ITM 310 Exam 1 RQ (ch. 1,2,3,5,10)

Ace your homework & exams now with Quizwiz!

The following are all examples of the risk scenarios associated with information systems except: ANSWER Correct answer A freshman college student gets a brand-new smartphone. Right away, she starts searching for and installing the best applications, including an app for her bank which allows her to take photos of her checks to deposit them, rather than having to go to the bank in person. The student likes the app so much that she decides to do all of her banking online via her smartphone. Unselected In the United Kingdom, two computer disks were misplaced by government workers. The tiny platters contained personal data, including bank account information, on 25 million residents. Unselected Two disgruntled Domino's Pizza employees uploaded a stomach-turning video shot in the restaurant kitchen showing them defiling the food. Domino's corporate office failed to respond for two days. The employees claimed it was just a prank, but before it was taken down, the video had been viewed almost one million times. Unselected An employee writes an email to his friend in the next cubicle about how much he dislikes their boss, including some rude jokes about his boss's breath and threats that he's going to take the company down. Instead of sending the email to his friend, he accidentally hits reply-all to a recent company-wide email.

A freshman college student gets a brand-new smartphone. Right away, she starts searching for and installing the best applications, including an app for her bank which allows her to take photos of her checks to deposit them, rather than having to go to the bank in person. The student likes the app so much that she decides to do all of her banking online via her smartphone.

__________ is an intermediary server that receives and analyzes requests from clients and then directs them to their destionations; sometimes used to protect privacy. ANSWER Correct answer A proxy Unselected A cookie Unselected A firewall Unselected A virus scanner

A proxy

Which of the following is the correct order of steps in an information security incident response plan? ANSWER Correct answer 1. Identify the threat 2. Contain the damage 3. Determine the cause 4. Recover the systems 5. Evaluate the lessons learned Unselected 1. Identify the threat 2. Determine the cause 3. Recover the systems 4. Contain the damage 5. Evaluate the lessons learned Unselected 1. Identify the threat 2. Determine the cause 3. Contain the damage 4. Recover the systems 5. Evaluate the lessons learned Unselected 1. Determine the cause 2. Identify the threat 3. Contain the damage 4. Recover the systems 5. Evaluate the lessons learned

ANSWER Correct answer 1. Identify the threat 2. Contain the damage 3. Determine the cause 4. Recover the systems

Which of the following is not one of the four main hardware components of a computer? ANSWER Correct answer Communications Unselected Storage Unselected Input Unselected Processing (CPU)

ANSWER Correct answer Communications

Frank, the marketing manager of an MNC, is in need of information on a competitor's new product which is to be launched soon. He needs the information to place his own product with a competitive advantage. Which of the following information would be valuable for his purpose? Accurate information received before the launch of the competitor's product Unselected Every piece of information except the competitor's product price Unselected Accurate information received soon after the launch of the competitor's product Unselected Information received immediately after the launch of Frank's product

Accurate information received before the launch of the competitor's product

Which of the following accurately describes the function(s) of the business processes component in information systems? Achieve a task by designing a set of activities Unselected Design, develop, and launch information systems Unselected Collect, process, and store data Unselected Present facts in various forms and shapes

Achieve a task by designing a set of activities

Which of the following is not an example of how businesses depend on information systems? An employee checks her work email at home to save time the next day. Unselected A marketing manager analyzes the data from her business's online ads to make smarter decisions about how to spend the marketing budget. Unselected A development professional who opts to use online training modules, rather than the standard paper materials, to reach more employees and keep the material more easily up to date. Unselected A self-employed IT consultant trains himself with basic IT skills in order to launch websites, build social networks, and purchase online ads, all at a very low cost.

An employee checks her work email at home to save time the next day.

__________ can technically be defined as a set of interrelated components that collect, process, store, and distribute information to support decision-making and control in an organization. An information system Unselected Information technology Unselected Outsourcing Unselected Information systems literacy

An information system

Which of the following correctly defines an information system? An information system is a set of interrelated components that collect, process, store, and distribute information to support decision-making and control in an organization. Unselected An information system is all the hardware and software that a firm uses to achieve its business objectives. Unselected An information system is the process of delegating business to external stakeholders. Unselected An information system is a broad understanding of customer interactions, company decision-making, and collaboration in a business.

