CIS EXAM 2

Ace your homework & exams now with Quizwiz!

Big Data is commonly characterized by four labels. Which of these labels describes data that is of varying levels of quality and accuracy. Big Data is often uncertain, contains biases, noise and abnormalities. a) Veracity b) Volume c) Variety d) Velocity

a) Veracity

Which of the following are Availability characteristics and techniques? (Select all that apply, omit those that do not) maintaining the expected state of our information or systems involves a set of rules limit access to Information ensures that the information or systems are reliably accessible to those with permissions the assurance that information is trustworthy and accurate use techniques such as Denial of Service attacks to render web services unavailable

ensures that the information or systems are reliably accessible to those with permissions use techniques such as Denial of Service attacks to render web services unavailable

Match the terms with their charcteristics and description.(Not all options are used, some options apply to multiple terms.) An ethical issue that focuses on who owns information about individuals. Focuses on how infromation can be sold and exchanged. The act of conforming, acquiescing, or yielding infromation Addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity. 1. Information Secrecy 2. Information Compliance 3. Information Governance 4. Information Management 5. Information Property

5 5 2 1

The Systems Thinking ideas of Input → Process → Output are fundamental to designing, developing and maintaining computer systems. In a Point-of-Sales (POS) system at a grocery store, which of the following is an input? (Select all that apply, omit those that do not) Sales Receipt Receiving customer payment Scanning customer's item Calculating total of tax Purchase History Report

Receiving customer payment Scanning customer's item

Which of these functions in excel is best suited for extracing a substring from within a long text message? a) LEN b) LEFT c) TRIM d) SUBSTITUTE e) TEXTJOIN

b) LEFT

Match the terms with associated concepts. Allows people to exchange secret messages without ever having met to exchange a key Encryption that uses a pair of keys, one called a public key and the other a private key. An encoded value that uniquely represents or identifies a message. It serves as a digital fingerprint of the message. Using the same key to encrypt and decrypt a message. 1. Asymetric key encrption 2. Symetric key encryption 3. One-way encryption

1 1 3 2

Match the type of Management Information System with the types of decisions supported by each. Structured decisions Semistructured decisions Unstructured decisions 1. Transaction Processing System (TPS) 2. Decision Support Sytem (DSS) 3. Executive Information System (EIS)

1 2 3

The six-step Decision Making Process described in the eBook is a general process that can be made for all manner of problem solving (including solving problems in the instructions you give Excel). Order the steps of Decision Making Process.

1 Problem Identification 2 Data Collection 3 Solution Generation 4 Solution Test 5 Solution Selection 6 Solution Implementation

Match each concept with its characteristics. Prejudice bias Sample bias Measurement bias 1. Occurs when there is a problem with the data collected that skews the data in one direction. 2. A result of training data that is influenced by cultural or other stereotypes. 3. A problem with using incorrect training data to train a machine

2 3 1

Match the organization levels with the scope of focus of decision making at that level. Managerial Level Operational Level Strategic Level 1. Cross company 2. Crossfunctional 3. Functional

2 3 1

Earlier this semester the progression of Data to Knowledge was described as a four level progression: Data --> Information --> Business Intelligence --> Knowledge. Match the Organization Layer with the type of data prominent in the decision making taking place at that level. ____ Operational Level ___ Strategic Level ___ Managerial Level 1. Data 2. Information 3. Business Intelligence 4. Knowledge

2 4 3

Match the type of Management Information System with the company level where they are primarily used. Strategic level Operational level Managerial level 1. Transaction Processing System (TPS) 2. Decision Support Sytem (DSS) 3. Executive Information System (EIS)

3 1 2

Match the concepts with their characteristics. Where multiple terms seem to apply broadly, choose the term with the most specific best fit. These systems learn (progressively improve performance) to do tasks by considering examples. An method to enable computers to understand concepts in the environment. The computer uses sensors and algoritms to position the users's eyes within an artificial environment. As the user's head moves, the graphics react accordingly. A type of computer systems that couples algorithms and data to discover patterns and trends that make predictions. Computer-simulated environment that can be a simulation of the real world or an imaginary world. Uses a mathematical method to handle imprecise or subjective information to express comlicated concepts in a form that the computer can apply rules with confidence. 1. Virtual Reality 2. Machine Learning 3. Neural Networks

