Information Systems Exam #3
A group of people with common interests who come together to create, store, and share knowledge of a specific topic is known as a community of practice.
True
Even legitimate organizations sometimes use email spam for promoting products. a. True b. False
True
The eventual success of any system solely depends on how users work with it.
False
A strong security program begins by assessing the backgrounds of the employees in the organization. a. True b. False
False
Which of the following is a vendor of popular anti-virus software? a. Microsoft b. Symantec c. McDonald's d. Bayer
B
_____ is text, graphics, video, animation, audio, and other media that can be used to help an organization efficiently and effectively achieve its goals.
Multimedia
Default usernames and passwords should always be changed. a. True b. False
True
It is crucial that antivirus software be continually _____ with the latest virus signatures.
updated
_____ is software that generates and grades tests that humans can pass; however, all but the most sophisticated computer programs cannot.
CAPTCHA
A _____ is a conditional statement that links conditions to actions or outcomes. a. simulation b. case c. rule d. genetic algorithm
C
A _____ is a description of the logical and physical structure of data and the relationships among the data for each user. a. data dictionary b. process c. schema d. cold site
C
_____ are factors that are essential to the success of a functional area of an organization.
Critical success factors (CSFs) Critical success factors CSFs
_____ are rules of thumb arising from experience.
Heuristics
_____ statements are rules that suggest certain conclusions based on certain conditions.
IF-THEN
_____ is a system involving sequential decisions with learning taking place between each decision.
Reinforcement learning
_____ are mechanical or computing devices that perform tasks requiring a high degree of precision or that are tedious or hazardous for humans
Robots
_____ is a method employed to keep the agile system development effort focused and moving quickly.
Scrum
Outline six useful policies to minimize computer-related waste and mistakes.
Some useful policies to minimize waste and mistakes include the following: 1. Changes to critical tables, HTML, and URLs should be tightly controlled, with all changes documented and authorized by responsible owners. 2. A user manual should be available covering operating procedures and documenting the management and control of the application. 3. Each system report should indicate its general content in its title and specify the time period covered. 4. The system should have controls to prevent invalid and unreasonable data entry. 5. Controls should exist to ensure that data input, HTML, and URLs are valid, applicable, and posted in the right time frame. 6. Users should implement proper procedures to ensure correct input data.
_____ is the stage of systems development that answers the question, "How will the information system solve a problem?"
Systems design
The _____ attempts to determine whether a computer can successfully impersonate a human.
Turning Test
____ is a piece of programming code, usually disguised as something else, that causes a computer to behave in an unexpected and usually undesirable manner.
Virus
_____ is similar to SMiShing except that the victims receive a voice mail message telling them to call a phone number or access a Web site.
Vishing
You recently installed a game that you got for free. After a few days, you find that your computer's log has entries of logins that were not initiated by you. The perpetrator was most likely logging in using a _______.
backdoor
A(n) _____ is a computer environment that includes rooms, electrical service, telecommunications links, data storage devices, and the like.
cold site
If a multimedia file is very large, it might be necessary to _____ it so that it can be downloaded or emailed.
compress
In terms of information systems, issues of privacy relate to the collection and use or misuse of _____.
data
When the data about Target's customers was stolen, it was an example of a(n) ______.
data breach
A(n) _____ is a detailed description of all data used in a database.
data dictionary
In the context of data flow diagrams (DFDs), a(n) _____ reveals a storage location for data.
data store symbol
A(n) _____ is a diagram used during both the analysis and design phases of a systems development life cycle (SDLC) to document the processes of the current system or to provide a model of a proposed new system.
data-flow diagram (DFD) data-flow diagram DFD
According to the Better Business Bureau, a business's privacy notice should include some method of _____, which means providing a customer a course of action to take if the business does not meet its' own privacy policy in some way.
redress
Employees at a small publishing company were dissatisfied with their project tracking system because it didn't allow them to record enough detail. To solve the problem, they created another system that recorded some of the same information, but allowed them to add even more detail about the schedules and budgets. As a result, the company had _____ systems.
redundant
The US-CERT newsletter has alerted you about vulnerabilities in some software installed in your organization. To detect if there is any attempt at exploiting this vulnerability, you would employ ____-based intrusion detection system.
knowledge
A _____ is a group of people with common interests who come together to create, store, and share knowledge of a specific topic. a. community of practice (COP) b. social network c. professional learning community (PLC) d. personal network
A
A scrum team usually consists of _________. a. less than a dozen people b. twelve to fifteen people c. fifteen to twenty people d. more than twenty people
A
Although Roberta had signed a form preventing her doctor from sharing her personal medical records with the company she worked for, she later discovered that the doctor's office had, in fact, shared her data with her health insurance provider and her employer, which caused her to be terminated. Because the doctor's practice violated its own privacy policy, she was able to file a lawsuit under the ________. a. Health Insurance Portability and Accountability Act b. Health and Medical Records Privacy Act c. Gramm-Leach-Bliley Act d. none of these answers
A
Heavy computer users who experience red, dry, itchy eyes should _____. a. consider the use of artificial tears b. consider the use of older, but more human friendly CRT monitors c. keep their focus on their screens for long hours d. avoid blinking often
A
In a recent survey of 2100 human resource professionals, which two activities were listed as the biggest "productivity killers" in the workplace? a. personal cell phone use and Internet surfing b. personal cell phone use and online game play c. Internet surfing and online game play d. online shopping and online game play
A
In an expert system, the _____ is the component that delivers the expert advice. a. inference engine b. knowledge acquisition facility c. user interface d. explanation facility
A
Someone who violates computer or Internet security maliciously or for illegal personal gain is known as a(n) _______. a. black hat hacker b. industrial spy c. hacktivist d. cyberterrorist
A
Suppose you have been receiving unsolicited phone calls from telemarketers. Which agency should you contact to prevent these 'junk' calls? a. The Federal Trade Commission b. Better Business Bureau c. your local police department d. The Department of Justice
A
There has been a data breach at your business and the business has lost some customer data. It has led to angry customers who have filed charges. What is a recommended course of action to prepare for future events? a. activate the forensics analysis team and prepare documentation b. meet with your lawyers to prepare to counter-sue the customers c. settle with the customers, however much it may cost d. none of these answers
A
Which of the following is NOT one of the four most common issues related to the storage and use of personal data? a. notice b. security c. knowledge d. consent
A
Which of the following subject areas does the USA Patriot Act cover? a. Cyberterrorism b. Identity theft c. Credit card fraud d. Transmitting virus programs
A
While giving her students a physics exam, Professor Thompson noticed that Jack, one of her students who has been struggling with the course material, appeared to be copying answers from Graydon, one of the best students in the class. She decides that she should compare their answers when the class period is over before deciding what to do about the situation. In which phase of the ethical decision-making process is Professor Thompson? a. gathering information b. developing a problem statement c. identifying options d. weighing options
A
You have been hired as the new Information Security consultant at XYZ Inc. Which of these employee behaviors would be a top security concern? a. Leaving laptop computers unattended in public spaces b. Using office computers for personal e-mails c. Drinking water or coffee while working on computers d. Banging on the keyboard, when the computer is running slow
A
_____ involves using a new or modified system under all kinds of operating conditions. a. Systems operation b. System construction c. Systems review d. Systems modification
A
_____ is a wide range of adaptive and rehabilitative devices to help people with disabilities perform tasks that they were formerly unable to accomplish or had great difficulty accomplishing. a. Assistive technology b. Virtual reality c. Forensics software d. Bioinformatics
A
_____ is is an inflammation of the nerve that connects the forearm to the palm of the wrist. a. Carpal tunnel syndrome (CTS) b. Seated immobility thromboembolism (SIT) c. Chronic idiopathic mylofibrosis d. Behcet's syndrome
A
_____ is the combination of information technology with traditional disciplines such as medicine or science while considering the impact on individuals, organizations, and society. a. Informatics b. Heuristics c. Assistive technology d. Informetrics
A
_____ is the process of analyzing systems to make sure they are operating as intended. a. System review b. System operation c. System maintenance d. System construction
A
_____ knowledge is hard to measure and document and typically is not objective or formalized. a. Tacit b. Shared c. Technical d. Explicit
A
_____ creates a complete set of technical specifications that can be used to construct an information system. a. Systems design b. Systems investigation c. Systems analysis d. Systems development
A
_____ determines whether the expected benefits associated with a project outweigh the expected costs sufficiently to make the project financially attractive. a. Economic feasibility b. Technical feasibility c. Legal feasibility d. Operational feasibility
A
Define artificial intelligence system and list the characteristics of intelligent behavior.