An information system is a set of interrelated components that collect, process, store, and distribute information to support decision-making and control in an organization.

Which of the following accurately describes the functions of the technology component in information systems? Collect, process, and store data Unselected Design, develop, and launch information systems Unselected Achieve a task by designing a set of activities Unselected Present facts in various forms and shapes

Collect, process, and store data

Which of the following is the correct order of steps in an information security incident response plan? ANSWER Correct answer 1. Identify the threat 2. Contain the damage 3. Determine the cause 4. Recover the systems 5. Evaluate the lessons learned Unselected 1. Identify the threat 2. Determine the cause 3. Recover the systems 4. Contain the damage 5. Evaluate the lessons learned Unselected 1. Identify the threat 2. Determine the cause 3. Contain the damage 4. Recover the systems 5. Evaluate the lessons learned Unselected 1. Determine the cause 2. Identify the threat 3. Contain the damage 4. Recover the systems 5. Evaluate the lessons learned

Correct answer 1. Identify the threat

The five steps in supply chain management are: ANSWER Correct answer 1. Plan 2. Source 3. Make 4. Deliver 5. Return Unselected 1. Source 2. Plan 3. Make 4. Deliver 5. Return Unselected 1. Plan 2. Make 3. Source 4. Deliver 5. Return Unselected 1. Source 2. Make 3. Pack 4. Deliver 5. Return

Correct answer 1. Plan 2. Source 3. Make 4. Deliver 5. Return

A financial management system plays what roles in an organization? ANSWER Correct answer A financial management system supports financial accounts and processes, including accounts payable, accounts receivable, procurement, cash management, budget planning, assets, general ledger, and related activities. Unselected A financial management system is a smaller database developed by individuals or departments that focuses on its creator's specific information requirements. Unselected A financial management system encompasses all the activities and information systems related to effectively managing an organization's human capital. Unselected A financial management system helps track time and attendance, sick leave, vacation leave, and project assignments.

Correct answer A financial management system supports financial accounts and processes, including accounts payable, accounts receivable, procurement, cash management, budget planning, assets, general ledger, and related activities.

Which of the following is not an example of a human behavioral tendency that may affect information security? ANSWER Correct answer A high level of patience Unselected The human desire to help others Unselected Greed Unselected Respect for authority

Correct answer A high level of patience

__________ is an intermediary server that receives and analyzes requests from clients and then directs them to their destionations; sometimes used to protect privacy. ANSWER Correct answer A proxy Unselected A cookie Unselected A firewall Unselected A virus scanner

Correct answer A proxy

Which of the following best defines a risk matrix? ANSWER Correct answer A risk matrix lists an organization's vulnerabilities, with ratings that assess each one in terms of likelihood and impact on business operations, reputation, and other areas. Unselected A risk matrix is a plan that an organization uses to categorize a security threat, determine the cause, preserve any evidence, and also get the systems back online so the organization can resume business. Unselected A risk matrix is a combination of two or more authentications a user must pass to access an information system, such a fingerprint scan combined with a password. Unselected A risk matrix is a security measure that uses a pair of keys, one to encrypt the data and the other to decrypt it. One key is public, widely shared with everyone, but the other is private, known only to the recipient.

Correct answer A risk matrix lists an organization's vulnerabilities, with ratings that assess each one in terms of likelihood and impact on business operations, reputation, and other areas.

Which of the following is not a valid strategy to counteract human weaknesses that lead to possible information security breaches? ANSWER Correct answer A security awareness program should not alert people to the many ways in which social engineering can exploit human tendencies toward kindness, helpfulness, greed, or just productivity—this can potentially plant ideas for misbehavior. Unselected Organizations should have robust security awareness programs to help educate and continually remind people about the risks that lax security represents. Unselected A security awareness program should cover the organization's own policies and procedures, as well as laws and regulations about how relevant information should be handled to ensure compliance. Unselected A security awareness program should reinforce the principle that the organization has an ethical responsibility to maintain information security.

