intro to info systems exam 2
All of the following are types of information systems general controls except:
Application Controls
Which of the following is not a part of business intelligence infrastructure?
Balanced scorecards
An expert system cannot consider multiple rules at the same time.
False
Knowledge workers include all of a company's workers who are tasked with managing or creating knowledge, from top-level scientists to clerical and data workers.
False
Neural network applications explain why they arrive at a particular solution.
False
Operational management face primarily semistructured decisions.
False
Apple's Siri application is an example of which of the following?
Intelligent Agent
Software programs that work without direct human intervention to carry out specific tasks for individual users, business processes, or software applications, are called:
Intelligent Agent
__________ use scanning software to look for known problems such as bad passwords, the removal of important files, security attacks in progress, and system administration errors.
Intrusion Detection System (IDS)
Which of the following is the single greatest cause of network security breaches?
Lack of user knowledge
Which of the following has a hidden layer that processes inputs?
Neural Network
Which of the following typically makes the unstructured decisions for a firm?
Senior management
A semistructured decision is one in which only part of the problem has a clear-cut answer provided by an accepted procedure.
True
A structured decision is repetitive and routine.
True
Al applications are used by search engines and social networks to target ads.
True
An acceptable use policy defines acceptable uses of the firm's information resources and computing equipment.
True
Authentication refers to verifying that people are who they claim to be.
True
Biometric authentication uses systems that read and interpret individual human traits.
True
Data visualization technologies are used to help human users see patterns and relationships in large amounts of data
True
DoS attacks flood a network server with thousands of requests for service
True
Expert systems capture the knowledge of skilled employees in the form of a set of rules in a software system that can be used by others in the organization.
True
Some decision scenarios made by middle managers may have unstructured components.
True
The data-driven farming systems described in the chapter-opening case are an example of operational intelligence.
True
Which of the following involves where, when, and how to apply knowledge?
Wisdom
An inference engine is:
a strategy used to search through an expert system's collection of rules and formulate conclusions.
When a hacker discovers a security hole in software that is unknown to the software's creator, it is an example of:
a zero-day vulnerability
The dimension of _______ in information quality describes whether the structure of data is consistent.
accuracy
Genetic algorithms:
are a form of machine learning.
Which of the following refers to all of the methods, policies, and organizational procedures that ensure the safety of the organization's assets, the accuracy and reliability of its accounting records, and operational adherence to management standards?
controls
The _________ phase of decision-making involves identifying and exploring various solutions to a problem.
design
When hackers gain access to a database containing your personal private information, this is an example of:
identity theft
When managers represent their company in the outside world and perform symbolic duties, they are acting in their:
interpersonal role
A(n) ________ is a type of intelligent technique that finds patterns and relationships in massive data sets too large for a human to analyze.
neural network
Decisions regarding managing and monitoring day-to-day business activities are referred to as ___________ intelligence.
operational
A firewall allows the organization to:
prevent unauthorized communication into and out of its network.
The text defines ________ as expertise of organizational members that has not been formally documented.
tacit knowledge
An authentication system in which a user must provide two types of identification, such as a bank card and PIN, is called:
two-factor authentication
When there is no well-understood or agreed -on procedure for making a decision, it is said to be:
unstructured
Neural networks:
use Learning Rules to identify the optimal path through the network.
Blockchain refers to a technology that:
uses a chain of digital "blocks" that contain records of transactions.
CryptoLocker is an example of which of the following?
Ransomware/Trojan