3 2 1 2 1 3

Match the CIA triad to the methods and techniques used to ensure them: 1. Confidentiality 2. Integrity 3. Availability 4. Compliance preparing for fast disaster recovery with backups and business continuity plans promptly applying system upgrades and patches Two-Factor Identification Checksums (hashes) Biometric Verification File permissions

3 3 1 2 1 2

Match the terms with their definitions. a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents an exclusive right to make, use, and sell an invention and is granted by a government to the inventor the unauthorized use, duplication, distribution, or sale of copyrighted software counterfeit software that is manufactured to look like the real thing the legal protection afforded an expression of an idea 1. Copyright 2. Counterfeit Software 3. Digital Rights Management 4. Intellectual Property 5. Patent 6. Pirated Software

3 4 5 6 2 1

Match the terms with their associated definitions and characteristics. A task performed to verify that seperate systems can work together, passing data back and forth correctly. Detail the steps a system must perform along with the expected result of each step. Making system changes to reduce the chance of future system failure. Making system changes to repair known design flaws, coding errors, or implementation issues 1. Preventive maintenance 2. Corrective maintenance 3. Test conditions 4. Integration testing

4 3 1 2

Match the following terms of Artificial Intelligence to their descriptions (not all choices are used) an AI technique that mimics the evolutionary, survival-of-the-fittest processes to generate increasingly better solutions to a problem _ area of computer science that emphasizes the creation of intelligent machines that work and react like humans _ Computing systems inspired by biological neural networks _ method of data analysis that automates data model building 1. Artificial Intelligence 2. Machine Learning 3. Neural Networks 4. Virtual Reality 5. Genetic Algorithm

5 1 3 2

Match the terms with their charcteristics and description. (Not all options are used. Some options apply to multiple terms.) Focuses on how infromation can be sold and exchanged. Ensures that organizations have the types of data/information required to function and grow efficiently. Addresses the protection of data from unauthorized disclosure and confirmation of data source quthenticity. An issue that focuses on who owns information about individuals. 1. Information Secrecy 2. Information Compliance 3. Information Ethics 4. Information Management 5. Information Property

5 4 1 5

Which of the following provides an accurate definition of systems thinking? A way of capturing information that returns to its original transmitter and modifies the transmitter's actions. A way of implementing a system that moves information about products, across the company to facilitate decision making and problem solving. A way of monitoring the rate at which goods and services are produced based upon total output given total inputs A way of monitoring the entire system by viewing multiple inputs being processed or transformed to produce outputs while continuously gathering feedback on each part.

A way of monitoring the entire system by viewing multiple inputs being processed or transformed to produce outputs while continuously gathering feedback on each part.

What is a project manager? Involves graphically representing the processes that capture, manipulate, store, and distribute information between a system and its environment. A formal, approved document that manages and controls the entire project. Describes the business need (the problem the project will solve) and the justification, requirements, and current boundaries for the project. An individual who is an expert in project planning and management, defines and develops the project plan, and tracks the plan to ensure that the project is completed on time and on budget.

An individual who is an expert in project planning and management, defines and develops the project plan, and tracks the plan to ensure that the project is completed on time and on budget.

Which phase of the SDLC gathers business requirements? Design. Test. Implementation. Analysis.

Analysis.

(Select Which of the following are examples of Types of Machine Learning? (select all that apply, omit those that do not) a) Underfitting. b) Reinforcement Learning c) Overfitting. d) Case-based reasoning. e) Unsupervised Machine Learning f) Supervised Machine Learning correct answers)

B)Reinforcement Learning E)Unsupervised Machine Learning F)Supervised Machine Learning

In terms of system thinking, what controls to ensure correct processes? Process. Feedback. Output. Input.