Artificial intelligence systems include the people, procedures, hardware, software, data, and knowledge needed to develop computer systems and machines that demonstrate characteristics of human intelligence. The characteristics of intelligent behavior include the ability to: 1) learn from experience and apply the knowledge acquired from experience, 2) handle complex situations, 3) solve problems when important information is missing, 4) determine what is important, 5) react quickly and correctly to a new situation, 6) understand visual images, 7) process and manipulate symbols, and 8) be creative and imaginative.
A hacktivist is someone who _______. a. attempts to gain financially and/or disrupt a company's information systems and business operations b. hacks computers or Web sites in an attempt to promote a political ideology c. attempts to destroy the infrastructure components of governments d. violates computer or Internet security maliciously or for illegal personal gain
B
A job that requires sitting at a desk and using a computer for many hours a day can lead to _______. a. undesirable weight loss b. formation of blood clots c. inflammation of the gum tissue d. sleep disorders
B
An international package shipping company like FedEx needs to be able to track the location of every package at every stage in the process, from pick-up to delivery. Which specific type of software would be useful in this situation? a. business rule management b. enterprise search c. knowledge management d. none of these answers
B
Anne and Jordan have two pre-teen sons and they're concerned about what their kids might see and share on the Internet. They should probably invest in _______. a. Internet licensing b. filtering software c. security passwords d. privacy screening
B
Executives at Southwestern Construction have noticed that the company's construction team in the Phoenix office is more efficient with its resources than the other teams in the Las Vegas, Salt Lake, and Santa Fe offices. They decide to construct a knowledge management system that will allow the Phoenix team's methods to be shared with the other three offices. Which general benefit are they hoping to gain from this new system? a. fostering innovation through a free flow of ideas b. leveraging the expertise of people across the organization c. capturing the expertise of key individuals d. all of these answers
B
In order to be accredited by the Better Business Bureau, a business is required to publish a privacy notice on its website that includes all of the following elements EXCEPT ________. a. choice b. sharing and selling c. access d. updates
B
In today's workplace, most employers issue a policy stating that they will monitor employees' use of any company-owned computer, server, or email system, thus eliminating any expectation of privacy. How many organizations actually monitor, retain, and review employees' emails? a. about one-fourth b. about half c. about three-quarters d. nearly all
B
Kelly has just been hired as a server at a seafood restaurant. Since this is her first job as a server, her manager has instructed her to follow Mark, an experienced server, for an entire shift to learn how to do the job. Kelly is: _______. a. observing b. shadowing c. copying d. mimicing
B
Knowing the best way to negotiate with a foreign government about a volatile hostage situation is an example of _____ knowledge. a. implied b. tacit c. explicit d. definitive
B
Laura is carefully estimating the time required for each phase of a proposed system development project to see if her company can meet the client's desired time for completion. Laura is checking on ___________. a. technical feasibility b. schedule feasibility c. deadline feasibility d. economic feasibility
B
Once new software has been selected, implementation will include all of these tasks EXCEPT _________. a. customizing any aspects of the solution needed b. consulting with stakeholders to establish future needs c. training end users d. configuring all of the software's capabilities and options to meet requirements
B
Sophisticated computer systems require an extension of understanding visual images. This is called a _____ system. a. robotic b. perceptive c. learning d. virtual reality
B
The _____ stores all relevant information, data, rules, cases, and relationships that an expert system uses. a. inference engine b. knowledge base c. user interface d. data warehouse
B
Which of the following is NOT one of the factors that have caused many organizations to establish knowledge management programs? a. expansion of the services sector b. economic fluctuations c. emergence of new information technologies d. globalization
B
Which of the following is a computer-related mistake? a. Operating unintegrated information systems. b. Mishandling computer outputs. c. Acquiring redundant systems. d. Exhausting information system resources.
B
Which of the following laws covers false claims regarding unauthorized use of credit cards? a. Computer Fraud and Abuse Act b. Fraud and Related Activity in Connection with Access Devices Statute c. Identity Theft and Assumption Deterrence Act d. Stored Wire and Electronic Communications and Transactional Records Access Statutes
B
Which of the following statements is true of the E-Government Act of 2002? a. It renews the U.S. government's authority to monitor electronic communications of foreigners abroad and authorizes foreign surveillance programs by the National Security Agency (NSA). b. It requires federal agencies to post machine-readable privacy policies on their Web sites and to perform privacy impact assessments on all new collections of data of ten or more people. c. It restricts government access to certain records held by financial institutions. d. It defines procedures to request judicial authorization for electronic surveillance of persons engaged in espionage against the United States on behalf of a foreign power.
B
You are part of a testing team at a software business. Your job is to see how many concurrent users the system can host and how many database transactions the system can handle without a noticeable drop in performance. You are doing _____ testing. a. system testing b. volume testing c. acceptance testing d. integration testing
B
You joined an agriculture business as an Assistant Marketing Manager and you are full of ideas on how to improve sales. When you voiced your thoughts to your boss, she mentions "do not reinvent the wheel". It means _______. a. do not bring new ideas, since this is an old company b. before starting any new project, try to build on expertise and knowledge of others in the organization c. the wheels of innovation have already been created in the organization d. currently there is not adequate budget to explore new ideas
B
Your business has a web server that has suddenly become unresponsive. When you study the server's logs there are a huge number of requests from what appear to be legitimate computers. The problem is likely because of _____. a. a CAPTCHA issue b. a denial-of-service attack c. too many Spam emails d. a logic bomb
B
_____ do not need any previous training in computers or expert systems. a. Domain experts b. Knowledge users c. Knowledge engineers d. Intelligent agents
B
_____ explains the purpose of every major piece of computer code and also identifies and describes key variables. a. Agile documentation b. Technical documentation c. Systems documentation d. User documentation
B
_____ involves testing the complete, integrated system (hardware, software, databases, people, and procedures) to validate that an information system meets all specified requirements. a. Integration testing b. System testing c. Volume testing d. User acceptance testing
B
In the context of data-flow diagrams (DFDs), a(n) _____ shows either the source or destination of the data. a. data-flow line b. entity symbol c. process symbol d. data store symbol
B
On the back of a credit card the three-digit number above the signature panel is used to _____. a. verify the identity of the credit card holder b. verify the card is legitimate and not a stolen card number c. enter your account into a raffle d. track your transactions for rewards program purposes
B
Which of the following is a useful policy to minimize waste and mistakes? a. Changes to HTML and URLs should be documented and authorized by end users. b. System report titles should be as brief as possible and should simply indicate the report number. c. Users should implement proper procedures to ensure correct input data. d. Tight control should be avoided over critical tables.
C
Which of the following is the correct description of a firewall? a. It is a software that deletes viruses from attachments. b. It is hardware that prevents unauthorized data to enter the private network. c. It is a software and hardware combination that limits the incoming and outgoing Internet traffic. d. It is a concept used in developing security policies.
