link in the chain of personal security. For instance, someone who is knowledgeable of the risks, threats, and vulnerabilities from the Internet will react differently towards technology compared to someone who is ignorant of such risks. a.) True b.) False

False

[True/False] Predictive analytics uses current and future data to better understand customers and other business entities in order to define areas of opportunity or areas of risk. a.) True b.) False

False

[True/False] RAM is a secondary storage device, and it stands for Read Access Memory. a.) True b.) False

True

[True/False] RFID technology enables companies to monitor and track inventory using wireless handheld devices. a.) True b.) False

False

[True/False] Social media platforms, such as Twitter, enable news stories to be searched by a large number of users. a.) True b.) False

True

[True/False] The internet of Things (IoT) will enable automated, just in time e-commerce transactions. a.) True b.) False

False

[True/False] The local Amish furniture store in a small country town uses a traditional file system to keep track of their sales. This is a good way to store their sales records and inventory since this is a small business, and therefore, it is more cost-effective for the store owner. a.) True b.) False

False

[True/False] The process of turning information into an unreadable format to prevent unauthorized access is known as decryption. a.) True b.) False

False

[True/False] The programming stage in the waterfall method of software development focuses on development and testing. a.) True b.) False

False

[True/False] The prototyping software development method consists of three steps. a.) True b.) False

True

[True/False] There are four systems used by corporations to provide decision support. These systems are MIS, DSS, ESS, and GDSS. a.) True b.) False

False

[True/False] There are several business models that organizations can use to conduct business online. However, organizations can only use one model at a time to ensure smooth processing of online transactions. a.) True b.) False

False

[True/False] To gain entry to secured location at airports or the building of some government agencies, a photo identification (which is classified as a knowledge authentication method) is all you need to have. a.) True b.) False

False

[True/False] Web-based databases allow users to access data only from their office computers, via the business internet connection. a.) True b.) False

False

[True/False] When a retailer acquires another retail store, the two companies' databases can be easily merged into one database without any problem after performing a data quality audit, since they are both in the same industry. a.) True b.) False

False

[True/False] When installing a wireless LAN, the access points must be configured to TCP/IP and 4G protocols. a.) True b.) False

False

[True/False] Wireless communication uses radio waves over the optical spectrum to send and receive signals. a.) True b.) False

True

[True/False] Wireless networks enable businesses and their customers or suppliers to collaborate and share data on premises. a.) True b.) False

Transnational

a commercial enterprise that operates substantial facilities, does business in more than one country and does not consider any particular country its national home.

Variable

a data type or simply type is a classification of data which tells the compiler or interpreter how the programmer intends to use the data.

Extraction, transformation, and loading (ETL)

a process in which data is extracted from a computer, transformed into a format appropriate for the data warehouse, and then transferred to the data warehouse.

______________ is an alternative tool that requires a group of users to collectively review and analyze the alternatives, prior to making a decision. a- brainstorming b- a decision tree c- PERT

a- brainstorming

Why is providing user support after system production a challenge? a- budgets are reduced and the implementation team takes on new tasks b- systems typically do not perform c- users are busy dealing with other job responsibilities

a- budgets are reduced and the implementation team takes on new tasks

How are user expectations best managed during system implementation? a- communication and training b- user involvement in implementation c- user involvement in analysis

a- communication and training

North Americans are usually very straightforward and distrust evasive behavior. This characteristic is an example of a cultural difference in which of the following? a- communication style b- time orientation c- stereotyping

a- communication style

Web 2.0 sites enable collaboration and interaction among users, creating a virtual online a- community b- network c- forum

a- community (a forum is short lived)

Which of the following would likely be a step in building a logical model of a system? a- defining what must be accomplished b- describing methods of implementation c- describing how something will be accomplished

a- defining what must be accomplished

What is qualitative risk analysis? a- it involves the measurement of probability and consequences of risks b- it involves the measurement and cost associated with quality failures c- it involves the measurement of high level security breach impact

a- it involves the measurement of probability and consequences of risks

What is total cost of ownership (TCO)? a- it is a study to determine economic feasibility b- it is a waterfall economics analysis c- it is a development life cycle method

a- it is a study to determine economic feasibility

Why do users fail to adopt new information systems? a- lack of training or acceptance for new system b- new systems being more complex c- new systems being web GUI based

a- lack of training or acceptance for new system

What is the meaning of outcomes in decision theory? a- outcomes are the consequences of an event b- outcomes are possibilities thought by the agent c- outcomes are the feedback mechanism to decision theory

a- outcomes are the consequences of an event

In systems modeling and design, the structured systems model is methodical and ________ oriented. a- process b- analytical c- class

a- process

___________ decisions involve an established procedure, and are repetitive and routine. a- structured b- unstructured c- semi-structured

a- structured

What is a disadvantage of the group decision-support systems (GDSS)? a- the scheduling challenges that occur when planning simultaneous events b- the network limitations c- the lack of interactive collaborative tools

a- the scheduling challenges that occur when planning simultaneous events

Secondary storage

accessed only through a system's input/output bus and is generally several orders of magnitude slower than primary storage technologies Removable media, such as magnetic floppy disks, optical discs (CDs & DVDs), and USB flash drives

growth (business strategy)

adding new products or new enhancements to existing products

Multinational

an organization that owns or controls production of goods or services in one or more countries other than their home country.

Business intelligence consists of databases, data warehouses, and ____________.

analytics

Online Analytical processing (OLAP)

analyze transaction data used for making decisions.

What are group decision support systems (GDSS)? a- GDSS provide internal and external grouped data for middle managers b- GDSS enable interactive collaboration support for multiple decision makers at multiple geographic locations c- GDSS help translate organizational objectives into operational targets d- GDSS define key performatnce indicators for decision making

b- GDSS enable interactive collaboration support for multiple decision makers at multiple geographic locations

Business analytics consists of the tools and techniques used for the analysis and understanding of data, and include _____________ modeling, statistics, and OLAP a- reporting b- data mining c- methods

b- data mining

What systems do upper management use for decision making? a- Online analytical processing systems (OLAP) b- exclusive support systems(ESS) c- Online Transaction Processing Systems (OLTP)

b- exclusive support systems(ESS)

work breakdown structure (WBS)

broken down list of all deliverables showing what the customer will get at the end of a project.

Waterfall derivative models in the SDLC methodology include fountain, spiral, and _________________________________________.

build and fix

A systems analyst should try to have an understanding of ___what kind of___ processes

business

How does business intelligence make information actionable? a- BI formats non-relational data into hierarchial reporting b- BI uses predictive analytics to predict future business trends c- BI provides real-time, relevant, and user-customized information that is easily shared

c- BI provides real-time, relevant, and user-customized information that is easily shared

Which method uses fourth generation computer languages? a- RAD b- Agile c- End user development

c- End user development

Which is not a component of a feasibility study? a- Technical b- Economic c- Managerial

c- Managerial

is a project management technique that identifies critical tasks and helps reduce program delays. a- WBS b- CPM c- PERT

c- PERT (?)

Balanced scorecards are often used in business. What is a balanced scorecard? a- a methodology in BI that only tracks organizational activities b- a type of dashboard that tracks goal attainment intervention c- a tool used by management to track and monitor staff and organizational activities

c- a tool used by management to track and monitor staff and organizational activities

Because feedback is not readily available with written communication, the content must be accurate and contain sufficient detail. Which of the following is most likely to increase the audience understanding of written communication? a- acronyms b- technical terms c- action-specific verbs

c- action-specific verbs

Which is not a key factor to consider when evaluating a system alternative? a- economic b- compatibility c- brand d- limitations

c- brand

What is the objective of the systems analysis stage in the waterfall method? a- define the software architecture b- identify the hardware platform c- identify user system and software requirements

c- identify user system and software requirements

Which of the following is not a category from Henry Mintzberg's management behavior roles? a- informational b- interpersonal c- problem solver

c- problem solver

What does the behavioral model hope to accomplish in management decision making? a- support unstructured types of decisions b- support the human factors design of information systems c- support the unpredictable and less systematic aspects of decision-making d- support the predictable and systematic aspects of decision making

c- support the unpredictable and less systematic aspects of decision-making

What is the focus of a functional evaluation of a management information system? a- to evaluate reporting capability for decision making b- to evaluate the query response time c- to evaluate the quality and functionality of information and output

c- to evaluate the quality and functionality of information and output

What is not a development stage in the waterfall model? a- systems analysis b- conversion c- user requirement

c- user requirement

When should oral communication be avoided? a- when working on global projects b- when meeting with people from different cultures c- when conveying documentation

c- when conveying documentation

Hybrid systems

called thin- or zero-clients are dumb terminals that use input and output devices, such as a monitor, mouse, and keyboard, but connect to a centralized server for processing.

The waterfall model for software development is ideal when systems requirements are _______________________________________________.

clear and unlikely to change

Information Technology Infrastructure Library (ITIL)

common set of best practices widely used by businesses to give guidance to companies on how to use IT as a tool for implementing change

Input

components include devices that provide input into the processing unit. These include peripherals, such as the keyboard, mouse, microphone (audio input), sensors, and document or visual scanners.

Storage

components include primary temporary storage and secondary long-term storage devices. Random access memory (RAM) is temporary or short-term storage used by the processor.

