MIS 3063 Final Exam
Which of the following statements is true of the financial losses due to computer crimes? Companies are legally required to calculate their financial losses due to computer crime every month. Knowledge about the cost of computer crimes is restricted to large companies. All studies on the costs of computer crimes are based on surveys. There are several set standards for tallying computer crime costs and financial losses.
All studies on the costs of computer crimes are based on surveys.
Which of the following steps in the systems definition process aims to eliminate obviously nonsensible projects? Define the system goals and scope. Form the project team. Assess the project feasibility. Plan the project requirements.
Assess the project feasibility.
Which of the following statements is true of systems development for bigger systems and longer projects? Average contribution per worker is increased. Project budgeting and scheduling becomes easy. Changes in requirements are increased. Diseconomies of scale are reduced.
Changes in requirements are increased.
1. ________ is a dynamic social media process of employing users to participate in product design or product redesign. Crowdsourcing Social capitalization Flexible product development Collaborative product development
Crowdsourcing
________ refers to an organization-wide function that is in charge of developing data policies and enforcing data standards. Database encapsulation Data encapsulation \ Data administration Database administration
Data administration
Which of the following statements is true of the composition of a development team over the different phases of the systems development life cycle? During conversion, the team will be heavy with database designers. During design and implementation, the team will be augmented with business users. During requirements definition, the team will be heavy with testers and database designers. During integrated testing and conversion, the team will be augmented with business users.
During integrated testing and conversion, the team will be augmented with business users.
1. ________ in the context of management means loss of control of employees. Divergence Dependence Emergence Transcendence
Emergence
________ is the process of transforming clear text into coded, unintelligible text for secure storage or communication. Malware protection Authentication Encryption Usurpation
Encryption
1. ________ are rule-based systems that encode human knowledge in the form of If/Then rules. Content management systems Document management systems Expert systems Enterprise resource planning systems
Expert systems
Which of the following is the first step in defining a new information system? Form the project team. Determine the schedule and budget for the project. Assess the feasibility of the project. Explain the goals and scope of the project.
Explain the goals and scope of the project.
________ are created by companies as false targets for computer criminals to attack. Honeypots Negatives Cookies Trojan horses
Honeypots
1. Which of the following statements is true about viral hooks in a social media (SM) site? It is designed to root out users who post junk content on an organization's SM site. It is used to enhance an organization's privacy on its SM sites. It is an inducement to pass communication along the tiers of a community. It is used to restrain information leaks from an organization.
It is an inducement to pass communication along the tiers of a community.
1. Which of the following statements is a characteristic of social media (SM) user communities? In community SM site relationships, the relationships in second-tier communities are disassociated from first-tier users. SM user communities are mostly based on geographic and familial ties. Most users of SM belong to several different user communities. A viral hook is an inducement to constrain communications between user communities.
Most users of SM belong to several different user communities.
1. Which of the following statements is true of social networking problems? Inappropriate contributions that contain obscene or otherwise inappropriate content should be ignored indefinitely. Responses to problematic content are best reserved for instances where it has caused an organization to do something positive. If problematic content represents reasonable criticism of the organization's products, the best response is to delete it. The product development team should not receive criticisms posted on a social networking site.
Responses to problematic content are best reserved for instances where it has caused an organization to do something positive.
________ take computers with wireless connections through an area and search for unprotected wireless networks. Hackers Phishers Pretexters Sniffers
Sniffers
1. Which of the following is a challenge for content management systems (CMS)? CMS content is static. The systems must maintain linkages among documents. Content databases cannot hold large numbers of documents. Documents exist in isolation from each other.
The systems must maintain linkages among documents.
1. Which of the following statements is true of social capital? Social capital can be gained by limiting the number of friends. The value of social capital is determined by the number of relationships in a social network. Social capital is an investment in human knowledge and skills for future profit. Being linked into social networks undermines a professional's image and position in an organization.
The value of social capital is determined by the number of relationships in a social network.
Which of the following statements is true of information systems? They are off-the-shelf software without adaptation. They cannot be tailor-made. They can be adapted to fit business needs. They can be purchased as off-the-shelf software.
They can be adapted to fit business needs.
1. In the context of the five components of social media information systems (SMIS), which of the following statements is true of social media (SM) procedures? They process SM sites using elastic, cloud-based servers. Informality makes SMIS difficult to use. They are informal, evolving, and socially oriented. Organizations develop and operate their own custom, proprietary, social networking application software.
They process SM sites using elastic, cloud-based servers.
1. Which of the following statements is a feature of social media (SM) providers? They generally charge users a license fee to use their applications. They do not support custom software for long durations as it is expensive. They sponsor content on SM sites. They use elastic, cloud-based servers to host SM presence.
They use elastic, cloud-based servers to host SM presence.
1. Which of the following statements is true of using social media to advance organizational strategies? Organizations whose business strategy involves selling to developer networks are the last to adopt SM-based customer support. Solving supply chain problems via social media reinforces an organization's sense of privacy. The unpredictability of dynamic processes like social media is encouraged in supply chains. Users who have no financial incentive are willing to provide reviews to the buyer community.
Users who have no financial incentive are willing to provide reviews to the buyer community.