C
Which of the following shortcoming may be revealed during an IT security audit? a. whether the IT budget is adequate or not b. whether the users are satisfied with IT services or not c. whether only a limited number of people have access to critical data or not d. whether the firewall is tall enough
C
You had used an online service to apply for a credit card. As part of the process, you submitted your personal information such as SSN, date of birth, employer information, etc. Soon after you started receiving bills for items you did not purchase. You have become a victim of ________. a. cyberterrorism b. ransomware c. identity theft d. cyber espionage
C
You wish to use your personal laptop computer at work. However, the IT department folks are unwilling to allow you. The likely reason is ______. a. you will use your laptop for non-work related activity b. your productivity could not be measured correctly c. your non-work related use of the laptop could increase vulnerability d. your activities could not be monitored
C
Your new software project manager is OK with requirements that are not fully specified up front. He recommends a team-based approach to development. He is very likely to be a proponent of the _______ approach to software development. a. Waterfall b. outsourced c. Agile d. packages solution
C
_____ has the potential to superimpose digital data over real photos so that GPS maps can be combined with real pictures of stores and streets to help people locate their position. a. Immersive virtual reality b. Telepresence c. Augmented reality d. Location reality
C
_____ include the people, procedures, hardware, software, data, and knowledge needed to develop computer systems and machines that can simulate human intelligence processes including learning, reasoning, and self-correction. a. Assistive technology systems b. Intelligence agents c. Artificial intelligence systems d. Virtual reality systems
C
_____ involves publishing an intentionally false written statement that is damaging to a person's or an organization's reputation. a. Vishing b. Slander c. Libel d. Phishing
C
_____ is a mathematical theory for developing strategies that maximize gains and minimize losses while adhering to a given set of rules and constraints. a. Parrondo's paradox b. Bioinformatics c. Game theory d. Chainstore paradox
C
During a recent brainstorming session, one of Franklin's co-workers suggested that their company could sell some of the data contained in its customer databases to earn extra revenue for the business. As a long-time member of the ACM (Association for Computing Machinery), Franklin is opposed to the idea because it violates which of the following imperatives in the ACM code of ethics? a. Avoid harm to others. b. Be honest and trustworthy. c. Honor property right.s d. Respect the privacy of others.
D
Executives at Southwestern Construction have noticed that the company's construction team in the Phoenix office is more efficient with its resources than the other teams in the Las Vegas, Salt Lake, and Santa Fe offices. They decide to construct a knowledge management system that will allow the Phoenix team's methods to be shared with the other three offices. As a means of convincing the other teams to adopt the new methods, they develop an incentive program that allows team members to earn a percentage of the money they save on each project. This is related to which phase of knowledge management project implementation? a. connecting the KM to goals and objectives b. starting with a small pilot and enthusiastic participants c. identifying valuable tacit knowledge d. getting employees to buy in
D
Flexibility is a major component of ergonomic design, mainly because: _______. a. people come in a wide range of shapes and sizes b. people have their own preferences c. people need to be able to position equipment in different ways for best results d. all of these answers
D
Harold is thinking about setting up profiles on Facebook and Twitter. Which of the following categories of data should he avoid sharing on these social media platforms? a. his location b. his religious and political affiliations c. his health conditions d. all of these answers
D
Phil has been working on a new version of his company's best-selling sales management software and now he'd like to ask several co-workers and a handful of the existing version's top users to perform an acceptance test. Phil is preparing for _________. a. gamma testing b. beta testing c. delta testing d. alpha testing
D
RFID chips embedded in objects generate radio transmissions that allow people to track the location and other associated data of those objects. It's been suggested that RFID chips be implanted ________. a. in children to enable parents to find them if lost b. in criminals to allow law enforcement agents to find them if needed c. in all humans to give medical professionals instant access to medical records and conditions d. all of these answers
D
Tara and Zach are leading a systems development project and they want the investigation phase to go smoothly and quickly. They decide to use _____ because it will also help with the analysis and design phases. a. direct observation b. agile systems development c. functional decomposition d. joint application development
D
The Pareto principle is also known as the _____. a. result rule b. cause rule c. 50-50 rule d. 80-20 rule
D
The US-CERT incident reporting system is used to ____. a. alert the bank about stolen credit cards b. alert the government about missing computers c. alert the Border Patrol about undocumented workers d. alert the Department of Homeland Security about information security incidents
D
The _____ requires telephone companies to turn over customer information, including numbers called, without a court order if the Federal Bureau of Investigation (FBI) claims that the records are relevant to a terrorism investigation. a. Cable Act of 1992 b. Electronic Communications Privacy Act of 1986 c. Gramm-Leach-Bliley Act of 1999 d. USA Patriot Act of 2001
D
The process of switching from an old information system to a replacement system is called _____. a. installation b. conversion c. site preparation d. cutover
D
These days, the biggest threats to IT security are from ________. a. "geeks" working on their own and motivated by the desire to gain some degree of notoriety b. international drug cartels c. terrorist organizations d. organized groups that have ample resources, including money and sophisticated tools, to support their efforts
D
To minimize waste and mistakes, organizations often develop and implement policies and procedures which focus on: ________. a. the use of data editing to ensure data accuracy and completeness b. the assignment of clear responsibility for data accuracy within each information system c. the implementation of source data automation d. all of these answers
D
Which legislation is designed to combat the growing crime of identity theft? a. E-Government Act of 2002 b. USA Freedom Act of 2015 c. USA Patriot Act of 2001 d. Fair and Accurate Credit Transactions Act of 2003
D
Which of the following security incidents is least costly to fix? a. theft of program source code b. alteration of corporate database c. theft of trade secrets d. defacing of web pages
D
You work for a company that is growing. Originally, all the users in all departments had access to all the data in the database. It is considered a security risk. What is an appropriate action to reduce the risk? a. Install a two-step login procedure, where the user has to key in additional information for logging in b. Install and provide stronger anti-virus software on the users' computers c. Tweak the firewall parameters so that outgoing traffic can be better controlled d. Assign roles and privileges to users so that only job-relevant data is accessible to the user.
D
You work for a manufacturing business. Your employer uses a model for selecting the supplier for the raw materials. They wish to become more responsive so that changes in the internal decision model can be quickly implemented in the systems. What is an appropriate recommendation? a. Install a more advanced email system. b. Install a social network interface to the customer relationship management system. c. Install better teleconferencing systems for anytime, anywhere teleconferencing with the suppliers. d. Install a Business Rules management system and interface it to the Supply chain management system.
D
Your cousin works at her desktop computer for prolonged period of time every day. She would like to minimize the harmful effects of such repetitive work. Her workspace should be designed with ______ in mind. a. privacy b. productivity c. economics d. ergonomics
D
_____ can process many pieces of data at the same time and learn to recognize patterns. a. Voice recognition systems b. Natural language processing systems c. Learning systems d. Neural networks
D
_____ involves running a complete new system for one group of users rather than all users. a. Phase-in approach b. Parallel start-up c. Cutover d. Pilot start-up
D
The term "ethics" refers to an individual's personal beliefs about right and wrong, whereas the term "morals" describes standards or codes of behavior expected of an individual by a group, such as a nation, organization, or profession. a. True b. False
False
Those convicted of cyberterrorism are subject to a prison term of 6 months to 1 year. a. True b. False
False
Training and incentives are the keys to the successful acceptance and implementation of policies and procedures governing waste and error prevention.
False
Unit testing uncovers any defects in the interface between individual components of an information system.
False
Waterfall and agile are the two types of software development processes available to organizations.
False
While discussing the preliminary feasibility of a project, your colleague insists that figures used in economic feasibility be very accurate down to the last cent. His claim is appropriate and not uncommon.
False
While gathering requirements for a system that assists tech support people, you create a list of conditions and the recommended responses. This list of conditions and responses can form the basis of a knowledge-base for a robotics system.
False
When you receive a text message that there is a problem with your bank account and you are required you to click on a link to submit some information, you are likely seeing a vishing attack. a. True b. False
False
You have been called in to collect information regarding a recent data breach at your organization. What specific information would you collect and for what reasons would you seek that information?
First, I would identify what actions or inactions led to the data breach. This will help in reducing or preventing such attacks in future. Second, I would identify the vulnerabilities that were exploited in this attack so that those vulnerabilities can be addressed. Third, I would review the capabilities of the intrusion detection system and recommend updates, modifications, or replacement so that similar intrusions can be detected sooner.
_____ involves linking all individual components together and testing them as a group to uncover any defects between individual components.
