ISA235 Final

Ace your homework & exams now with Quizwiz!

What is a benefit of a networked environment for an organization? 2 of three of these are considered benefits Virtual Workforce Reduced Travel All are considered benefits Increased Innovation

All are considered benefits

There are many downtime-related threats to an organization's intellectual assets . From the list below, what is not considered a threat according to the text? Terrorism Loss of internet connectivity All are threats to intellectual assets Flood Loss of power

All are threats to intellectual assets

Which of the following are ways to maintain information security that a company should include in their information security policies? Require competitive click-fraud events All but 1 are correct ways Changing passwords every 30 days Requiring computer users to log off before leaving for lunch Never sharing user or password information with anyone

All but 1 are correct ways

The Module Story about the Internet/WWW described explosion of the number of users and websites as part of Web 2.0. What caused this explosion? Greater/wider-spread network connectivity All but 1 of these choices Increase in PCs and other personal computing devices Netflix, Amazon, and other companies of the Information Age

All but 1 of these choices

What describes a driver of the Information Age? Information collected from multiple sources that analyzes patterns, trends, and relationships for strategic decision making Skills, experience, and expertise, coupled with information and intelligence, which creates a person's intellectual resources Information converted into an encrypted state All but 1 of these choices Raw facts that describe the characteristics of an event or object

All but 1 of these choices

All are benefits of Prototyping except: evolved through iteration All of these are benefits accelerates the speed through the SDLC tends to detect errors earlier

All of these are benefits

Why is estimating future growth a challenge for most companies? Growth can occur if the company acquires new markets. All of these are correct Growth can occur if the company acquires new products. Growth can occur if the company acquires new customers.

All of these are correct

What is a firewall expected to accomplish? detects computers communicating with the Internet without approval examines each message that wants entrance to the network blocks messages without the correct markings from entering the network All of these are correct.

All of these are correct.

Which of the following occurs during data cleansing? All of these are correct. Populate missing data Clean inaccurate data Clean redundant records Only two of these choices are correct

All of these are correct.

The most secure procedures combine which of the following authentication and authorization techniques? Something the user knows, such as a user ID and password Something that is part of the user, such as a fingerprint or voice signature Something the user has, such as a smart card or token Two of these are correct All of these choices

All of these choices

What are the three advantages of using blockchain technology? Immutability. Digital trust. Internet of Things integration. All of these choices are correct.

All of these choices are correct.

Which of the following is a cost of downtime in addition to lost revenue? Loss in financial performance Damage to reputation All of these choices are correct. Legal expenses

All of these choices are correct.

When building a scalable Infrastructure system that can support new company developments, what are the key factors to consider? Analyzing the accessibility and availability of competitor systems Understanding competitor products and services Anticipating expected and unexpected growth Organizing and deploying additional resources You Answered All but 1 of these are correct.

Anticipating expected and unexpected growth

What area of information security focuses on preventing identity theft? Authentication and authorization Prevention and resistance Access and authorization Detection and authorizing

Authentication and authorization

Susan wants to log into the HR system to enter her boss' time for the week. After she successfully logs in, she clicks on the 'Time Entry' button and the system gives her an error preventing her from adding a new time sheet for her boss. What concept below describes this protection technique? Authorization Encryption Authentication Two of these are correct

Authorization

____________ is the process of computerizing manual tasks, making them more efficient and effective and dramatically lowering operational costs. Business Process Modeling Workflow Streamlining Automation

Automation

What is information collected from multiple sources such as suppliers, customers, competitors, partners, and industries that analyzes patterns, trends, and relationships for strategic decision making? Knowledge Suppliers Intelligence Business Intelligence Strategy

Business Intelligence

What involves graphically representing the processes that capture, manipulate, store, and distribute information between a system and its environment? Business Predictive modeling Business Process Modeling Storyboarding SDLC

Business Process Modeling

During the Analysis phase, what refers to the specific business requests the system must meet to be successful? Sign-off Conversion Details Business Requirements COBIT

Business Requirements

__________ is a standardized set of activities that accomplishes a specific task. Business Strategy Knowledge Process Business Process Business Outcome

