IS251 Quizzes 1-7

Ace your homework & exams now with Quizwiz!

Look at the digital signal depicted below. What is the digital output for highlighted point B?

0

Industry experts estimate that ________ percent of data in an organization is unstructured.

80-90

The What is an Information System video describes an Information System as...

A set of computer-based tools that collects, stores, and processes data in our world.

Law enforcement uses drones for what purpose?

All of the above

________ is the largest book publisher and bookseller in the US today.

Amazon

________ support managers at all levels of the organization.

Clerical workers

Which of the following is NOT an advantage of VPN?

Cost

________ modems use the digital portion of a voice telephone to offer broadband access.

DSL

________ is an example of a metasearch engine.

Dogpile

Look at the digital signal depicted below. What is the digital output for highlighted point C?

Either 1 or 0 at random

A workforce including more women, single parents, minorities, and persons with disabilities puts societal pressure on organizations.

False

According to the videos, the Time of Spreadsheets has only just begun!

False

Credit card data is only helpful to online retailers and publishers if those cards are used for purchasing items online; they do not provide relevant information for brick-and-mortar purchases.

False

Disintermediation is a threat of substitute products from Porter's Five Forces.

False

If you grew up using IT, you are an informed user.

False

If you purchase an e-book from Amazon, it is a clicks-and-mortar transaction.

False

It is more secure for a buyer to use the telephone or mail to arrange or send payments than to use a computer.

False

Nearly all TPSs are ERP systems.

False

Opendoor makes its money by charging home buyers a commission.

False

Privacy rights apply only to individuals.

False

Procurement is a subset of the purchasing process.

False

The Internet and World Wide Web are synonyms.

False

The new, consultative function of the MIS department centers on more efficient project management, technical training, and effective infrastructure planning.

False

True or False? IoT devices are 100% secure and all of your data is private and accessible only to you.

False

True/False? According to Immanuel Kant, it is morally acceptable to tell a lie in extreme cases only.

False

True/False? Immanuel Kant is an example of a consequentialist philosopher. In that, he believes the outcome far outweighs the means.

False

You file your income taxes online. This is an example of _________ e-commerce.

G2C

Which of the following is an accuracy issue?

How can we ensure that errors in databases, data transmissions, and data processing are accidental and not intentional?

________ is an example of a social, collaborative, industrial robot.

LoweBot

What is a challenge of IoT?

There are so many companies creating IoT products, but there's no way for them to communicate with each other.

A foreign key is a primary key in another file.

True

According to the videos, people expect that an AI machine will be on a company's Board of Directors.

True

Advancements in information technology make privacy harder to manage.

True

Amazon Business stays competitive in niche markets by using a long tail strategy.

True

Customers of a business process can be either internal or external to the organization.

True

Cyberterrorism is typically carried out by individuals or groups whereas cyberwarfare is carried out by nation states or nonstate actors such as terrorists.

True

Fat clients have large storage and processing power and therefore can run local programs.

True

Nearly all ERP systems are also TPSs.

True

No central agency manages the Internet.

True

Privacy must be balanced against the needs of society.

True

The external audit of information systems is frequently a part of the overall external auditing performed by a CPA firm.

True

The rightmost part of an Internet name is its top-level domain.

True

The traditional function of the MIS department centers on the idea that end users do not have the required technical expertise to address IT issues.

True

True or False? If you have something that is Internet Smart, you probably have something that is part of the Internet of Things.

True

True or False? Logistics, Operations, and Sales are primary activities of a company.

True

True or False? Professor Lenzo was born and lived part of his life at some point during Globalization 2.0 and 3.0.

True

True/False? According to the video, after a shopper clicks on "Buy" and fills out the payment information, that information is then sent through the payment gateway.

True

Match the following terms with the appropriate connectivity medium.