Integration testing
A(n) _____ consists of programs and a knowledge base used to perform a specific task for a person, a process, or another program.
Intelligent agent
A party offended by a libel can file what is known as a(n) _____ lawsuit and use the subpoena power it grants to force the Internet service provider (ISP) to provide whatever information it has about the anonymous poster, including Internet Protocol (IP) address, name, and street address.
John Doe
You have been invited to speak to senior citizens about the Internet in general and email in particular. What topics would you choose to talk about to benefit your audience the most?
Knowing that many of the victims of phishing attacks often tend to be unsuspecting senior citizens, I would caution them against phishing attacks. I would explain what phishing is, and how to identify those emails. I would show them samples of phishing emails and show them what happens if they respond to those mails. I would also demonstrate how following a link from the email can lead to websites with malicious codes. I would give them some guidelines on what to do in case they become victims of phishing attacks.
A(n) _____ is an organized collection of people, procedures, software, databases, and devices used to create, store, share, and use the organization's knowledge and experience.
Knowledge management system (KMS)
_____ proposes that every organizational system is made up of people, tasks, structure, and technology with an interaction among the four components so that any change in one of these elements will necessitate a change in the other three elements.
Leavitt's Diamond
Discuss the advantages and disadvantages of agile development.
Like any other approach, agile development has its advantages and disadvantages. For appropriate projects, this approach puts an application into production sooner than any other approach. On the other hand, this intense systems development life cycle (SDLC) can burn out systems developers and other project participants. In agile development, documentation is produced as a by-product of completing project tasks, but this approach requires systems analysts and users to be skilled in agile systems development tools and agile techniques. Agile forces teamwork and lots of interaction between users and stakeholders; however, it requires a larger percentage of stakeholders' and users' time than other approaches.
When a U.S. citizen applies for health insurance through the federally-operated Healthcare Marketplace, workers for the Marketplace then contact the IRS for data about that citizen's income and tax records. This cross-referencing of data is regulated by the Computer _____ and Privacy Act of 1988.
Matching matching
_____ is a means of acquiring data about a group of people (such as location, noise level, and pollution levels) through sensor-enhanced mobile devices.
Mobile crowd sensing (MCS) Mobile Crowd Sensing MCS
_____ involves measuring system performance by tracking the number of errors encountered, the amount of memory required, the amount of processing or CPU time needed, and other performance indicators.
Monitoring
_____ involves a computer understanding, analyzing, manipulating, and/or generating linguistic communication.
Natural Language Processing
Imagine that you own your own business, and you have decided to write your own code of ethics. List at least five "imperatives," or guidelines, that you would like to include in your company's code of ethics.
Students' answers should include some of the following or similar statements: 1. contribute to society and human well-being. 2. avoid harm to others. 3. be honest and trustworthy. 4. be fair and take action not to discriminate. 5. honor property rights including copyrights and patents. 6. give proper credit for intellectual property. 7. respect the privacy of others. 8. honor confidentiality.
_____ involves those activities that ensure the orderly dissolution of a system, including disposing of all equipment in an environmentally friendly manner, closing out contracts, and safely migrating information from the system to another system or archiving it in accordance with applicable records management policies.
System disposal
The ______ is the agency tasked with the goal of providing for a safer, more secure America, making it resilient against terrorism and other potential threats.
The DHS DHS Department of Homeland Security
Identify and briefly discuss two primary causes of computer-related health problems.
Two primary causes of computer-related health problems are a poorly designed work environment and failure to take regular breaks to stretch the muscles and rest the eyes. The computer screen can be hard to read because of glare and poor contrast. Desks and chairs can also be uncomfortable. Keyboards and computer screens might be fixed in place or difficult to move. The hazardous activities associated with these unfavorable conditions are collectively referred to as work stressors. Although these problems might not be of major concern to casual users of computer systems, continued stressors such as repetitive motion, awkward posture, and eye strain can cause more serious and long-term injuries. If nothing else, these problems can severely limit productivity and performance.
Briefly describe the role of the inference engine and the explanation facility components of an expert system.
The overall purpose of an inference engine is to seek information and relationships from the knowledge base and to provide answers, predictions, and suggestions similar to the way a human expert would. The explanation facility allows a user or decision maker to understand how the expert system arrived at certain conclusions or results. The expert system, using the explanation facility, can indicate all the facts and rules that were used in reaching the conclusion.
System investigation is the initial phase in the development of a new or modified business information system. What is the purpose of this phase, and what questions are typically explored during the investigation?
The purpose of system investigation is to gain a clear understanding of the specifics of the problem to solve or the opportunity to address. Questions typically asked during this phase are: What is the scope of the problem? Who is affected and how? How often does this occur? After gaining a good understanding of the problem, the next question is, "Is the problem worth addressing?" What are the potential costs, both the one-time initial costs and recurring costs? What risks are associated with the project? If successful, what benefits, both tangible and intangible, will the system provide? Given that organizations have limited resources—people and money—these questions deserve careful attention.
_____ include hardware and software that permit computers to capture, store, and process visual images.
Vision Systems
A ________ often creates a "backdoor" on a computer that enables an attacker to gain access to the system and compromise confidential or private information
Trojan horse
A job that requires sitting at a desk and using a computer for many hours a day qualifies as a sedentary job. a. True b. False
True
A neural network relies on massively parallel processing to enable a computer to simulate the function of a human brain.
True
A perceptive system allows a machine to approximate the way a person sees, hears, and feels objects.
True
A slipstream upgrade is a minor upgrade—typically a code adjustment or minor bug fix.
True
A user interface makes an expert system easier to develop and use.
True
A zombie computer would send requests to access to the target site again and again. a. True b. False
True
An attack that takes place before the security community and/or software developers become aware of and fix a security vulnerability is called the 'zero-day attack.' a. True b. False
True
An employee who is marked for a lay-off sent threatening emails to his boss, stating that he is going to delete sensitive data. This employee can be charged under the Computer Fraud and Abuse Act. a. True b. False
True
An expert system can use a case-based solution process to develop the solution to a problem by finding cases stored in the knowledge base that are similar to the problem at hand and then modifying the solution to the cases to fit the current problem.
True
An expert system, using the explanation facility, can indicate all the facts and rules that were used in reaching a conclusion.
True
Artificial intelligence involves the development of machines and computer systems that can simulate human intelligence processes.
True
As a Google user, your search history data can be accessed by the NSA and the FBI without obtaining court orders. a. True b. False
True
Assistive technology systems help people overcome disabilities and perform various tasks.
True
Bioinformatics has been used to help map the human genome and conduct research on biological organisms.
True
Deepak's team is in charge of conducting a review of their company's waste/mistake prevention policies and procedures. Part of this review should also evaluate how upcoming changes in information systems will affect business activities. a. True b. False
True
Discovery of a vulnerability in a software program can potentially be sold to the government. a. True b. False
True
Downloading games from unknown websites can be risky. The software may be a Trojan horse. a. True b. False
True
Even if unit testing is successful, developers cannot assume they can combine individual components into a working system without any problems.
True
Expert system shells lessen the burden of programming, allowing nonprogrammers to develop and benefit from the use of expert systems.
True
Expert systems, robotics, vision systems, natural language processing, learning systems, and neural networks are all part of the broad field of artificial intelligence.
True
Feasibility analysis assesses the technical, economic, legal, operational, and schedule feasibility of a project.
True
For a small system, site preparation can be as simple as rearranging the furniture in an office to make room for a computer.
True
If Stan and Marcus, a new trainee at the manufacturing plant, are working together to resolve an issue on the line, they would be using joint problem solving as a means of transferring Stan's tacit knowledge to Marcus.
True
If a worker is seated at a desk using a keyboard, the height of the surface holding the keyboard and mouse should be 1 or 2 inches above the worker's thighs so that his or her wrists are nearly straight. a. True b. False
True
If an attack is dangerous enough, it may warrant shutting down or disconnecting critical systems from the network. a. True b. False
True
In some cases, metadata—the data that describes other data—is more important than the data itself.
