Intro to Management Information Systems Midterm (Module 1-8)
The _______________ step in the ethical decision-making process is considered the most critical.
develop a problem statement
ability to install and use two different operating systems on the same hardware.
dual booting
There are _______________ steps that must be taken to perform a thorough security risk assessment.
eight
The purpose of data normalization is to
eliminate data redundancies and ensure data dependencies make sense
an internal corporate network built using Internet and World Wide Web standards and products.
intranet
A network device that directs data packets to other networks until each packet reaches its destination is a
router
visual approach to developing database queries or requests.
query by example (QBE)
Two specific BI/analytics techniques that are in the general category of descriptive analytics are
regression analysis and visual analytics
regulations safeguard PHI (protected health information) and ePHI (electronic PHI) data gathered in the health care process and standardizes certain electronic transactions within the health care industry.
HIPAA (Health Insurance Portability and Accountability Act)
n the design of a database, it is not necessary to know how long the data must be stored
false
properties of SQL databases help ensure the integrity of data in the database.
ACID
The builders of safety-critical systems must determine when they have completed sufficient testing and sign off their approval to release the product. This is typically an easy and straight-forward decision.
false
The use of primary keys and foreign keys make it impossible to define relationships between the data in two tables of a relational database.
false
A blended threat, phishing, and virus are all examples of a(n)
ransomware
Spreadsheet, word processor, and graphics presentation software are used in the_________ sphere of influence.
single-user
Input/output devices provide data and instructions to the computer and receive results from it
true
There is a concern by some people who belong to a particular ethnic, religious, or social group that surveillance data collected by the government could be used to identify and target them and their associates
true
The fact that big data comes in many formats and may be structured or unstructured is an indicator of its
variety
is a standard page description language for Web pages that tells the browser how to display font characteristics, paragraph formatting, page layout, image placement, hyperlinks, and the content of a Web page. It uses tags, which are codes that tell the browser how to format the text or graphics as a heading, list, or body text.
HTML
site provides a portal to 125 years of U.S. health care data.
Heathdata.gov
A database and a database management system are the same thing.
false
Acting in an ethical manner and acting in a legal manner will always lead to the same actions.
false
A data center designed to have an expected annual downtime of less than 30 minutes and able to handle a power outage of up to four days is a tier _______________ data center.
4
What federal law gives citizens the right to expect their private information will be protected from undue investigation?
4th Amendment
How are desktop and mobile operating systems similar?
Both feature a graphical user interface (GUI).
Which of the following is not a disadvantage of self-service analytics?
It places valuable data in the hands of end users.
A 5G network will have the following advantages over a 4G network
Lower latency, greater bandwidth, and ability to support more devices.
What tool can you use to see how the app will perform on Android devices?
SDK
an approach to networking that allows network administrators to manage a network via a controller that does not require physical access to all the network devices, such as routers and switches. (abstracting network control)
SDN (software-defined networking)
a Web address that specifies the exact location of a Web page using letters and words that map to an IP address and a location on the host.
URL
A network that connects large geographic regions is a
WAN
____________is not a key challenge associated with big data.
Which format the data should be stored in
The fact that _______________ is not a benefit that can be expected from following a professional code of ethics.
a code can provide an answer to every ethical dilemma
A(n)______ is the technique used to gain unauthorized access to a device or a network.
attack vector
Web client software used to view Web pages is called
browser
The primary hardware component of a computer responsible for routing data and instructions to and from the various components of a computer
bus
A key difference between grid computing, multiprocessing, and parallel processing is
grid computing relies on a community of computers acting together
Genetic algorithm and linear programming belong in the _______________ general category of BI/analytics.
optimization
Three advantages associated with a software-defined network include
the risk of human error is reduced, overall network support and operations costs are reduced, and new applications can be made available sooner
8. One means of ensuring that you are interacting with a secure Web site is to look for a Web address beginning with https
true
Four information system types based on their sphere of influence include interorganizational, personal, enterprise, and
workgroup
a graphical representation that summarizes the steps a consumer takes in making a decision to become a customer, and it enables decision makers to see what steps are causing customers confusion or trouble.