Correct answer A security awareness program should not alert people to the many ways in which social engineering can exploit human tendencies toward kindness, helpfulness, greed, or just productivity—this can potentially plant ideas for misbehavior.

Which of the following statements about digital rights management technology is false? ANSWER Correct answer All digital rights management (DRM) technology is effective to help stop piracy and intellectual property theft. Unselected Although most countries protect intellectual property (IP), digitized IP is extremely difficult to protect, and many companies use digital rights management technologies to safeguard their assets. Unselected Just as the Internet made plagiarism easy, it also made it easy to track. Unselected Turnitin.com offers an "originality checking" technology service that color codes document submitted to it, showing the passages that match existing written work.

Correct answer All digital rights management (DRM) technology is effective to help stop piracy and intellectual property theft

Which of the following statements about digital rights management technology is false? ANSWER Correct answer All digital rights management (DRM) technology is effective to help stop piracy and intellectual property theft. Unselected Although most countries protect intellectual property (IP), digitized IP is extremely difficult to protect, and many companies use digital rights management technologies to safeguard their assets. Unselected Just as the Internet made plagiarism easy, it also made it easy to track. Unselected Turnitin.com offers an "originality checking" technology service that color codes document submitted to it, showing the passages that match existing written work.

Correct answer All digital rights management (DRM) technology is effective to help stop piracy and intellectual property theft.

__________ integrates two or more of the applications that support major business processes common to most organizations (especially finance and human resources). ANSWER Correct answer An enterprise resource planning (ERP) system Unselected Customer relationship management Unselected Supply chain management Unselected A human capital management system

Correct answer An enterprise resource planning (ERP) system

There are two major types of software. What are they? ANSWER Correct answer Application software and system software Unselected Application software and data software Unselected System software and operations software Unselected Operations software and application software

Correct answer Application software and system software

All of the following are types of networks except: ANSWER Correct answer Bluetooth network Unselected Local area network (LAN) Unselected Circuit-switched network Unselected Metropolitan area network (MAN)

Correct answer Bluetooth network

__________ are classified as output hardware. ANSWER Correct answer Cell phone and tablet screens Unselected Keyboards Unselected Joysticks Unselected Microphones

Correct answer Cell phone and tablet screens

Which of the following is not a reason organizations lean toward implementing surveillance? ANSWER Correct answer Concerns about managing employee stress due to fear of potential security leaks Unselected Concerns about employer liability for allowing harassment or hostile work environments Unselected Need to protect security and confidentiality Unselected Concerns about employee productivity and "cyberslacking"

Correct answer Concerns about managing employee stress due to fear of potential security leaks

Which of the following best describes customer relationship management (CRM)? ANSWER Correct answer Customer relationship management (CRM) covers the strategies, processes, and information systems an organization uses to build and maintain relationships with its current and prospective customers. Unselected Customer relationship management (CRM) is a capability of specialized software to scan text input surveys, blogs, or other user-generated content and classify the opinions as pro, con, or neutral toward the company or product. Unselected Customer relationship management (CRM) is a tiny, invisible image, typically a single pixel with a unique identifier, used on websites to track visitors. Unselected Customer relationship management (CRM) helps track time and attendance, sick leave, vacation leave, and project assignments.

Correct answer Customer relationship management (CRM) covers the strategies, processes, and information systems an organization uses to build and maintain relationships with its current and prospective customers.

System software supports all of the following activities except: ANSWER Correct answer Databases Unselected File management Unselected Disk storage Unselected Hardware interfaces

Correct answer Databases

Multiuser application software designed for organizations supports all of the activites below except: ANSWER Correct answer Disk storage Unselected Transaction processing Unselected Human resources management Unselected Corporate training

Correct answer Disk storage

Which of the following best describes electronic data interchange? ANSWER Correct answer Electronic data interchange refers to an electronic bridge between partner companies in a supply chain that is used to transmit real-time information about orders, inventories, invoices, and other data. Unselected Electronic data interchange describes how easily managers can track timely and accurate supply chain metrics. Unselected One of the most important supply chain metrics, electronic data interchange measures the difference between forecasted and actual demand. Unselected Electronic data interchange describes the distortions in a supply chain caused by changes in customer demand, resulting in large swings in inventory levels as the orders ripple upstream from the retailer to the distributor and manufacturer.