True
In the U.S., there is some debate over privacy between those who favor data collection as a means to increase national security and those who view such programs as a violation of rights guaranteed by the Constitution and the Bill of Rights. a. True b. False
True
It is not uncommon for computer users to share their login ID and password with coworkers. a. True b. False
True
Joint application development (JAD) sessions with a cross section of users and stakeholders in a project are an effective way to define system requirements.
True
Learning systems allow a computer to change how it reacts to situations based on the feedback it receives.
True
Macro viruses are called so because they are written using a macro language. a. True b. False
True
Many workers claim their right to privacy trumps their employers' right to monitor employee use of IS resources. a. True b. False
True
Namaste Yoga Studio's website is a great example of multimedia because it uses text, photos, graphics, and video to communicate the message of the studio's owners.
True
One idea for reducing cyberloafing is to develop software that recognizes and categorizes Internet sites into sites that employees can always visit, sometimes visit, and never visit. a. True b. False
True
One of the significant drawbacks to building a custom system is the high cost compared to off-the-shelf software
True
Operational feasibility takes into account the need to meet certain system performance requirements that are considered important to system users and stakeholders.
True
Pressure to increase profitability and improve operational efficiencies often drives organizations to implement new approaches and technology.
True
Robotics involves developing mechanical or computer devices that can paint cars, make precision welds, and perform tasks that require a high degree of precision or are tedious or hazardous for humans.
True
Spear-phishing is when the phisher sends fraudulent emails to a certain organization's employees. a. True b. False
True
Suppose your business is using software that was written using FORTRAN 77. They wish to modify it to accommodate new requirements. It is a sound advice to suggest that they consider switching to a new application using newer technologies (e.g. Microsoft ASP.Net), rather than modify the current software.
True
System testing is often done by independent testers who are not involved in developing program code.
True
The computer is running, but not responding to your keyboard inputs. You find that the network activities are running very slowly. You have probably been hit by a rootkit. a. True b. False
True
The disaster recovery plan focuses on technology recovery and identifies the people or the teams that are responsible to take action in the event of a disaster, what exactly these people will do when a disaster strikes, and the information system resources required to support critical business processes.
True
The pages on a university's website are maintained by individual departments and organizational units. It is a useful policy to require that every change a user makes to his department pages be reviewed and approved. a. True b. False
True
The primary outcome of systems analysis is a prioritized list of system requirements and a recommendation of how to proceed with a project.
True
The purpose of studying a system is to identify the strengths and weaknesses of the existing system and examine current inputs, outputs, processes, security and controls, and system performance.
True
The use of computers in the workplace is a double-edged sword for workers. While they help to increase productivity and efficiency, they can also raise concerns about privacy and health issues. a. True b. False
True
There are bots that can sign up for thousands of email accounts. a. True b. False
True
There are laws that require businesses to prove that their data is secure. a. True b. False
True
To avoid potential bottlenecks and delays in accurately applying and implementing changes in business rules, many organizations use business rule management software.
True
Transmitting a program, code, or command that causes harm to a computer is a crime. a. True b. False
True
Two primary causes of computer-related health problems are a poorly designed work environment and failure to take regular breaks to stretch the muscles and rest the eyes. a. True b. False
True
U.S. federal law permits employers to monitor email sent and received by employees. a. True b. False
True
User acceptance testing (UAT) is a critical activity that must be completed successfully before newly developed software can be rolled out to the market.
True
Virtual reality simulations require special interface devices that transmit the sights, sounds, and sensations of the simulated world to the user.
True
Vision systems include hardware and software that permit computers to capture, store, and process visual images.
True
When audio files are played while they are being downloaded from the Internet, it is called streaming audio.
True
Whenever there is a computer security incident, it is not recommended that the organization reveal all they know in public forums. a. True b. False
True
You see a deceptive pop-up that says your computer is infected and that you must visit a compromised web site where you pay them to clean your computer. You have just become a victim of ransomware. a. True b. False
True
You work at a call center of a large bank where you answer credit card services related questions from customers. Lately, you have noticed an increased number of customers enquiring if you had initiated a call. There can be a scam in progress. a. True b. False
True
Any Internet traffic that is not explicitly permitted into the internal network is denied entry through a firewall. a. True b. False
True
_____ is a process where a computer makes a decision, analyzes the results, and then makes a better decision based on the analysis.
Dynamic programming
_____ issues deal with what is generally considered right or wrong.
Ethical
Identify and briefly define several specialty areas of artificial intelligence.
Expert systems consist of hardware and software that store knowledge and make inferences, enabling a novice to perform at the level of an expert. Robotics involves developing mechanical or computer devices that can paint cars, make precision welds, and perform other tasks that require a high degree of precision or that are tedious or hazardous for humans. Vision systems include hardware and software that permit computers to capture, store, and manipulate visual images. Natural language processing allows a computer to understand and react to statements and commands made in a natural language. Learning systems are a combination of software and hardware that allows a computer to change how it functions or reacts to situations based on feedback that it receives. A neural network is a computer system that can act like or simulate the functioning of the human brain.
_____ knowledge is objective and can be measured and documented.
Explicit
_____ is an approach to writing code that promotes incremental development of a system using short development cycles to improve productivity and to accommodate new customer requirements.
Extreme programming (XP) Extreme programming XP
. Educational institutions' Websites are the most commonly targeted sites by phishers a. True b. False
False
A 'virus signature' contains the email ID of the virus developer. a. True b. False
False
A genetic algorithm can be used to search the vast resources of the Internet to find information on any topic.
False
A job that requires sitting at a desk for many hours a day can significantly reduce the risk of type 2 diabetes. a. True b. False
False
A virus can reside in a file (or many files) on the hard drive, but it would not be active in memory. As such, it is not as important to scan live memory as it is to scan the hard drive. a. True b. False
False
Agile is better suited for developing larger information systems than smaller ones.
False
All members of a system investigation team must be co-located to ensure a successful start to a project.
False
Amy is doing some online research for a term paper. She'd like to access some information on a particular website, but the website is asking her to put in her email address before allowing her to view the information. She wonders what the website owner will do with that information, but there is never any way for her to know how data collected via a website will be used. a. True b. False
False
As the complexity of a network increases, the possibility of security breaches decreases. a. True b. False
False
Children and young adults under 18 can easily become the victims of crimes due to their use of social media, but adults are entirely safe in using social media. a. True b. False
False
Computer-related mistakes include organizations operating unintegrated information systems and acquiring redundant systems. a. True b. False
False
IS professionals believe that their field offers few opportunities for unethical behavior. a. True b. False
False
If an activity is defined as legal then it is ethical. a. True b. False
False
In order to protect the privacy of employees, email messages that have been erased from hard disks cannot be retrieved. a. True b. False
False
It is illegal for companies to buy and sell personal data collected through marketing and sales efforts. a. True b. False
False
It's safe for you to input personal data into your Facebook profile because Facebook is not allowed to share this information with law enforcement officials or third parties for any reason. a. True b. False
False
Laws and regulations have thoroughly addressed concerns about privacy and data management in private organizations and federal agencies. a. True b. False
False
Many organizations actively attempt to convert explicit knowledge to tacit knowledge
False
Monitoring is the process of analyzing systems to make sure they are operating as intended.
False
Most organizations do not hesitate to conceal information about a data loss event if there is a fear of bad publicity and loss of customers. a. True b. False
False
Never send sensitive personal data such as credit card numbers, bank account numbers, or passwords via text or IM; only send them by email. a. True b. False
False
Organizations continue to operate their businesses using integrated information systems that lead to missed opportunities, increased costs, and lost sales. a. True b. False
False
Parallel start-up involves running a complete new system for one group of users while the rest of the users still run an old system.
False
Perceived usefulness and perceived ease of use do not have any influence in determining whether someone will use an information system.
False
Posting information to the Internet using anonymous email accounts or screen names makes it impossible to identify a libeler. a. True b. False
False
Security and control considerations are a negligible part of the entire system development process.