________ occurs when computer criminals invade a computer system and replace legitimate programs with their own unauthorized ones. Sniffing Usurpation Cyber stalking Spoofing
Usurpation
A(n) ________ is a sophisticated, possibly long-running computer hack that is perpetrated by large, well-funded organizations like governments. network sniffer attack copyright theft advanced persistent threat identity threat
advanced persistent threat
Every information system today should require users to sign on with a user name and a password. In this case, which of the following functions is performed by the user's password? decryption authentication encryption identification
authentication
Which of the following uses an individual's personal physical characteristics such as fingerprints, facial features, and retinal scans for verification purposes? symmetric encryption smart card credit card biometric authentication
biometric authentication
When compared to program development, systems development is ________. broader in scope narrower in focus less comprehensive more technical
broader in scope
Davian, a professional hacker, tries every possible combination of characters to crack his victim's email password. Using this technique, he can crack a six-character password of either upper- or lowercase letters in about five minutes. Which of the following techniques is used by Davian to obtain access to his victim's email? spoofing denial-of-service attack brute force attack pretexting
brute force attack
A comprehensive test plan should ________. cause only critical error messages to be displayed be constructed by only product quality assurance (PQA) personnel cause every line of program code to be executed not include incorrect actions that users take
cause every line of program code to be executed
1. Social media (SM) ________ are formed based on mutual interests and transcend familial, geographic, and organizational boundaries. outlets communities collaborators dashboards
communities
1. A Facebook user likes pages of various organizations on Facebook. The fact that the user has liked a particular organization is an example of ________. data contribution user response content data connection data
connection data
1. A(n) ________ is the percent of people who achieve a certain result for an organization. exchange rate bounce rate conversion rate exit rate
conversion rate
If a new system involves a new database or substantial changes to an existing database, then the development team will have to create a(n) ________. replica test plan data model archetype
data model
Thomas is responsible for creating backup copies of information in a system. He also works along with IT personnel to ensure that the backups are valid and that effective recovery procedures exist. Thomas is involved in establishing ________. human safeguards technical safeguards data safeguards hardware safeguards
data safeguards
Which of the following is a typical concern for developers while using prototypes? developing a uniform funding solution for the system understanding a system's complete requirements assessing a system's technical feasibility comparing a system's features with requirements
developing a uniform funding solution for the system
Projects are said to be in analysis paralysis if so much time is spent ________. in the system definition phase of the systems development life cycle (SDLC) designing the system components on project scheduling documenting the requirements
documenting the requirements
1. A(n) ________ social networking service like Yammer can be used to provide managers with real-time feedback about how to resolve internal operational inefficiencies. enterprise media sharing microblogging polling
enterprise
Which of the following is a technical safeguard against security threats? password compliance encryption firewall
firewall
1. A(n) ________ refers to a content structure employed by Enterprise social networks (ESNs) that emerges from the processing of many user tags. folksonomy agronomy cytotaxonomy heteronomy
folksonomy
In terms of password management, when an account is created, users should ________. immediately change the password they are given to a password of their own maintain the same password they are given for all future authentication purposes create two passwords and switch back and forth between the two ensure that they do not change their passwords frequently to reduce the risk of password theft
immediately change the password they are given to a password of their own
The procedure of entrusting a party with a copy of an encryption key that can be used in case the actual key is lost or destroyed is called ________. key replication pledged encryption key escrow insured encryption
key escrow
1. The process of creating value from intellectual capital and sharing that knowledge with employees, managers, suppliers, customers, and others who need it is called ________. value engineering earned value management knowledge engineering knowledge management
knowledge management
A(n) ________ examines the source address, destination address, and other data of a message and determines whether to let that message pass. encrypted firewall perimeter shareware internal malware packet-filtering firewall
packet-filtering firewall
In a ________ installation, a new system runs alongside the old one until the new one has been tested and is fully operational. plunge phased parallel pilot
parallel
Which of the following is the most expensive style of system conversion? pilot installation parallel installation plunge installation phased installation
parallel installation
Software developers group the fixes for high-priority failures into a group that can be applied to all copies of a given product called a ________. product key bug service pack patch
patch
Which of the following is a major concern for developers in a systems development life cycle process? having to work with a team of specialists moving through the unstructured phases of the cycle agreeing on the basic tasks to be performed to build a system performing repetitive tasks of a completed phase
performing repetitive tasks of a completed phase
A(n) ________ sits outside an organizational network and is the first device that Internet traffic encounters. adware internal firewall perimeter firewall malware
perimeter firewall
Mark receives an email from his bank asking him to update and verify his credit card details. He replies to the mail with all the requested details. Mark later learns that the mail was not actually sent by his bank and that the information he had shared has been misused. Mark is a victim of ________. phishing sniffing hacking data mining
phishing
In a ________ installation, an organization implements an entire system on a limited portion of the business. plunge phased parallel pilot
pilot
Which of the following styles of system conversion shuts off the old system and starts a new system? pilot installation phased installation parallel installation plunge installation
plunge installation
A person calls the Stark residence and pretends to represent a credit card company. He asks Mrs. Stark to confirm her credit card number. This is an example of ________. hacking pretexting sniffing data mining
pretexting
During design and implementation, a development team will be heavy with ________. programmers business users business analysts senior managers
programmers
Which of the following types of encryption is used by the secure sockets layer protocol? physical layer encryption disk encryption public key encryption optical encryption
public key encryption
The easiest and cheapest time to alter an information system is in the ________ phase of the systems development life cycle. implementation system definition component design requirements analysis
requirements analysis
Adware and spyware are similar to each other in that they both ________. reside in the background and observe a user's behavior are specifically programmed to spread masquerade as useful programs are installed with a user's permission
reside in the background and observe a user's behavior
1. Being linked to a network of highly regarded contacts is a form of ________. mobility personal reinforcement nepotism social credential
social credential
1. A ________ is a statement that delineates employees' rights and responsibilities in an organization. labor bill statement of purpose corporate datasheet social media policy
social media policy
1. Value chains determine ________. structured business processes social media's requirements social media's flow unstructured business processes
structured business processes
Which of the following is the first phase of the systems development life cycle? implementation system definition requirements analysis business planning process
system definition
Which of the following personnel in a development team has the final say on whether a system is ready for use? managers systems analysts PQA personnel users
users