Correct answer Electronic data interchange refers to an electronic bridge between partner companies in a supply chain that is used to transmit real-time information about orders, inventories, invoices, and other data.

Which of the following is not a technical security control used to manage information security risks? ANSWER Correct answer Establishing security policies that restrict the Internet sites that employees can visit Unselected Implementing multifactor authentication Unselected Implementing public key encryption Unselected Implementing firewalls

Correct answer Establishing security policies that restrict the Internet sites that employees can visit

__________ refers to a system of moral principles that human beings use to judge right and wrong and to develop rules of conduct. ANSWER Correct answer Ethics Unselected Accountability Unselected Due process Unselected Liability

Correct answer Ethics

Application software supports all of the activites below except: ANSWER Correct answer File management Unselected Word processing and spreadsheets Unselected Video editing Unselected Email

Correct answer File management

Core human resources management applications, workforce management applications, talent management applications, service delivery applications, and social software are the main components of: ANSWER Correct answer Human capital management (HCM) Unselected A financial management information system Unselected An information system Unselected Supply chain management

Correct answer Human capital management (HCM)

__________ encompasses all the activities and information systems related to effectively managing an organization's human capital. ANSWER Correct answer Human capital management (HCM) Unselected The workforce management module Unselected Talent management applications Unselected Social software

Correct answer Human capital management (HCM)

Which one of the following statements about enterprise resource planning systems is true? ANSWER Correct answer Implementing an ERP is a major challenge, partly because so many applications are related and because so many processes are affected at the same time. Unselected Almost all ERPs have tightly integrated modules because those that synchronize data across modules and are more loosely integrated have more potential issues. Unselected Almost all ERPs synchronize data across modules and are more loosely integrated because those that have tightly integrated modules have more potential issues. Unselected All ERPs use middleware, which attempts to connect different components that might be running on different servers and operating systems.

Correct answer Implementing an ERP is a major challenge, partly because so many applications are related and because so many processes are affected at the same time.

Which of the following is not an administrative security control used to manage information security risks? ANSWER Correct answer Implementing multifactor authentication Unselected Establishing security policies that restrict the Internet sites that employees can visit Unselected Prohibiting employees from downloading data to smartphones or USB drives Unselected Cutting off internal systems access to employees about to be terminated before the pink slip is delivered

Correct answer Implementing multifactor authentication

Which of the following statements about the relationship between ethics and the law is false? ANSWER Correct answer Laws always cover ethical principles, so if an action is legal, that means it is also ethical. Unselected Depending on the circumstances, lying might be legal, but, at the same time, grossly unethical. Unselected Some laws have less to do with ethics, and instead result from the pushes and pulls of lobbying efforts and political pressures. Unselected Laws are often grounded in ethical principles, such as the prohibition against murder and theft, or the protection of private property and free speech.

Correct answer Laws always cover ethical principles, so if an action is legal, that means it is also ethical.

Which of the following is not an emerging trend in ICT architecture? ANSWER Correct answer Mainframes Unselected Virtualization Unselected The integration of voice and data Unselected Cloud computing

Correct answer Mainframes

Which of the following is not a type of information security threat posed by botnets? ANSWER Correct answer Malware Unselected Identity theft Unselected A distributed denial of service (DDoS) attack Unselected Phishing

Correct answer Malware

Which of the following statements about piracy is false? ANSWER Correct answer Most consumers agree that it is a very serious ethical violation to break intellectual property laws when the material is digitized. Unselected The Business Software Alliance reports alarming financial losses due to software piracy—more than $63 billion per year. Unselected Not everyone agrees that the strict legal protection for software is the best ethical decision. The Free Software Foundation, for example, advocates for less restrictive copyright laws, insisting that users should have the freedom to run, copy, distribute, and improve software products. Unselected Rather than fining violators large sums, which proved very unpopular, the music industry launched a "copyright alert system," in which Internet service providers send warnings to suspected offenders, and then slow down their connection speeds if they persist.

Correct answer Most consumers agree that it is a very serious ethical violation to break intellectual property laws when the material is digitized.