Processing

components include the central processing unit (CPU), which is the brain of the computer. Historically this unit included several components, such as a control unit, a processor, an arithmetic or logic unit, and memory components. Modern CPUs have merged these components into an integrated design

wide area network (WAN)

connection b/w small networks that create a large network that typically connects business campuses consisting of computer systems across large distances

system bus

connection between the CPU, memory, storage, expansion slots, and other motherboard components

Which of the following best describes predictive analytics? a- a method that uses data mining techniques to solve operational challenges b- a process that uses business data to report operational information c- a process that integrates data to help management make changes d- a method or algorithm that uses statistics and data mining to forecast models

d- a method or algorithm that uses statistics and data mining to forecast models

Attacks

damaging or potentially damaging acts that are the product of an attacker's process, which may include: reconnaissance, scanning, gaining and maintaining access, escalating privileges, building backdoors, and destroying evidence

VoIP technology is currently a very popular form of communications because it ______________________________________.

delivers voice information in digital form using packet switching

data-flow model

describes how data moves and is processed by the proposed system under development.

function-oriented (system evaluation)

determine of the success of the information system in examining he performance of data, hardware, software, networks, and human resources

A router connects data links from a single network and transmits data packets between ______________________________________.

different networks

The intelligence phase in the decision-making process consists of the __________, identification, and understanding of the problem.

discovery

Which of the following statements regarding e-Tailers is false?

e-Tailers provide a venue for brokerage services.

ring network

each computer connected to the next computer; cheaper to install; less effiecient.

Sniffing

eavesdropping on network traffic in order to acquire traffic data packets and decoding. The information gathered can be used to hack into a network

copyright

egal right given to the creator of an original work allowing the exclusive right for sale and distribution of that work for a period of time.

change agent

encompasses the identification of the desired organizational improvements, designing systems that will implement those changes, and training and motivating users to operate and access the new system.

Agile development (SDLC)

encourages adaptive planning and development, fast delivery, continuous improvement, and flexibility in response to change. (interactive)

One way to define user requirements is to allow users to _______ with the system during development. a- experiment b- code c- train

experiment

To facilitate efficient and effective business, corporations utilize the _____________________ for communications with suppliers and vendors.

extranet

Internet Protocol version 4 (IPv4) was created and standardized in the 1970s by the original ARPANET group to _________________________________.

facilitate communications

Threats

identified and unidentified actors that have the potential for attacking the information assets. (Internal, External)

The first step when building a system model is to collect _____________________________ about the proposed system.

information

Transaction processing system

information system used for processing patient admissions, employee time cards, and purchase orders

four phases of the decision-making process

intelligence, design, choice, and implementation

To facilitate efficient and effective business, corporations utilize the ____________________ to communicate with their customers.

internet

To facilitate efficient and effective business, corporations utilize the ______________________ to manage employees' affairs.

intranet

Structured decisions

involve an established procedure, are repetitive and routine, and therefore can be handled in the same manner each time. Line-level managers and non-management employees typically make... decisions.

problem solver

involves converting processes and procedures into system components and troubleshooting errors or delays that may occur.

chief operations officer (COO)

is the director of operations, responsible for the oversight of internal operations on a day-to-day basis and for monitoring production quotas

chief security officer (CSO)

is the highest level executive concerned with the overall security functions and policies of a business.

The process of creating a model is _______________________________ with the desired outcome of a validated model.

iterative

There is a higher chance of failure in information system projects if ___who_____ do not use and leverage the system on behalf of their organization.

managers

chief financial officer (CFO)

manages the company's cash flow and evaluates and communicates financial risks.

Decision analysis

method of assisting decision makers with making simple choices and using mathematical formulas to infer from these choices whether the decision maker is making the best decision.

The focus of strategic-oriented evaluation is the determination of whether the information system outputs enable management to execute the plan and _______________________________________________ of the organization.

mission

Wireless LAN networks are _____________________________________________.

more scalable than wired networks.

TCP/IP

most common protocol which establishes the connection, and data packet quality transmission.

network host

node/computer connected with an IP address

Social engineering

normally low tech attacks used to trick individuals into disclosing information, providing access, or changing their patterns. Examples include phishing, spear-phishing (i.e. targeted phishing), dumpster diving, baiting, tailgating, and quid pro quo.

Product differentiation (business strategy)

offering a higher quality product to differentiate from others in the market

Output

omponents include internal storage devices or processes, as well as external peripherals such as monitor screens (visual output), speakers (audio output), and printers (physical output).

The objective of a _____________________________ feasibility study is to determine if stakeholders will support the development program and not sabotage or disrupt it.

political

Data mining

process of identifying hidden patterns and relationships in large databases and applying rules to that data in order to predict future behavior.

RFID technology helps companies to be more _________________________ with inventory management because they eliminate the need for physical handling of materials during cycle counting.

productive

The objective of SDLC is to deliver a high quality system, provide management control, and maximize ____________________.

productivity

Strategic information system

provide tools used by an organization to accomplish specific tasks to gain competitive advantage.

The Network address translation (NAT) technology allows private users to ________________________.

redefine network addresses to assign their own addresses

prototyping model (SDLC)

requires the development of a scaled prototype that can be tested prior to full-scale development

Spoofing is effective to hackers because it solicits a network _________________________________________________.

response

The scope of a project defines the elements of cost, time, quality, and ____________________________.

risk

critical path method (CPM)

step-by-step process planning technique that defines the critical and noncritical tasks within a project in order to reduce or minimize process delays and time-related problems.

Convergence

the ability for a telecommunication network to carry voice, data, and video

Network economics (network-based strategy)

the cost of adding another business participant to a business venture is small, the potential gain is great.

information technology management

the management of hardware, software, data, networks, and people that facilitate access to information and allow the organization to achieve business objectives.

Among all the connections - Internet, intranet, and extranet - the Internet is ________________________________________.

the most widely used channel for business

The Internet has contributed to a complex network system. Businesses continue to grow and develop a need for more computer-enabled productivity. This resulted in more complexity due to _________________________________________________.

the need for more systems and better processing capabilities

Risks

the potential for loss, commonly associated with the monetary and non-monetary impact to such a risk, as well as the probability of occurrence.

Data normalization

the reorganization of tables, and attributes within a database to reduce duplication is especially important during database redesign, but also when data is imported or merged.

Build and fix model (SDLC)

the simplest SDLC model allowing for code to be incrementally modified and implemented until successful.

waterfall model (SDLC)

the traditional systems development method, so named because each stage must be completed before moving on to the next stage. (slow application development)

Health Analytics Tools

through smartphone sensors or wearable peripheral devices. Data from these devices is collected, analyzed, and used to help a user to understand, improve, and maintain, or automatically report, their health to their health professionals.

Unified Modeling Language (UML)

which is a general-purpose modeling language designed to provide a standard method to represent the design of a system.

system-oriented (system evaluation)

which is the ability of an information system to discriminate between files or data that are relevant to a user query, and those which are not relevant.

The dawn of e-commerce created several new possibilities for businesses. Which of the following is NOT one of these new possibilities?

A new mobile market to process financial transactions - Companies could process financial transactions online for customers long before e-commerce.

Which of the following is a definition of a software patch?

A patch is a code that fixes a software defect.

Information

A payroll spreadsheet is an example of WHAT? a.) Process b.) Data c.) Information d.) Information system

Memory slot

A primary memory device like a DRAM (Dynamic Random Access Memory) can be plugged into a motherboard through a(n) WHAT? a.) VGA cable b.) Extension card c.) Memory slot

Information management

A restaurant relied on a manual ordering and accounting system. The restaurant owner decided to purchase a point-of-sale (POS) system to better track sales of different food items to determine which were the most profitable. This scenario is an example of an advantage of WHAT? a.) Information management b.) Information technology management

Record

A set of related fields, also called a tuple, that describe one occurrence of an entity, such as a customer.

Which of the following action is considered ethical, social, and legally acceptable?

A small business owner installs Microsoft Office suite on all the computers in his office.

What is the purpose of a network sniffer?

A sniffer is used to monitor network traffic.

How many stages are in the waterfall methodology?

6 - System Engineering, Analysis, Design, Coding, Testing, Maintenance

What is the purpose of a general Management Information Systems (MIS) evaluation?

A company's general eval of their MIS is to analyze the system performance against outlined objectives

Success of strategic information systems projects

A majority fail to meet schedule or budget

Which of the following best describes predictive analytics?

A method or algorithm that uses statistics and data mining to forecast models - used to forecast behavior of consumers and help develop business models to capitalize on opportunities.

System on a chip

A microchip that performs more functions than a CPU and has other devices embedded in it is called WHAT? a.) DRAM b.) System on a chip c.) Multi-core CPU

CPU

A motherboard consists of other microprocessors, like memory, expansion slots for peripheral devices, as well as a WHAT? a.) LCD b.) CPU c.) GUI

When using a decision tree, _______________________________________ can become complex when uncertain values exist, or if multiple outcomes are linked oriented.

Calculations

Which of the following is a successful business that uses big data to find flaws, boost production, and root out counterfeiters?

Caseificio Scalabrini - with IBM's help, Caseificio Scalabrini, a producer of Parmigiano Reggiano cheese in Italy, uses big data to find flaws, boost production, and root out counterfeiters.

The term 'generations' is used to describe changes in which type of technology?

Cellular wireless standards

When streaming data or voice, which type of switched network is used?

Circuit switch

Have more flexibility than they do with a VPN

Cloud computing is becoming more popular because users WHAT? a.) Don't need internet access to get to cloud data b.) Have more flexibility than they do with a VPN c.) Have greater security than they do with a VPN

In asynchronous communications, two people in separate locations can communicate with each other during different times of the day. Which is an example of asynchronous communication:

Collaboration among participants via online message boards

What activities do Web 2.0 enable?

