MIS 301 (Exam)

Ace your homework & exams now with Quizwiz!

_________ refers to determining who is responsible for actions that were taken.

Accountability

_________ issues involve the authenticity, fidelity, and correctness of information that is collected and processed.

Accuracy

_________ causes pop-up advertisements to appear on your screen.

Adware (廣告軟件)

__________ is a methodology for achieving incremental improvements in the effectiveness and efficiency of a process.

BPI (Business Process Improvement)

________ is a short-range wireless network

Bluetooth

________ organizations are purely physical.

Brick-and-mortar

________ organizations have physical and online dimensions.

Clicks-and-mortar

_______ cables are made of copper.

Coaxial

Which of the following would be an example of a SCADA attack?

Computer viruses are introduced into the electrical company's systems resulting in a shutdown of the power plant.

_______ is a disadvantage of fiber-optic cable.

Difficult to work with

Selecting and adhering to a single competitive strategy is sufficient to counter all of Porter's five forces and be successful in the long term.

False

_______ cables are made of glass.

Fiber-optic

Only a few ________ satellites are needed for global coverage.

GEO

______ is an advantage of coaxial cable

High bandwidth

Which of the following is a property issue?

How should we handle illegally copying copyrighted software?

The IT infrastructure is __________

IT Components, IT Personnel, IT Services

Which of the following is not in the business analytics domain?

In-memory computing

______________ is the right to determine when, and to what extent, information about you can be gathered and/or communicated to others.

Information privacy

An order from a customer is a(n) __________ for a business process.

Input

An/The ________ is a network of networks.

Internet

The ________ layer of TCP/IP is responsible for addressing, routing, and packaging data packets

Internet

A network that is restricted to a single building is a ________.

LAN

Satellite telephone services are provided through ________ satellites.

LEO

________ satellites are used to run the GPS system.

MEO

_______ transmission systems transmit data through electromagnetic waves.

Microwave

The __________ model of informed consent permits the company to collect personal information until the customer specifically requests that the data not be collected.

Opt-out

_________ issues involve collecting, storing, and disseminating information about individuals.

Privacy

______ is the most popular query language used for interacting with a database.

SQL

Which of the following is the most prominent data manipulation language today?

SQL (Structured Query Language)

________ transmission systems can have a large coverage area but their signals experience propagation delay.

Satellite

________ networks are an emerging technology that is becoming increasingly important to help organizations manage their data flows across their enterprise networks.

Software-defined

_________ is pestware that users your computer as a launch pad for unsolicited e-mail, usually advertising for products and services.

Spamware

Which of the following is not "unstructured data"?

Spreadsheet

_________ collects personal information about users without their consent.

Spyware

________ is the protocol of the Internet.

TCP/IP

A foreign key is a primary key in another file

True

Blacklisting is when everything can run except what is on the list.

True

_______ is a cable medium

Twisted-pair

_________ is a private network that uses a public network to connect users.

VPN (Virtual Private Network)

_________ organizations are only online.

Virtual

_________ is a remote attack requiring user action

Virus

Which of the following is NOT a characteristic of Big Data?

Viscous

Careless Internet surfing is _________ and is an _________ mistake.

a human error; unintentional

In ________, vendors ask partners to place logo on the partner's website and then pay that partner a commission.

affiliate marketing

Each characteristic or quality of a particular entity is called a(n) ________.

attribute

Which of the following is an accurate representation of the data hierarchy from smallest to largest?

bit, byte, field, record, file, database

The _________ approach highlights the interlocking relationships that underlie all societies.

common good

Which of the following is the correct order of the KMS cycle?

create, capture, refine, store, manage, disseminate

Under the convention of business flowchart,__________ shape is used to represent questions? And _________ shape is used to represent actions? How many branches should be followed by a question? _____________ (digit).

diamond, rectangle, 2

The _________ approach posits that ethical actions treat all human beings equally, or, if unequally, then fairly, based on some defensible standard.

fairness

The ________ creates links between two tables.

foreign

Intellectual capital is another term for ________.

