CIS 200 final exam
according to the video "artificial intelligence overview from brainstorm films" in chapter 1, artificial intelligence could contribute up to ______ to the global economy in 2030
$15.7 trillion
Which of the following is a true statement about information system security?
- A constant vigilance regarding security needs to be a key component in your organization's culture. - Information systems security involves a trade-off between cost and risk. - A constant vigilance regarding security needs to be part of your individual skill set.
wikis
- A website that anyone can edit directly from within the browser. All changes are attributed, and there is a revision history allowing for the roll back of changes to revert to earlier versions. - Wikipedia
The best way to thwart a would-be phishing attack is:
- Don't open unexpected attachments or files. - Stay alert when interacting with email. - Don't click on login links shown in emails; login to the website directly.
Organizations must be prepared to address and respond to the following situation(s) involving social media.
- Employees making anonymous posts on social media promoting the organization and disparaging competitors - Dissatisfied customers publishing negative feedback about the organization on social media - Individuals with no relationship with the organization posting harmful content about an organizational employee or the organization itself - Employees posting content that could damage the organization's reputation
electronic social network
- Facebook - Online community that allows users to establish a personal profile, link to other profiles (i.e., friends), share content, and communicate with members via messaging, posts. Most personal relationships are reciprocal (i.e., both parties agree to be "friends").
Which of the following statements is true?
- Facebook followed Twitter's Periscope with its own Facebook live video streaming tool. - Application programming interfaces (APIs) refer to programming hooks, or guidelines, published by firms that tell other programs how to get a service to perform a task, such as sending or receiving data. - Facebook has a significant "walled garden," which has given rise to the fear that increasingly large parts of the Web will reside in a single service and thereby limit competition, innovation, and exchange.
According to the textbook, what are ways that FreshDirect achieved competitive advantage over rivals?
- FreshDirect created an imitation-resistant value chain. Traditional grocers found it difficult to copy the firm's delivery business because this would have left them straddling two markets (low-margin storefront and high-margin delivery), unable to gain optimal benefits from either. - FreshDirect was a first mover in the online grocery market, allowing the firm to develop brand, scale, data, and other advantages that newcomers lack.
According to section 16.4 of your textbook, which statements are TRUE about net neutrality?
- Internet service firms (e.g., Google, Netflix) say they create demand for broadband business from ISPs (e.g., Comcast, AT&T), while broadband firms (e.g., Comcast, AT&T) say Internet service firms (e.g., Google, Netflix) are ungrateful parasites that aren't sharing the wealth. - The Obama administration had largely supported Net neutrality, but the Trump administration removed most of these regulations. As a result, several states have attempted to enact their own rules favoring Net neutrality.
Which of the following statements about Facebook and mobile is true?
- Many analysts were skeptical of Facebook's ability to create a business from mobile. Mobile revenue just before Facebook's IPO was zero. - Ads on Facebook mobile show up in a user's feed, the area of the screen they pay most attention to, suggesting mobile ads will be tougher to ignore than those on the side of a browser screen. - Facebook's acquisition of WhatsApp was a way for the firm to gain leadership in the fast-growing mobile messaging market. - Today, mobile makes up the majority of Facebook's advertising revenue.
Which of the following are TRUE statements? Select all that apply.
- Most organizations do not opt for IT configurations that are purely in-house, packaged, or SaaS models. - Firms that want significant control over the operating system and applications they put 'in the cloud' should choose an IaaS service over an SaaS offering. - Firms using SaaS products can dramatically lower several costs associated with the care and feeding of their information systems. - A manager should take a vendor's reputation and financial position into consideration while making an IT outsourcing decision.
microblogging
- Short, asynchronous messaging system. Users send messages to "followers" who aren't required to follow back. - Twitter
Which of the following is a TRUE statement about websites, URLs, and phishing? Select all that apply.
- Spear phishing attacks specifically target a given organization or group of users. - One of the reasons one should be careful about clicking on any URL in an e-mail is that hackers can easily embed a redirection in e-mail links, rerouting a user to an alternate online destination. - Phishing is one of the most common intrusion techniques used to spread malware. - Hackers might infiltrate computer systems to enlist hardware for subsequent illegal acts.
Which of the following is a risk associated with social media?
- The online social media activities of employees, whether in their personal or professional domains, can taint the image of the organizations they work for when the online content or behavior is perceived to be negative or controversial by the general public or key organizational stakeholders. - Online trolls can vandalize content published on social media or otherwise cause grief or mischief on social media. - Viral online outrage can harm the reputation of an organization, regardless of whether the organization uses social media.
When creating an organizational cybersecurity strategy, which statement is FALSE?
- The whole organization needs to buy-in to the strategy. This is best achieved by having a sponsor from the senior management team. - Cybersecurity strategies should always be tied to the business strategy of an organization. - An incident response plan can greatly reduce the cost of a possible cybersecurity breach. - Employees need to know a firm's policies, be regularly trained, with incentives to comply.
What is an example of crowdsourcing, as described in your textbook?