conversion funnel
You need to create a relationship between the Transactions table and the Customers table. To do this, what foreign key must be added to the Transactions table?
customer_ID
Sensors placed in each engine report real-time data on the engine's performance and condition. This massive amount of data must be subjected to a thorough ___________process to determine the state of the engine at any given time, its performance over time, and any indications of problems.
data analytics
a network device that directs data packets to other networks until each packet reaches its destination. A router usually connects two different networks and routes data packets between them.
router
All of the following are among the advantages of green computing except:
Eliminates server virtualization needs
The perpetrator most likely to be the cause of a cyberattack is the
careless insider
Which of the following is not a function of the database management system _______________?
database data normalization and data cleansing
You're an HR director meeting with your CEO to discuss plans for a new application that will allow employees to track their own hours and earned vacation time. There are several pieces and parts that need to be coordinated, and the two of you are trying to decide which employees to bring on board for the project. She's got a ________ background and helped with this kind of thing at her prior company where she developed the initial design for some bookkeeping software. We need a__________ Zahira is our ________ I'll ask her to jump in as well.
system analyst programmer web developer
database is stored on a service provider's servers and accessed by the service subscriber over the Internet, with the database administration handled by the service provider.
DBaaS (database as a service)
component of the Hadoop environment is composed of a Procedure that performs filtering and sorting and a method that performs a summary operation.
Map/Reduce program
Act written to protect children from pornography on the Internet but was ruled unconstitutional.
The Children's Internet Protection
Which of the following is not a key responsibility of the data governance team?
decide which database technology should be used
A collection of instructions and commands to define and describe data and relationship in a specific database is a
data definition language (possibly)
Primary key for a transaction table that would generate a unique number for each transaction. The Customer_ID field could be a primary key for the Customers table where each customer would have a different ID, but each Customer ID could be used repeatedly in the Transactions table for multiple purchases by the same customer. Similarly, a single transaction might include multiple items (Item_ID), and each Transaction_Date could apply to multiple transactions.
Activity_ID
the only Web site authorized by federal law to provide free credit reports under FACTA.
AnnualCreditReport.com
The growth of the Internet of Things is helping to curb the number of cyberattacks.
False
All of the following are true about General Data Protection Regulation (GDPR) except:
GDPR does not cover EU employees
an open-source software framework that includes several software modules that provide a means for storing and processing extremely large data sets. It divides data into subsets and distributes the subsets onto different servers for processing, placing the data processing software on the same servers where the data is stored. This approach creates a highly redundant computing environment that allows the application to keep running even if individual servers fail.
Hadoop
an open-source relational DBMS developed, distributed, and supported by Oracle.
MySQL
____________automation allows cloud services to continually evaluate performance and make changes as needed to optimize performance and minimize costs.
Self-optimizing
An individual who combines strong business acumen, a deep understanding of analytics, and a healthy appreciation of the limitations of their data, tools, and techniques to deliver real improvements in decision making is a(n)
data scientist
Cloud service providers can offer various ________capabilities to help ensure that tenants have access to their cloud resources at all times.
disaster recovery
a person, place, or thing (object) for which data is collected, stored, and maintained.
entity
is a means to offer limited network access to people external to the organization such as selected customers and suppliers.
extranet
Organizations are using the Internet of Things (IoT) to capture and analyze streams of sensor data to detect patterns and anomalies—not after the fact, but while they are occurring—in order to have a considerable impact on the event outcome.
false
Three commonly used approaches to cloud computing are public cloud computing, private cloud computing, and __________cloud computing.
hybrid
Public cloud computing offers three key benefits to organizations including
increased redundancy in the event of disaster, reduced costs, and flexible computing capacity
___________provide data and instructions to the computer and receive results from it.
input/output devices
The primary advantage associated with the use of an in-memory database to process big data is that _
it provides access to data at rates much faster than storing data on some form of secondary storage
When you create the relationship from the Customers table to the Transactions table, what type of relationship should you configure?
