CIS Final Exam
Knowledge workers
advise middle managers
Many organizations have implemented corporate portals for which of the following reasons?
all of the above
Networks enable which of the following applications?
all of the above
Refer to IT's About Business 5.4: Hospital Improves Patient Care with Data Warehouse: A single source of all patient data, accessible to multiple hospitals will have the following benefit
all of the above
Which of the following are advantages of computer networks?
all of the above
The costs of delivering products in the ____ channel are much higher than delivering products in the _____ channel.
physical, digital
In a relational database, every row represent a(n): _____.
record
Passwords and paraphrases are examples of:
something the user does
Voice and signature recognition are examples of:
something the user does
Biometrics are an example of:
something the user is
Enterprise resource planning systems
use a common database for all functional areas.
What are three distinct characteristics that distinguish big data from traditional data?
volume, velocity, and variety
All information system's _____ is the possibility that the system will be harmed by a threat.
vulnerability
In a process called _____, a company allows nothing to run unless it is approved, whereas in a process called ____, the company allows everything to run unless it is not approved.
whitelisting, blacklisting
Which of the following is not an example of the growing initiative called green IT?
Building computer applications that use less energy.
_____ conveys understanding, accumulated learning, and expertise as they apply to a current problem.
Knowledge
____ is a process that helps organizations identify, select, organize, disseminate, transfer, and apply expertise that are part of the organization's memory and typically reside inside the organizations in an unstructured manner.
Knowledge management
Data are sent through a fiber-optic cable by a(n) ____.
Laser
The Bodymetrics body scanner is best characterized as an example of:
Mass customization
The function of ___ is to convert digital signals to analog signals and vice-versa.
Modems
_____ issues involve collection, storing, and disseminating information about individuals.
Privacy
Managing purchasing is an example of a(n):
Production Business Process
Data dictionaries perform all of the following functions except:
Providing information on each record.
The ______ ethical standard states that an ethical action is the one that best protects and respects the moral rights of the affected parties.
Rights
Which of the following statements is correct?
The absence of consistent international privacy and security laws has led to a complex global legal framework.
Which of the following is not an example of business- IT alignment?
The company views IT as a way to support the business but not as a way to create new revenue streams.
The data in a data warehouse have which of the following characteristics?
They are organized by subject.
Which of the following is not a benefit of being an informed user of IT?
Working on the IT side of the organization.
A protocol is:
A standard set of rules and procedures for the control of communications in a network.
A pharmaceutical company's research and development plan for a new class of drugs would be best described as which of the following?
A trade secret
You have moved into a different apartment, but your electricity bill continues to be sent to your old address. The Post Office in your town has which problem with its data management?
Data inconsistency
Not including alphabetic characters in a Social Security Number field is an example of:
Data integrity
_____ occurs when applications cannot access data associated with other applications.
Data isolation
The process of profiling:
Decreases individual privacy.
Which of the following is not a Section Reference 1 by organizations to business pressures?
Delay releases of innovated products.
Which of the following statements is correct?
Determining and enforcing privacy regulations can be difficult.
Which strategy for competitive advantage involves offering different products, services, or product features?
Differentiation
In TCP/IP, IP is responsible for:
Disassembling and reassembling of packets during transmission.
Which of the following is not a role that information systems play in businesses processes?
Establish Standards
Business activity monitoring is a type of scheduled reporting.
False
Each functional area within an organization has only one application.
False
Robots can handle unfamiliar situations.
False
A(n) ___ connects two or more devices in a limited geographical area.
Local area network
____ are software programs that hide in other computer programs and reveal their designed behavior only when they are activated.
Logic bombs
Which of the following statements concerning the management of information resources is not true?
Managing mainframes has become more difficult.
Collecting sales tax is an example of a(n):
Marketing Business Process
Internet service providers connect to one another through ____.
Network access points
Which of the following statements concerning technology pressures on modern businesses is true?
New technologies offer alternative service options
Privacy advocates prefer which model of informed consent?
Opt-in
A ___ attack uses deception to fraudulently acquire sensitive personal information by masquerading as an official e-mail.
Phishing
Which of the following statements concerning the difficulties of protecting information resources is not correct?
Rapid technological changes ensure that controls are effective for years.
______ means accepting the consequences of your decisions and actions.
Responsibility
_____ is the process in which an organization assesses the value of each asset being protected, estimates the probability that it will be compromised, and compares the probable costs of an attack with the costs of protecting the asset.
Risk analysis
In _____, the organization takes concrete actions against risks.
