MIS 390
A network that spans a college or corporate facility is called a:
**INCORRECT** WAN.
________ is spyware that logs and transmits everything a user types.
A keylogger
Which of the following is a computer-based system that attempts to emulate how humans think and act?
AI technology
Which of the following is the first step in the knowledge management value chain?
Acquire
Which of the following is not a major feature of organizations that impacts the use of information systems?
Agency costs
Which of the following is a private corporate network extended to authorized users outside the organization?
An extranet
Which signal types are represented by a continuous waveform?
Analog
Firms that allow employees to use their own devices are embracing which of the following?
BYOD
Which of the following statements about wireless security is false? SSIDs are broadcast multiple times and can be picked up fairly easily by sniffer programs. Radio frequency bands are easy to scan. An intruder who has associated with an access point by using the correct SSID is capable of accessing other resources on the network. Intruders can force a user's NIC to associate with a rogue access point. Bluetooth is the only wireless technology that is not susceptible to hacking by eavesdroppers.
Bluetooth is the only wireless technology that is not susceptible to hacking by eavesdroppers.
Which of the following types of system would you use to manage relationships with your customers?
CRM
Which model is used to describe the interaction of external forces that affect an organization's strategy and ability to compete?
Competitive forces model
Which of the following protects the authors of a book from having their work copied by others?
Copyright law
Using numerous computers to inundate and overwhelm the network from numerous launch points is called a(n) ________ attack.
DDoS
Which of the following types of information systems is especially suited to situations in which the procedure for arriving at a solution may not be fully defined in advance?
DSS
Which of the following is an automated or manual file that stores information about data elements and data characteristics such as usage, physical representation, ownership, authorization, and security?
Data dictionary
Which type of infrastructure service stores and manages corporate data and provides capabilities for analyzing the data?
Data management
You are advising a video production company on the best type of knowledge management system to help them archive digital video and sound clips. Which of the following will suit their needs?
Digital asset management system
________ is a feature of law-governed society and involves having laws that are known and understood, along with the ability to appeal to higher authorities to ensure that the laws are applied correctly.
Due process
Which of the following are the three major types of knowledge management systems?
Enterprise-wide knowledge management systems, KWS, and intelligent techniques
Maintaining the organization's financial records is a central purpose of which main business function?
Finance and accounting
Which of the following involves practices and technologies to minimize the environmental effects of manufacturing and managing computing devices?
Green computing
Which main business function is responsible for maintaining employee records?
Human resources
Which of the following is not one of the current key technology trends that raise ethical issues?
Increase in data quality
Which of the following best describes the effect that new information technology has on society?
It has a ripple effect, raising new ethical, social, and political issues.
Which of the following statements about botnets is false? Eighty percent of the world's malware is delivered by botnets. Botnets are often used to perpetrate DDoS attacks. Ninety percent of the world's spam is delivered by botnets. Botnets are often used for click fraud. It is not possible to make a smartphone part of a botnet.
It is not possible to make a smartphone part of a botnet.
Which of the following would you use to consolidate the relevant knowledge and experience in the firm and make it available to improve business processes and management decision making?
KMS
Measures defined by management and used to internally evaluate the success of a firm's financial, business process, customer, and learning and growth are called
KPIs
A colleague at work takes small amounts of office supplies for her own personal use, saying that this is a tiny loss to the company. You tell her that if everyone were to take office supplies, then the loss would no longer be minimal. Your rationale expresses which of the following ethical principles?
Kant's Categorical Imperative
Which of the following is a tool for the management, delivery, tracking, and assessment of various types of employee learning?
Learning management system
Amazon's use of the Internet as a platform to sell books more efficiently than traditional bookstores illustrates which of the following strategies?
Low-cost leadership
The total number of food items with storage temperature problems is an example of which of the following?
Meaningful information
Which of the following is a device that makes possible the translation of digital signals to analog sound signals used by a computer network?
Modem
Which of the following is a data analysis technology that finds hidden connections between data in disparate sources?
NORA
Which of the following specifically makes malware distribution and hacker attacks to disable websites a federal crime?
National Information Infrastructure Protection Act
Which of the following has a large number of sensing and processing nodes that continuously interact with each other?
Neural networks
Which of the following types of computing involves purchasing computing power from a remote provider and paying only for the computing power used?
On-demand
Which of the following substitute products would be of most concern for a cable TV distributor?
On-demand Internet television
In a business hierarchy, which of the following levels is responsible for monitoring the daily activities of the business?
Operational management
Which of the following involves slicing digital messages into parcels, transmitting them along different communication paths, and reassembling them at their destinations?
Packet (switching)
The use of computers to assemble data from different sources to create digital dossiers of detailed information about individuals is known as which of the following?
Profiling
CryptoLocker is an example of which of the following?
Ransomware
________ is malware that hijacks a user's computer and demands payment in return for giving back access.
Ransomware
________ means that you accept the potential costs and obligations for the decisions you make.
Responsibility
Which of the following industries has the lowest barrier to entry?