False
Spam emails make up only a small proportion (<10%) of emails. a. True b. False
False
Suppose you have an accounting background and you are considered an expert in the field of discovering errors in electronic spreadsheets. You are considered a knowledge engineer if you are part of a team that is developing an expert system to discover errors in spreadsheets.
False
Suppose your computer network was compromised in a large scale virus attack last Thursday. Most of the data files got corrupted beyond repair. The last data backup was done the Sunday before the virus attack. This means your company has an adequate backup process in place. a. True b. False
False
The Federal Commerce Commission is responsible for enforcing consumer protection laws that prevent fraud, deception, and unfair business practices. a. True b. False
False
The U.S. Congress has made several attempts to pass and maintain legislation that limits children's exposure to online pornography, but eventually each of these laws has been ruled out because they were unconstitutional. a. True b. False
False
The first step in implementing a knowledge management project is to identify the most valuable pieces of tacit knowledge to capture.
False
Some people believe that consumers should have the ability to correct errors in their personal data stored in corporate database systems, which is an issue of _____.
control
Your ex-colleague was apprehended based on the "Fraud and Related Activity in Connection with Access Devices Statute" Act. He was caught using unauthorized or stolen _________.q
credit cards
Kay should have been inputting data into her employer's database, but instead she was ____, meaning she was surfing the Internet, online shopping, and playing games.
cyberloafing
Liam, a specialist in _____, has designed a desk that uses hydraulic lifts to raise and lower the desk to the perfect height for any worker to use comfortably, whether sitting or standing.
ergonomics
Knowing that the Hennessey Venom GT, with a top speed of 270 mph, is the fastest car in the world, is an example of having _____ knowledge.
explicit
In computing, an attack on an information system that takes advantage of a particular system vulnerability is called a(n) _______.
exploit
Some parents use _____ as a means of controlling what their children see or access on the Internet.
filtering software
Hector and his team have received several requests for information from software development vendors, so now they are deciding how to go about analyzing the proposals and contacting several customers of each of the vendors. In other words, they are developing a plan for their _____.
final evaluation
Computer _______ is a discipline that combines elements of law and computer science to identify, collect, examine, and preserve data from computer systems, networks, and storage devices in a manner that preserves the integrity of the data gathered so that it is admissible as evidence in a court of law.
forensics
A(n) _____ is an approach to solving large, complex problems in which many repeated operations or models change and evolve until the best one emerges.
genetic algorithm
Maria has been revising a new app, so at the end of the day she recorded her changes in a(n) _____.
image log
The last time you backed up your computer's files was a week ago. You should perform a(n) ____.
incremental backup
A(n) _______ is an individual who captures trade secrets and attempts to gain an unfair competitive advantage.
industrial spy
The purpose of a(n) _____ is to seek information and relationships from the knowledge base and to provide answers, predictions, and suggestions similar to the way a human expert would.
inference engine
Kumar and Jodie have purchased a new computer system for the company where they work. After unpacking all of the new equipment and putting the components in place, they will have to test the new system to make sure it's operational before they can consider the ____ to be complete.
installation
The main purpose of the _____ is to provide a convenient and efficient means of capturing and storing all components of the knowledge base.
knowledge acquisition facility
A system of rules that tells us what we can and cannot do is referred to as _____.
law laws
Determining the _____ involves an analysis of existing and future laws to determine the likelihood of legal action against a systems development project and possible consequences of such action.
legal feasibility
The primary security threat for mobile devices continues to be ______ of the device.
loss theft
Some businesses outsource their security management to MSSPs. MSSP stands for ________.
managed security service provider
One advantage of the waterfall system development process is that formal reviews at the end of each phase allows maximum _____ control.
management
If an organization wants to document and measure flows of information among various sources, such as individuals, workgroups, organizations, and web sites, it should engage in _____.
organizational network analysis ONA organizational network analysis (ONA)
The concept of _______, in connection with IS security, recognizes that managers must use their judgment to ensure that the cost of control does not exceed the system's benefits or the risks involved.
reasonable assurance
Isabella's manager has asked her to write up a _____ that describes their company's interest in developing a custom software solution for processing orders and asks vendors to estimate the cost and time needed to create the software.
request for information RFI
Many organizations use _______ to provide a comprehensive display of all vital data related to an organization's security defenses, including threats, exposures, policy compliance, and incident alerts.
security dashboard software
A ______ defines an organization's security requirements, as well as the controls and sanctions needed to meet those requirements.
security policy
In a user interface design, most systems provide a(n) _____ that requires identification numbers, passwords, and other safeguards to improve security and prevent unauthorized use.
sign-on procedure
The _____ specifies the factors that can lead to better attitudes about the use of a new information system, along with its higher acceptance and usage.
technology acceptance model (TAM) technology acceptance model TAM
A(n) _____ is a formal agreement that a user signs stating that a phase of the installation or the complete system is approved.
user acceptance document
Before National Bank rolled out its new online banking system, it held numerous training sessions with managers and employees. It also executed a massive campaign to convince its customers of the benefits of the new system and to educate them on using it. These activities were all part of the bank's _____.
user preparation
The hazardous activities associated with unfavorable working conditions are collectively referred to as _____.
work stressors
Your company has acquired Joggers PLC, a smaller company. The integration of the information systems can take up to 6 months, and until then Joggers PLC workers will continue following their policies. You have been tasked with ensuring that their IT practices will be safe and lead to a secure system. What advice would you give your manager regarding information security policies?
I would ensure Joggers' infrastructure is well protected by firewalls, anti-virus software, and updated applications. I would enforce a password policy to make guessing the passwords improbable. I would recommend they institute a data backup policy that will make daily, weekly, and monthly backups of all the data. I would also make data access restricted to users' roles.
In the modern workplace where many employees are using their employer's computer technology for business, there are often two differing viewpoints regarding privacy: the organization's and the employees'. Describe each party's viewpoint and state your own opinion on this issue.
The right to privacy at work is also an important issue. Employers are using technology and corporate policies to manage worker productivity and protect the use of IS resources. Employers are mostly concerned about inappropriate web surfing, with over half of employers monitoring the web activity of their employees. Organizations also monitor employees' email, with more than half retaining and reviewing messages. Statistics such as these have raised employee privacy concerns. In many cases, workers claim their right to privacy trumps their companies' rights to monitor employee use of IS resources. However, most employers today have a policy that explicitly eliminates any expectation of privacy when an employee uses any company-owned computer, server, or email system. The Fourth Amendment protects individuals against unreasonable searches and seizures and requires that warrants be issued only upon probable cause and specifying the place to be searched and the persons or things to be seized. The courts have ruled that, without a reasonable expectation of privacy, there is no Fourth Amendment protection for the employee. Students' opinions will vary.
In a user interface design with a(n) _____ system, users select what they want to do from a list of alternatives.
menu-driven
A genetic algorithm is an approach to solving problems based on the _____. a. theory of evolution b. theory of relativity c. Compton Effect d. Complementarity Principle
A
Miranda works at a small-batch soda pop manufacturing plant. For eight hours a day, she uses her right hand to lift individual bottles of soda pop off the production line and place them in packing crates. Lately her right elbow has been hurting, so she visited her doctor, who diagnosed her with _______. a. a repetitive strain injury b. carpal tunnel syndrome c. a thromboembolism d. none of these answers
A
Once a _____ is installed, the attacker can gain full access to the computer. a. botnet b. zombie c. worm d. rootkit
A
The _____ requires all financial institutions to protect and secure customers' nonpublic data from unauthorized access or use. a. Gramm-Leach-Bliley Act of 1999 b. E-Government Act of 2002 c. USA Patriot Act of 2001 d. Sarbanes-Oxley Act of 2002
A
Which of the following is NOT a popular vendor of firewall software? a. Red Hat b. Check Point c. Kaspersky d. Total Defense
A
_____ states the principles and core values that are essential to a set of people and that, therefore, govern these people's behavior. a. Code of ethics b. Code of conduct c. Code of civil procedure d. Code of criminal procedure
A
In a denial-of-service (DDoS) attack, the perpetrator ____. a. instructs the zombie computers to send simple access requests to target computers b. sends out a huge number of spam emails to all of those in your contacts list c. changes the configuration information of the infected computers d. refuses to accept any email from any sender
A
An expert system's knowledge acquisition facility serves as an interface between _____. a. the end users and the inference engine b. the experts and the knowledge base c. the inference engine and the knowledge base d. the inference engine and the explanation facility
B
Which of these organizations offers guidelines on developing security policies? a. DHS b. SANS c. IBM d. CISCO
B
_______ try, on a daily basis, to gain unauthorized access to a number of important and sensitive sites, such as the computers at the British, French, Israeli, and United States foreign intelligence agencies.