Business process

What is a graphic description of a process, showing the sequence of process tasks, that is developed for a specific purpose and from a selected viewpoint? Business process matrix Business process Business process engineering Business process model

Business process model

John and Jenny have been saving for two years to take their six children on a vacation to Disneyworld. They are surprised to find out that airline tickets are far more expensive than they had anticipated. They decide to try to find cheaper tickets on Priceline.com where they are allowed to set their own price they are willing to pay for the airline tickets. What form of ebusiness model are John and Jenny using? B2C C2B B2B CBC C2C

C2B

What is an artificial intelligence program that simulates interactive human conversation by using key precalculated user phrases and auditory or text-based signals? Chatbot. Intelligent virtual agent. IoT Integrated Voice Recognition

Chatbot.

A wholesaler should be most threatened by: Sustaining technology Mass customization Disintermediation Network effect Clickstream data

Disintermediation

_________ is a new way of doing things that initially does not meet the needs of existing customers. Disruptive technology Innovator's dilemma Sustaining technology Digital Darwinism

Disruptive technology

_____________________________________provides enterprise-wide support and data access for a firm's operations and business processes. Enterprise systems Enterprise Application Integration Middleware Business Intelligence

Enterprise systems

___________is the confirmation or validation of an event or object. Fact or Data Information Information Technology Business Intelligence

Fact or data

A global positioning system (GPS) consists of only hardware that provides location information for display on a multidimensional map. T or F

False

Absolute information security is achievable True False

False

Each stage of the value chain accumulates costs and reduces the value of the product T or F

False

Supply chains are sets of interlinked business processes. T o F

False

Technology solves business problems

False

The goal of single-factor authentication is to make it difficult for an unauthorized person to gain access to a system because if one security level is broken, the attacker will still have to break through additional levels T or F

False

The three primary information security areas are 1) authentication and authorization, 2) policies and protections, and 3) detection and response T or F

False

Unified Communication represents the maximum amount of data that can pass from one point to another in a unit of time. T or F

False

Virtualization is a collection of computers, often geographically dispersed, that are coordinated to solve a common problem T or F

False

When disruptive technology is first introduced in the market, it tends to provide us with better, faster, and cheaper products T or F

False

When processes formerly done by people are moved to computers that perform the work through software, the activities are said to be systematized.

False

In our class day where we discussed the case Coronavirus exposes America's broadband problem, we uncovered the principle players (or Actors) involved in the problem of delivering reliable internet service. Which is the following was not among those discussed FCC Rural Business Owners Financial Services Firms Local Government Telecom/Cable companies

Financial Services Firms

_____________ takes advantage of the available 75% of unused processing power of a computer and links thousands of individual computers around the world creating a(n) _______ that can process intensive tasks. Cloud computing; virtual operating system Cloud computing; wireless mesh Grid computing; virtual supercomputer Grid computing; physical computer

Grid computing; virtual supercomputer

Dividends at Miami can reduce its costs using ebusiness to streamline its business processes. Which of the following does not represent an example of Dividends reducing its costs through ebusiness? Using AI for processing applications for job candidates Creating an App for salad line orders Hiring more workers for the salad line Inventory software which orders supplies when low thresholds are reached

Hiring more workers for the salad line

Your boss wants to know the best-selling product from the previous quarter. This is an example of which core driver of the information age? Knowledge Business Intelligence Information Data

Information

Francis works in the human resources division of a large oil and gas company in Texas. Francis's tasks include maintaining payroll and vacation records, employment histories, and benefit information along with ensuring the security of all sensitive employee information. Which MIS infrastructure is most important to Francis? Sustainable MIS infrastructure Virtualized MIS infrastructure Information MIS infrastructure Agile MIS infrastructure

Information MIS infrastructure

Janet is a financial aid counselor at a local community college and she shares an office with her three coworkers. Janet feels safe in her office environment and frequently leaves her username and password on a sticky note next to her computer. Without realizing it Janet is creating the potential for which type of information security breach to occur? Viruses and worms to spread through the college system Insiders to hack into the college system Phishing Scam Two of these are correct All of these choices