- Walmart: The company set up a contest, providing a sample of historical sales data with potential influencing factors, including promotions, clearance sales, and price roll backs. Candidates were asked to build models that use these factors to forecast sales across various departments. - Mechanical Turk: An online marketplace where anyone with a task to be completed or problem to be solved can put it up for Amazon, setting their price for completion or solution. - St. Louis Cardinals baseball team: The club's One for the Birds contest calls for the fans to submit scouting reports on promising players, as the team hopes to broaden its recruiting radar beyond its classic recruiting pool of Division I colleges.
Which statement is TRUE about cybersecurity within organizations?
- When defining a cybersecurity strategy, it is always a balancing act between risk and cost. - The virtual shutdown of websites by way of overloading them with seemingly legitimate requests sent simultaneously from thousands of machines is termed a DDoS (distributed denial of service) attack. - Proactively avoiding a cybersecurity incident costs less than dealing with a security breach afterward. - A Red Team looks for weaknesses in security mechanisms, with a view to help plug the holes that might be exploited by cyber-criminals.
When creating an organizational cybersecurity strategy, which statement is FALSE?
- Working from home does not change the cybersecurity plan for an organization - The attack surface does not matter when creating a cybersecurity strategy. - Always hire Black Hat hackers to test vulnerabilities in your organization cybersecurity landscape.
According to this module, people cope with the psychological stress associated with paradoxical ideas through defensive strategies, such as:
- blaming or scapegoating others for the tensions - forming or joining subgroups that align with one of the viewpoints - resorting to understandings or actions that have provided comfort and security in the past - ignoring or denying the tensions
disadvantages of ERP systems
- implementations can be costly and time consuming (sometimes spanning years) - standardized processes in the commercial software means the processes are not unique and may not provide competitive advantage - customizations can be costly and difficult to maintain when upgrading the software - users tend to resist new implementations because these systems tend to substantially change their jobs - failed implementations can cost a company millions of dollars and sometimes bankrupts companies - implementations are often large-scale change projects because processes typically have to be modified to fit the software rather than customizing the software to fit existing processes
Which of the following best captures individuals' motivations for information security attacks?
- intellectual property theft -stealing personal or financial data - pranking people - revenge (disgruntled employee) - cyberwarefare - protest hacking (hacktivism)
The reason unscrupulous individuals use the unsophisticated method of Phishing or Spear Phishing emails are:
- to gain the login information of the targets (email recipients) - to get the most results for the least amount of effort - to access the targets' (email recipients') financial credentials for financial gain - to obtain private information to sell on the Dark Web
Timing and technology alone will not yield sustainable competitive advantage. Moving first pays off when the time lead is used to create critical resources that are _______.
- tough to imitate -rare - lacking in substitutes -valuable
What is a key way that organizations use social media?
- viral marketing -data analytics -contests and promotions -customer engagment -human resources management -knowledge sharing
advantages to ERP systems
-"single source of truth" with data stored in a single, centralized database--allowing for powerful analytics and decision making -operational efficiency and effectiveness -increased visibility into an organization's business processes -standardization and integration of business processes -ERP software vendors tend to embed industry best practices into their software -easier to connect systems with external organizations, facilitating mergers and acquisitions
messaging services
-Communicate with individuals or groups of users using short-format text, graphics, and video. Most messaging is done using mobile devices. -Snapchat
According to the module videos and textbook, which of the following is an example of how organizations can develop and deploy more ethical and less risk-prone information systems?
-Increase diversity in information systems development and management teams -Create a systems review board -develop a code of technology ethics -hire ethicists
According to the textbook and lecture videos, what is a risk or challenge associated with use of AI?
-Potential for negative unintended consequences of data misuse -Potential for AI algorithms to yield biased predictions and results -Consumers and employees may feel their information privacy is compromised. -Insufficient and inconsistent data will inhibit AI use. -Employees may resist AI systems in the workplace because AI could significantly alter their jobs.
Which statement is TRUE about software?
-Software is one of the technology components of information systems. -software is a precise set of instructions that tells hardware what to do -software is computer program or collection of programs
According to this module, what is a true statement about "people" in information systems?
-Technology implementation failures in organizations are more likely to stem from problems with "people" (e.g., end users, project managers) rather than poorly designed technology. -Learning how to work effectively with people from diverse backgrounds is a critical soft skill that information systems professionals should learn and maintain. -People create and manage the technology and process components of information systems; this is one reason it's important to understand the "people" component of information systems.
According to the textbook and lecture videos, what is an example of positive outcomes associated with the use of AI?
-Use of AI can automate many tasks, providing convenience to consumers and cost savings for organizations. -Use of AI can predict cancer survival better than humans. -Use of AI can improve employee retention by uncovering patterns of those most likely to leave.
According to the video, which software option has the advantage of "scalability"?
-cloud -open source
Of the five components of information systems, which components represent "technology"?
-data -software -hardware
According to the lecture video, which AI tools do Apple's Siri and Android's Google Assistant rely on?
-machine learning -natural language processing
Messaging services are a form of social media known for the following characteristic(s).
-some focus on specific media types (e.g., Instagram: photos, TikTok: videos) - often used on mobil devices
According to the textbook, which of the following is a strategy used by a firm to achieve and maintain competitive advantage?