Cyberterrorists
A botnet is a ____. a. network of robots that control an assembly line at a factory b. network of servers that exchange traffic data c. network of devices that are used for managing security d. network of computers that send out access requests to servers repeatedly
D
A company's risk assessment process can include numerous threats to the computers and networks. Which of the following can be considered an adverse event? a. Distributed denial-of-service attack b. Email attachment with harmful worm c. Harmful virus d. All of the above
D
A new _____ is a major program change, typically encompassing many new features. a. release b. patch c. slipstream upgrade d. version
D
A recent study conducted by the University of Nevada revealed that cyberloafing (wasting time online) costs U.S. businesses more than _____ annually. a. $25 billion b. $45 billion c. $65 billion d. $85 billion
D
After the software is implemented, some modification is done on the software during maintenance. Suppose the customer data analysis software used by ABC Bank was significantly changed, but no new features were added. This type of maintenance is called a _______. a. patch b. slipstream upgrade c. version d. release
D
Federal law permits employers to monitor their employees' use of company-owned computer equipment, specifically _______. a. e-mails b. instant messages c. website views d. all of these answers
D
Graydon noticed Jack, his friend and classmate, cheating on a physics exam and now he is trying to decide what to do about it. He knows he could keep quiet about it, but that would violate his moral values, plus the school's code of ethics requires students to report incidents of cheating. On the other hand, if he reports the incident, both his friend and probably all of their other friends will be mad at him. In which phase of the ethical decision-making process is Graydon? a. gathering information b. developing a problem statement c. identifying options d. weighing options
D
Which of the following statements is true of user acceptance testing (UAT)? a. UAT involves linking individual components together and testing them as a group to uncover any defects in the interface. b. A goal of UAT is to determine the work load at which systems performance begins to degrade. c. UAT is often done by independent testers who were not involved in developing program code. d. UAT must be completed successfully before newly developed software can be rolled out to the market.
D
You are part of the team to implement new software at XYZ Inc. The employees at XYZ Inc. trust the results of the old software programs, but are cautious about accepting the outcomes of the proposed new software programs. What software implementation strategy would you recommend in this situation? a. Direct cutover b. Phase-in approach c. Pilot startup d. Parallel start up
D
_____ is an iterative system development process that develops a system in "sprint" increments lasting from two weeks to two months. a. Prototyping b. Object-oriented development c. Individual development d. Agile development
D
_____ is the science of designing machines, products, and systems to maximize the safety, comfort, and efficiency of the people who use them.
Ergonomics
Software developers have created filtering software that blocks children from viewing inappropriate or harmful Internet sites at home or school, but to date developers have been unsuccessful in creating a similar software for use in the workplace. a. True b. False
False
Some companies offer health and wellness programs that require employee participants to share personal data. This data is protected under the same HIPAA privacy regulations as data shared with health insurance companies and doctors. a. True b. False
False
Spam emails do not add to costs because nobody reads them anyways. a. True b. False
False
The _____ Amendment protects individuals against unreasonable searches and seizures by requiring warrants to be issued only upon probable cause.
Fourth fourth
Pam, your new marketing manager, is exploring the purchase of tens of thousands of email addresses, from a legitimate source, for the purpose of sending product information to the masses. She has asked your opinion. Would you agree or disagree with her idea? Why or why not?
I would not agree with her idea to buy tens of thousands of email addresses and send mass emails to them. It will be considered spam and potentially marked as spam by the email filters. The email filters are quite sophisticated these days. Those emails may not make it to the inboxes of the intended audience. Given the general opinion that spam is not welcome, the email marketing campaign is not destined make any net positive impact on the potential audience minds. In addition, having received 'junk email' from our business would leave a not-so-good impression on people. They may reject any future genuine emails from our business. For these reasons, I would not agree with Pam.
At County Hospital, doctors and nurses must be able to access patient's records immediately and at all times in order to perform surgeries, provide medication, and cure patients' illnesses. Accessing records is a _____ process.
mission-critical mission critical
One of your colleagues has temporarily lost the ability to use his hands and fingers due to a rare medical condition. He would like to continue to interact with the computers at work. A solution based on ___________ would help him.
natural language processing voice recognition
A _____ is a computer system that can act like or simulate the functioning of a human brain.
neural network
Suppose you wish to inspect the packets of data that are coming in from the Internet into your organization's network. You should use _______.
next-generation firewall
A(n) _____ is a comparison of vendor options conducted in a computing environment and with a workload that matches its intended operating conditions.
performance evaluation test
The purpose of _____ is to use email messages to make the recipients reveal personal data.
phishing
There are federal laws that permit your employer to monitor your email communications, hence your ______ is not protected
privacy right of privacy rights of privacy privacy rights
_____, which means sending sexually explicit texts and/or photos, is illegal in some states, even if it is consensual.
sexting
A judge evaluating evidence against a criminal based on his prior experiences is an example of exhibiting _____ knowledge.
tacit
A data flow diagram (DFD) does not provide any information about process timing.
True
Although computers excel at numerical calculations, they are not as good at dealing with symbols and three-dimensional objects.
True
Expert systems use heuristics to arrive at conclusions or make recommendations.
True
The domain expert is the person with the expertise the expert system is trying to capture.
True
The overall purpose of an inference engine is to seek information and relationships from the knowledge base and to provide answers, predictions, and suggestions similar to the way a human expert would.
True
The use of e-mail among public officials might violate "open meeting" laws. a. True b. False
True
Someone who attempts to destroy the infrastructure components of governments is known as a ______________.
cyberterrorist
Sending an email message is like having an open conversation in public—many people can listen to your messages, especially if they are not _____.
encrypted
You've just purchased some new software for your laptop, but you can't seem to figure out how to install it correctly. When you call tech support, you're calling the company's _____.
help desk
You have been contacted to suggest a solution for creating a digital mockup of a machine to be used at a factory. The users would like to be able to view and interact with the layout of the controls of the machine, even before the actual machine is built. A(n) _______________ system will be an appropriate choice for this kind of problem
virtual reality
A(n) _____ is a system that enables one or more users to move and react in a computer-simulated environment.
virtual reality system
You are starting to see unexpected messages on the screen. Some programs that used to work do not work any longer. You find some key files missing. Your computer has been infected by a(n) _________.
virus
_____ is a popular and sophisticated software package that can be used to edit photographs and other visual images. a. PowerPoint b. Microsoft Silverlight c. Adobe Photoshop d. Autodesk
C
_____ requires unbiased and careful questioning of whether system elements are related in the most effective ways, considering new or different relationships among system elements, and possibly introducing new elements into the system. a. Causal analysis b. Creative analysis c. Critical analysis d. Data flow analysis
C
This harmful malware is triggered by a specific event, such as Friday the 13th. a. Virus b. Worm c. Logic bomb d. Trojan bomb
C
_____ is the process of analyzing systems to make sure they are operating as intended.
Systems review
Imagine that you are faced with an ethical dilemma at work, and you must determine the "right," or ethical, course of action. List the eight steps you will go through to make this decision, including some of the questions you'll ask yourself at each step in the process.