Small retailer
Which of the following is not an example of a wearable computing device?
Smartphones
Which type of system integrates supplier, manufacturer, distributor, and customer logistics processes?
Supply chain management system
A firm that invests in an information system because it is a necessity of doing business does so because it is seeking to achieve which of the following business objectives?
Survival
On which of the following protocols is the Internet based?
TCP/IP
Which of the following is not an example of the moral dimensions of the Information Age identified in the text?
The emergence of giant tech firms that dominate their markets
Which of the following tools would you use to evaluate and choose a collaboration tool for your organization?
The time/space collaboration and social tool matrix
Which model can be used to analyze the direct and indirect costs to help firms determine the actual cost of specific technology implementations?
Total cost of ownership
Which of the following is the single greatest cause of network security breaches?
User lack of knowledge
Which of the following is a recent addition to the mobile digital platform?
Wearable computing devices
An inference engine is
a strategy used to search through the collection of rules and formulate conclusions
Augmented reality is
a technology for enhancing visualization by overlaying digital data and images onto a physical real-world environment
A MOOC is
a type of online course
The leading methodology for understanding the really important information needed by a firm's executives is called the ________ method.
balanced scorecard
Evil twins are:
bogus wireless network access points that look legitimate to users.
The telephone system is an example of a ________ network.
circuit-switched
A salesperson clicks repeatedly on the online ads of a competitor in order to drive the competitor's advertising costs up. This is an example of:
click fraud.
All of the following are technologies used to analyze and manage big data except: Hadoop. analytic platforms. in-memory computing. cloud computing. noSQL.
cloud computing.
Interpretations of Moore's law assert that:
computing power doubles every 18 months.
The ________ phase of decision-making involves identifying and exploring various solutions to a problem.
design
Bandwidth is the:
difference between the highest and lowest frequencies that can be accommodated on a single channel.
All of the following are competitive forces in Porter's model except
disruptive technologies.
In ________, digital technology and the Internet are used to execute the major business processes in the enterprise.
e-business
A(n) ________ system collects data from various key business processes and stores the data in a single, comprehensive data repository, usable by other parts of the business.
enterprise
A schematic of the entire database that describes the relationships in a database is called a(n):
entity-relationship diagram.
Group Decision Support Systems (GDSS)
facilitate the solution of unstructured problems
Data mining allows users to:
find hidden relationships in data.
As discussed in the chapter text, the three main reasons that investments in information technology do not always produce positive results are
information quality, organizational culture, and management filters
Data collected at checkout counters in a grocery store is an example of
input
The three activities in an information system that produce the information organizations use to control operations are
input, processing, and output
Apple's Siri application is an example of
intelligent agents
The Internet increases the bargaining power of customers by
making information available to everyone.
Firms use a ________ strategy to provide a specialized product or service for a narrow target market more effectively than their competitors do.
market niche
According to the ________ definition of organizations, an organization is seen as a means by which capital and labor are transformed by the organization into outputs to the environment.
microeconomic
The process of streamlining data to minimize redundancy and awkward many-to-many relationships is called:
normalization.
Decisions regarding managing and monitoring day-to-day business activities are referred to as ________ intelligence.
operational
In the ________ model of informed consent, personal information cannot be collected until the consumer specifically agrees that his or her data can be collected.
opt-in
The practice of contracting custom software development to an outside firm is commonly referred to as:
outsourcing.
The logical view of a database:
presents data as they would be perceived by end users.
A field identified in a table as holding the unique identifier of the table's records is called the:
primary key.
A(n) ________ represent data as two-dimensional tables.
relational DBMS
The ________ function is responsible for making sure customers are aware of the company's products.
sales and marketing
In a relational database, the three basic operations used to develop useful sets of data are:
select, project, and join.
In a hierarchical organization, the upper level consists of
senior management
The three principal levels within a business organization hierarchy are
senior management, middle management, and operational management
An employee clicks a link in an email from what looks like a coworker and is taken to a fraudulent website, which asks for personal information. This is an example of:
spear phishing.
A pivot table is a(n)
spreadsheet tool that displays two or more dimensions of data in a convenient format
If you can follow a definite procedure to make a business decision, you are making a(n) ________ decision.
structured
All of the following are capabilities of enterprise social networking tools except the ability to set up member profiles the ability to share, store, and manage content tagging and social bookmarking supply chain management the ability to establish groups and team workspaces
supply chain management
OLAP enables:
support of multidimensional data analysis, enabling users to view the same data in different ways using multiple dimensions.
The text defines ________ as expertise of organizational members that has not been formally documented.
tacit knowledge
Specifications that establish the compatibility of products and the ability to communicate in a network are called:
technology standards.
Thomas Friedman's description of the world as "flat" refers to
the flattening of economic and cultural advantages of developed countries
According to ________, you should take the action that produces the least harm.
the risk aversion principle
The domain .gov is a(n):
top-level domain.
When there is no well-understood or agreed-on procedure for making a decision, it is said to be
unstructured
A network that covers entire geographical regions is most commonly referred to as a(n):
wide area network.