-switching casts and data -network effects -scale advantages -distribution channels -brand -differentiation
horns effect
-the horns effect is a cognitive bias that happens when we disapprove of someone based on a negative first impression -with the horns effect, we continue to disapprove of someone even if this person demonstrates positive traits
Up until this point of the video, what are the ways the speakers have characterized "unconscious biases"? Check all answers that apply.
-unconscious biases are shortcuts our brains have so that we can deal with the information we process every day -our unconscious biases define boundaries we're unwilling to expand -our worldview can exert an influence beyond our conscious awareness
According to the lecture videos and your textbook, deep learning involves multiple layers of interconnections among data to identity patterns and predict results and uses _______________
-unstructured data -unlabeled data
According to the lecture videos and textbook, machine learning involves the following:
-use of algorithms -learning through data and experiences
According to the lecture videos and textbook, what are examples of artificial intelligence applications?
-virtual backgrounds in conferencing apps like zoom -irobot roomba -IBM watson -CAPTCHA -McDonald's use drive-thru menus -voice analysis software to detect employees "compassion fatigue" -robo-journalists
Put the SDLC phases in order from start to finish.
1. requirements 2. design 3. implementation 4. verification 5. maintenance
In 2020, Facebook had nearly ______________ monthly active users.
3 billion
According to this video, our unconscious mind makes ________ percent of our decisions without us even knowing it.
90
phishing
A bank customer receives a message, ostensibly from the bank's website, asking her to provide her login information but contains many misspellings and links that go to suspicious websites.
data warehouse
A collection of databases structured for fast online queries and exploration, typically aggregating enormous amounts of data from many different operational systems
vishing
A cyber rascal calls a company trying to get access to private personal and sometimes financial information to use for financial gain. It is a form of social engineering.
data mart
A database or databases focused on addressing the concerns of a specific problem or business unit
sock puppet
A fake online persona created to promote a particular point of view, often in praise of a firm, product, or individual.
According to this module, what is a true statement about generational theory?
A generational cohort shares major experiences and events that leave distinctive imprints on the cohort, manifested in espoused beliefs, values, and behaviors. This is especially true when these events are experienced at salient, early stages of life. A generational cohort shares important historical, cultural, and social events that shape its members' attitudes and dispositions throughout their lives.
smishing
A person receives a text message from a familiar number with a link. If they click on the link, it will install a malicious software app on the phone.
data cube
A special database used to store data in OLAP reporting
platform bundling
A strategy whereby a firm offers products and services that allow for the integration of other software products and complementary goods, which creates an eco-system of value-added offerings.
envelopment
A strategy whereby a firm with a significant customer base adds a feature to an existing product or service and eliminates the need for any rival, stand-alone platforms. Think Apple adding video to cameras, crushing the market for the Flip cam.
griefer
An internet vandal and mischief maker; also sometimes referred to as a troll
Which of the following statements is TRUE?
Because Facebook is private, most of its content is on the deep Web, which is Internet content that can't be indexed by Google and other search engines.
According to lessons in this module, the following statement best describes careers in information systems.
Careers in information systems can fall on either business or technical tracks and often combine both business/soft and technical skills.
Which of the following statements is TRUE about Computer Information Systems (CIS)?
Cis focuses on how technology works with people and processes to achieve business goals
What is the difference between on-premises enterprise software and cloud-based enterprise software?
Cloud-based enterprise software is hosted on the vendor's servers and accessed through a web browser, whereas on-premises enterprise software is installed locally, on a company's own computers and servers.
According to a video in 11.5 of the textbook, the most dangerous type of false and misleading information that social media companies are trying to address is:
Content low in truth with a high intent to mislead (e.g., hoaxes, conspiracy theories)
Which of the following statements is TRUE about cybersecurity?
Cybersecurity breaches can most often be traced back to personnel or procedural (process) factors.
According to your textbook, how are artificial intelligence, machine learning and deep learning related?
Deep learning is a subcategory of machine learning, which is a subset of artificial intelligence
spear phishing
Employees of a medical center received e-mails from the head office manager, indicating that the recipient was being laid off and offering a link to job counseling resources. The link really offered a software payload that recorded and forwarded the keystrokes on the victim's PC.
astroturfing
Engineering the posting of positive comments and reviews of a firm's product and services (or negative ones of a firm's competitors).
Which of the following statements about Facebook and mobile is FALSE?
Facebook's was an early innovator and leader with mobile applications, out-competing Instagram in mobile photo sharing.
Drag and drop the technologies to the most relevant business discipline where they are having an impact. Each technology belongs in only one category/discipline.
Finance robo-advisors, computor-automated trading Marketing customer relationship management, personalization systems operations supply chain management, factory automation human resources linkedIn, resume database software
According to the lecture videos, research has shown that the link between (1) social media use and (2) negative responses and outcomes is the following:
Findings from existing studies are mixed; some show negative correlations and others show positive correlations.
Which of these is not a major type of cloud services?
Hardware as a service (HaaS)
In this scenario, the cloud firm usually manages the infrastructure (keeping the hardware and networking running), while the client has control over most other things (operating systems, storage, deployed applications, and perhaps even security and networking features like firewalls and security systems).
Infrastructure as a Service (IaaS)
Which is a best practice for physical security awareness?