Collaboration and interaction among users

Which of the following is not a factor that must be considered when implementing a new information system?

Competition - Once a decision has been made to implement an information system, competition is not a factor.

Besides customer attributes, which of the following factors can be used by an e-business to accurately price goods?

Competitors' public pricing information.

Randomizing your online behavior

Computer-based actions are actions that involved the use of a computer. Which of the following is NOT a computer-based action? a.) Installing anti-virus and malware programs on your computer. b.) Turning off your computer when you are not using it. c.) Implementing authorization and authentication procedures. d.) Randomizing your online behavior.

If your identity has been stolen, what should you do?

Consult legal counsel and retain documentation of all stolen information.

What is the cost of keeping a customer?

Customer Relationship Management (CRM) systems collects and store customer data, product information, and customer orders. Using the appropriate analytical tool, a CRM can answer all, except for which of the following question? a.) What is the value of a customer to the company? b.) What is the cost of keeping a customer? c.) Who are the most loyal and profitable customers? d.) What are the most popular products sold?

Which of the following is an international establishment of laws that help to protect fundamental human right to privacy?

Organization for Economic Co-operation and Development (OECD) - an international agency consisting of 34 developed countries. Founded in 1961 to stimulate economic progress and world trade, it has since created an anti-spam task force, wrote papers on best practices for ISPs, and worked on the information economy and the future of the Internet economy.

Black Hat

Organizations are constantly encountering cyber-attacks from intruders. For instance, in late 2013, the security system of Target Stores, Inc., was compromised by which of the following type of attacker? a.) Grey Hat b.) Black Hat c.) White Hat

Retrieve

Organizations can help to maintain data integrity by implementing data governance policies. Only employees with appropriate access rights can do WHAT with data from the server? a.) Record b.) Store c.) Retrieve

Information

Data that has been organized in a meaningful manner.

What helps e-businesses accurately target individual customers by charging them different prices?

Databases - mainstream innovations that contain massive data to help e-businesses identify regions and localities where they can charge different prices based on location demographics and income.

Which method below uses fourth generation computer languages?

End User Development - uses fourth generation computer languages, enabling users to code with little expert assistance.

Social Networking and interpersonal skills.

Enhances interpersonal and relationship-forming skills.

[True/False] An information repository allows a business to store important information and documents that are accessed remotely by its stakeholders for free.

False

[True/False] Coaxial cable is the required medium for telecommunication transmissions.

False

[True/False] Wireless communication uses radio waves over the optical spectrum to send and receive signals.

False - it uses RADIO waves over the RADIO spectrum

[True/False] The programming stage in the waterfall method of software development focuses on development and testing.

False - the programming stage consists of software development, proving, and integration.

As a student taking a course at a university, which of the following legislation must your university follow when dealing with your personal information?

Family Educational Rights and Privacy Act (FERPA) of 1974.

Business intelligence provides real-time, relevant, and user-customized information that is easily shared

How does business intelligence make information actionable? a.) Business intelligence provides real-time, relevant, and user-customized information that is easily shared b.) Business intelligence formats non-relational data into hierarchical reporting c.) Business intelligence uses predictive analytics to predict future business trends

ESS provide high-level information in KPI format

How does executive management use executive support systems (ESS)? a.) ESS provide executive management data to make structured decisions b.) ESS data has transaction and production data used by executives c.) ESS provide high-level information in KPI (Key Performance Indicators) format

Internet-based technologies allow for distribution of information with external business entities

How does the use of Internet-based technologies help businesses? a.) Internet-based technologies provide on-site information for decision making b.) Internet-based technologies are centralized and require suppliers to have a virtual private network to access information c.) Internet-based technologies allow for distribution of information with external business entities

7

How many layers are in the standard OSI (Open System Interconnection) model? a.) 7 b.) 5 c.) 6

The Virtue ethical model focuses on which of the following?

Human Behaviors - the Virtue Ethical Model values human behaviors that allow us to act in aspirational ways, such as compassion, trustworthiness, honesty, generosity, kindness, autonomy, courage, and obedience.

Which of the following is a weakness of manual keying for data capture?

Human error

Cut and paste

In online analytical processing applications, which of the following is not a basic analytical operation? a.) Slicing and dicing b.) Consolidation c.) Drilling down d.) Cut and paste

Process

In systems modeling and design, the structured systems model is methodical oriented and WHAT? a.) Class b.) Analytical c.) Process

Online banking

Information technology is used everywhere: where you work, where you live, and where you play. Keeping track of financial information and making transfers at anytime, from home, without waiting in line is an example of what? a.) Telecommuting b.) Social networking c.) Online banking d.) Online shopping e.) Online learning

Enterprise Resource Planning (ERP)

Involves utilizing computer technology to link various aspects of a business; a very complex resource planning system that spans the entire business; companies often have difficulty implementing the system.

Reduce

It is good practice to do WHAT to data that is backed up on a regular basis? a.) Reduce b.) Copy c.) Duplicate

Which of the following best describes structured English as a process description tool?

It is similar to modular design with data terminology.

Community

Maintaining a social online presence has become the latest trend. Businesses can use which of the following models to connect online with their customers? a.) Advertising b.) Brokerage c.) Community d.) E-tailer

Data administrator

Maintaining employees' usage of a company's database is the responsibility of what role below? a.) Data auditor b.) Data administrator c.) Database administrator d.) Information policy administrator

Analysis

Maintaining historical records allows managers to analyze the data to help improve their business. Data collected from all internal and external sources are extracted, transformed, and then loaded into a data warehouse for additional WHAT? a.) Processing b.) Storage c.) Analysis

Installing the latest antivirus applications onto your computer is one way to protect your computer from __________________________ software which can be used to steal information or spy on users.

Malware

Digital goods refer to products that can be downloaded from the Internet. Which of the following is NOT an example of digital goods?

Musical DVDs

Have the most experienced workers complete tasks on the critical path

ABC Playground Company has been asked to build a new playground for a local elementary school. The project must be completed before the first day of school. Which of the following steps would increase the likelihood of finishing the project on time? a.) Assign the least experienced workers to the tasks on the critical path b.) Have the most experienced workers complete tasks on the critical path c.) Evenly divide the experienced workers between all tasks for the project

In order to keep company computers secure, users must agree to an _______________ policy stipulated by the organization in order to access a company network or the Internet.

Acceptable Use

Which of the following category of generalized ethical issues refers to creation of barriers to access?

Accessibility

Supply Chain Management (SCM)

Network of businesses that are connected to provide products and services more efficiently to the customer, accommodate rapid growth, and meet requirements of retailers and distributors defines what type of enterprise system? a.) Enterprise Resource Planning (ERP) b.) Customer Relationship Management (CRM) c.) Supply Chain Management (SCM) d.) Knowledge Management (KM)

Are hypervisors or hypervisor applications necessary in small businesses with simple networks?

No, a hypervisor is a computer software that enables network virtualization and is not necessary.

What is a downside of using the Internet as a resource?

Accuracy of information

Evil twins and pharming are two different examples of phishing. What's the best example of pharming and where it can occur?

Airports or coffee shops, where criminals redirect users to a website that looks official and legitimate.

Artificial intelligence

Algorithms based on machine learning or WHAT are used in most cases to look for relationships, patterns, or trends? a.) Deterministic b.) Logic c.) Artificial intelligence

Both high tech and low tech attacks

All cyber threats or attacks are associated with computers; therefore, all computer risks are limited to WHAT? a.) Low tech attacks b.) Both high tech and low tech attacks c.) High tech attacks

ability to improve communication

All of the following are advantages of cloud computing except WHAT? a.) ability to support remote workers b.) ability to support mobile computing c.) ability to improve communication

Information system

An integrated network of components working together to convert data into useful information; includes an input, a process, and an output; comprised of people, processes, machines, and information technology.

System Development Life Cycle (SDLC)

Analysis Phase 1. Identify problems, opportunities, and objectives 2. Determining information requirements 3. Analyzing system needs Design Phase 4. Designing the recommended system 5. Developing and documenting software Implementation Phase 6. Testing and maintaining the system 7. Implementing and evaluating the system

Which answer best completes the following sentence? Business intelligence consists of databases, data warehouses, and _____________________________________________________.

Analytics - the systematic analysis of data produced for business intelligence.

Family Educational Rights and Privacy Act (FERPA) of 1974

As a student taking a course at a university, which of the following legislation must your university follow when dealing with your personal information? a.) Public Company Accounting Reform and Investor Act (aka Sarbanes-Oxley Act) of 2002 b.) Family Educational Rights and Privacy Act (FERPA) of 1974 c.) Financial Services Modernization Act (aka Gramm-Leach-Bliley Act) of 1999

Responsibility

As an employee of a retailing business, which of the following defines your obligations to your clients? a.) Ethical principles b.) Responsibility c.) Liability d.) Accountability

Effective written communication must be correct, simple, and accurate. Jargon and terminology should be ______________.

Avoided

There are many reasons why online businesses must be held accountable to the laws and regulations in the localities and countries in which they operate. Which of the following is NOT one of the reasons?

Online businesses can operate more easily and freely than brick and mortar businesses - Online businesses CAN operate anywhere to gain efficiencies, but ARE NOT more free to do what they want; they are still accountable to laws and regulations.

How does a corporation benefit from a business intelligence program?

BI provides automated data collection and reporting reducing labor costs

For an individual or a business, data can be uploaded to the Internet in many forms. Which of the following data should NOT be communicated on the Internet?