many-many (possibly)
A faulty sensor or a bad network connection can result in __________or IoT sensor data that lacks a time stamp indicating when the reading occurred.
missing data
The five broad categories of BI/analytics techniques include
optimization, descriptive analytics, and text and video analysis, simulation, and predictive analytics
The purpose of client-side programming is to
provide an interface to allow the client computer to request services of the server computer
one whose failure may cause human injury or death.
safety-critical system
A private cloud computing environment can provide more data security than a public cloud computing environment.
true
An organization may require high-quality data to avoid fines and penalties for non-conformance to regulatory requirement
true
Choosing what data to store and where and how to store the data are two key challenges associated with big data.
true
Each user should conduct a security self-assessment test.
true
a measure of the quality of big data
veracity
systems software that controls the computer systems and devices on a network. Some SDN solutions use robust software controllers that are categorized as network operating systems.
NOS (network operating system)
database enables hundreds or even thousands of servers to operate on the data, providing faster response times for queries and updates.
NoSQL
A _______________ differs from a _______________ in that it provides a means to store and retrieve data that is modelled using some means other than the simple two-dimensional tabular relations.
NoSQL database and relational database
is a form of software that is distributed, typically for free, with the source code studied, changed, and improved solely by the original developers.
Open-source software
comes from a variety of sources and does not fit neatly into traditional relational database management systems.
Unstructured data
All of the following are a type of biometric authentication except:
VPN recognition
The right to freedom of expression is one of the most important rights for free people in the United States. The _______________ was adopted to guarantee this right and others.
First Amendment
Four drivers that set the information strategy and determine information system investments include corporate strategy, technology innovations, innovative thinking, and
business unit strategy
a class of software used to meet organization-wide business needs and typically shares data with other enterprise applications used within the organization.
enterprise
Programming languages are commonly used to perform data analysis and build application software, system software, embedded systems, Web sites, and
games
The strategic planning process for the IS organization and the factors that influence it depend on how the organization is perceived by the rest of the organization.
guarantees that only the most current technology solutions will be employed
Computer forensics is a discipline that combines elements of _______________ and computer science.
law
One of the consequences of a successful cyberattack that can lead to monetary penalties for organizations that fail to comply with data protection regulations is
legal consequences
Two potential benefits of obtaining a certification in an IS subject area are:
new career possibilities and a potential increase in salary
A collection of attributes about a specific entity is a
record
The three primary types of end user license agreements are individual/multiuser, network/multiuser, and
single-user
A class of computer used by people on the move to run personal productivity software, access the Internet, read and prepare email and instant messages, play games, listen to music, access corporate applications and databases, and enter data at the point of contact.
single-user portable computer
Managers of the business functions most affected by a new information system have a key responsibility to ensure that
the people, processes, and human structure components are fully addressed
The primary intent of a code of ethics is to define desired behavior.
true
What information does Gregory's team need to have on hand as they're setting prices for each item in their company's new line of shoes?
Current level of the market's familiarity and preference for his company's brand Competitors' prices on similar items Perceived value of differentiating factors for his company's shoes
Which of the following is not associated with the implementation of server virtualization?
Increase in the number of software licenses that must be purchased
All of the following are true about SQL except: a.It was first called a Structured English Query Language, or Sequel b.It uses keywords such as SELECT, FROM, and WHERE c.It does not support relational database design d.Microsoft Access and Oracle database support it
It does not support relational database design
a model used to introduce new systems into the workplace in a manner that lowers stress, encourages teamwork, and increases the probability of a successful implementation.