Lock your computer screen and mobile devices every time you step away.
ransomware
Malware that encrypts a user's files (or perhaps threatens to delete them) and demands that a user pay to regain control of their data and/or device.
What is impossible from a cost or performance perspective today may be possible in the future. What concept provides support for this statement?
Moore's Law
What is the relationship between Moore's Law and e-waste?
Moore's Law predicts the accelerated obsolescence of technology devices, which leads to increases in discarded hardware devices.
legacy systems
Outdated information systems that were not designed to share data, aren't compatible with newer technologies, and aren't aligned with the firm's current business needs
Which of these would be an example of a DDoS attack?
Overloading a popular social networking site with inbound messages in order to shut down access to the site
In this scenario, the cloud firm usually manages the platform (hosting, hardware, and supporting software), while the client has control over the creation and deployment of their applications.
Platform as a Service (PaaS)
prediction market
Polling a diverse crowd and aggregating opinions in order to form a forecast of an eventual outcome.
In this scenario, the cloud firm manages the creation and deployment of software applications that are delivered online, while also managing the platform and infrastructure.
Software as a Service (SaaS)
Drag/drop the strategies for personal cybersecurity hygiene to their corresponding categories. (NOTE: There are six correct answers for each category.)
Strategies that Strengthen Personal Cybersecurity Hygiene :-) - Don't turn on risky settings, like unrestricted folder sharing. - Pay attention when clicking links. - Turn on software update features for your operating system and applications you use. - Install security software (e.g., antivirus software, personal firewalls, malware scanners, etc.). - regularly backup your most important files practicing the 3-2-1 backup scheme. - Don't give your password to anyone. Strategies that Weaken Personal Cybersecurity Hygiene :-( - Click the "Remember me" or "Save password" settings on a public computer. - Write your passwords down on a sticky note. - Use public computers (libraries, coffee shops) when accessing sites that contain your financial data or other confidential information. - Always trust an email with a link that states it's from your manager. - Use the same password on many websites. - Turn on browser settings that will auto-fill fields with your prior entries (e.g., usernames, passwords, phone numbers), especially on devices that you share with others.
data lake
Systems that allow for the storage of data in both structured and unstructured ("raw," "unfiltered") formats
Transaction processing systems
Systems that record a transaction (i.e., a form of business-related exchange), such as a cash register sale, ATM withdrawal, or product return
Which of the following statements is FALSE?
The Facebook-backed Libra cryptocurrency seeks to serve the 100 million adults worldwide who do not have a bank account.
crowdsourcing
The act of taking a job traditionally performed by a designated agent (usually an employee) and outsourcing it to an undefined, generally large group of people in the form of an open call.
switching costs
The cost a consumer incurs when moving from one product to another. It can involve money spent, investments in time, any data loss, etc.
The founders of tech firms Microsoft, Dell, Facebook, Apple, Google, Instagram, Yahoo!, Snapchat, Youtube, Dropbox, Box, and Spotify all have the following in common:
They were all in their 20s when they founded these tech firms
collaborative consumption
When participants share access to products and services rather than having ownership. Shared resources can be owned by a central service provider (e.g., Zipcar) or provided by a community that pools available resources (e.g., Airbnb, Uber).
network effects
When the value of a product or service increases as its number of users expand. Also known as Metcalfe's Law, or network externalities.
what is a cross-functional process?
a business process that spans multiple functional areas or units in an organization
The way hourly employees report the hours they work for payroll purposes is an example of:
a process
what is a business process
a series of steps taken to achieve a desired outcome or goal
A customer relationship management system is ________.
a system for managing all the interactions with the customer, from lead generation to customer service
The scalability of a software product is defined as the:
ability to be easily expanded to manage workload increases.
According to this video, a strategy you can use to resolve paradoxes (contradictory ideas and values) is the following:
account for context - clarify levels of analysis (individual, society, organization, etc.) - account for time - introduce new ideas that can resolve the paradox
Which of the following is an example of a security threat resulting from malicious human activity?
an employee who intentionally destroys data or other system components
Net neutrality affects individuals, business, and Internet Service Providers. Categorize the arguments SUPPORTING net neutrality and the arguments AGAINST net neutrality. All arguments are used.
arguments supporting net neutrality - No exclusion of content. Everything on the internet is available to everyone. - No additional costs for content type whether you are streaming a video or gaming online. - Small creators, such as YouTube channel creators, have a level playing field of having their content viewed. - Freedom of Expression. ISPs won't censor the Internet. - Startups have a greater chance of being successful with a web presence and having their content viewed. arguments against net neutrality - If all Internet traffic is treated equally, it's easier for illicit (offensive, dangerous, illegal) content to be widely available and more difficult to remove. - No new infrastructure. If ISPs can't charge more for their services, they will have less incentive and fewer resources to invest in their infrastructure. - From the perspective of ISPs, net neutrality does not allow them to prioritize some Internet services to provide better service to customers. - Tiresome regulations. Under net neutrality, the FCC must monitor the ISPs' compliance with these rules. This includes submitting reports twice a year, which can become costly for ISPs of any size. - From the perspective of ISPs, net neutrality allows Internet service firms (e.g., Google, Netflix, etc.) to "free ride" and earn huge profits by using ISP networks and infrastructure without funneling any of these profits to the ISPs that provide this infrastructure.