Feedback

Which of the following Excel Formula Auditing capabilities help gather data and diagnose problems with excel formulas and functions?(Select all correct answers) a) Trace Dependents b) Data Validation c) Show Formulas d) Trace Precendents e) Text to Columns

Trace Dependents Show formulas Trace Precendents

Which of the following are associated with Public Key Encryption (PKE). a) Assymetric Encryption b) Symmetric Encryption c) One-Way Encryption. Encrypted data serves to uniquely identify a message and cannot be decrypted. d) Involves a mathematically linked pair of keys. Data encrypted with one key can be decrypted using the partner key.

a) Assymetric Encryption d) Involves a mathematically linked pair of keys. Data encrypted with one key can be decrypted using the partner key.

Which of the following are categories of Data Analytics? a) Diagnostic: to describe reasons why something happened. b) Predictive: to describe what could happen in the future. c) Dialectic: to identify contradictions d) Antagonistic: to assess unfriendly behavior e) Prescriptive: to shuggest how to proceed in the future. f) Descriptive: to describe what happened in the past.

a) Diagnostic: to describe reasons why something happened. b) Predictive: to describe what could happen in the future. e) Prescriptive: to shuggest how to proceed in the future. f) Descriptive: to describe what happened in the past.

Which of the following characterize Big Data? a) High Veracity b) Overfitting c) Generated at High Speed d) Huge Volume e) Variance bias f) Immense Variety

a) High Veracity c) Generated at High Speed d) Huge Volume f) Immense Variety

What is the difference between pirated and counterfeit software? a) Pirated is the unauthorized use, duplication, distribution, or sale of copyrighted software, where counterfeit is software that is manufactured to look like the real thing and sold as such. b) Counterfeit is intangible creative work, where pirated is authorized use, duplication and distribution of software. c) Pirated is stolen software used to hack into a company's classified material, where counterfeit is a way to pay the owner of an invention. d) Counterfeit is the unauthorized use, duplication, distribution, or sale of copyrighted software, where pirated is software that is manufactured to look like the real thing and sold as such.

a) Pirated is the unauthorized use, duplication, distribution, or sale of copyrighted software, where counterfeit is software that is manufactured to look like the real thing and sold as such.

Digital Dashboards offer many analytical capabilities. _________ rotates data to display alternate representations of the data. a) Pivot b) Slice-and-Dice c) Model d) Drill-Down e) Consolidation

a) Pivot

Which of the following approaches will be important strategies to manage ethical questions of Artificial Intelligence a) Push responsibilities back on AI designers b) Developing a framework of rules and regulations through hard laws c) Giving consumers individual rights of complaint d) Having consumers reading terms & conditions e) Allowing consumers to choose not to participate

a) Push responsibilities back on AI designers b) Developing a framework of rules and regulations through hard laws

Infographics include many types of graphic representations of data. A _________ is used for data that changes continuously, such as a stock price. a) Time-series chart b) Pie Chart c) Histogram d) Bar Chart e) Pivot

a) Time-series chart

A machine learning approach that transfers knowledge from simple machine learning tasks to more difficult tasks. This method could integrate results from many earlier machine learning activities as a step towards AI that can solve multiple tasks. a) Supervized Learning b) Reinforcement Learning c) Transfer machine learning d) Unsupervized Learning Answer

c) Transfer machine learning

Which of the following describes the Solution Selection stage of the Decision Making Process? (Select all that apply, leave others blank.) a) If the solution does not solve the problem, then the process begins again. b) Gather problem-related data, in particular facts and not opinions. c) Evaluate solutions in terms of feasibility & suitability. d) Choose the solution that best solves the problem. e) Define the problem as clearly and precisely as possible.

d) Choose the solution that best solves the problem.

_________ is an individual item on a graph or chart. a) Dataset b) Pivot c) Fact d) Data point e) Model

d) Data point


Related study sets

Chapter 12 - nurtition, NUtrition Chp 13, exam 11-13

View Set

CHAPTER 12 BJU AMERICAN GOVERNMENT

View Set

NRS104L Exam #2: PrepU Practice Questions ALL Chapters

View Set

Solving Quadratic Equations Unit Test 100%

View Set

SCM 186: Chapter 12 Inventory Connect

View Set