Information Systems
Which security technique helps protect systems by examining each message as it enters the system and blocking improper or unauthorized messages?
Antivirus software
A mapping company is expanding into analytical and map-based data delivery. Company engineers would like to produce a product that maps various business related facts and data packaged into a web-based delivery model. Which decision support system gives the company the foundation for its product?
Geographic information systems
A contractor is bidding on a system to help a dental office schedule patient appointments and payments. Which law would the contractor need to understand?
HIPAA
Which three attacks are security threats to information in an organization?
Malware Unauthorized system access Website defacing
Which type of computer would most completely suit the needs of an office employee using Windows and Microsoft Office?
Microcomputer
A high school student would like to upgrade a 14.4 kbs modem based internet service to a faster broadband type. Which hardware combination will add high speed connectivity capability to the student's existing computer?
Network interface card and cable / DSL / router
Which type of software controls the users and contains an array of programs that ensure data is transmitting to the correct user, computer, and other device?
Network operating system
An employee works as an engineer at a software firm and often checks personal e-mail while at work. Due to long hours at the office, the employee does not have any time to check e-mail at home and feels that these actions are acceptable. What would discourage this employee's behavior?
Offering ethics training programs
Which business strategy does supply chain management support?
Reduce the transportation costs of raw materials and finished goods
A company uses a database to organize and access information according to a logical structure and uses a series of logically related two-dimensional tables or files to store information. Which data base type does this company use?
Relational database
A company has purchases new security software to keep the system from being vulnerable to a denial of service attack. Which aspect of implementation is this an example of?
Reliability
A hospital wants to protect a patient's medical records from unauthorized access in the hospital. Which security process would be most effective in this situation?
Role bases access control
In the planning and analysis phases of system development, the investigation step is important because it helps prevent which issue?
Scope and feature creep
Match each feature with it artificial intelligence technology. Answer options may be used more than once or not at all.
Simulating physical worlds - virtual reality Managing personal data - intelligent agent Testing before committing - virtual reality Monitoring events - intelligent agent Realistic training - virtual reality
What type of software application is most effective for analyzing small to medium sets of numbers?
Spreadsheet
How does e-society use application service providers (ASPs)?
Subscribe to applications and run software on the browser
Which network system provides management functions of financial, production, and distribution operations?
Supply chain management
A company has modified its business system to meet new legislative environmental requirements. Which aspect of implementation is this an example of?
Sustainability
What is the primary networking standard used to communicate over the internet?
TCP/IP
A company needs to identify unauthorized attempts to access a customer credit card database. Which security process would be most effective in this situation?
Access control logs and audits
How does Automatic Speech Recognition differ from Virtual Reality?
Automatic Speech Recognition captures spoken word and forms a sentence. Virtual Reality is a three dimensional interactive simulation.
Which type of e-commerce model is used when a company sells tires to automobile companies?
B2B
Why do goal seeking and optimization modeling processes provide value?
Because both processes give the best targeted outcome based on a set of data
A programmer is asked to design and implement an external website with the goal of supporting the company's image and reputation and promote additional business. Why should the programmer use an open source software to develop this website ?
Because its widely accepted by many browsers.
A database administrator is creating a new relational database table to track products brought in for warranty service. The warranty service table links to the customer information table so the repaired product can be shipped back to the right person and to the right parts table to track which parts were used to make the repairs. This is an example of what relational database feature?
Foreign keys
What are three models that can be used to implement e-commerce?
G2G C2G G2C (C= consumer, G= government, B= business)
A stockbroker needs to check emails regularly while waiting for flights at the airport. The stockbroker uses an Apple iPhone. Which wireless technology would be used to receive and end emails?
GSM/CDMA/4G LTE
An organization has a project to upgrade it's data center and the project is currently in the analysis phase. Which activity must occur in this phase?
Gather business requirements
An internet service provider offers subscribers e-mail accounts on its system. It has developed software to identify spam. Which artificial intelligence technology should be used in their anti-spam software?
Genetic algorithms
How do information systems support accounting functions?
By managing payroll, corporate wealth, and interest expenditures.
A company is migrating from Windows XP to Windows 7. How should this company measure the effectiveness of this conversion?
By measuring the amount of interruption to daily work tasks during the conversion.
A company would like to organize its project management staff to evaluate a new Enterprise Resource Planning (ERP) system. How should the effectiveness of the planning and organizing of the ERP system be measured?
By measuring the amount of time spent by the project management staff
How is the effectiveness of a client / server infrastructure improved?
By processing and storing all data on a central server.
A company wants to discourage someone from inappropriately accessing the company's technology resources for personal use. How could the company deal with this?
By writing guidelines for usage of technology
A store owner is opening a new online bookstore to sell college level textbooks. A web based application program has to be developed for the customers to place orders. Which two questions are important to ask when designing the database?
Can it meet the performance requirement of the application Can we expand the inventory and customer list without redesigning database
Business intelligence gives someone the ability to make effective, important, and often strategic decisions based upon what?