For some industries where the products are commodities, the Internet has afforded customers increased price transparency of these products, thereby increasing the __________
bargaining power of buyers
Technologies that measure and analyze human body characteristics for identification or authentication are known as ____________.
biometrics
Hordes of surreptitiously infiltrated computers, linked and controlled remotely, are known as zombie networks or:
botnets
Neural networks are statistical techniques commonly used in machine learning that are modeled off the following human biological system:
brain
When an organization creates its social media awareness and response team, it should:
create an interdisciplinary team from different functional areas, such as public relations, legal, marketing, customer support, human resources, and IT, among others
An attack on the U.S. power grid by terrorists or a foreign power is indicative of:
cyberwarfare
Information silos arise as a result of ________________.
data being isolated in separated systems
Social media can be a key driver of "________" media, where consumers who are enthusiastic about products and services can help spread the word through social media and word of mouth.
earned
Who would be included as an employee cybersecurity threat?
employees who sometimes do not follow security practices
Match the following components in this web address (https://en.wikipedia.org/wiki/Web_address) with its description.
en -host name indicating the computer hosting the website wikipedia.org -domain name with ".org" being the top level domain wiki -the path that maps to the folder location where the file is stored under the filename "Web_address" https -application transfer protocol used in the Web address and stands for "hypertext transfer protocol secure."
google is the world's largest provider of cloud computing services
false
What is the root cause of almost every data breach?
human breach
Which of the following is a benefit of in-house hosting (as compared to cloud hosting)?
in depth visibility of security and disaster preparedness for business continuity
In any organization,
information security is everybody's responsibility
Which of the following is a FALSE statement about information system security?
information system security is fundamentally a technology problem.
Drag/drop the hardware examples to their corresponding function. It's possible some examples do not match any category and will remain unsorted.
input -microphone -sensors and smart devices -touchpad output -monitor or screen -speaker -printer processing -central processing unit -microprocessor storage -flash memory -hard drive -random access memory (RAM)
the major functions of computer hardware are
input, output, processing, and storage
According to this video and your textbook, a popular type of programming software that programmers use to write code is called a(n):
integrated development environment
According to the lecture videos, ERP systems focus primarily on integrating business processes _____________ to the organization, whereas SRM, SCM, and CRM tend to focus on integrating business processes _________ to the organization
internal, external
According to lecture videos and your textbook, switching costs can help reduce some of Porter's five forces so that firms can remain competitive. Drag/drop the correct descriptions to match the corresponding source of switching costs.
learning costs - Switching technologies may require an investment in learning a new interface and commands information and data - Users may have to reenter data, convert files or databases, or even lose earlier contributions on incompatible systems financial commitment -Can include investments in new equipment, the cost to acquire any new software, consulting, or expertise, and the devaluation of any investment in prior technologies no longer used contractual commitments - Breaking contracts can lead to compensatory damages and harm an organization's reputation as a reliable partner search costs -Finding and evaluating a new alternative costs time and money loyalty programs -Switching can cause customers to lose out on program benefits. Think frequent purchaser programs that offer "miles" or "points" (all enabled and driven by software).
According to the lecture videos, there is _______________ in the telecommunications industry (e.g., Verizon, AT&T) in the United States.
low threat of new entrnats
According to this video, because our brains can not process all of the information it receives, we're wired to:
make cognitive shortcuts using past experiences to make assumptions
The domain name service (DNS) is a distributed database that allows users to communicate with other computers by:
mapping host and domain names to IP addresses of computers.
The actual coding or programming of software begins in the following SDLC phase:
none of these -design -requirements
A significant portion of Facebook's underlying technical infrastructure consists of ______________, which is software that is typically free and whose code can be accessed and potentially modified by anyone.
open source software
According to Michael Porter, the reason many firms perform poorly compared to their competitors is because they've defined themselves according to_________________ (performing the same tasks better than rivals) rather than__________________ (performing different tasks than rivals or the same tasks in a different way).
operational effectiveness, strategic positioning
According to this video, which statement is a true statement about diversity and/or inclusion?
organizations currently struggle more with inclusion than they do with diversity, though they still fall behind with diversity, too.
In cloud computing, resources are said to be "pooled" because ________.
organizations share the same physical hardware through virtualization
According to the textbook, which of the following is NOT a strategy used by a firm to achieve and maintain competitive advantage?
packaged software
Drag and drop the definitions and examples to the most relevant information systems component
people individuals who interact with information systems and are impacted by these systems, employees and customers process purchasing a product, steps taken to achieve desired goals hardware physical parts of the technology that you can touch, memory card software instructions that tell the hardware what to do, web browser data raw figures and facts, mortality rate
According to the lecture videos, what contributes the most to the risk and challenges of implementing ERP systems?