Leavitt's Diamond
Naomi is a market researcher for her company, which designs and manufactures carpets and rugs. She travels globally to conferences and trade shows to track current trends in her industry. During one trip, Naomi learns about a new dye technique that results in more resilient color at a lower cost. She brings the relevant information back to her team and other experts in her company to discuss the feasibility of implementing this technique in their products. Which part of her company's supply chain will be most directly affected by these changes? The new dye technique is implemented before competitors discover and implement similar techniques. At this point, Naomi's job role is likely to be seen as a________
Operations game changer
Three ways IS organization can be perceived by the rest of the organization that influence IS strategy are
cost center, business partner, and game changer
Data governance is a subset of data management.
false
Five actions an organization must take in the event of a successful cyberattack include incident notification, protection of evidence and activity logs, incident containment, eradication, and incident
follow-up
Three subject areas where federal statutes have been implemented to protect the personal data of U.S. citizens include financial data, children's personal data, and
health information
Peoples' lives are at stake here. We don't want this interfering with any of our scheduled surgeries, and we need to know how this might affect any emergency surgeries. This software is classified as a _____________ meaning it gets our highest priority attention from our most qualified technicians throughout the upgrade process.
safety-critical system
The NSA is required to obtain permission from the Foreign Intelligence Surveillance Court (FISC) to access the telephone metadata records of U.S. citizens, which are now held by telecommunication companies rather than by the government.
true
The contemporary view of information systems is that they are often so intimately involved in an organization's value chain that they
true
a methodology for planning, coordinating, and controlling any change made to a system.
change management
A networking approach wherein many clients (end user computing devices) request and receive services from servers (host computers) on the network is
client/server
To pull more information and insights from existing data sets. What analytics tool will help them explore this data to identify patterns they can use to make predictions about which strategies will work best for each identified population?
data mining
is a large database that holds business information from many sources in the enterprise, covering all aspects of the company's processes, products, and customers.
data warehouse
The goal of the________ step of the ETL process is to take the source data from all the various sources and convert it into a single format suitable for processing.
extract
Encouragement of self-service analytics almost assuredly will eliminate the risk of erroneous analysis and reporting and the problem of different analyses yielding inconsistent conclusions
false
JavaScript, VBA Script, HTML, CSS, and Ajax are server-side programming languages, while PHP, C++, Java, Python, and Ruby on Rails are client-side programming languages.
false
A network topology in which all network devices connect to one another through a single central device called the hub node is a
star network
a network device that keeps a record of the Media Access Control (MAC) address of all the devices connected to it and uses this information to determine to which port a packet of data should be directed. Switches connect computers, printers, phones, and servers to the network.
switch
Many Web sites use Cascading Style Sheets (CSS) to define the design and layout of Web pages, and Extensible Markup Language (XML) to define the content, and hypertext mark-up language to join the content with the design
true
By designing a cloud to function fluidly across multiple providers, a business can reduce its ______ limitations and increase its ability to shift services between providers.
vendor lock-in
You're helping to on-board a new employee who will be spending some time working from home as well as traveling twice a month for meetings with clients. Employee: Actually, I just bought a new tablet recently that I really like. Will I be able to use that tablet for work? You: Yes, we have a ___________ so you can use your tablet to access company computing resources and applications. Employee: That's good to hear. Will you have to make any changes to it before I can use it for work? You: We'll scan it for any security vulnerabilities and apply the necessary_____________ to close those gaps. Employee: Does that mean my tablet will be safe going forward? You: Not necessarily. For example, a(n)________________ could take advantage of a newly discovered vulnerability before it's patched.
BYOD policy patches zero day attack
not a specific goal of green computing.
Combating global climate change
Emma is ordering a new desktop computer for her work as graphic designer. She wants to make sure she has the latest technology so the computer can render graphics quickly, store large files, and display colors accurately. Which of these options is the most current variety of RAM that Emma can order for her computer? Emma plans to back up her data to the cloud daily; however, she wants to maximize budget-friendly storage space available locally on her computer without any special equipment. What is the best type of storage to meet Emma's needs? Emma needs a monitor that will be easily viewable from multiple angles and will produce bright, sharp images. She's been advised that a(n) __________ monitor, which does not rely on a backlight, will give her the best performance.
