Information Systems Midterm Question Bank
Which of the following sets of characteristics specifically apply to relational databases?
A relational database organizes data in tables composed of records or objects (the rows), and fields (the columns) & Data tables in a relational database are linked by the fields they have in common.
Internet
Controls the movement of packets throughout the network
What security measures are commonly used at the perimeter level of database security?
Firewalls & VPNs
There are four key features of Web 2.0. One key feature allows users to collectively determine the classification of information. For example, tagging of websites, images, videos, and links. This key feature is called:
Folksonomy
The most efficient way to implement an effective business intelligence (BI) system is to:
Get buy-in from the users (typically first line employees, supervisors, and junior management).
In the early 20th century, Henry __ developed a horizontal bar chart that could be used to visualize a project schedule. Today, his chart is the most widely used tool in project management.
Gnatt
Network Access Layer
Handles the physical parts of sending and receiving data. Data can be sent via wireless networks, Ethernet cable, network interface cards (NIC), etc.
Which function of the NIST Cybersecurity Framework involves an organization gaining deeper understanding of cybersecurity management in the context of their business needs and resources?
Identify (ID) function
Jim, an HR director, does not want to change business management systems, even though it brings several advantages and falls within his department budget. What are two reasons why Jim might not want to make the change?
Jim believes the change will create employee stress as they are required to adapt to a new system. & Jim believes changing to the new system will cause a decrease in productivity, at least in the short-term.
Which of the following is not considered an entity in a university database?
Lecture Times
Which statement best summarizes the primary advantages of performing a data quality audit?
The audit recommends ways the organization can improve its data quality and reduce costs through increasing data consistency.
Application
The group of applications that require network communication and are used by people to facilitate communication. These include email and messaging applications
Why are prepared statements and parameterized queries effective against SQL injection attacks?
They prevent attackers from altering query intent even if they insert SQL commands.
What is the goal of the planning phase of the plan-protect-respond cycle?
Understand the steps needed to design effective information security architecture.
Which of the following is a key focus of maintaining data quality in database management?
Utilizing SMART data quality metrics
In which of the following scenarios is denormalization beneficial?
Where data retrieval speed is prioritized & In data warehousing scenarios
Sara, an executive with McMurtry Management, has decided that her organization needs to update its business management system. What three questions should she consider prior to choosing a system?
Where will the new system be housed? Is the change worth the expense and impact on employee morale? How will the new system interact with existing systems?
Decision-making information system
Works with a limited number of inputs and unknowns to provide managers with a statistical analysis of likely outcomes
Common methods to connect a LAN to the Internet include which of the following?
fiber optic, coaxial cables, and ethernet cables
To control how information is entered into a database, programmers and database administrators create ___ to help ensure data integrity.
forms
In cybersecurity, the probable maximum loss (PML) is used to______
help determine spending needed to adequately secure an organization's IT infrastructure
The goal of the NIST Cybersecurity Framework Protect (PR) function is to ______.
help protect an organization's IT infrastructure from security breaches by offering guidelines on IT infrastructure protection
The first stage of the project management (PM) process, in which project objectives are identified and feasibility studies are conducted is the ___ phase.
initiation
Which best practices help prevent SQL injection attacks?
input validation, prepared statements/parameterized queries, and frequent testing
Which of the following are advantages of using NoSQL databases?
Ability to handle large data sets, Support for both structured and unstructured data, & Optimized for querying data from emerging digital platforms
Ayala has decided to implement a new business management system. What are two advantages of hosting on-premises?
Any changes deemed necessary can be implemented extremely quickly & It can be configured to meet the unique needs of the organization.
Management information systems because they can be used to communicate, coordinate, and monitor business activities, can be indispensable when it comes to using ___.
Business processes
Which of the following is prohibited by the Computer Fraud and Abuse Act?
Cyber blackmail & Intentionally destroying a computer
Which of the following is an example of a tool that could be used to ensure data integrity?
Data are regularly backed up. & Data correction codes are used to ensure the data retrieved are the same as when it was stored.
What characteristics do entities in a database typically have?
Define people or objects that store data & Often are represented by nouns
Why might a company choose a NoSQL database over a relational database?
Demand for rapid querying of large volumes of data & Requirement for scalability across distributed systems
Which of the following is a task that data administration would be responsible for?