Uses the copper in telephone wires to transmit data - DSL, Uses pulses light to transmit data - fiber optic cable, What old folks like Professor Lenzo used to get onto the internet during the 1990s - dial up connection, A type of home connectivity where the upload speed and download speed are relatively the same - SDSL, A type of home connectivity where the upload speed is far slower than the download speed - ADSL, A type of home connectivity that uses a cable television provider to connect one to the internet - cable modem

________ made Uber's first self-driving cars that arrived in Pennsylvania in 2016.

Volvo

Judith works from home. In order to access her corporate email and other computer systems she logs into a virtual private network (VPN). The VPN is an example of _____________.

a communications control

You open an e-mail from your friend that looks a little odd, but you figure your friend would never send you anything bad. This is _________ and is an _________ mistake.

a human error; unintentional

You can check your credit report annually for free through TransUnion, Equifax, and Experian. This allows you to catch signs of identity theft early and note any problems in your credit reports. This is an example of an ethical issue that falls into the category of ________.

accuracy

144.126.1.28 is an example of ________________________.

an IPv4 IP address

Your name in your university's database is a(n) ________.

attribute

Spam costs US companies _________ of dollars per year.

billions

You own a restaurant in New York City that is cash only and doesn't subscribe to any meal delivery services. This is an example of a _________ organization.

brick-and-mortar

You live in a small town with only one large retailer. This means there is low ______.

buyer power

You sell popcorn in downtown Chicago. It became so popular that you started a website so people all over the country can get your popcorn delivered to their doorstep. This is an example of a _________ business.

clicks-and-mortar

According to the videos, companies need to guard against outside threats as well as inside threats who can be malicious, careless, and __________.

clueless

Your professor hands you a random piece of paper with the number 75 on it. This is ________.

data

When you map out how your business currently processes customer orders to figure out how to reduce delivery time, this is part of the _________ phase of BPI.

define

According to the videos, many phishing scams are ________________________.

elaborate and believable.

Suppose you work for XYZ Corporation. You know you can contribute 6% of your salary to a 401K and the company will match that 100% after 6 years of service because it is in the employee handbook. This is an example of ________.

explicit knowledge

According to the videos, an attacker may issue a DDOS attack for three reasons:

financial, political, or for fun

The Sarbanes-Oxley Act requires publicly held companies to implement _________ controls; it was passed to address the _________ crisis.

financial; Enron

American companies can easily do business with Chinese companies. This is phenomenon is called ________.

globalization

Online advertising has caused newspapers to _________ subscription prices and _________ advertising rates.

increase, decrease

The IS function has become ________ strategic within organizations, so a growing number of CIOs are coming from _________.

increasingly; other business units

Your professor hands you a piece of paper with the number 75 on it and tells you this is your current average in the class. This is ________.

information

Documents in NoSQL store data in ________________________.

key/value pairs

Your professor hands you a piece of paper with the number 75 on it and tells you this is your current average in the class. Since this is your fourth year as a college student, you know you could work hard to bring that average up to a B by the end of the semester. This is ________.

knowledge

Suppose you slip in the hallway and break your arm. You sue the school for not properly marking the wet spot that caused you to slip. This is an example of ________.

liability

Employee # is the _______ in the Employee file and the _________ in the Class File.

primary key; secondary key

Intellectual property is NOT protected under _________ laws.

privacy

Laurie heads up a team creating a new process for the shipping department of her company. She worked with external consultants and wrote a process diagram. The team is now asking the VP of shipping to review the process diagram and give opinions. Laurie's team is at the ________ knowledge stage of the KMS cycle.

refine

You recently inherited an Alvin and The Chipmunks "A Chipmunk Christmas" record. Since you don't have a record player, you need to find a way to convert the record into a CD. This is an example of data ________.

rot

Gift cards are _________ cards.

stored-value money

Globalization 2.0 lasted from ______________________________ to ________________________________.

the early 1820's, about the year 2000

The music and newspaper industries were hurt primarily by _________.

threat of substitutes

In Globalization 1.0, you went global through ______________________.

your country


Related study sets

Rush Marine Ecology Final Exam 7

View Set

Clinical Urinalysis I (Lecture 5 - Part 2)

View Set

Chapter 30: Management of Patients with Hematologic Neoplasms

View Set

(4.7) Bonding Theories (pg. 240-246)

View Set

Chapter 36: Management of Patients With Immune Deficiency Disorders

View Set