people and processes
In the lecture videos, the Prada example shows that copying technology alone is not a guarantee of success. The firm would have benefited from a holistic understanding that Information Systems is comprised of the following components:
people, processes and technology (hardware, software, and data)
Two of the biggest considerations in the management of the facilities of a large data center include:
power and cooling
Drag/drop the value chain components to their corresponding level of activity: primary or secondary
primary components/activities -Support—service, maintenance, and customer support -Inbound logistics—getting needed materials and other inputs into the firm from suppliers - Outbound logistics—delivering products or services to consumers, distribution centers, retailers, or other partners - Operations—turning inputs into products or services - Marketing and sales—customer engagement, pricing, promotion, and transaction secondary components/activities -Technology / research and development—new product and process design - Human resource management—recruiting, hiring, training, and development - Procurement—sourcing and purchasing functions - Firm infrastructure—functions that support the whole firm, including general management, planning, IS, and finance
The information systems component "processes" is also referred to as:
procedures
According to this video and your textbook, what provides a set of commands, syntax, standards, and instructions for writing computer software?
programming languages
in the United States, Section 230 of the Communications Decency Act defines social media companies like Facebook as a(n):
provider of content but not a publisher of content, releasing social media companies from liability for the user-generated content posted on their platforms.
Data is oftentimes considered a defensible source of competitive advantage; however, advantages based on capabilities and data that others can acquire will be ____________
short lived
According to this module, one of the conditions that has not been widely supported in existing research to establish a causal link between social media use and addictions or other mental health conditions is the following:
social media use precedes the development of addictions or other mental health conditions
social media has been used for the following
social protests, word-of-mouth marketing, reputation management, recruiting, and spreading fake news
According to this video, software projects often fail due to weaknesses in:
soft skills
open source software is
software that provides the source code for anyone to copy and use.
_________ controls the way that the computer systems resources are allocated, functions, and provides a means by which end users can interact with the computer.
the operating system
A firm should be wary of adopting software packages or outsourcing portions of its value chain that are proprietary and a source of competitive advantage.
true
According to this module, some social media researchers express concerns that social media use is re-wiring our brains to shorten our attention spans, while other social media researchers caution that there is insufficient research to support these claims.
true
Raspberry Pi is a low cost, compact computer that can fully run an operating system.
true
The following SDLC phase includes structured testing of the software for quality assurance:
verification
A(n) _____ is someone who uncovers computer weaknesses and reveals them to manufacturers or system owners, without exploiting these vulnerabilities.
white hat hacker
What is a TRUE statement about database management systems (DBMS)?
-Although the DBMS is considered application software, using the layer cake analogy, it's useful to think of an organization's database systems as layered on top of the operating system layer but under the (enterprise) application layer. -A DBMS is sometimes referred to as database software, which is software for creating, maintaining, and manipulating data.
Which statements are TRUE about the Disney MagicBand? Select all that apply.
-Planning, designing, and implementing the MyMagic+ system involved many stakeholders with different opinions and agendas, which resulted in conflict among stakeholders, underscoring the importance of learning about "people" in information systems. -Thanks to Moore's Law, while Disney initially incurred manufacturing costs of $35 per MagicBand, these costs are now below $5. -The MagicBand allows Disney to collect various real-time data that it can use to personalize and improve services for guests. -MagicBand and supporting systems have increased revenues from guest spending and boosted efficiencies that resulted in serving thousands of additional guests per day.
Which statements are TRUE regarding the reasons managers should pay attention to Moore's Law?
-The advance of powerful, cheap computing often comes with a special kind of price elasticity that enables whole new markets to open up. -Ideas that may be impossible today due to power, capacity, or cost reasons may be possible in the future.
According to section 15.5 of your textbook, what is a characteristic of "data quality"?
-The data is accurate, clean, complete, and reasonably free of errors. -The data can be trusted.
Which statements are FALSE regarding the reasons managers should pay attention to Moore's Law?
-The rising power of minicomputers mitigates the need of outsourcing in many firms. -Cost decreases often encourage governmental regulation of suppliers.
According to this video, generational theory proposes the following ideas.
-a generational cohort shares salient socio-culture and historical events that shape its members attitudes and dispositions throughout their lives -major experiences and events shared by a generational cohort leave distinctive imprints on the cohort, manifested in espoused beliefs, values, and behaviors. this is especially true when these events are experienced at salient early stages of life, childhood through early adulthood -generational theory helps explain how each generation has shared traits that are unique compared to other generations
In this video, the speaker has made the following point(s) about confirmation bias.
-confirmation bias can inhibit and blind us to alternative solutions to problems -the halo and horns effects can be reinforced by confirmation bias -a study found that people spent over 36% more time reading articles that confirmed their beliefs -confirmation bias is when we look for evidence that supports and ignore evidence that contradicts our beliefs
According to lessons in this module, the following solution(s) can help us overcome our unconscious biases.
-embed ourselves in diverse networks and embrace inclusive relationships -seek out and be open to contradictory and differing views -set objective criteria to evaluate information
What is a type of application software?
-enterprise software -desktop/personal software
In this video, the speaker offered the following suggestion(s) to overcome the cognitive biases covered in this video
-evaluate all evidence objectively -slow down your thinking -be open to having different opinions -seek out contradictory differing views
Select the statements made about prototype bias in this video.
-prototype bias happens when we have a preconceived notion of who we think will be right for a particular role based on stereotypes -prototype bias is based on who we've seen succeed in the past and can influence who we think will succeed in the future
In this video, what is recommended to overcome prototype bias?