Banking transactions - must be encrypted to be safely communicated over the internet

Risk transference

Because no two projects are alike, different strategies for managing project risk exist and should be used depending on project complexity and scope. Some of these strategies include acceptance, avoidance, sharing, reduction, or transference. Purchasing homeowner's insurance in case of a fire or hurricane is an example of WHAT? a.) Risk transference b.) Risk reduction c.) Risk sharing d.) Risk acceptance

Amazon

Besides e-tailing, which of the following e-businesses utilizes its supply chain to be a platform for many others and also continuously innovates into other e-business services? a.) Federal Express b.) Google c.) Caseificio Scalabrini d.) Amazon

Petabyte

Big Data database size is considered to be in WHAT size level? a.) Petabyte b.) Megabyte c.) Terabyte

Unique identity

Biometrics is the study and measuring of individual body characteristics, and is often used in computer security. Biometrics falls under which of the following methods? a.) Possession b.) Unique identity c.) Knowledge

Why is providing user support after system production a challenge?

Budgets are reduced, and the implementation team takes on new tasks.

A systems analyst should try to have an understanding of _________________________________________ processes.

Business - information systems automate business processes.

When using the balanced scorecard method, quality would fall under which of the following measurements?

Business Process - measures the ability of the organization to satisfy customer and/or stakeholder needs.

Data mining

Business analytics consists of the tools and techniques used for the analysis and understanding of data, and include WHAT modeling, statistics, and OLAP? a.) Reporting b.) Methods c.) Data mining

Analytics

Business intelligence consists of databases, data warehouses, and WHAT? a.) Methods b.) Algorithms c.) Analytics

Software

Business intelligence is defined as the infrastructure, data, and WHAT tools to help mine collected data? a.) Application b.) Software c.) Hardware

How does a corporation benefit from a business intelligence program?

Business intelligence provides automated data collection and reporting reducing labor cost - can provide reporting that helps management make actionable decisions.

How does business intelligence make information actionable?

Business intelligence provides real-time, relevant, and user-customized information that is easily shared.

Flexibility

Business intelligence reporting WHAT provides users with better insight than traditional reporting systems? a.) Hierarchy b.) Uniformity c.) Flexibility

Organizational features that can change the company direction

Processes, politics, culture, and environment

What is QoS?

QoS (Quality of Service) is used to measure performance of data communications.

__________________________________ risk analysis involves performing an analysis of the risks and conditions in order to prioritize the effects on a project.

Qualitative

Financial Services Modernization Act (aka Gramm-Leach-Bliley Act) of 1999

Organizations must follow procedures to store or transfer their financial information as outlined in which of the following legislation? a.) Public Company Accounting Reform and Investor Act (aka Sarbanes-Oxley Act) of 2002 b.) Health Insurance Portability and Accountability Act (HIPAA) of 1996 c.) Financial Services Modernization Act (aka Gramm-Leach-Bliley Act) of 1999

Hot sites

Organizations need to include redundancy in their business disaster recovery plan by creating duplicate facilities. Which of the following sites offer offsite office space that allow recovery within minutes to hours? a.) Warm sites b.) Shared hot sites c.) Cold sites d.) Hot sites

What are peer-to-peer network topologies?

Peer-to-peer topologies connect each user in a network directly.

In systems modeling and design, the structured systems model is methodical and __________________________________ oriented.

Process

Enact and enforce security, and manage and retain documentation

The U.S. government enacted legislation and regulations to protect privacy and do what else? a.) Enact, but not enforce, security, and manage and retain documentation. b.) Enact and enforce security, and manage and retain documentation. c.) Enact and enforce security, and manage and remove documentation off of servers.

Human behaviors

The Virtue ethical model focuses on which of the following? a.) Outcomes of an action b.) Moral rationality c.) Human behaviors d.) Choices and motivations

Information management

The ability to collect, organize and process data from internal and external sources and distribute the resulting information to support decision making and business processes is an advantage of WHAT? a.) Information management b.) Information technology management

Integration

The benefit of contracting a single vendor to provide the software and hardware necessary for a business intelligence system is reduced problems with WHAT? a.) Deployment b.) Training c.) Integration

Trust built through customer interaction

The business value of using social media as a marketing tool relies on the WHAT? a.) Distribution of mass messages to customers b.) Ability to communicate business plans c.) Trust built through customer interaction

Which of the following best describes the classical model in management decision making?

The classical management model supports planning and controlling - the classical model describes the role of management through 4 functions: planning, organizing, leading, and controlling.

The Internet is organized as a client/server system. Which of the following statement is FALSE regarding the client/server architecture?

The client has control over the applications residing on the server. (the server, not the client, has control over the applications residing on the server)

Schema

The complete description of the database.

What is the function of the data integration service in business intelligence?

The data integration service serves as the depository of all extracted data for the load function of the data warehouse - logically related or integrated before the load function of the ETL process is performed.

A new mobile market to process financial transactions

The dawn of e-commerce created several new possibilities for businesses. Which of the following is NOT one of these new possibilities? a.) A digital marketplace to sell goods and services. b.) A new mobile market to process financial transactions. c.) The creation and sale of goods that were completely digital.

Businesses perform regular backups for operational databases

The disaster recovery plan (DRP) addresses several issues when an emergency occurs. What item below would NOT be addressed in a DRP? a.) Businesses perform regular backups for operational databases. b.) Legal and insurance liabilities are reduced. c.) Decisions during a disaster are structured and expected.

According to the omnichannel model, inventory volume is reduced and operations become leaner and better able to react to changes in demand because of which of the following reasons?

The division between brick-and-mortar and online operations has been erased.

COBOL

The first computer language; developed in the 1950s; still used today.

Helping them use structured processes for decision making

The information system should assist management in decision-making by doing what? a.) Helping them use unstructured processes to make decisions b.) Helping constrain them so decision making is controlled c.) Helping them use structured processes for decision making

Discovery

The intelligence phase in the decision-making process consists of the identification, understanding, and the WHAT of the problem? a.) Solutuion b.) Analysis c.) Discovery

What is a disadvantage of the group decision-support systems (GDSS)?

The scheduling challenges that occur when planning simultaneous events - especially across multiple time zones.

Cellular wireless standards

The term 'generations' is used to describe changes in which type of technology? a.) Network hardware devices b.) Telecommunications protocols c.) Cellular wireless standards

central home office

The three most common types of global organizational structures are centralized, decentralized, and coordinated. Where are corporate activities and information systems located in a centralized structure? a.) central home office b.) local foreign units

Data complexity

The traditional file environment is not usually as efficient as a database management system. What is typically NOT a challenge when using the traditional file environment? a.) Data inconsistency b.) Data redundancy c.) Data complexity

When communicating, what is important for IT professionals to understand during the system development process?

The user knowledge and background of target audience.

What is the major difference between a rigidly defined brick-and-mortar depiction of a business and one that is purely an e-business?

The way they communicate with their stakeholders - An e-business communicates and interacts with their stakeholders via an online format.

Deliverables

The work breakdown structure (WBS) is a broken down list of project WHAT that are required to complete a project? a.) Resources b.) Activities c.) Deliverables

Information Security Analyst

Their goal is to ensure that data and systems are secure to prevent breaches.

EIS

There are different types of information systems based on the different levels of hierarchy in an organization. Which one helps senior executives analyze information and come up with alternate actions and business strategies? a.) DSS b.) EIS c.) MIS d.) TPS

Quality

There are five major variables in project management that must be monitored when managing information technology to ensure it is completed on time, within budget, according to specs, and with high quality and low risk. How well the end product meets the goals and objectives of management is called WHAT? a.) Time b.) Risk c.) Quality

Foreign exporter

There are four main global business strategies that form a global firm's organizational and information systems structure. Which item below is NOT one of those strategies? a.) Transnational b.) Multinational c.) Franchisers d.) Foreign exporter

CIO

There are many IT roles in an organization. Which one is responsible for information systems strategic thinking and planning? a.) Project Manager b.) IT Manager c.) MIS Manager d.) CIO

Virus

There are many different kinds of malware, which could be a spyware, worm, virus, or Trojan horse. In general, any WHAT that is downloaded and stored on a computer hard drive can cause undesirable damage to the computer or network system? a.) Spyware b.) Worm c.) Virus d.) Trojan horse

Employees

There is a higher chance of failure in Information system projects if WHO do not use and leverage the system on behalf of their organization? a.) Executives b.) Managers c.) Employees

Threat of substitute products or services

There is less demand for DVDs because of the creation and quick distribution on-demand video services, such as those supplied by Netflix and iTunes. In terms of Porter's five competitive forces, this is an example of WHAT? a.) Intensity of competitive rivalry b.) Threat of substitute products or services c.) Threat of new entrants

Resistance

There is often considerable organizational WHAT when implementing new information systems? a.) Compliance b.) Resistance c.) Acceptance

Knowledge Management (KM)

These systems provide tools to help manage organizational knowledge and create value to meet business requirements and strategic goals.

T/F: Although software patches fix bugs, they are expensive to code and can take time

True

[True/False] Although software patches fix bugs, they are expensive to code and can take time.

True - Software patches are expensive and time consuming.