Determining that two-factor identification must be used to access data that the company has determined to be confidential, Deciding that the organization will begin collecting and storing users' locations upon the release of the next generation software for its mobile app, & Defining policies stating that employees may not share data with people who are not employees of the organization.
______ are cybersecurity breaches that make a computer or online service unavailable to its users.
Distributed Denial of Service (DDOS) attacks
Transport
Divides data into packets and acknowledges the packets have been received
According to the CIA triad, in which of the following examples is an organization ensuring data integrity?
During an acquisition, logistics data are securely transferred to the acquiring company's servers & Access to important data is limited so that only certain employees are able to modify that data
Tracking the performance of employees will always be a critical component of management for this reason, most firms use ___.
Employee Evaluation Software
Payscale.com, Payfactors.com, and Salary.com are examples of sites that offer ___
Employee comp management solutions
Which of the following are areas covered by state-specific cybersecurity laws?
Ensuring state and local governments are protected from cybersecurity threats, Protecting elections from cyber threats, Addressing security needs of smart devices.
Which of the following behaviors are considered insider threats according to CISA's definition?
Espionage, terrorism, and unauthorized access
What is conducted in the process optimization step of business process management?
Managers adapt (modify) the process to enhance process performance.
Predictive information system
Models trends and attempts to predict outcomes
The doubling of the number of transistors on each chip that occurs roughly every 18 months means that computer capability, and the corresponding software, also improve rapidly. This phenomenon is called ____ Law
Moore's
Why is it important for all organizations, no matter how small, to create and implement organizational information policies?
Organizational data are a critical asset; it is important to ensure its security.
What are the primary layers of database security?
Perimeter, Database, Access
The 3rd step in business process management provides managers the ability to play the "what-if" game by changing input variables (abstract) decision making. This is the ___ step
Process Execution
Database management system (DBMS)
Provides a means of storing and finding information
Which of the following statements describe the capabilities of relational database management system (RDBMS)?
RDBMS have features that support the quality and security of data. & RDBMS allow users to view, add, revise, and remove data.
Which of the following are primary goals of database normalization?
Reduce data redundancy. Maintain data consistency. Avoid anomalies during database operations.
Which of the following are methods database administrators use to optimize database performance?
Regularly updating and patching database software, Monitoring and adjusting storage parameters, & Fine-tuning queries and indexing strategies
In which function of the NIST Cybersecurity Framework does an organization's cybersecurity team take quick action to mitigate damage to systems?
Respond (RS) function
Which of the following distinguishes SQL Server from SQL?
SQL is used within SQL Server & SQL Server is an RDBMS.
What does the asterisk (*) symbol represent in an SQL query?
Selects all data that fits a criteria
When implementing a new business management system, which option provides managers with lowest initial start-up expenses.
Software-as-a-Service (SaaS) Option
Which of the elements of the CIA triad does serve in maintaining a properly functioning, error-free operating system?
availability
While there are many benefits of Cloud computing, there are also some disadvantages. One of the disadvantages is ___. This can occur because of maintenance, system/mechanical failure, natural disasters, and outside intrusions/attacks.
downtime
The software and processes that allow organizations to capitalize on the power of big data and predictive analytics is referred to as business ___ (BI).
intelligence
Today's employees expect to be able to go online and see a record of their compensation and make adjustments such as their tax withholding. Twenty years ago they would have planned to meet with their human resources department representative to make such changes. This is one example of how expectations change as advancements in business __ systems occur.
management
Electronic Communications Protection Act (ECPA)
provides protections for communications in storage and transit
Analytic platforms are designed to ______.
quickly gather and analyze specific organizational data to provide information that guides decision making
In a relational database, such as Microsoft Access, a collection of related fields in a data file is called a ___
record
The detection of errors in data sets and the correction/removal of of these mistakes to ensure an organization's data are valid is referred to as data _____ or data cleansing.
scrubbing
The primary characteristic of a relational database is that it ______.
stores and allows access to data objects that are related to one another
When employers deactivate former employees' username and passwords, they are using which tool that ensures confidentiality?
access control and authentication
Serving as the technology behind cryptocurrencies such as Bitcoin, __ provides a level playing field for all users.
blockchain
Geographically distributed network server groups that work together to deliver more efficient delivery of Internet and Web content are called __ Delivery Networks (CDN).
content
Salesforce remains one of the largest suppliers of ___ software solutions.
customer relationship management (CRM)
Nearly all BI software platforms have a(n) ___, that displays an overview of the data that is presented.
dashboard presentation