Which of the following statements about information privacy is false? ANSWER Correct answer Most everyone agrees that online anonymity should be protected as a right. Unselected Privacy is under considerable pressure because of the growing volume of personal information online and the complexity of privacy settings. Unselected People are surprisingly willing to disclose personal data to marketers for a little convenience or a discount coupon. Unselected With advanced technologies that collect, store, and analyze big data, anonymity is far more difficult to achieve than people might assume.

Correct answer Most everyone agrees that online anonymity should be protected as a right.

Which of the following statements about information privacy is false? ANSWER Correct answer Most people are unwilling to disclose personal data to marketers, even for a little convenience or a discount coupon. Unselected Privacy is under considerable pressure because of the growing volume of personal information online and the complexity of privacy settings. Unselected Not everyone agrees that online anonymity should be protected as a right because anonymity is important for whistleblowers, police tipsters, news sources, political activists in oppressive regimes, and people who participate in online support groups where they reveal personal details. Unselected With advanced technologies that collect, store, and analyze big data, anonymity is far more difficult to achieve than people might assume.

Correct answer Most people are unwilling to disclose personal data to marketers, even for a little convenience or a discount coupon.

Which ethical framework judges the morality of an action based on how well it adheres to broadly accepted rules, regardless of the action's actual consequences? ANSWER Correct answer Natural laws and rights Unselected Utilitarianism Unselected Faith-based ethics Unselected Humanism

Correct answer Natural laws and rights

Which of the following best describes demand forecast accuracy (DFA)? ANSWER Correct answer One of the most important supply chain metrics, DFA measures the difference between forecasted and actual demand. Unselected DFA describes how easily managers can track timely and accurate supply chain metrics. Unselected DFA refers to the distortions in a supply chain caused by changes in customer demand, resulting in large swings in inventory levels as the orders ripple upstream from the retailer to the distributor and manufacturer. Unselected DFA refers to an electronic bridge between partner companies in a supply chain that is used to transmit real-time information about orders, inventories, invoices, and other data.

Correct answer One of the most important supply chain metrics, DFA measures the difference between forecasted and actual demand.

Which of the following is not one of customer relationship management's diverse software applications? ANSWER Correct answer Payroll Unselected Marketing Unselected Sales force automation Unselected Customer service and support

Correct answer Payroll

____________ is also called a computer's primary storage. ANSWER Correct answer Random access memory (RAM) Unselected Read-only memory (ROM) Unselected An external hard drive Unselected An internal hard drive

Correct answer Random access memory (RAM)

Which of the following is a true statement about the importance of financial reporting? ANSWER Correct answer Reports are the lifeblood of people in finance and accounting, and information systems routinely generate detailed summary reports on all the organization's transactions. Unselected Financial systems generate exception reports that automatically tag repeated events—ones that human beings must review. Such reports can be used to spot mistakes, but have a hard time detecting fraud. Unselected Financial systems are not responsible for compliance reporting, so they do not need to conform to local, national, or international regulations. Unselected Converting to machine-readable financial data within financial systems can help eliminate manual processes, but also hinders transparency.

Correct answer Reports are the lifeblood of people in finance and accounting, and information systems routinely generate detailed summary reports on all the organization's transactions.

__________ take advantage of human behavioral tendencies to manipulate people into disclosing sensitive information or bypassing security measures. ANSWER Correct answer Social engineering tactics Unselected Single sign-on gateways Unselected Ethics Unselected Utilitarianism principles

Correct answer Social engineering tactics

Which one of the following statements about enterprise resource planning systems is true? ANSWER Correct answer Some ERPs have tightly integrated modules, whereas others synchronize data across modules that are more loosely integrated, using middleware. Unselected Almost all ERPs have tightly integrated modules because those that synchronize data across modules and are more loosely integrated have more potential issues. Unselected Almost all ERPs synchronize data across modules and are more loosely integrated, using middleware, because those that have tightly integrated modules have more potential issues. Unselected Because so many processes are affected at the same time, much of the work to implement an ERP can be done simultaneously and thus saves time.

Correct answer Some ERPs have tightly integrated modules, whereas others synchronize data across modules that are more loosely integrated, using middleware.