False

True or false. A virtual company provides only virtual services. a.) True b.) False

False

True or false. Accountants have no need to interact with an organization's information system. a.) True b.) False

True

True or false. Major threats to information systems facilities vary by region and can include floods, hurricanes, terrorism, power outages, and earthquakes. a.) True b.) False

False

True or false. Managers only need to understand the basic features of their organization to build and use information systems successfully. a.) True b.) False

False

True or false. Michael Porter's five competitive forces include the following: threat of new entrants, threat of substitute products or services, bargaining power of customers (buyers), bargaining power of suppliers, and product development. a.) True b.) False

True

True or false. One positive impact of information technology is the increasing number of jobs that are becoming available for the disabled. a.) True b.) False

True

True or false. When considering global system strategy solutions, not all systems should be shared with the foreign units. Only some of the core systems should be shared, along with other systems if they share key elements. a.) True b.) False

Enterprise Resource Planning (ERP)

Typically uses one database to store all information needed by various business units and increases operational efficiency defines what type of enterprise system? a.) Enterprise Resource Planning (ERP) b.) Customer Relationship Management (CRM) c.) Supply Chain Management (SCM) d.) Knowledge Management (KM)

Data

Unorganized data that lacks meaning.

In asynchronous communication, participant communication is not concurrent. Why is this an advantage of email?

Users can send or reply to messages on their own schedule.

142 and 212

Using the IP address of 142.212.25.1, which two bytes are managed and assigned by the Internet Service Provider? a.) 142 and 25 b.) 212 and 1 c.) 25 and 1 d.) 142 and 212

25 and 1

Using the IP address of 142.212.25.1, which two bytes are managed and assigned by the computer administrator to each individual host on the network? a.) 142 and 212 b.) 142 and 25 c.) 212 and 1 d.) 25 and 1

WSNs

WHAT are located in strategic locations and used to monitor physical or environmental conditions? a.) Barcodes b.) WSNs c.) RFID

Enterprise resource planning (ERP) systems

WHAT involve utilizing computer technology to link various aspects of a business, including human resources, accounting, and inventory control? a.) Supply chain management (SCM) systems b.) Enterprise systems c.) Enterprise resource planning (ERP) systems

CPM (Critical Path Method)

WHAT is a project management technique that identifies critical tasks and helps reduce program delays? a.) WBS (Work Break-down Structure) b.) PERT(Program Evaluation Review Technique) c.) CPM (Critical Path Method)

Clickstream

WHAT is a series of human or user Web visitor page requests? a.) Keystroke b.) Cookie c.) Clickstream

TCP/IP

WHAT is a universal telecommunication network protocol that most operating systems can recognize? a.) TCP/IP b.) Ethernet c.) Bluetooth

Core competency

WHAT is an activity for which a business is a marketplace leader? a.) Synergy b.) Growth c.) Core competency

Brainstorming

WHAT is an alternative tool that requires a group of users to collectively review and analyze the alternatives, prior to making a decision? a.) PERT (Program Evaluation Review Technique) b.) Decision tree c.) Brainstorming

_____________ have mentioned that inappropriate or provocative photos or information, and evidence of alcohol and drug abuse, by the job seeker revealed during social media search can negatively impact employment opportunities.

Recruiters

His actions were considered ethically and socially acceptable, but legally unacceptable

Robin Hood is a heroic outlaw in English folklore who robbed the rich to help the poor. He fought against the Sheriff of Nottingham and the reign of King John. Which of the following statement is TRUE regarding Robin Hood? a.) His actions were considered legally acceptable, but ethically and socially unacceptable. b.) His actions were considered ethically, socially, and legally unacceptable. c.) His actions were considered ethically and socially acceptable, but legally unacceptable.

Which of the following is not a systems implementation phase?

Scheduling

______________________________ is usually the result of a lack of proper documentation, definition, or control over the project requirements and can sneak up and destroy a project.

Scope Creep

Scope

Scope, time, cost, quality and risk are the five major variables in project management that must be monitored when managing information technology to ensure project success. What is included or defined in a project, including goals, deliverables, costs, and deadlines? a.) Time b.) Cost c.) Scope

The ______________ method can address unexpected changes or challenges that cannot be addressed effectively with SDLC.

Scrum - designed to better handle unexpected changes.

For what purpose is SCRUM software development methodology designed?

Scrum is designed to address customer need changes.

Auditing can only be used by the accounting department

Security policies are output from an organization's risk assessment process, which cover an organization's need for various levels of security. Auditing is an example of a security policies control. Which of the following is FALSE regarding auditing? a.) Auditing is used by many divisions and departments within an organization b.) Auditing can only be used by the accounting department c.) An IS auditor may penetrate security policies to determine their adequacy or need for training

Which of the following is not a step in the decision-making process?

Select Team - The intelligence phase in the decision-making process consists of the (DISCOVERY), identification, and understanding of the problem.

Configure your computer system to receive these updates automatically

Software companies such as Microsoft frequently develop system updates. What should individuals do with these system updates? a.) Configure your computer system to receive these updates automatically b.) Ignore them because they may contain malware c.) Download and install them after they are 100 percent tested by Microsoft and other system developers

Horizontal Application

Software that provides solutions based upon the common needs of many businesses.

Response

Spoofing is effective to hackers because it solicits a network WHAT? a.) Authentication b.) Denial of service c.) Response

What does the behavioral model hope to accomplish in management decision making?

Support the unpredictable and less systematic aspects of decision-making.

Confidentiality, integrity, and availability

The CIA triad is a model that guides information security policy. What do the letters in CIA stand for? a.) Cardinality, intelligence, and audit b.) Confidentiality, integrity, and availability c.) Capacity, infrastructure, and adaptive

Confidentiality

The Central Intelligence Agency is responsible for high level data integrity and security for the nation. One of the key points in the CIA triad is to maintain WHAT and keep the data from those who don't need to have access to it? a.) Consistency b.) Availability c.) Integrity d.) Confidentiality

Fairness

The Golden Rule, or "do unto others as you would have them do unto you," belongs to which of the following ethical models for ethical behavior? a.) Utilitarian b.) Fairness c.) Virtue d.) Rights

Combining data, voice, and video into one platform means having only one network to service and maintain

What is a benefit of telecom services convergence for business? a.) Combining voice, data, and video into one platform reduces complexity. b.) Combining voice, data, and video into one network reduces failures. c.) Combining data, voice, and video into one platform means having only one network to service and maintain.

Data marts are used to analyze a business unit

What is a data mart business application? a.) Data marts are used to analyze data warehouse operations. b.) Data marts are used to analyze subsets of Big Data. c.) Data marts are used to analyze a business unit.

Passive tags leverage energy from radio signals

What is the advantage of RFID passive tags? a.) Passive tags leverage energy from radio signals. b.) Passive tags use battery power. c.) Passive tags emit or reflect optical signals.

Install the latest anti-malware and antivirus programs

What is the best way for individuals to safeguard their computers against malware? a.) Install only the latest antivirus programs b.) Install the latest anti-malware and antivirus programs c.) Install only the latest anti-malware programs d.) Install any version of anti-malware and antivirus programs

Cloud computing

What is the biggest trend, with future growth, in enterprise IT operation regarding software, platform, and infrastructure? a.) Cloud computing b.) Onsite IT data center c.) Virtual private networks

An entity exists in itself.

What is the definition of an entity in a database? a.) An entity is a record. b.) An entity exists in itself. c.) An entity is an object.

A byte is a unit of digital information, whereas a hertz is the standard measurement of frequency

What is the difference between a hertz and a byte? a.) A byte is a data transmission speed, whereas a hertz is a frequency. b.) A byte is a unit of digital information, whereas a hertz is the standard measurement of frequency. c.) A byte is a measure of frequency, whereas a hertz is a wavelength.

Primary keys define columns in a table, while foreign keys are typically a constraint to reference two tables

What is the difference between a primary key and a foreign key in a relational database? a.) Primary keys define columns in a table, while foreign keys are typically a constraint to reference two tables. b.) There is no difference between a primary key and a foreign key. c.) Primary keys are used in hierarchical models, while foreign keys are used in relational models.

PSTN is the voice telephone network around the globe

What is the public switch telephone network (PSTN)? a.) PSTN is the voice telephone network around the globe. b.) PSTN is the old telegraph analog system. c.) PSTN is the wire line infrastructure.

SQL's purpose is to administer and manage data in a database

What is the purpose of Structured Query Language (SQL)? a.) SQL is business language for enterprise applications b.) SQL's purpose is to act as the operating system for a DBMS c.) SQL's purpose is to administer and manage data in a database

To analyze system performance

What is the purpose of a general MIS evaluation? a.) To analyze system performance b.) To speed up system response c.) To review system cost effectiveness

A feasibility study is an analysis to determine if a proposed system is possible

What is the relationship of a feasibility study to an information system development project? a.) A feasibility study is an analysis performed to understand technology requirements b.) A feasibility study is an analysis to determine if a proposed system is possible c.) A feasibility study is a financial analysis

To increase traffic to the organization's website

What is the responsibility of a search engine optimization (SEO) specialist? a.) To develop an Internet marketing campaign b.) To increase traffic to the organization's website c.) To work as the organizational liaison for search engine companies

Use a Virtual Private Network

What is the safest way to access a public Wi-Fi? a.) Use an Evil Twin b.) Use anonymous browsing c.) Use a Virtual Private Network

Application

What kind of controls manages the restrictions that employees may have to the corporate data resources? a.) Information systems b.) General c.) Application

The assassination of Osama Bin Laden

What major event in American history was tweeted 20 minutes before any established news organization made the announcement? a.) The assassination of Osama Bin Laden b.) The election results of Barack Obama c.) The capture of Saddam Hussein

To analyze traffic accidents and citation data

What might a local government agency use a business intelligence geographic information system (GIS) application for? a.) To analyze traffic accidents but not citation data b.) To analyze traffic accidents and citation data c.) To predict traffic accidents and citation data