-set objective criteria -share they "why" behind your decisions -don't make assumptions based solely on your idea fit
What are some of the novel technologies presented in Chapter 5?
-smart license plate that contacts emergency services when a car crashes -smart umbrella that receives weather reports wirelessly and flashes when rain is expected -smart diaper that sends a tweet when the sensor detects moisture -smart billboards that detect people's demographics as they walk by in order to change its advertising to target these demographics
According to the lecture videos, which statements are TRUE regarding spreadsheets?
-spreadsheets are useful for analyzing data -Spreadsheets are not an effective tool to use to store large amounts of organizational data long term for decision making.
According to this video, findings from studies on prototype bias have revealed the following:
-the exact same resumes with more black-sounding names received 50 percent fewer call backs than those same resumes with traditional white names -participants in a prototype bias study who thought they were the most unbiased ended up being the most biased -individuals often have prototypes for the people they believe would succeed in a job and may unconsciously change their criteria to help those people get a job
The assigned chapter discusses various sources of internal and external data that an organization collects, stores, and analyzes for strategic decision making. Which is an example of a data source discussed in the chapter?
-transaction processing systems -call center conversations -social media -focus groups -enterprise systems -surveys -data aggregators (firms that collect and resell data) -sensor data -loyalty cards
According to this video, which statement is a true statement about status quo bias?
-user resistance to new technology implementations in organizations is often due to status quo bias -people often prefer the status quo because it is comfortable and efficient -status quo bias is people's preference for doing things the way they always have -status quo bias makes it harder for people to adapt to new ways of doing things
According to the video, by accepting that blind spots exist, we can choose to do something about our own blind spots. The video offers the following suggestion(s) on how we can challenge our blind spots:
-using different perspectives -having inclusive relationships -being embedded in diverse networks
According to the lessons in this module, our unconscious mind can determine:
-where we sit (e.g., in a business meeting), -who we turn to for advice, -who we choose to help, -who we eat lunch with
According to comments mentioned in this video, unconscious biases in organizations can impact:
-who gets hired -who gets promoted -who is assigned to leadership positions -who is assigned to teams
halo effect
-with the halo effect, we continue to favor someone even if this person demonstrates negative traits -the halo effect is a cognitive bias that happens when we favor someone based on a positive first impression
According to this video, our brains are overloaded with 11 million pieces of information every second, but we can only process about ______ of them.
40
Of the statements below, which is the most comprehensive definition of information systems?
Information systems are a combination of people, processes, and technology that work together to achieve goals.
Why is it important to find responsible e-waste recycling facilities that do not sell e-waste illegally to foreign countries?
The e-waste that's sold typically goes to developing countries, where it causes significant environmental harm and health risks.
According to lessons from this module, one reason that people possess unconscious biases is the following:
The human brain receives millions of pieces of information each second and can only process a small fraction of this information, so it relies on mental shortcuts to make decisions.
big data
The massive amounts of data available to today's managers, often unstructured and are too big and costly to easily work through use of conventional databases
data mining
The process of using computers to identify hidden patterns and to build models from large data sets
According to the textbook, which of the following is true of United States environmental legislation regarding e-waste and recycling standards?
There is no U.S. federal legislation signed into law covering e-waste.
Drag/drop the descriptions to the correct category (advantages or disadvantages of open source software), according to your textbook and the video lectures. It's possible some descriptions do not match a category and will remain unsorted. Each category may have a different number of correct answers. Category
advantages of open source software -cost of software -security -reliability -scalability -time on market disadvantages of open source software -availability of support -control over development and quality -cost of support services and add-ons
According to the textbook, after the initial problematic roll-out of the Healthcare.gov app, a team of seasoned technologists and committed developers worked on fixing the system using a(n) ____________ methodology and led the web app to exceed enrollment projections.
agile
According to Chapter 1, the following technologies are creating radical shifts in different industries and business disciplines:
artificial intelligence, machine learning, cloud computing, and 3D printing
Up until this point of the video, which disabilities have been presented by Google employees?
blindness and autism spectrum disorder
A computer processor is considered the of the ______________ computer because it processes information and carries out commands.
brain
According to the textbook, due to widespread access to simple, affordable handheld devices in East Africa's Somaliland, the country's economy is fast becoming:
cashless
_______ currently has the most internet users compared to any other country
china
Drag/drop the definitions to the corresponding approaches to computing discussed in Chapter 5.
cloud computing -refers to replacing traditional computing resources with services provided over the Internet grid computing -special software is installed on several computers enabling them to work together on a common problem. massively parallel processing -a technique in which computers are designed with many microprocessors that work together, simultaneously, to solve problems cluster computing -connecting server computers via software and networking so that their resources can be used to collectively solve computing tasks
Based on lessons in this module, drag/drop the scenario/example to the type of bias it best represents.