Random access memory (RAM) is part of which computer hardware component? ANSWER Correct answer Storage Unselected Input Unselected Output Unselected Processing

Correct answer Storage

______________ applications help track and manage employees including recruitment, training, and retirement. ANSWER Correct answer Talent management Unselected CRM Unselected ERD Unselected Workers management

Correct answer Talent management

Which of the following statements about piracy is false? ANSWER Correct answer The Business Software Alliance reports that software piracy is down due to the proliferation of technology available to consumers. Unselected Many think it is not a very serious ethical violation to break intellectual property laws when the material is digitized. Unselected Not everyone agrees that the strict legal protection for software is the best ethical decision. The Free Software Foundation, for example, advocates for less restrictive copyright laws, insisting that users should have the freedom to run, copy, distribute, and improve software products. Unselected Rather than fining violators large sums, which proved very unpopular, the music industry launched a "copyright alert system," in which Internet service providers send warnings to suspected offenders, and then slow down their connection speeds if they persist.

Correct answer The Business Software Alliance reports that software piracy is down due to the proliferation of technology available to consumers.

__________ describes the distortions in a supply chain caused by changes in customer demand, resulting in large swings in inventory levels as the orders ripple upstream from the retailer to the distributor and manufacturer. It occurs when visibility is low. ANSWER Correct answer The bullwhip effect Unselected Visibility Unselected The demand forecast accuracy (DFA) Unselected An electronic data interchange (EDI)

Correct answer The bullwhip effect

performs a variety of critical basic tasks, such as handling device input and output, maintaining file structures, and allocating memory. ANSWER Correct answer The operating system (OS) Unselected Utility software Unselected Application software Unselected Multiuser application software

Correct answer The operating system (OS)

Which of the following statements about the enterprise architecture is false? ANSWER Correct answer The tenets of the enterprise architecture are designed so that they remain relatively stable over time, and relatively unaffected by the advent of new technology. Unselected The enterprise architecture (EA) is the big picture for the organization, the blueprint that describes the current environment and the target environment the organization hopes to reach to achieve its mission. Unselected It includes a roadmap for moving from the baseline to the target, to help managers make better decisions that focus on long-term benefits and not just short-term gains. Unselected The architecture is not just about hardware, software, and telecommunications assets; it also encompasses the people, technology, processes, and data that make up information systems, and it should be driven by business requirements and the organization's mission.

Correct answer The tenets of the enterprise architecture are designed so that they remain relatively stable over time, and relatively unaffected by the advent of new technology.

__________ is an ethical framework that considers the consequences of an action, weighing its good effects against its harmful ones. ANSWER Correct answer Utilitarianism Unselected Natural laws and rights Unselected Faith-based ethics Unselected Humanism

Correct answer Utilitarianism

Which of the following best describes supply chain visibility? ANSWER Correct answer Visibility describes how easily managers can track timely and accurate supply chain metrics. Unselected One of the most important supply chain metrics, visibility measures the difference between forecasted and actual demand. Unselected Visibility describes the distortions in a supply chain caused by changes in customer demand, resulting in large swings in inventory levels as the orders ripple upstream from the retailer to the distributor and manufacturer. Unselected An electronic bridge between partner companies in a supply chain that is used to transmit real-time information about orders, inventories, invoices, and other data.

Correct answer Visibility describes how easily managers can track timely and accurate supply chain metrics.

__________ refers to a computer network in which connections rely on radio waves at frequencies of 2.4 GHz or 5 GHz. ANSWER Correct answer WiFi Unselected Microwave transmission Unselected Digital subscriber lines (DSL) Unselected Optical fiber cables

Correct answer WiFi

Which of the following is not an example of a network protocol? ANSWER Correct answer WiMax Unselected Ethernet Unselected Transmission Control Protocol and Internet Protocol (TCP/IP) Unselected The 802.11 family of standards

Correct answer WiMax

Twisted pair wire, coaxial cable, and optical fiber are the three major types of what kind of transmission media? ANSWER Correct answer Wired media Unselected Wireless media Unselected Bandwidth Unselected Open-source software