Business intelligence must help align the organization with business objectives

What must an effective business intelligence platform accomplish? a.) Business intelligence must reduce the labor force b.) Business intelligence must help align the organization with business objectives c.) Business intelligence must predict future trends

ESS data includes internal enterprise data, as well as external data from financial, industry, and trade databases

What type of data is included in executive support systems (ESS)? a.) ESS data includes internal enterprise data, as well as external data from financial, industry, and trade databases b.) ESS data only includes production, quality, and customer satisfaction data c.) ESS data focuses on financial and cost of goods information

Business process

When using the balanced scorecard method, quality would fall under which of the following measurements? a.) Customer perspective b.) Learning and growth c.) Business process d.) Financial perspective

Accountability

When you are enrolled as a student at your university, you automatically assume which of the following for your own actions? a.) Accountability b.) Responsibility c.) Liability d.) Ethical principles

Data governance

Which answer below defines the policies and processes to manage and maintain the data integrity and security of a government agency? a.) Data governance b.) Data administration c.) Database administration d.) Information management

Excel

Which application below uses data patterns to fill numbers in a column? a.) Access b.) Excel c.) Word

Android

Which is a mobile operating system? a.) Windows XP b.) Android c.) BSD

Gantt chart

Which is a well known tool in project management that illustrates project tasks against a timeline? a.) Calendar b.) Gantt chart c.) Visio

Entity-relationship diagram

Which item below is a graphical representation of the relationships and provides a description of the entities in a database? a.) Structured query language b.) Entity-relationship diagram c.) Graphical user interface d.) Data dictionary

Educating employees about social media threats

Which method can businesses utilize to thwart social media risks and threats? a.) Creating their own social media platforms b.) Educating employees about social media threats c.) Opting out of social media channels

Actions that are both legal and ethical

Which of the following actions is the hardest, but most desirable in individuals and businesses? a.) Actions that are legal but unethical b.) Actions that are both legal and ethical c.) Actions that are ethical but illegal d.) Actions that are both illegal and unethical

The classical management model supports planning and controlling

Which of the following best describes the classical model in management decision making? a.) The classical management model supports collaborative decision making b.) The classical management model supports planning and controlling c.) The classical model supports motivational theory

1G networks were "voice only" analog communication networks

Which of the following best describes the first generation of mobile networks? a.) 1G networks were "voice only" analog communication networks. b.) 1G networks were "data digital" networks. c.) 1G networks were "optical data" networks.

Organizational factors

Which of the following factors deals with the potential loss of business from the dismissal or death of an important key manager? a.) Technological factors b.) Environmental risk factors c.) Organizational factors

New drug discovery

Which of the following is an example of a big data analytics application? a.) New drug discovery b.) Structural design and analysis c.) Sales history of an enterprise

Problem Solver

Which of the following is not a category from Henry Mintzberg's management behavior roles? a.) Informational b.) Interpersonal c.) Problem Solver

Project manager

Which of the following is not a primary role of a systems analysts? a.) Arbitrator b.) Project manager c.) Consultant

patent

legal right given to an inventor of a product or process

mesh network

network topology in which each node relays data for the network

Platform as a Service (PaaS)

service provider provides server space, the server, virtualization, operating system, database, and development environment in a platform that can be used for application development. An example would be Amazon Web Services.

data mart

smaller subset database from a data warehouse typically focused on a single area or function.

Rapid application development (RAD)

software development focuses on the development's process, with limited emphasis on the planning process.

Fourth generation computer languages (4GL)

software tools that help reduce the amount of procedural knowledge that is needed about how computers operate and lets end users create programs as needed.

Data access

Which of the following is the best reason to implement a database for a growing business? a.) Digital age b.) Big data c.) Data access

Query language

Which of the following is used to retrieve specific stored data from a database? a.) Foreign key b.) Query language c.) Schema

Utility

Which of the following items is a type of system software? a.) Routing b.) DBMS c.) Utility

Modem

Which of the following items is used as an output device? a.) Modem b.) Touch screen c.) Keyboard

Authentication and authorization

Which of the following must be enforced to protect the organization's corporate data resources and to control access to the information assets? a.) Authentication and authorization b.) Authentication and prevention c.) Authorization and prevention

Wireless networks

Which of the following networks is the easiest for someone to gain access to? a.) Both b.) Wired networks c.) Wireless networks

Smartphone

Which of the following portable device combines the functionality of the phone technology with the computing of a desktop or laptop? a.) Smartphone b.) Tablet c.) Netbook d.) iPod

It is important for management to periodically evaluate information systems in order to determine whether the system is effective and relevant to the organization. There are three types of system evaluation: system-oriented, function-oriented, and ________________________________________________.

strategy-oriented

Effective written communication is also important in emails. Although less formal than written documents and manuals, with email communication, attention should be given to all of the following, except ________________________________________________.

technical jargon

Global Business Strategies that form their organizational and information systems structure

transnational, multinational, franchisers, domestic exporter

relational database

type of database in which multiple information files are combined into one database in one location, where data are stored in two-dimensional tables known as relations and contain multiple entities and attributes

router

used to connect multiple networks together and forward data packets between those separate networks to the destination host.

Protocols

used to ensure the quality and accuracy of the transmission, and that the transmission is understood by the receiving device.

Vulnerabilities

weakness in the technology, process, and procedure, or people involved with any given information asset

First and second-generation computer languages

were specific to the computer manufacturer (1GL) or to a specific processor or environment (2GL).

RFID

Which of the following technologies is used to track inventory and can be read hundreds at a time, even if the tag is covered? a.) Bar code b.) RFID c.) Wireless sensor networks

Instagram

Which social media site do most teenage girls use? a.) Facebook b.) Instagram c.) Snapchat

They display data in a structured format

Why are DBMS reports a valuable database tool in helping managers make business decisions? a.) They display data in a structured format. b.) They display summarized data of the whole table. c.) They display data in an unstructured format. d.) They displace raw data of the whole table.

Data warehouses can be mined or analyzed for trends or patterns

Why are data warehouses beneficial to business managers? a.) Data warehouses store operational data. b.) Data warehouses increase the effectiveness of OLTP databases. c.) Data warehouses can be mined or analyzed for trends or patterns.

Lack of training or acceptance for new system

Why do users fail to adopt new information systems? a.) New systems being web GUI based b.) New systems being more complex c.) Lack of training or acceptance for new system

WPA is a tunneling encryption protocol that secures wireless data transmissions

Why is WPA (Wireless Protected Access) critical to wireless networks? a.) WPA is a tunneling encryption protocol that secures wireless data transmissions b.) WPA is necessary for accessing information over the web c.) WPA brings all the wireless technologies into a standard protocol

Classification

You were hired by a company to administer survey questionnaires to customers entering a major shopping mall. The data mining software is capable of sorting the respondents into WHAT based on their age, gender, education level, and household income? a.) Classification b.) Associations c.) Forecasting

True

[True/False] Computer hardware is a means to an end, running the software programs that allow a user to perform tasks. a.) True b.) False

True

[True/False] Software applications have a life cycle because of hardware technological advances described by Moore's Law. a.) True b.) False

False

[True/False] Spoofing a network is a false representation of digital identity and leads to less packet encapsulation information as the network responds. a.) True b.) False

False

[True/False] Supply Chain Management (SCM) is a popular analytics application. A company's supply chain is a network of business processes that includes procuring raw materials, producing and manufacturing the goods, marketing the products to potential customers, and finally, distributing the finished products to the customers. a.) True b.) False

False

[True/False] Telegraph technology provided richer quality, more detailed, and a more reliable form of communication than the telephone. a.) True b.) False

False

[True/False] The Digital Millennium Copyright Act (DMCA) is an international treaty on copyright law adopted in 1996. a.) True b.) False

False

[True/False] The Open System Interconnection model consists of five layers. a.) True b.) False

False

[True/False] The behavioral model of management recognizes that actual management behavior is more systematic and predictable. a.) True b.) False

True

[True/False] The business benefit of LinkedIn is the ability to target a large number of users with specific skills or education. a.) True b.) False

True

[True/False] The factors that most influence the success of an information system are the functionality of the system, the quality of the data, the usefulness of the system, system usage, system efficiency, and user satisfaction. a.) True b.) False

False

[True/False] The five largest business intelligence technology vendors are IBM, Apple, Oracle, SAP, and SAS. a.) True b.) False

False

[True/False] The virtual layer is the seventh layer of the OSI (Open System Interconnection) model. a.) True b.) False

chief information officer (CIO)

a business leader who analyzes internal business processes such as payroll and billing, reshapes the physical infrastructure and network purchases to meet business goals, and leads the workforce to implement critical IT internal projects; responsible for information systems strategic thinking and planning.