knowledge

_______ is an example of pre-digital data storage that is comparable to a database.

library card catalog

A data ________ is a low-cost, scaled-down version of a data ________ that is designed for the end-user needs in an SBU or an individual department.

mart; warehouse

You use your smartphone to look up how much money you have in your bank account. This is an example of _________ commerce.

mobile

Dashboards are used in which of the following processes?

monitoring process performance

The ________ key is an identifier field that uniquely identifies a record.

primary

With ________, customers use the internet to self-configure products or services.

product customization

In public-key encryption, the _________ key is used for locking and the _________ key is used for unlocking.

public; private

Database systems minimize ________.

redundancy (多餘的)

Whereas phishing attacks are ____, denial of service attacks are ____.

remote attacks requiring user action; remote attacks requiring no user action

In _________ auctions, one buyer wants to purchase a product or a service; these auctions result in _________ prices over time.

reverse; lower

The _________ approach maintains that an ethical action is the one that best protects and respects the moral rights of the affected parties.

rights

Each relational database table contains records (listed in _______) and attributes (listed in ______) .

rows; columns

Keystroke loggers and screen scrapers are examples of _________

spyware

The ________ layer of TCP/IP provides communication and packet services.

transport

_______ cellular networks use digital signals and can transmit voice and data at different speeds based on how fast the user is moving; it supports video, web browsing, and instant messaging.

3G

_________ is a communications control.

A firewall

_________ is the most difficult, radical, lengthy, and comprehensive strategy.

BPR (Business Process Reengineering)

Hackers would use a botnet to perform a _________.

DoS

_________ is a remote attack requiring no user action.

DoS (Disk Operating System)

________ defines how messages are formulated and how their receivers interpret them.

HTTP

Which of the following is FALSE of QR codes?

QR codes are larger than bar codes because they store information both horizontally and vertically.

The Internet is a ________.

WAN

Which of the following is the correct order of networks from largest to smallest?

WAN, MAN, LAN, PAN

A data ________ is a repository of historical data that are organized by subject to support decision makers in the organization.

warehouse

Bandwidth is stated in ________ per second.

bits

IT _________ be used to create a competitive advantage ____________

can; when it is used effectively

In _________ auctions, sellers solicit bids from many potential buyers; these auctions result in _________ prices over time.

forward; higher

The _________ model of informed consent prohibits an organization from collecting any personal information unless the customer specifically authorizes it.

opt-in

An electronic _________ is a website the represents a single store.

storefront

According to the textbook, ________ is the most widely available cable medium.

twisted-pair

The relational database model is based on the concept of ________-dimensional tables.

two

The _________ approach states that an ethical action is the one that provides the most good or does the least harm.

utilitarian

The _____________ approach states that an ethical action is the one that provides the most good or does the least harm.

utilitarian

In ________, recipients of your marketing notices send information about your product to their friends.

viral marketing

An information system's ____ is the likelihood that the system or resource will be compromised by a ____ that will result in its ____ to further attacks.

vulnerability (脆弱性); threat; exposure

LTE is ________ cellular technology.

4G

_________ is an attack by a programmer developing a system.

A Trojan horse

Which of the following is NOT an example of alien software?

Blockware

_______ is NOT an advantage of twisted-pair wire.

High bandwidth

________ was developed because we have run out of IP addresses in the original IP addressing scheme.

IPv6

________ is a broadcast medium.

Microwave

________ transmission systems have signals that pass through walls but they are susceptible to snooping unless encrypted

Radio

_________ means that you accept the consequences of your decisions and actions.

Responsibility

Which of the following is NOT a basic function of TCP/IP?

Responsible for disassembling, delivering, and reassembling data during transmission

A ________ is a group of eight ________.

byte; bits

A _________ site is a fully configured computer facility with all of the company's services, communication links, and physical plant operations.

hot

The _________ model of informed consent permits the company to collect personal information until the customer specifically requests that the data not be collected.

opt-out


Related study sets

Biology Chapter 30 : An Introduction to Animals

View Set

Chapter 3 - Types of Policies and Riders

View Set

N316A Autonomic Nervous Quiz [2]

View Set

EMR -Chapters 1 through 27 FDLTCC 2020

View Set