Collective information
A sales VP for a national chain wants to provide customer demographics and historical sales data to staff in the sales and production department to help them determine how many products to make and ship to each retail location for the upcoming holiday season. Which of the following database structures would allow the staff to most efficiently extract that information?
Decision Support
An organization has a library of databases available to be used. However, a department needs a custom database that has specific fields not available in any of the standard databases. What problem can be created by allowing departments to create their own custom databases rather than having the IT department modify a library database?
Compatibility issues
What is the difference between data and information as it relates to business functions?
Data is processed to get information
A company needs to expand its customer relationship database. Which component of the database should they use to accomplish this goal?
Data manipulation subsystem.
Apple Computer, in comparison with other computer manufacturers, offers products with a unique appearance and a different screen interface. Apple Computer products also focus more on non-textual information such as photos, music, and videos. Which business strategy is Apple Computer adopting?
Differentiation
A business purchases a new payroll system. Friday will be the last day to use the legacy system. On Monday the business will begin using the payroll system. Which system conversion strategy does this scenario describe?
Direct
Which security technique uses private key / public key pairs to protect sensitive information?
Encryption
Which hardware device allows employees to send information to and receive it from another person or computer in a network?
I/O device
Which technology will enhance a customer's experience in processing payments for an online store?
Implementing a secure payment gateway and shopping cart.
In information systems, what is the difference between data and information?
Information is data that has been processed and formatted to make it meaningful to human beings.
A company wants to establish and host their computing services on its internal network. They want to have it available only to employees within the organization. Which solution should a business use?
Intranet
A new computer system was just installed in a hospital. The system automatically distributes medication in the hospital pharmacy. How does this information system impact employees in the hospital?
It decreases errors in medication
What is a general advantage of relational database?
It provides the ability to create more efficient queries.
A company needs to develop a salesperson management system because there are many salespeople that will need to use the system. The organization is considering using end user application development. What are two disadvantages of using this application development method?
Lack of documentation Insufficient analysis of design alternatives
The development team is creating a new vacation and expense reporting system. The business will use the new vacation reporting system first and will not implement the expense reporting system until it is ready. Which type of testing does this scenario describe?
Phased
A hospital system would like to analyze patient satisfaction surveys to identify positive and negative comments which are then correlated to structured information such as the specific hospital with in the system, waiting room facilities, types of services, doctors, nurses, and receptionists. Which types of analytics should the hospital system use?
Predictive analytics
A small medical clinic will be implementing a new practice management software system to meet current regulation standards. The practice management system that they choose to implement will have to protect patient data. How will the practice management system maintain the data to meet regulation standards?
Private and auditable
A company has recently acquired a former distribution competitor in another country. The new subsidiary is found to use obsolete CRM software. To streamline integration with the new subsidiary , the CEO and the CIO have decided to replace the outdated software with the system the company currently uses. What are the political challenges to implementing this decision?
Prohibitions against the transfer of certain technologies across national borders.
What is the most recent federal bill that addresses electronic monitoring of employees?
The Electronic Communications Privacy Act of 1986
The president of a small sporting goods store is considering outsourcing the marketing and web design. Which factors should the president consider when making the decision to outsource?
The cost savings of using another company
When a field in a table is defined as the primary key, what characteristic of the field?
The field must have values.
What does proper investigation during the planning phase help insure?
The on - time delivery of a complete and successful information system.
A company has recently acquired a former distribution competitor in another country. The new subsidiary is found to use obsolete CRM software. For legal reasons , the CEO and CIO have decided to create a new, proprietary CRM solution that will be used by all divisions. Why has a multinational development team approach been proposed?
The resulting team can take into account the needs of all users in all locations.
A consumer is shopping for kitchen equipment on a well-know web retailer. Which process step involves the completion of a transaction from the consumer to the web store?
The shipment of the product from the warehouse.
A company builds a proprietary high tech tablet. The costs associated with manufacturing have been increasing each year. The company believes that it can successfully offshore it manufacturing process to another country. Which factor should the company consider to ensure that its proprietary information is protected?
The strength of the patent system of the selected country
What is an example of push technology?
The use of websites that email offers based on customers' membership profiles.
Which distributed infrastructure designs would be most effective?
Using single location
Which three threats to information security are considered insider threats as opposed to outsider threats?
Viruses - outside Spyware - outside Embezzlement - inside Computer misuse - inside Intellectual property theft - inside
Which three threats to information security are considered outsider threats?
Viruses - outside Spyware - outside Embezzlement - inside Theft of USB devices - inside Payroll checks written too fictitious employees - inside
Which technology allows businesses to use a network phone software for PCs to make calls to other network users anywhere in the world at no additional cost?
Voice Over IP
A company is converting its existing order entry system to a web-based system. Which two considerations are important for the user interface design?
Webpages should allow for quick and efficiency order entry The order entry system should be secured and require a strong password
Which networking standard is used for transmitting connectivity in the form of radio waves over distances up to several miles?
Wimax