A reliable intranet connection provides organizations and their suppliers and vendors with ________________________________.

a secure platform for internal use

What is the relationship of a feasibility study to an information system development project? a- A feasibility study is an analysis to determine if a proposed system is possible b- A feasibility study is a financial analysis c- A feasibility study is an analysis performed to understand technology requirements

a- A feasibility study is an analysis to determine if a proposed system is possible

Which of the following is not an organizational change category to consider when implementing a new information system? a- Quality b- Automation c- Rationalization

a- Quality

The ______________ method can address unexpected changes or challenges that cannot be addressed effectively with SDLC. a- SCRUM b- agile c- RAD

a- SCRUM

There are multiple methods of data capture, categorized as manual or ________________- a- automated b- optical c- scanned

a- automated

Effective written communication must be correct, simple, and accurate. Jargon and terminology should be a- avoided b- explained c- used

a- avoided

When using the balanced scorecard method, quality would fall under which measurement? a- business process b- customer perspective c- learning and growth d- financial perspective

a- business process

When using a decision tree, ____________ can become complex when uncertain values exist, or if multiple outcomes are linked oriented. a- calculations b- outcomes c- analyses

a- calculations

What are measurement, analytics, reporting, collaboration, and knowledge management? a- common functionalities of business intelligence b- the best practices of management c- the five management roles identified by Henry Mintzberg

a- common functionalities of business intelligence

Which is not a factor that must be considered when implementing a new information system? a- competition b- technical ability c- user d- resistance to change

a- competition (once a decision has been made to implement an information system, competition is not a factor)

Which of the following is a primary role of information systems managers? a- decision making b- hiring c- performance review

a- decision making

The work breakdown structure (WBS) is a broken down list of project __________ required to complete a project a- deliverables b- activities c- resources

a- deliverables

Which of the following is not a benefit of using the SDLC when implementing an information system program? a- difficulty in estimating project cost b- ability to monitor large projects c- detailed staged process

a- difficulty in estimating project cost

The _________step, when managing systems implementation, consists of cataloging the system specifications in detail. a- documentation b- acquisition c- conversion

a- documentation

__________ combine multiple tools or workbenches to support the complete software cycle. a- environments b- workbenches c- tools

a- environments

Which of the following is not a primary role of a systems analysts? a- project manager b- consultant c- arbitrator

a- project manager

Which is not a step in the decision making process? a- select team b- define problem c- develop alternatives

a- select team

What is the function of the data integration service in business intelligence? a- serves as the depository of all extracted data for the load function of the data warehouse b- helps extract value from the data c- gathers and logically mixes business and master data

a- serves as the depository of all extracted data for the load function of the data warehouse

When communicating, what is important for IT professionals to understand during the system development process? a- the user knowledge and background of the target audience b- the system networking platform c- the legacy systems model

a- the user knowledge and background of the target audience

What type of MIS do operational and middle management use for structured decisions? a- transactional processing systems b- analytical processing systems c- data warehouse systems

a- transactional processing systems

chief executive officer (CEO)

also called president or managing director, is responsible for the success or failure of the company, creating the company culture, selecting the senior management team, setting strategy and vision, and selecting projects to fund.

Pseudocode

an informal high-level description of the operating principle of a computer program or other algorithm. Used for human reading, rather than machine reading.

Agile software development methodology

an operational method by which software developers iteratively gather requirements, plan, design, develop, test, and implement software.

Which of the following is a definition of a systems analysis logical model? a- a logical model is an abstraction of a system b- a logical model is UML c- a logical model is a type of data diagram

b- a logical model is UML (?)

What are podcasts, and why are they a good source of information for systems analysts? a- sources of information that are accessed by apple devices b- audio files that contain educational content c- content channels that can be read

b- audio files that contain educational content

What is the overall job function of a systems analyst? a- executes qualitative risk assessments b- focuses on analysis, design, and implementation c- develops system design processes

b- focuses on analysis, design, and implementation

___________ environments are the most common and are suitable for the entire system development life cycle, from analysis to maintenance. a- process b- integrated c- method

b- integrated

Which of the following is a great, free, and ubiquitous source of information for systems analysts? a- textbooks b- internet c- library

b- internet

What is considered to be a low level security risk during system post-implementation? a- low level is characterized by complete loss of organizational capabilities b- low level is characterized by noticeable impact to the organization c- low level is characterized as severe impairment to an organization

b- low level is characterized by noticeable impact to the organization

What are three levels of risks associated with system design and implementation? a- cost, schedule, and user acceptance b- project structure, size, and team technical background c- critical path, work breakdown, and change

b- project structure, size, and team technical background

What are the classifications of cloud computing? a- virtual, multi-core, and distributed b- public, private, and hybrid c- in-house, remote, and hybrid

b- public, private, and hybrid

System development life cycle (SDLC) consists of seven stages. The sixth stage in SDLC is a- designing the recommended system b- testing and maintenance c- determining information requirements

b- testing and maintenance

What is risk management in system security? a- the process of security breach prevention b- the process of identifying, analyzing, and responding to risk c- the process of cataloging risks

b- the process of identifying, analyzing, and responding to risk

What is a rich site summary (RSS)? a- systems analysts' information channel b- web feed formats used by publishers c- websites used specifically by systems analysts

b- web feed formats used by publishers

What category of Computer Aided Software Engineering (CASE) does Microsoft Visual Basic fall under? a- tools b- workbenches c- environments

b- workbenches

Tertiary storage

consists of an automated robotic mechanism to mount and dismount magnetic tape or optical discs.

Open System Interconnection (OSI)

consists of seven layers and is an international standard that governs or guides the development of data communication protocols the seven layers are: application, presentation, session, transport, network, data link, and physical.

The proper techniques for developing an internet search strategy include reviewing information requirements, using proper search techniques and tools, evaluating the results, and determining __________________________________________________________.

copyright and data integrity issues

Clickstream applications

create non-relational databases which are mined to track and analyze an application's activity, including how it is used and where a user clicks.

Which of the following is not a systems implementation phase? a- development b- conversion c- testing d- scheduling

d- scheduling

Online transaction processing (OLTP)

database design used for browsing and manipulating business transaction activity. Processing of information into the database.

Both cloud computing and Web 2.0 are ____________________________.

disrupting systems design and implementation

primary storage

flash memory chips, such as shown below, plugged into memory slots on the motherboard.

End-user development (SDLC)

fourth-generation languages that enable end users to develop systems and solutions with little or no assistance from professional technical specialists.

Benchmarking requires contacting users and teams that have successfully implemented a similar system in order to ______________________________________________.

gather best practices

chief technology officer (CTO)

has ultimate responsibility for all technology implementation, maintaining technology compliance regulations, and identifying technology risks for the company.

Cloud computing is becoming more popular because users ___________________________________________.

have more flexibility than they do with VPN

Third generation computer languages (3GLs)

high-level programming languages such as FORTRAN, COBOL, C, Java, C++, and C#

The government selects one specific culture to codify the ethics into laws

We live in a diverse culture in this country, with people who came from different nationalities and backgrounds. Which of the following statement about ethics is FALSE? a.) Our social ethics is codes of conduct based on accepted standards of right and wrong. b.) Different cultures develop their own set of ethics by which members abide. c.) Ethics are moral principles and concepts and rules of behavior governing our behavior. d.) The government selects one specific culture to codify the ethics into laws.

Societies

We make our ethical decisions based on the principles of right and wrong that we learn from our upbringing and our exposure to different? a.) Communities b.) Organizations c.) Societies

Destroying sensitive information

We need to intentionally harden our individual security to make it harder for criminals to steal our information assets by removing all paper trails to our important information. Doing WHAT by using a cross-cut shredder will help eliminate this possibility? a.) Making accounts more secure b.) Destroying sensitive information c.) Using secure forms of payment

GDSS enable interactive collaboration support for multiple decision makers at multiple geographic locations

What are group decision support systems (GDSS)? a.) GDSS help translate organizational objectives into operational targets b.) GDSS provide internal and external grouped data for middle managers c.) GDSS enable interactive collaboration support for multiple decision makers at multiple geographic locations d.) GDSS define key performance indicators for decision making

Online transaction processing

What does OLTP stand for? a.) Online tracking processing b.) Online transcript processing c.) Online transaction processing d.) Offline transaction processing

Open System Interconnection

What does OSI stand for? a.) Open Switch Interpacket b.) Open System Interconnection c.) Open Standard International

Wireless Sensor Networks

What does WSN stands for? a.) Wireless Sensor Networks b.) Wireless System Networks c.) Wireline Sensor Nodes

Develop public profiles for organizations in order to enable interaction with customers

What does an organization's social media strategist do? a.) Serve as the liaison between the organization and the online community. b.) Boost website rankings through analysis and testing marketing techniques. c.) Develop public profiles for organizations in order to enable interaction with customers.

Support the unpredictable and less systematic aspects of decision-making

What does the behavioral model hope to accomplish in management decision making? a.) Support unstructured types of decisions b.) Support the unpredictable and less systematic aspects of decision-making c.) Support the predictable and systematic aspects of decision making d.) Support the human factors design of information systems

It provides real-time information that can be acted upon quickly

What function does the breaking news aspect of social media provide the investment community? a.) It provides real-time information that can be acted upon quickly. b.) It reveals patterns of behavior, such as consumer spending. c.) It can predict the direction of market indexes.

Mobile Internet devices and Web 2.0

What has enabled social media use to grow exponentially over the past decade, dramatically changing how individuals and organizations communicate and conduct business? a.) The Internet b.) Broadband packet switched data communications c.) Mobile Internet devices and Web 2.0

Databases

What helps e-businesses accurately target individual customers by charging them different prices? a.) Databases b.) Telecommunications c.) Mobile devices d.) The Internet

Systems Analyst

A change agent who uses design and analysis techniques to solve organizational problems using information technology.