Risk mitigation
In ______, the organization purchases insurance as a means to compensate for any loss.
Risk transference
A ____ sends messages through several connected LANs or to a wide-area network.
Router
Which of the following is(are) designed to use your computer as a launch pad for sending unsolicited e-mail to other computers?
Spamware
Refer to IT's About Business 6.2: A New Search Engine. Which of the following statements is true about the Summly search engine?
Summly uses AI tools like genetic algorithms to generate search results.
BitTorrent uses a process called _____, which eliminated file-sharing bottlenecks by having everyone share little pieces of a file at the same time.
Swarming
Which of the following is a digital transmission system that defines circuits that operate at different rates, all of which are multiples of the basic 64 Kbps used to transport a single voice call?
T-carrier system
As a manager in your company, you expect to retrieve ___ from operation systems and present it as ______ to your boss, who will react based on his ____.
data, information, knowledge
Buyer power is ____ when buyers have many choices from whom to buy and ____ when buyers have few choices.
high, low
For most companies, the Web ____ the threat that new competitors will enter the market by _____ traditional barriers to entry.
increases, decreasing
An organization's ____ consists of the physical facilities, IT components, IT services and IT management that will support the entire organization.
information technology infrastructure
A database management system is primarily a(n) ____.
interface between applications and a database
The most overlooked people in information security are:
janitors and guards
In a database, the primary key field is used to ____.
uniquely identify a record
Which of the following is not an ethical question related to IT?
Accuracy
_____ occurs when various copies of the data agree.
Data consistency
____ is a feature that must be offered by a competing organization in order to survive in the marketplace.
An entry barrier
_____ controls are concerned with the user identification, and they restrict unauthorized individuals from using information resources.
Access
_____ issues involve who may obtain information and how much they should pay for this information.
Accessibility
What is the relationship between advances in information technology and the practice of profiling?
Advances in IT make it easier to profile individuals.
The term ____ refers to clandestine software that is installed on your PC through duplicitous channels but is not particularly malicious
Alien software
Cybercriminals can obtain the information they need in order to assume another person's identity by:
All of the above strategies to obtain information to assume another person's identity.
Refer to Closing Case: Baxter Coming to Work Right Next to You. Modern industrial robots must be suited to the following situations:
All of the above.
A(n) _______ is a computer program designed to support a specific task or business process.
Application
Which of the following statements is not correct?
As with normal first-class mail, employers cannot read employee e-mail.
Various organizations that promote fair and responsible use of information systems often develop a ____.
Code of ethics
______ portals coordinate content within relatively narrow organizational and partners' communities.
Corporate
Which of the following is not a disadvantage of telecommuting for employees?
Fewer opportunities for housebound people.
A(n) ____ is a logical grouping of related records
File
Managing account collections is an example of a(n):
Finance Business Process
How does society keep owners of electronic bulletin boards from disseminating offensive or untrue content? This is a difficult question because it involves the conflict between _____ on the one hand and _____ on the other.
Freedom of speech, privacy
_______ include B2B and B2C.
Functional area information systems
A ______ connects dissimilar networks
Gateway
Today's customers have _____.
Higher expectations
The IT infrastructure is comprised of _____ and _____.
IT components, IT services
Competitive advantage for an organization manifests itself as all of the following except:
Increased time to market
The list of all your purchases from Amazon (books bought, price paid, dates) is defined as ____.
Information
The threat of competitors' entering a market is very high in industries that perform a(n) ____ role and in industries where the primary product or service is _____.
Intermediation, digital
You are registering for the next semester at your university. You take into account your major, the courses you need, the prerequisites for each course, the times you take each course, and the professors teaching each section, as well as your work schedule. You are using ____ to select your class schedule.
Knowledge
_______ is a legal concept that gives individuals the right to recover damages done to them by other individuals, organizations, or systems.
Liability
Organizations are turning to data governance for which of the following reasons?
They are responding to federal regulations
Compared to data warehouses, data marts have which of the following characteristics?
They cost less.
____ describes the activities of the business, whereas ____ categorize (s), aggregate (s), and evaluate (s) data generate by the organization's activities.
Transaction data, master data
Refer to IT's About Business 3.1: Pinterest: Pinterest's user agreements allows
Users to pin images that they have created
The ____ ethical standard states that an ethical action is the one that provides the most good or does the least harm.
Utilitarian
With _____, phone calls are treated as just another kind of data
Voice over IP
A purchase of books in the college bookstore is _____. The report at the end of the day showing sales totals for the day is _____.
data, information