Insiders to hack into the college system

What allows separate systems to communicate directly with each other, eliminating the need for manual entry into multiple systems? Integration intelligence data interchange business intelligence

Integration

In the Module 6 story, we explored why a relational database (RDMS) a better choice over an Excel spreadsheet in supporting more complex business information needs. Which one of these is not a reason? It's flexible It optimizes the amount of bandwidth It can scale Eliminate information redundancy by recording each piece of information in only one place

It optimizes the amount of bandwidth

Critical success factors are fundamentals deemed essential for successful business where _________ measure the progress of those elements. Effectiveness metrics Return on Investment Efficiency metrics Key performance indicators

Key performance indicators

_____________________ a security strategy that administers and enforces corporate epolicies for applications on mobile devices. Mobile application management. Enterprise mobility management. Mobile information management. Types of data you can store Mobile device management.

Mobile application management.

Cameron owns SDS Pizza in town. Recently, Cameron has noticed several customer complaints about charging errors. Cameron decides to investigate the errors in his business payment process and finds that most of the inaccuracies occur during order taking. Cameron decides to implement an electronic ordering system to help improve order efficiency and effectiveness. What method did Cameron follow to solve his charging issues? Moved directly to implementing the To-Be process without analyzing the As-Is process Modeled the As-Is process, fixed the errors, and then created the To-Be process Moved directly to implementing the As-Is process without analyzing the To-Be process Modeled the To-Be process, fixed the errors, and then created the As-Is process Cannot answer with the information given

Modeled the As-Is process, fixed the errors, and then created the To-Be process

Constance Abramowitz manages the service department at Guido's Transmission Sales and Service in Binghamton, New York. Which of the following is an example of information that Constance would be using to successfully perform her job? On Saturday, December 9, Guido's Transmission Service had many more walk-in customers during the morning than during the afternoon hours. The price of a new Ford Fiesta with standard transmission is $16,000 Poppy Mitchell's customer number is 71449. Andreasen Sprockets is supplier number 13990334. All of these choices

On Saturday, December 9, Guido's Transmission Service had many more walk-in customers during the morning than during the afternoon hours.

What is the application of knowledge, skills, tools, and techniques to project activities to meet project requirements? Scope None of these Project Management software Project management

Project management

_________________________ uses ________________________ to identify objects wirelessly over short distances. RFID, bluetooth RFID, electronic tags and labels GPS, satellites GPS, bluetooth

RFID, electronic tags and labels

Lee's deli grocery is outsourcing their customer online order processing process to Salesforce.com. Lee's deli currently uses the cloud service including hardware infrastructure, operating systems, and business application programs. Salesforce.com is an example of which of the following cloud services? VaaS CDN IaaS PaaS SaaS

SaaS

What kind of decisions are made when you have a few established processes to help evaluate potential solutions, but not enough to lead to a definite recommended decision? Semi-structured decisions Structured decisions Unstructured decisions Analytics

Semi-structured decisions

Which of the following best describes Web 1.0? intelligent applications machine-based learning Static text-based information websites All are characteristics of Web 1.0

Static text-based information websites

What improves business process efficiencies by simplifying or eliminating unnecessary steps? Workflow Streamlining Automation Reengineering

Streamlining

The way a business can monitor the whole organization bu viewing multiple inputs being processed and transformed to produce outputs while gathering feedback. Systems Thinking Competitive Advantage Strategy The 5 Forces

Systems thinking

What technology does Dr M refer to as the Mother of all Disruptive Technology because of how it has fundamentally changed the way business is done? None of these Business Intelligence The Internet Artificial Intelligence

The Internet

Which of the following types of employees at Kroger will be likely to need data with the finest granularity? The Chief Operating Officer The Chief Information Officer The Oxford Store Manager The Chief Executive Officer

The Oxford Store Manager

What is clickstream analytics? The process of collecting, analyzing and reporting aggregate data about which pages a website visitor visits—and in what order. A two-dimensional representation of data in which values are represented by colors. Uses clickstream data to determine the efficiency of the site for the users and operates at the server level. Uses clickstream data to determine the effectiveness of the site as a channel-to-market.

The process of collecting, analyzing and reporting aggregate data about which pages a website visitor visits—and in what order.