Codes

A software engineer does WHAT with computer programs to perform specific tasks? a.) Codes b.) Procures c.) Selects

Low switching costs

Business strategy is how a business achieves its goals and outperforms its competitors. Strategic information systems (SIS) are used to help companies accomplish business strategies. Some of the initiatives for implementing an SIS include all except which of the following? a.) Customer lock-in b.) Differentiating products c.) Low switching costs d.) Barriers to competitors

Technology

Businesses face difficult decisions regarding their hardware needs. Constant changes in WHAT can lead to obsolescence? a.) Technology b.) Communication c.) Training

Foreign currency exchange rates

Businesses should not build global systems just to build global systems; senior management should weigh all benefits before proceeding. The major contributions or factors that drive global systems and the internationalization of business includes all except which of the following? a.) Management and coordination b.) Production, operation, supply and distribution c.) Global customers and global marketing d.) Foreign currency exchange rates

Customer Relationship Management (CRM)

Focused marketing efforts, better customer experiences, automated reporting, and better cooperation to respond to customer needs defines what type of enterprise system? a.) Enterprise Resource Planning (ERP) b.) Customer Relationship Management (CRM) c.) Supply Chain Management (SCM) d.) Knowledge Management (KM)

Customer Relationship Management (CRM)

For a new business, to collect customer information online and at the register and to consolidate and merge the information to better serve customers defines what type of enterprise system? a.) Enterprise Resource Planning (ERP) b.) Customer Relationship Management (CRM) c.) Supply Chain Management (SCM) d.) Knowledge Management (KM)

Operating system

In order to function, all computer systems are composed of hardware components, software components,and require a CPU as well as a(n)? a.) Hard drive b.) Operating system c.) Application

Supply Chain Management (SCM)

Lower costs, improve collaboration, reduce cycle times, respond to conflict, forecast demand, and manage product flow defines what type of enterprise system? a.) Enterprise Resource Planning (ERP) b.) Customer Relationship Management (CRM) c.) Supply Chain Management (SCM) d.) Knowledge Management (KM)

Customer satisfaction

Many factors need to be weighed when managing system implementation, both tangible and intangible, to reduce project risk. WHAT is an intangible benefit when evaluating information systems cost and benefits? a.) Faster order fulfillment b.) Customer satisfaction c.) Reduced customer complaints

Accounting and finance

Most large corporations have several information systems to support their functional business areas. What is the system that tracks and processes company revenues, purchases, and payroll? a.) Marketing and sales b.) Human resources c.) Accounting and finance d.) Manufacturing and production

Insignificant

Network economics sees the cost of adding new members as WHAT? a.) Consequential b.) Prohibitive c.) Insignificant

Associate with other companies, without being physically tied to them

One network-based strategy is that of virtual companies that can do WHAT? a.) Associate with other companies, without being physically tied to them b.) Use the internet as their storefront to connect with customers c.) Provide online products and services only

Information

One of the advantages of information systems for businesses is to take raw data and turn it into information, and then transform that information into knowledge. The number of people in Florida with incomes below the poverty line increased in the City of Tampa between 2010 and 2015 is an example of what? a.) Knowledge b.) Information c.) Data

Data

One of the advantages of information systems for businesses is to take raw data and turn it into information, and then transform that information into knowledge. The number of people in Florida with incomes below the poverty line is an example of what? a.) Data b.) Knowledge c.) Information

Knowledge

One of the advantages of information systems for businesses is to take raw data and turn it into information, and then transform that information into knowledge. Understanding why the poverty line increased in the city of Tampa is an example of what? a.) Data b.) Knowledge c.) Information

Communication

One reason IT is important is because video conferencing has become cheaper, quicker, more collaborative, and more efficient. Of what IT benefit is this an example? a.) Cost effectiveness b.) Communication c.) Product development d.) Globalization

Shifting environment

Porter's five competitive forces includes all except what below? a.) Competitive rivalry b.) New entrants c.) Shifting environment d.) Substitute products

Enterprise Resource Planning (ERP)

Standardized business procedures that allow for more consistency within the business and removes redundancy defines what type of enterprise system? a.) Enterprise Resource Planning (ERP) b.) Customer Relationship Management (CRM) c.) Supply Chain Management (SCM) d.) Knowledge Management (KM)

Synergy

Teamwork is used in business to motivate employees to work harder and be more productive. When employees show commitment to team goals and work effectively, collaboratively, and cooperatively with others to reach desired outcomes is an example of WHAT? a.) Merger b.) Synergy c.) Core competency

Network of physical devices

The "Internet of Things" (IoT) is a growing topic in business and a hot IT career field. What best describes IoT? a.) Internet access for everyone b.) Internet streaming services c.) Wi-Fi access everywhere d.) Network of physical devices

MIS

There are different types of information systems based on the different levels of hierarchy in an organization. Which system helps managers manage their departments more efficiently? a.) DSS b.) EIS c.) MIS d.) TPS

DSS

There are different types of information systems based on the different levels of hierarchy in an organization. Which system helps support business decision-making activities by manipulating and building upon the information from the systems below it in the hierarchy? a.) DSS b.) EIS c.) TPS d.) MIS

Environment

There are many organizational features that can change the direction of the company. Some of these include processes, politics, culture, and environment. Managers must understand how organizational features can influence their business in order to build and use information systems successfully. Internal and external elements that affect various parts of an organization, for instance the government, competitors, customers, and suppliers, are examples of what organizational feature? a.) Culture b.) Politics c.) Structure d.) Environment

Culture

There are many organizational features that can change the direction of the company. Some of these include processes, politics, culture, and environment. Managers must understand how organizational features can influence their business in order to build and use information systems successfully. Values and behaviors that contribute to the social and psychological well-being of an organization are examples of what organizational feature? a.) Culture b.) Politics c.) Structure d.) Environment

Politics

There are many organizational features that can change the direction of the company. Some of these include processes, politics, culture, and environment. Managers must understand how organizational features can influence their business in order to build and use informations systems successfully. Pursuing individual interests or agendas in an organization without regard for company goals is an example of what organizational feature? a.) Structure b.) Environment c.) Culture d.) Politics

Information Systems

WHAT accepts data as input? a.) Information b.) People c.) Information Systems

Facilities

WHAT are needed for information systems infrastructure? a.) Service providers b.) Facilities c.) Computers

Memory and CPU

WHAT are the components found on a computer's motherboard? a.) Memory and CPU b.) Hard drive and Memory c.) CPU and Hard drive

Processes and employees

WHAT are the key factors to consider when planning and organizing information technology in business? a.) Hardware and processes b.) Processes and employees c.) Customers and suppliers

The internet

WHAT is the biggest impact to global business due to the fact that there are virtually no physical borders? a.) The internet b.) Foreign exchange c.) Information technology

Information management

What is the application of management techniques to collect, communicate, and process information in order to make better management decisions called? a.) Information management b.) Information technology management

Competitive forces

What is the name of Porter's Model that is used to help businesses determine their ability to compete. a.) Competitive forces b.) Competitive advantage c.) Competitive rivalry

Perform a strategic analysis

When determining business benefits from implementing a strategic information system, several factors need to be considered. Businesses need to consider their business objectives, look at who their customers are, create justification for the project and then seek support. What would be the first step in determining benefits? a.) Analyze competitive forces b.) Revamp business processes c.) Study the value chain d.) Perform a strategic analysis

Manage incoming data and catalog data

When looking at the evolution of software, databases have grown in features and popularity. What do database management system (DBMS) applications do for business? a.) Compile data into machine language and manage incoming data b.) Manage incoming data and catalog data c.) Catalog data and compile data into machine language

Synergies

When the output from one area is used to create input for another, thereby lowering costs and generating more profit is the idea of WHAT? a.) Network strategies b.) Synergies c.) Core competency

Defining an acceptable test plan

Which of the following is not a management solution when developing global systems? a.) Coordinating software releases b.) Encouraging local user support c.) Changing business processes d.) Defining an acceptable test plan

Design and select database software

Which of the following is not a responsibility of a project manager? a.) Demonstrate leadership and have good communication skills b.) Make team assessments and evaluations c.) Design and select database software d.) Establish project milestones and deliverables

Information security analyst

Whose job is it to focus on risk and vulnerability assessment to prevent security breaches of company or government data? a.) Information security analyst b.) Database administrator c.) Computer systems analyst

Computer systems administrator

Whose role is it to manage company workflows, identify and fix network issues, and maintain equipment and software? a.) Computer systems administrator b.) Computer programmer c.) Computer support specialist

True

[True/False] A 2-in-1 computer system is a computer that can act as a laptop, with high level of capability, and use the display as an touch screen pad. a.) True b.) False

False

[True/False] A desktop processor is designed to meet the needs of one person, whereas a server meets the needs of many people. Server processors are designed for speed and reliability, so they always use a quad-core processor. a.) True b.) False

False

[True/False] Cloud computing allows users to mix and match software components to create a customized application. a.) True b.) False

True

[True/False] Computer software is a set of machine-readable instructions that makes computers perform specific tasks. a.) True b.) False

True

[True/False] Engineers tasked with designing complex systems typically require workstations as their computer systems. a.) True b.) False

False

[True/False] HTML (Hypertext Markup Language) is a software language used to manage relational databases. a.) True b.) False

True

[True/False] Human touch and human gestures are computer input technologies. a.) True b.) False

True

[True/False] Open-source software has been found to contain fewer defects than proprietary software. a.) True b.) False

True

[True/False] The term "PC," which stands for personal computer, was adopted because of the success of the IBM personal computer. a.) True b.) False

False

[True/False] When purchasing hardware, do not purchase more than the minimum required by the software. a.) True b.) False


Set pelajaran terkait

taxation chap 1 multiple choice pt 1

View Set

Medsurg: Ch 51: caring for clients with diabetes mellitus

View Set

Quiz 2 Chapter 13 Physical Assessment

View Set