Information Systems

Ace your homework & exams now with Quizwiz!

Which security technique helps protect systems by examining each message as it enters the system and blocking improper or unauthorized messages?

Antivirus software

A mapping company is expanding into analytical and map-based data delivery. Company engineers would like to produce a product that maps various business related facts and data packaged into a web-based delivery model. Which decision support system gives the company the foundation for its product?

Geographic information systems

A contractor is bidding on a system to help a dental office schedule patient appointments and payments. Which law would the contractor need to understand?

HIPAA

Which three attacks are security threats to information in an organization?

Malware Unauthorized system access Website defacing

Which type of computer would most completely suit the needs of an office employee using Windows and Microsoft Office?

Microcomputer

A high school student would like to upgrade a 14.4 kbs modem based internet service to a faster broadband type. Which hardware combination will add high speed connectivity capability to the student's existing computer?

Network interface card and cable / DSL / router

Which type of software controls the users and contains an array of programs that ensure data is transmitting to the correct user, computer, and other device?

Network operating system

An employee works as an engineer at a software firm and often checks personal e-mail while at work. Due to long hours at the office, the employee does not have any time to check e-mail at home and feels that these actions are acceptable. What would discourage this employee's behavior?

Offering ethics training programs

Which business strategy does supply chain management support?

Reduce the transportation costs of raw materials and finished goods

A company uses a database to organize and access information according to a logical structure and uses a series of logically related two-dimensional tables or files to store information. Which data base type does this company use?

Relational database

A company has purchases new security software to keep the system from being vulnerable to a denial of service attack. Which aspect of implementation is this an example of?

Reliability

A hospital wants to protect a patient's medical records from unauthorized access in the hospital. Which security process would be most effective in this situation?

Role bases access control

In the planning and analysis phases of system development, the investigation step is important because it helps prevent which issue?

Scope and feature creep

Match each feature with it artificial intelligence technology. Answer options may be used more than once or not at all.

Simulating physical worlds - virtual reality Managing personal data - intelligent agent Testing before committing - virtual reality Monitoring events - intelligent agent Realistic training - virtual reality

What type of software application is most effective for analyzing small to medium sets of numbers?

Spreadsheet

How does e-society use application service providers (ASPs)?

Subscribe to applications and run software on the browser

Which network system provides management functions of financial, production, and distribution operations?

Supply chain management

A company has modified its business system to meet new legislative environmental requirements. Which aspect of implementation is this an example of?

Sustainability

What is the primary networking standard used to communicate over the internet?

TCP/IP

A company needs to identify unauthorized attempts to access a customer credit card database. Which security process would be most effective in this situation?

Access control logs and audits

How does Automatic Speech Recognition differ from Virtual Reality?

Automatic Speech Recognition captures spoken word and forms a sentence. Virtual Reality is a three dimensional interactive simulation.

Which type of e-commerce model is used when a company sells tires to automobile companies?

B2B

Why do goal seeking and optimization modeling processes provide value?

Because both processes give the best targeted outcome based on a set of data

A programmer is asked to design and implement an external website with the goal of supporting the company's image and reputation and promote additional business. Why should the programmer use an open source software to develop this website ?

Because its widely accepted by many browsers.

A database administrator is creating a new relational database table to track products brought in for warranty service. The warranty service table links to the customer information table so the repaired product can be shipped back to the right person and to the right parts table to track which parts were used to make the repairs. This is an example of what relational database feature?

Foreign keys

What are three models that can be used to implement e-commerce?

G2G C2G G2C (C= consumer, G= government, B= business)

A stockbroker needs to check emails regularly while waiting for flights at the airport. The stockbroker uses an Apple iPhone. Which wireless technology would be used to receive and end emails?

GSM/CDMA/4G LTE

An organization has a project to upgrade it's data center and the project is currently in the analysis phase. Which activity must occur in this phase?

Gather business requirements

An internet service provider offers subscribers e-mail accounts on its system. It has developed software to identify spam. Which artificial intelligence technology should be used in their anti-spam software?

Genetic algorithms

How do information systems support accounting functions?

By managing payroll, corporate wealth, and interest expenditures.

A company is migrating from Windows XP to Windows 7. How should this company measure the effectiveness of this conversion?

By measuring the amount of interruption to daily work tasks during the conversion.

A company would like to organize its project management staff to evaluate a new Enterprise Resource Planning (ERP) system. How should the effectiveness of the planning and organizing of the ERP system be measured?

By measuring the amount of time spent by the project management staff

How is the effectiveness of a client / server infrastructure improved?

By processing and storing all data on a central server.

A company wants to discourage someone from inappropriately accessing the company's technology resources for personal use. How could the company deal with this?

By writing guidelines for usage of technology

A store owner is opening a new online bookstore to sell college level textbooks. A web based application program has to be developed for the customers to place orders. Which two questions are important to ask when designing the database?

Can it meet the performance requirement of the application Can we expand the inventory and customer list without redesigning database

Business intelligence gives someone the ability to make effective, important, and often strategic decisions based upon what?

Collective information

A sales VP for a national chain wants to provide customer demographics and historical sales data to staff in the sales and production department to help them determine how many products to make and ship to each retail location for the upcoming holiday season. Which of the following database structures would allow the staff to most efficiently extract that information?