In our Zillow activity, we discussed where dirty data lurks and why it happens. Which of the following does not represent a reason for dirty or low-quality data? They are all reasons for low-quality data Different systems have different data entry standards and formats. Third-party and external data contain inaccuracies and errors. Online customers intentionally enter inaccurate data to protect their privacy

They are all reasons for low-quality data

How do sustaining technologies lead to future growth from existing investments? They enable the company to raise prices on existing products. They enable a company to open new markets and destroy old ones. They produce improved products in an established market. They position companies expecting future growth from new investments.

They produce improved products in an established market.

A blockchain is a type of distributed ledger, consisting of blocks of data that maintain a permanent and tamper-proof record of transactional data. T or F

True

A protocol is a standard that specifies the format of data as well as the rules to be followed during transmission. T or F

True

A tunnel is a virtual, private pathway over a public or shared network from the virtual private network (VPN) client to the VPN server. T or F

True

Changing schools, including transferring course credits and losing the personal relationships with fellow students is an example of high switching costs T or F

True

Data models are logical data structures that detail the relationships among data elements by using graphics or pictures. T or F

True

Encryption scrambles information into an alternative form that requires a key or password to decrypt. T or F

True

Improving the efficiency and effectiveness of its business processes improves a firm's value chain. T or F

True

Information technology's primary role in supply chain management is creating the integrations or tight process and information linkages between functions within a firm—such as marketing, sales, finance, manufacturing, and distribution—and between firms. T or F

True

Open source refers to any software whose source code is made available free (not on a fee or licensing basis, as in e-business) for any third party to review and modify T or F

True

Sample bias problem with using incorrect training data to train the machine T or F

True

The basic connectivity of the Internet is governed by protocols that are defined according to an arrangement called TCP/IP Protocol architecture. T or F

True

Within a data warehouse model, the internal databases could include marketing, sales, inventory, and billing. T or F

True

Which of these characteristics support an agile MIS infrastructure? accessibility, availability, maintainability portability, reliability, scalability, usability backup and recovery plan, disaster recovery plan, business continuity planning Two of these choices are correct grid computing, cloud computing, and virtualization

Two of these choices are correct

What is an activity-based process in which each phase in the SDLC is performed sequentially from planning through implementation and maintenance? RAD methodology Waterfall methodology Service-oriented methodology Agile methodology

Waterfall methodology

What does a business continuity plan typically include? How frequently the system backup is performed Which systems and business processes are critical and the maximum amount of time the company can continue to operate without functioning systems Where a hot site is located How quickly the system recovery needs to be performed

Which systems and business processes are critical and the maximum amount of time the company can continue to operate without functioning systems

Chloe needs to log into the HR system to update the employee headcount figures. She types in her User ID and Password in the sign-on page of the HR application. What concept below describes this protection technique? Intrusion Detection Encryption Authorization Authentication

authentication

in the required reading, Human values in the loop : Design principles for ethical AI, Deloitte described 3 core principles when thinking about the ethical use of AI. Which one of these is not a principle? Autonomy Bias Impact Justice

bias

Most people request real-time data without understanding that continual __________ is one of its biggest pitfalls. cleaning change information scaling standardizing

change

An MIS infrastructure is characterized as _________________ and ___________________. business continuity planning; back-up clients; servers dynamic; static hardware; software-as-a-service

clients; servers

A system is a/are ______________ that link to achieve a common purpose. Systems thinking is a way of monitoring ________________. computing concepts, a division within the sales role collection of parts, an individual piece of the system None of the above collection of parts, the system as a whole computing concepts, an individual piece of the system

collection of parts, the system as a whole

___________sources capital for a project by raising many small amounts from a large number of individuals, typically via the Internet. Explicit knowledge Crowdfunding Crowdsourcing Tacit knowledge

croudfunding

A company can create a __________ that would detail the process for recovering information or a system in the event of a catastrophic disaster. management recovery plan. disaster recovery plan two of these are correct business continuity plan

disaster recovery plan

_______________________ scrambles information into an alternative form that requires a key or password to decrypt the information Content filtering Encryption 2-factor authentication None of these Spyware

encryption

DNS allows dynamic IP address allocation so users do not have to have a preconfigured, or manually assigned, IP address to use the network​

false

What refers to the level of detail in the model or the decision-making process? Digital dashboard None of these are correct Visualization Granularity

granularity

The primary difference between a data warehouse and a data mart is a data warehouses ____________________where data marts _________________. make quick decisions, make slow decisions. tackle ethical issues, tackle hypothetical issues. have a more organization-wide focus, have functional focus. have a physical focus, have logical focus.

have a more organization-wide focus, have functional focus.