ANSWER: Questions to Consider Step 1: Gather information Have you spoken to everyone directly involved and gathered all the facts necessary to define the problem? Have you avoided assuming facts, motivations, or actions for which there is no evidence? Step 2: Develop a problem statement Do you know the answers to the following questions:What do people observe that causes them to think there is a problem?Who is directly affected by the problem?Is anyone else affected?How often does the problem occur?What is the impact of the problem?How serious is the problem?What are the ethical issues involved?When is a solution needed? Have you shared the problem statement with the stakeholders, and do they concur? Step 3: Consult those involved as well as other appropriate resources Have you discussed this issue with your manager? Have you sought input from human resources, legal, or other appropriate subject matter experts? Step 4: Identify options Have you identified the success criteria for a "good solution?" Have the stakeholders had an opportunity to offer solutions? Step 5: Weigh options How does each alternative fit with your organization's code of ethics, policies, regulations, and organizational norms? Is each alternative legal and consistent with industry standards? Does each alternative have possible unintended consequences? If so, how will you deal with those? Step 6: Choose an option Have you considered how choice of this option might appear to others? Would you be comfortable explaining your decision and describing your decision-making process to others? Is your decision grounded in a basic sense of fairness to all affected parties? Step 7: Implement a solution Have you provided to all stakeholders answers to the following questions: Why are we doing this? What is wrong with the current way we do things? What are the benefits of the new way for you? Do you have a clear transition plan that explains to people how they will move from the old way of doing things to the new way? Step 8: Review results Were the success criteria fully met? Were there any unintended consequences? Is there a need for further refinements?
The goals of _____ are to determine the work load at which systems performance begins to degrade and to identify and eliminate any issues that prevent the system from reaching its required system-level performance. a. unit testing b. user acceptance testing c. volume testing d. integration testing
C
The haptic interface relays the sense of _____ in the virtual world. a. sight b. sound c. touch d. smell
C
The purpose of Advanced Persistent Threat (APT) usually is to ____. a. steal money b. interrupt service c. steal data d. annoy the users
C
The second phase of an Advanced Persistent Threat attack is _____. a. capture b. reconnaissance c. incursion d. discovery
C
When video files are played while being downloaded from the Internet, it is called _____. a. video compression b. virtual reality c. streaming video d. file conversion
C
Assume your organization is experiencing an intruder attack. You have an intrusion detection system (IDS) set up. Which of the following events occurs first? a. Messages from the IDS are routed to the network security team b. The IDS warns the firewall of suspicious traffic c. The network router sends traffic to the firewall as well as to the IDS d. Network security team decides to block traffic from that IP address
C
Best Value Hardware Stores, a national chain, has established strict policies about the conditions under which a customer can return merchandise. These policies are an example of: __________. a. customer service b. an operational system c. a business rule d. a business rule management system
C
In one court case, a hospital employee, who had been fired for showing coworkers sexually explicit photos on a hospital computer, sued his former employer for wrongful termination. What did the court rule and why? a. The employee won the case because the court stated that he had a reasonable expectation of privacy. b. The employee won the case because the court stated that viewing sexually explicit photos is not illegal. c. The hospital won the case because the court stated that the employee did not have a reasonable expectation of privacy when using the hospital's computer at work. d. The hospital won the case because the court stated that all employers have the right to monitor their employees' behavior at all times.
C
In the context of data-flow diagrams (DFDs), the _____ includes arrows that show the direction of data movement. a. process symbol b. entity symbol c. data-flow line d. data store symbol
C
The _____ allows an expert system user to understand how the system arrived at its results. a. inference engine b. knowledge base c. explanation facility d. knowledge acquisition facility
C
The _____ is directed at Web sites catering to children and requires Web site owners to obtain parental consent before they collect any personal information from children under 13 years old.
Children's Online Privacy Protection Act (COPPA) Children's Online Privacy Protection Act COPPA
Discuss some of the factors that go into designing a multimedia application.
Designing multimedia applications requires careful thought and a systematic approach. Multimedia applications can be printed on beautiful brochures, placed into attractive corporate reports, uploaded to the Internet, or displayed on large screens for viewing. Because these applications are typically more expensive than preparing documents and files in a word-processing program, it is important to spend time designing the best possible multimedia applications. Designing a multimedia application requires that the end use of the document or file be carefully considered. Because different computers and Web browsers display information differently, it is a good idea to select styles, fonts, and presentations based on computers and browsers that are likely to display the multimedia application. Because large files can take much longer to load into a Web page, smaller files are usually preferred for Web-based multimedia applications.
You are being consulted for recommendation on software for sales report management. There are two choices. Choice #1 is a product from an industry leader that costs more than $1,000 per license per year. The second choice is a free open-source software that is free to download and install. The free software is in a language that your programmers do not have expertise in. You may be able to convince management to hire the right programmer to install the free and open source software. Considering the importance of data security, what solution would you recommend, and why?
I would recommend choosing the product from the industry leader. Since the software is from the industry leader, it is likely to have fewer vulnerabilities, and will be less risky. The second reason is that the large user base would have created reliable forums for troubleshooting. Thirdly, finding expertise for installation with this product will be easier. The open source software may have vulnerabilities that may not be discovered yet. For these reasons, I would recommend the first solution—to purchase the software license from the industry leader.
Briefly explain the difference between system testing and user acceptance testing (UAT).
System testing involves testing the complete, integrated system (hardware, software, databases, people, and procedures) to validate that an information system meets all specified requirements. System testing is often done by independent testers who were not involved in developing program code. They attempt to make the system fail. They frequently employ testing called black box testing because it requires no specific knowledge of an application's code and internal logic. In other words, a system tester is aware of what the software is supposed to do but is not aware of how it does it. During user acceptance testing (UAT), trained users test the information system to verify that it can complete required tasks in a real-world operating environment and perform according to the system design specifications. UAT is also known as beta testing, application testing, and end-user testing. Unlike system testing, which ensures that the system itself works, UAT determines whether the system meets its intended business needs.
What is system maintenance? List the reasons for systems maintenance.
Systems maintenance is a stage of systems development that involves changing and enhancing a system to make it more useful in achieving user and organizational goals. Some of the reasons for program maintenance are the following: 1. Poor system performance such as slow response time for frequent transactions 2. Changes in business processes 3. Changes in the needs of system stakeholders, users, and managers 4. Bugs or errors in the program 5. Technical and hardware problems 6. Corporate mergers and acquisitions 7. Changes in government regulations 8. Changes in the operating system or hardware on which the application runs
_____ includes written details that computer operators follow to execute a program and that analysts and programmers use to solve problems or modify the program.
Technical documentation
Briefly describe the various types of project feasibility that must be evaluated.
Technical feasibility examines whether a project is feasible within the current limits of available technology. Determining the technical feasibility is critical when new technology is first being considered for use within an organization, prior to its widespread use. Economic feasibility determines whether the expected benefits associated with a project outweigh the expected costs sufficiently to make the project financially attractive. Legal feasibility determines whether laws or regulations may prevent or limit a systems development project. Legal feasibility involves an analysis of existing and future laws to determine the likelihood of legal action against the systems development project and the possible consequences of such action. Operational feasibility is concerned with how the system will be accepted by people and how well it will meet various system performance expectations. Schedule feasibility determines whether a project can be completed in a reasonable amount of time. This process involves balancing the time and resource requirements of the project with other projects.
Human nature can make establishing a new KM program challenging, but there are best practices for successfully implementing such a program. Identify and explain the four steps recommended for implementing a KM project.
The first step in successfully implementing a knowledge management project is to connect the project to the organization's goals and objectives. By clearly defining the benefits and purpose of the project, the organizer will confirm the project is worthwhile and be able to elicit the support and enthusiasm of others in the organization. The second step is to involve enthusiasts within the organization to develop a small pilot program in order to work out issues, determine needed resources, and gain support. Since there is probably too much tacit knowledge to capture, organizers should identify the most valuable pieces of tacit knowledge needed in the third step of the process. Finally, in the fourth stage, the value and benefits of the project must be explained to employees throughout the organization in order to get their buy-in.