Correct answer Wired media

Considered a part of the XML family, ___________ is specialized for accounting and business reporting. ANSWER Correct answer XBRL Unselected ABRL Unselected XBRLE Unselected BBRL

Correct answer XBRL

A __________ is a measurement unit for computer storage that holds eight zeros and ones, and represents a single character. ANSWER Correct answer byte Unselected kilobyte Unselected bit Unselected gigabyte

Correct answer byte

A __________ typically consists of 8 bits. ANSWER Correct answer byte Unselected megabyte Unselected chunk Unselected snip

Correct answer byte

Improving customer retention, increasing profitability, growing revenue, and listening to customer sentiments are all goals of __________. ANSWER Correct answer customer relationship management (CRM) Unselected sentiment analysis Unselected the workforce management module Unselected supply chain management (SCM)

Correct answer customer relationship management (CRM)

Electronic data interchange (EDI), XML, RFID chips, and GPS all help to __________. ANSWER Correct answer improve visibility among suppliers and customers Unselected eliminate errors in financial reporting Unselected develop a shadow system Unselected eliminate supply chain disruptions

Correct answer improve visibility among suppliers and customers

The various devices which accept signals and convert them to a digital format that matches the signal's meaning are called __________. ANSWER Correct answer input Unselected storage Unselected output Unselected processing (CPU)

Correct answer input

Intangible assets such as music, written works, software, art, designs, movies, creative ideas, discoveries, inventions, and other expressions of the human mind that may be legally protected by means of copyrights or patents are called __________. ANSWER Correct answer intellectual property (IP) Unselected digital rights Unselected artistic license Unselected creative work

Correct answer intellectual property (IP)

If you set up your dorm room to connect computers, printers, and scanners, you have effectively created a . ANSWER Correct answer local area network (LAN) Unselected dorm area network (DAM) Unselected wide area network (WAN) Unselected college area network (CAM)

Correct answer local area network (LAN)

Strategies that optimize the flow of products and services from their source, through the company, and to the customer are referred to as __________. ANSWER Correct answer supply chain management (SCM) Unselected human capital management Unselected a financial management information system Unselected an information system

Correct answer supply chain management (SCM)

In order for managers to see metrics that help assess overall effectiveness of supply chain processes, __________ must be improved. ANSWER Correct answer visibility Unselected total sales by product Unselected the demand forecast accuracy (DFA) Unselected the bullwhip effect

Correct answer visibility

Microwave transmission, radio waves, WiFi, and Bluetooth are all examples of __________. ANSWER Correct answer wireless media Unselected wired media Unselected bandwidth Unselected open-source software

Correct answer wireless media

Which of the following is not one of the components of an information system? Data hardware depot Unselected Data Unselected Technology Unselected Processes

Data hardware depot

__________ refers to a system of moral principles that human beings use to judge right and wrong and to develop rules of conduct. ANSWER Correct answer Ethics Unselected Accountability Unselected Due process Unselected Liability

Ethics

Which of the following is a difference between information and data? ANSWER Information is processed data, whereas data is unformatted words. Unselected Information is unorganized, whereas data is organized. Unselected Information is unprocessed words, whereas data is processed words. Unselected Information is data without contextual cues, whereas data is information with contextual cues.

Information is processed data, whereas data is unformatted words.

Which of the following correctly describes knowledge? Knowledge is the ability to understand information, form opinions, and make decisions or predictions based on the information. Unselected Knowledge is individual facts or pieces of information (such as words and numbers). Unselected Knowledge is when data is formatted, organized, or processed to be made useful. Unselected Knowledge is the act of researching in order to gather data.

Knowledge is the ability to understand information, form opinions, and make decisions or predictions based on the information.