DDR4 HDD OLED
My students need a user-friendly app for recording and mixing music. They've been using Apple's GarageBand on my old computer. What operating systems will GarageBand work on? GarageBand works on ______computers. You might be able to find similar software for other operating systems, though. I also need my students to be able to use some new VR software and a video editing app that work only on Windows. Does that mean I'll have to buy two computers? No, you could use______ to run both operating systems on the same computer.
MAC dual booting
You've been hired by a large travel and tourism agency to upgrade their security systems. There are several specific areas of concern they'd like you to address and make recommendations. First, the agency is concerned about protecting their internal network where they host some servers, databases, and several workstations. Due to their global exposure with travel activities around the world, they've experienced some fairly sophisticated attacks on their network. You discover they're using an older firewall that simply isn't designed to protect against today's technologies. What would be a better alternative to protect their network resources?
NGFW
Which of the following is not a true statement about the software as a service model.
The SaaS subscriber must manage service levels and availability, so there may be a need to add hardware, software, or communications capacity as the number of users increases.
Which of the following is not an advantage associated with database-as-a-service (DaaS)?
The customer has complete responsibility for database security access and database backup.
Which of the following are non-technical skills not commonly associated with an effective Information system worker?
ability to work in a static, boring environment where there is little change
A key difference between the U.S. and EU fair information practices is that _______________.
although numerous laws have been implemented over time, no single overarching national data privacy policy has been developed in the United States
Because citizens' right to privacy is based upon a(n) _________ of privacy, company policies are needed that specify for employees what information and electronic services are subject to search.
expectation
The operating system plays no role in controlling access to system resources to provide a high level of security against unauthorized access to the users' data and programs as well as record who is using the system and for how long
false
A _______________ is a collection of similar entities while a(n) _______________ is a characteristic of an entity.
file and attribute
The class of computer used to support workgroups from a small department of two or three workers to large organizations with tens of thousands of employees and millions of customers is the
multi-user computer
Organizations must take strong measures to ensure secure, private, and reliable computing experiences for their employees, customers, and business partners.
organizational, network, application, and end user
We've been prioritizing security upgrades and improved processes over the past year. However, a_______________ would give us a more detailed and thorough assessment of existing vulnerabilities and threats. Unfortunately, we can never eliminate all vulnerabilities unless we just stop doing business. Once we get the report, we can determine how much investment is needed to reach a level of_____that balances security costs with a level of risk we're comfortable with. It's good to do a risk assessment every year. In the meantime, we can use a______to help track key perform
security audit reasonable assurance security dashboard
The two basic types of software are application software and
system software
Which of the following statements is true about strategic planning?
(all of the above) Helps managers identify initiatives Involves more complex considerations Within the IS department a strategic goal aligns with the larger corporate objectives
Next, they're concerned about ways their network has been exposed to viruses due to employees using company computers to visit international Web sites with questionable security. What can you add to the network to offer the company better control over which Web sites are approved for business interactions? After deploying several of the recommended security improvements, you suggest that the final and most important step in protecting the organization's security perimeter is
Proxy server end-user education
A federal law that focuses on unlawful access to stored communications to obtain, alter, or prevent authorized access to a wire or electronic communication while it is in electronic storage.
Stored Wire and Electronic Communications and Transactional Records Access Statute
An organization that monitors, manages, and maintains computer and network security for other organizations is called a_________ service provider.
managed security
When implementing a new information system in an organization, effects on the four key components defined by Leavitt's Diamond must be considered in order to increase the probability of a successful implementation. To do this, you must first identify how these components show up in your organization. Identify which major component of the organization is being highlighted in each scenario.
Technology-Dr Baggett Structure-Raul Process-Gina People-Dr. Michaels
_______________ is not a benefit of promoting a work environment in which employees are encouraged to act ethically.
The employees' tendency to act in a manner that seems ethical to them will be suppressed and instead they will act in a manner that will protect them from punishment.