The factor that significantly contributed to people's needs to use information systems to make decisions is ______. the amount of information people must understand to make good decisions is increasing exponentially. the amount of information people must understand to make good decisions is decreasing exponentially. the amount of information people must understand to make good decisions has remained unchanged. impossible to answer because it depends on the industry.

he amount of information people must understand to make good decisions is increasing exponentially

What are the three pressures/challenges driving the need for sustainable MIS infrastructures? increases in ewaste, energy waste, and dynamic scaling increases in electronic waste, energy waste, and carbon emissions decreases in electronic waste(or ewaste), energy waste, and carbon emissions decreases in ewaste, energy waste, and carbon footprints

increases in electronic waste, energy waste, and carbon emissions

Which of the following is an example of a competitive strategy employed by a firm? advertising its products nationwide like its competitor organizations launching a unique product targeted at a section of consumers laying off staff in order to cut down costs during a recession period increasing the price of its product when raw material prices increase

launching a unique product targeted at a section of consumers

A data warehouse is a _____________________ collection of information, gathered from many different __________________ databases that supports business analysis activities and decision-making tasks. logical; operational logical; transactional physical; operational physical; transactional

logical; operational

___________ are measurements that evaluate results to determine whether a project is meeting its goals. Metrics ROI BPMN Best practices

metrics

_________ is the system that consists of nonproprietary hardware and software based on publicly known standards that allows third parties to create add-on products to plug into or interoperate with the system. Management system Knowledge system Open system Closed system

open system

What could cause employee performance to decrease when using is a cloud computing environment? decreased job stability decreased dynamic scaling required Internet connectivity limited Internet features

required Internet connectivity

Gender can be referred to in many ways (Male, Female, M/F, 1/0) in a data warehouse. Ensuring gender is referenced the same way is an example of information scaling. streamlining data points. standardizing protocols. standardizing information

standardizing information

Decision making in organizations occur at 3 levels. What level has an external focus on the industry with an emphasis on a multi-year view? None of the above Operational Strategic Managerial

strategic

According to the spotlight story on the Cloud in Module 6, _____________, _______________, and ________________ make cloud computing possible. server virtualization, hardware, software grid computing, hardware, software the Internet, server virtualization, Moore's Law the Internet, OS virtualization, Moore's Law

the Internet, server virtualization, Moore's Law

Why do relational databases use primary keys and foreign keys? to create physical relationships to create logical relationships to create an attribute to create an entity

to create logical relationships

Managers use ____________ information when making structured decisions at the operational level, such as when analyzing daily sales reports to determine how much inventory to carry. structured transactional supply side uncertain

transactional

___________ is the technique used to execute the business strategy SWOT Analysis Value chain The 5 forces model

value chain

The goal of ______________ is to identify processes in which the firm can add value for the customer and create a competitive advantage for itself, with a _______________ or cost advantage. seizing a cost advantage, primary value activities value chain analysis, product differentiation creating a focused strategy, supplier management creating a focused strategy, product differentiation value chain analysis, supplier management

value chain analysis, product differentiation

What allows users to access the WWW? HTTP web browser Web 3.0 HTML

web browser


Related study sets

PrepU Chapter 6: Values, Ethics, and Advocacy

View Set

Chapter 3 Income Statement and Statement of Stockholders' Equity

View Set

Unit/module quiz questions WGU Intro to Communications

View Set

BLAW2200 - Chapter 5 Constitutional Law

View Set

Chapter 6 U.S. History Study Guide

View Set

Chapter 15 & 16: The 1st Global Age (European exploration and conquest)

View Set

Finance - Ch. 20 Financial Options

View Set