Decision Support

An organization has a library of databases available to be used. However, a department needs a custom database that has specific fields not available in any of the standard databases. What problem can be created by allowing departments to create their own custom databases rather than having the IT department modify a library database?

Compatibility issues

What is the difference between data and information as it relates to business functions?

Data is processed to get information

A company needs to expand its customer relationship database. Which component of the database should they use to accomplish this goal?

Data manipulation subsystem.

Apple Computer, in comparison with other computer manufacturers, offers products with a unique appearance and a different screen interface. Apple Computer products also focus more on non-textual information such as photos, music, and videos. Which business strategy is Apple Computer adopting?

Differentiation

A business purchases a new payroll system. Friday will be the last day to use the legacy system. On Monday the business will begin using the payroll system. Which system conversion strategy does this scenario describe?

Direct

Which security technique uses private key / public key pairs to protect sensitive information?

Encryption

Which hardware device allows employees to send information to and receive it from another person or computer in a network?

I/O device

Which technology will enhance a customer's experience in processing payments for an online store?

Implementing a secure payment gateway and shopping cart.

In information systems, what is the difference between data and information?

Information is data that has been processed and formatted to make it meaningful to human beings.

A company wants to establish and host their computing services on its internal network. They want to have it available only to employees within the organization. Which solution should a business use?

Intranet

A new computer system was just installed in a hospital. The system automatically distributes medication in the hospital pharmacy. How does this information system impact employees in the hospital?

It decreases errors in medication

What is a general advantage of relational database?

It provides the ability to create more efficient queries.

A company needs to develop a salesperson management system because there are many salespeople that will need to use the system. The organization is considering using end user application development. What are two disadvantages of using this application development method?

Lack of documentation Insufficient analysis of design alternatives

The development team is creating a new vacation and expense reporting system. The business will use the new vacation reporting system first and will not implement the expense reporting system until it is ready. Which type of testing does this scenario describe?

Phased

A hospital system would like to analyze patient satisfaction surveys to identify positive and negative comments which are then correlated to structured information such as the specific hospital with in the system, waiting room facilities, types of services, doctors, nurses, and receptionists. Which types of analytics should the hospital system use?

Predictive analytics

A small medical clinic will be implementing a new practice management software system to meet current regulation standards. The practice management system that they choose to implement will have to protect patient data. How will the practice management system maintain the data to meet regulation standards?

Private and auditable

A company has recently acquired a former distribution competitor in another country. The new subsidiary is found to use obsolete CRM software. To streamline integration with the new subsidiary , the CEO and the CIO have decided to replace the outdated software with the system the company currently uses. What are the political challenges to implementing this decision?

Prohibitions against the transfer of certain technologies across national borders.

What is the most recent federal bill that addresses electronic monitoring of employees?

The Electronic Communications Privacy Act of 1986

The president of a small sporting goods store is considering outsourcing the marketing and web design. Which factors should the president consider when making the decision to outsource?

The cost savings of using another company

When a field in a table is defined as the primary key, what characteristic of the field?

The field must have values.

What does proper investigation during the planning phase help insure?

The on - time delivery of a complete and successful information system.

A company has recently acquired a former distribution competitor in another country. The new subsidiary is found to use obsolete CRM software. For legal reasons , the CEO and CIO have decided to create a new, proprietary CRM solution that will be used by all divisions. Why has a multinational development team approach been proposed?

The resulting team can take into account the needs of all users in all locations.

A consumer is shopping for kitchen equipment on a well-know web retailer. Which process step involves the completion of a transaction from the consumer to the web store?

The shipment of the product from the warehouse.

A company builds a proprietary high tech tablet. The costs associated with manufacturing have been increasing each year. The company believes that it can successfully offshore it manufacturing process to another country. Which factor should the company consider to ensure that its proprietary information is protected?

The strength of the patent system of the selected country

What is an example of push technology?

The use of websites that email offers based on customers' membership profiles.

Which distributed infrastructure designs would be most effective?

Using single location

Which three threats to information security are considered insider threats as opposed to outsider threats?

Viruses - outside Spyware - outside Embezzlement - inside Computer misuse - inside Intellectual property theft - inside

Which three threats to information security are considered outsider threats?

Viruses - outside Spyware - outside Embezzlement - inside Theft of USB devices - inside Payroll checks written too fictitious employees - inside

Which technology allows businesses to use a network phone software for PCs to make calls to other network users anywhere in the world at no additional cost?

Voice Over IP

A company is converting its existing order entry system to a web-based system. Which two considerations are important for the user interface design?

Webpages should allow for quick and efficiency order entry The order entry system should be secured and require a strong password

Which networking standard is used for transmitting connectivity in the form of radio waves over distances up to several miles?

Wimax


Related study sets

Critical Care: Chapter 19: Endocrine Alterations

View Set

Women during the French Revolution

View Set

History of Graphic Design Exam 1

View Set

Module 2.10: Mutual Funds and Other Investments

View Set

Semester #1, Unit #2 Multiple Choice Study Guide- A.P. Biology

View Set

Anatomy and Physiology Unit 1 Practice quiz

View Set

Tax Quizzes and Post-Coverage Quizzes

View Set