All of the following are true about data science and big data except: a.No digital data is stored in traditional databases b.Data scientists use skills in data management, statistics, and software development c.Data science involves preparing, manipulating, and analyzing large amounts of digital data d.Digital data is growing at the rate of 2.5 quintillion bytes per day
No digital data is stored in traditional databases
a software design approach based on the use of discrete pieces of software (modules) to provide specific functions (such as displaying a customer's bill statement) as services to other applications.
Service-oriented architectur
When comparing off-the-shelf software to proprietary software, which of the following statements is not true:
The initial cost of the off-the-shelf software is likely greate
Identify the type of information system most relevant to each scenario.
Workgroup information system-Latoya Personal information system-Reginald Inter-organizational information system-Cam Enterprise information system-Shanna
We use a sophisticated ___________ process to plan, track, and control each change. We've also conducted extensive testing on clones of your existing systems, and will allow time during the maintenance window for additional testing during and after the upgrade.
change management
The process of detecting and then correcting or deleting incomplete, incorrect, inaccurate, or irrelevant records that reside in a database is called
data cleansing
The individual who is responsible for planning, designing, creating, operating, securing, monitoring, and maintaining databases is the
database administrator
Safety-critical systems are easy to learn and use because they perform quickly and efficiently, they meet their users' needs, and they operate safely and reliably.
false
While there are three key components that must be in place for an organization to get real value from its BI and analytics efforts, the one that is first and foremost is the existence of a solid data management program
true
Common issues encountered when moving to public cloud computing include complex pricing arrangements, performance issues, inadequate data security, and
vendor lock-in
For decades, organizations have collected operational, sales, and financial data with their __________________systems, which put data into databases quickly, reliably, and efficiently but did not support the type of data analysis that today's businesses and organizations require.
OLTP (online transaction processing)
_______________ maps the name people use to locate a Web site to the IP address that a computer uses to locate a Web site.
domain name system
The primary difference between business intelligence and analytics is that
BI is used to analyze historical data to tell what happened or is happening right now in your business while analytics employs algorithms to determine relationships among data to develop predictions of what will happen in the future.
allows consumers to request and obtain a free credit report once each year from each of the three primary consumer credit reporting companies (Equifax, Experian, and TransUnion).
FACTA (Fair and Accurate Credit Transactions Act)
requires that employers obtain an employee's or applicant's written permission before running a credit check related to hiring or employment processes.
FCRA (fair credit reporting act)
specially denoted text or graphics on a Web page, that, when clicked, open a new Web page containing related content.
Hyperlinks
specifies how to address and route each packet to make sure it reaches the desired destination.
IP
A 64-bit number that uniquely identifies a computer on the Internet is a(n)
IP address
Every computer (such as a Web server) connected to the Internet must have a unique address called
IP address
All of the following are a part of cloud computing services except: a.Platform as a service (PaaS) b.Infrastructure as a service (IaaS) c.Software as a Service (SaaS) d.Information as a Service (IaaS)
Information as a Service (IaaS)
All of the following are true about 5G, or fifth generation of cellular networks except: a.Taking advantage of 5G requires significant investment b.It supports lightning fast internet speeds, of at least 20 gigabits per second c.It does not mean that a hospital can serve more patients d.Downloading a movie takes about 25 seconds, as compared to the 10 minutes it took over 4G
It does not mean that a hospital can serve more patients
a wireless network that connects information technology devices close to one person.
Personal area network
can be used to lock out access to a record if the record is being updated or used by someone else.
concurrency control
___________could provide insights that result in notifications of needed preventive maintenance or preemptive action.
predictive analysis
Data mining and time series belong in the general category of _______________ of BI/analytics.
predictive analytics
One of the first things developers of IoT applications should focus on is building in _______________ from the start
security
Gregory can use ______to provide the most relevant and complete information regarding the target market's current level of familiarity with his company's brand.
three subclasses of computers associated with the multiple-user computer.
Server, mainframe, and supercomputer
The process of building software for safety-critical systems takes much longer and is much more expensive because
extreme measures must be taken to identify and remove defects starting at the very earliest stages of software development
One of the driving reasons behind the need for data management is to manage risk associated with the misstatement of financial data.
true