What is the use of information systems to the senior management of an organization? Making long-term strategic decisions Unselected Monitoring the daily activities of the business Unselected Creating new knowledge for the firm Unselected Producing the actual product

Making long-term strategic decisions

_____________ draws on researchers from many fields (e.g., sociology, psychology, computer science) and examines how people, technology, processes, and data work together. ANSWER Correct answer Management Information Systems Unselected Instructional Technology Unselected Database Systems Unselected Information Technology

Management Information Systems

Which of the following statements about piracy is false? ANSWER Correct answer Most consumers agree that it is a very serious ethical violation to break intellectual property laws when the material is digitized. Unselected The Business Software Alliance reports alarming financial losses due to software piracy—more than $63 billion per year. Unselected Not everyone agrees that the strict legal protection for software is the best ethical decision. The Free Software Foundation, for example, advocates for less restrictive copyright laws, insisting that users should have the freedom to run, copy, distribute, and improve software products. Unselected Rather than fining violators large sums, which proved very unpopular, the music industry launched a "copyright alert system," in which Internet service providers send warnings to suspected offenders, and then slow down their connection speeds if they persist.

Most consumers agree that it is a very serious ethical violation to break intellectual property laws when the material is digitized.

Which ethical framework judges the morality of an action based on how well it adheres to broadly accepted rules, regardless of the action's actual consequences? ANSWER Correct answer Natural laws and rights Unselected Utilitarianism Unselected Faith-based ethics Unselected Humanism

Natural laws and rights

Which part of the information system does user-generated content (UGC) (such as the content on Wikipedia, Craigslist, YouTube, Facebook, and Twitter) pertain to? People Unselected Technology Unselected Processes Unselected Data

People

Which of the following statements about piracy is false? ANSWER Correct answer The Business Software Alliance reports that software piracy is down due to the proliferation of technology available to consumers. Unselected Many think it is not a very serious ethical violation to break intellectual property laws when the material is digitized. Unselected Not everyone agrees that the strict legal protection for software is the best ethical decision. The Free Software Foundation, for example, advocates for less restrictive copyright laws, insisting that users should have the freedom to run, copy, distribute, and improve software products. Unselected Rather than fining violators large sums, which proved very unpopular, the music industry launched a "copyright alert system," in which Internet service providers send warnings to suspected offenders, and then slow down their connection speeds if they persist.

The Business Software Alliance reports that software piracy is down due to the proliferation of technology available to consumers.

Consider the following questions and scenarios: Who is responsible for the damage caused by accidental leaks of private information? The employee who misplaced the data? The information systems professional who designed a flawed system? The person who found the data and didn't return them? The citizens who failed to check credit reports? Do people who send harsh emails deserve what they get if the information leaks out? Is it ethical to broadcast a message you receive that was accidentally misdirected? How would you describe questions of this sort? Possible Answers These are ethical questions that arise when problems occur with information systems. Many have no easy answers. Unselected These are hypothetical questions developers must consider when designing information systems. Unselected These are questions used by lawyers during a criminal prosecution for privacy violations. Unselected These are questions about morality, the answers to which are fairly obvious.

These are ethical questions that arise when problems occur with information systems. Many have no easy answers.

Apple Corporation's introduction of Siri to gain an advantage over its rivals is an example of _____________ advantage. competitive Unselected understated Unselected SQL Unselected innovation

competitive

When Domino's experienced a crisis when a damaging video surfaced online, the organization's _________________ team addressed this threat and continues to be on high alert for other online problems. Correct answer crisis management Unselected Security management Unselected database management Unselected HTTP management

crisis management

Companies continue to implement ________________ systems to help build and maintain relationships with customers. ANSWER Correct answer customer relationship management Unselected entity relationship Unselected Supply chain management Unselected customer chain management

customer relationship management

In information systems, individual facts or pieces of information (such as words and numbers), are referred to as __________. ANSWER Correct answer data Unselected knowledge Unselected research Unselected information

data

Nonprofit fundraisers like JDRF understand the most successful fund-raisers know how to draw on __________________ to reach potential donors. ANSWER information systems Unselected random contacts Unselected law enforcement Unselected government

information systems

Web 2.0 is distinguished because of its use of _____________________. social networking Unselected HTML Unselected HTTP Unselected databases

social networking


Related study sets

Chapter 5, Unit 2: Agency Relationships and Disclosures

View Set

PEDS: Nursing Care of the Child with a Neurologic Disorder

View Set

SIE Exam Re-Review Sectino 1 Qs Quiz 1

View Set

Essentials of communication - Etiquette

View Set

Peds Exam 2 (Ch. 14, 15, 16, 17, 19, 22, 23, 24, 28, 32, 31)

View Set