confirmation bias A member of a project team believes the team is using an inefficient methodology to execute and manage the project. To prove this point, the team member seeks out and summarizes information that verifies the flaws associated with the chosen methodology and ignores any evidence to the contrary. The team member presents this information to the project manager's supervisor as justification to change the team's methodology. status quo bias An organization is recruiting a new CIO (Chief Information Officer) and is considering three candidates. All candidates have exceptional qualifications and leave positive first impressions on the organizational employees they meet during the interview process. In a late stage of the interview process, Candidate A proposes the adoption of a cloud-based enterprise system that would help the organization streamline their processes and better leverage organizational data for decision making, while Candidates B and C propose working within the practices that are already in place. Several employees do not wish to learn how to use a new system and change the way they do their jobs, even if doing so would improve organizational outcomes, so they express strong disapproval of Candidate A in favor of Candidates B and C. halo effect Three candidates are being considered to fill one spot on a management team that will lead a major organizational project. The team's project lead does not personally know all three candidates but observes that one candidate stands out as being the most physically attractive. Despite this candidate having the most inferior credentials of the three candidates, the hiring manager feels most inclined to recruit this candidate to the management team. Horns effect A recruiter interviews a candidate who appears reserved and shy. Based on this first impression, the recruiter assumes the candidate will be incapable of effectively communicating with clients and connecting with other employees. Despite the candidate having letters of recommendation that highlight the candidate's effective communication and teamwork skills, the recruiter continues to believe the candidate lacks skills in these areas.
The below example is a type of business intelligence and analytics tool called a(n) _______________. (larimer county covid numbers)
dashboard
Drag/drop the definitions/descriptions to their corresponding concept. All answers will be sorted, with none left unsorted. Each category should have an equal number of correct answers.
data -raw facts and figures -comes before information and knowledge information -data presented in context so that it can answer a question or support decision making -inferred from data and organized to have useful meaning knowledge -combined with information to make stronger decisions -insight derived from experience and expertise
Chapter 1 covers the following novel application(s) of drone technology. Select all correct answers.
delivering medical supplies to rural, underserved communities crop surveying in farming that can inform ways to improve crop yields
Drag/drop the definitions and examples to the corresponding type or category of software. It's possible some definitions/examples do not match any software type/category and will remain unsorted.
desktop software -presentation software -computer games -social media apps -applications installed on a personal computing device, typically supporting tasks performed by a single user enterprise software -applications that address the needs of multiple users throughout an organization or work group -enterprise resource planning -supply chain management -customer relationship management
Based on lessons in this module, drag/drop each description or statement to the category it best represents.
diversity -Understanding and valuing people who represent differences in races, genders, disabilities, sexual orientations, national origins, educational backgrounds, experiences, skills and knowledge (to name some characteristics) -Organizations have made more progress in this area. inclusion -Enacting practices that support respectful and collaborative work environments and encourage a sense of belonging and acceptance among all employees -Organizations have made less progress in this area.
According to the lecture video, "Overview of Artificial Intelligence," one of the differences between data and information is the following:
facts versus risk reduction
Which term refers to an expansion of the scope of a software project?
feature creep
Drag/drop the descriptions to their corresponding wave of computing (according to the textbook). The evolution of each wave is driven by Moore's Law.
first wave (1960s) -when there were massive mainframe computers that only large corporations and governments could afford second wave (1970s) -when mini-computers became mainstream in organizations because they were affordable third wave (1980s) -when PCs became more common in organizations fourth wave (1990s) -when Internet computing became more mainstream in organizations fifth wave (2000-2010) -when mobile phones became more commonplace, leading to a smartphone revolution sixth wave (2010-current) -when technologies became so fast and inexpensive that they are considered pervasive and ubiquitous
which information systems components can be combined into a broader category called "technology"? select all answers that apply.
hardware, software, data
What is the test mentioned in this video that helps to identify people's potential unconscious biases across a variety of dimensions?
implicit association test
The_________________ controls the computer hardware and how computer resources are allocated and provides a means by which end users can interact with the computer.
operating system
According to the video, which contributes the most to technology implementation failures in organizations?
people
In one of the videos, the guest speaker Greg Watkins referred to a stereotype that people who are "techies" or who are drawn to anime and video games are perceived to be most suitable for information systems careers. This stereotype is an example of: (choose the best answer choice)
prototype bias
According to this module, a digital native is:
someone who grew up in a time when adoption and diffusion of digital technologies, such as the Internet, was already mainstream.
According to your textbook, a scrum team repeats or reiterates its efforts in ____________, which are short time-boxed increments, each increment usually lasting 1-6 weeks.
sprints
Drag/drop the descriptions and examples to their best matching corresponding category of data. All answers will be sorted, with none left unsorted. Each category should have an equal number of correct answers.
structured data -data mart -data warehouse -relational database -SQL -data is stored in conventional formats unstructured data -social media -approximately 80 percent of corporate data -sensor data -email -more often associated with "big data"
Regarding Internet access speeds, the United States currently is not in the top 25 ranking for nations' mobile download performance.
true
Tech products are highly price elastic, meaning consumers buy more products as they become cheaper.
true
Drag/drop the descriptions and examples to their corresponding type of storage. It's possible some descriptions or examples do not match any category and will remain unsorted.
volatile memory -short-term storage -Requires power to retain stored data or information -RAM nonvolatile memory -Does not require power to retain stored data or information -Solid State Drive -Long-term storage
The ______________ method is a relatively linear, sequential approach to software development, while the ______________ method takes an iterative approach to software development, with a goal of more frequent product rollouts and constant improvement across smaller components of the larger project.
waterfall, agile, development