MIS Exam 3

Ace your homework & exams now with Quizwiz!

What is a potential problem if there is a natural disaster? A) property loss B) theft C) accidents D) terrorist activity E) hacking

A) property loss

Which of the following usually happens in a malicious denial-of-service attack? A) A hacker monitors and intercepts wireless traffic at will. B) A hacker floods a Web server with many millions of bogus service requests. C) An intruder uses another site's IP address to masquerade as that other site. D) A phisher pretends to be a legitimate company and requests confidential data. E) A hacker identifies vulnerabilities in network hosts.

B) A hacker floods a Web server with many millions of bogus service requests.

Facebooks is an example of a ________ because it provides a platform that enables the creation of social networks. A) marketing platform B) social media provider C) user D) community E) connection

B) social media provider

The manager of ABC, Inc decides to order the same number of widgets this year as last year. The manager has made a(n) ________ decision. A) informed B) structured C) gut D) regular E) centralized

B) structured

Which of the following is most likely to be a result of hacking? A) certain Web sites being censored for hurting sentiments B) small amounts of spam in a user's inbox C) an unauthorized transaction from a user's credit card D) pop-up ads appearing frequently E) slowing of network speed

C) an unauthorized transaction from a user's credit card

A ________ is a person or an organization that seeks to obtain or alter data or other IS assets illegally, without the owner's permission and often without the owner's knowledge. A) target B) vulnerability C) threat D) key escrow E) cipher

C) threat

__________ will enable an organization to determine whether it is under systematic attack or whether an incident is isolated. Encryption Practicing response to an attack Training personnel Quickly responding to an attack Centralized reporting

Centralized reporting

A new organizational​ position, called​ __________, has become common as organizations seek to develop and manage innovative social media programs. Chief Social Officer Chief Media Officer Chief Digital Officer Chief Message Officer Chief Design Officer

Chief Digital Officer

Which of the following is characterized by a group of people who work together following a process of feedback and iteration to achieve a common​ goal? Participatory work Collaboration Brainstorming Critical thinking Cooperation

Collaboration

An employee who believes he is about to be terminated intentionally destroys data. This is an example of which type of​ threat? Hacking Sniffing Computer crime Natural disaster Human error

Computer crime

When creating a new spreadsheet model, which of the following needs to be considered? A) What the model needs to accomplish? B) How much detail the model needs to show? C) From where does the data for the model come? D) All of the above E) None of the above

D) All of the above

________ is the investment of resources for future profit. A) Business to business B) Social media C) The marketplace D) Capital E) Attending a business function

D) Capital

Which social media site would organizations use to hire the best people? A) Twitter B) Facebook C) SharePoint D) LinkedIn E) Instagram

D) LinkedIn

All of the following are sources of threats except ________. A) human error B) computer crime C) natural events D) firewalls E) natural disasters

D) firewalls

Which of the following is considered a computer crime? A) accidental deletion of important records B) poorly written programs resulting in information loss C) loss of data as a result of flooding D) hacking of information systems E) failure to correctly back up customer data

D) hacking of information systems

The factors included in social capital evaluation are ________. A) Social Capital = Number of Relationships + Relationship Strength + Entity Resources B) Social Capital = Number of Relationships + Relationship Strength / Entity Resources C) Social Capital = (Number of Relationships + Relationship Strength) x Entity Resources D) Social Capital = Number of Relationships / Relationship Strength x Entity Resources E) Social Capital = Number of Relationships * Relationship Strength * Entity Resources

E) Social Capital = Number of Relationships * Relationship Strength * Entity Resources

Which of the following statements is NOT​ accurate? We do not know the full extent of the financial and data losses due to computer security threats. When conducting studies on the cost of computer​ crimes, some organizations​ don't report all their losses. Threats that involve hacking are attempts to obtain private data. There are no standards for tallying computer crime costs. Forms of usurpation deny access to legitimate users.

Forms of usurpation deny access to legitimate users.

The collaborative tool set that provides a power curve with an early flat spot that then increases to a moderate level is the​ _________ tool set. Primitive Comprehensive Minimal Good ​Open-source

Good

Collaboration information systems that are​ "in the​ cloud" include​ _______. Google Drive SharePoint LibreOffice Adobe Photoshop OpenOffice

Google Drive

Which of the following statements is​ accurate? By​ 2029, organizations will disappear. In the​ future, employers will have to stop allowing employees to bring their own devices to work. Because of social media and other technological​ advances, it will be impossible to manage employees in the future. There will be no more need for managers and executives in businesses because all employees will become directly empowered to interact directly with one another and accomplish company tasks without costly supervisory overhead. Managers may sense a loss of control in the future but managing employees may mean you have to harness the power of social behavior to advance your strategy.

Managers may sense a loss of control in the future but managing employees may mean you have to harness the power of social behavior to advance your strategy.

________ are those that support operational day-to-day activities. A) Operational decisions B) Managerial decisions C) Strategic decisions D) Snap decisions E) Allocation resources

Operational decisions

What is one feature that differentiates social media information systems (SMIS) from Web site applications? A) A user can comment on a Web site. B) SMIS has connection data. C) SMIS has more users than a Web site. D) SMIS do not use browsers. E) A user has to login to a Web site to use the special features.

SMIS has connection data.

In an accounts payable​ department, the department supervisor can both approve an expense and write a check to cover the expense. This situation illustrates ignoring which type of human​ safeguard? Insufficient screening Inadequate hiring procedures Incomplete termination procedures Least possible privilege Separation of duties

Separation of duties

__________ enables the relationship between customers and organizations to emerge in a dynamic process as both parties create and process content. Social CRM Social MIS Traditional MIS Traditional CRM Social Sales IS

Social CRM

__________ is defined as the investment in social relations with the expectation of returns in the marketplace. Social capital Physical capital Human capital Resource capital Friend capital

Social capital

Which is the single most important safeguard that an individual computer user can​ implement? Removing​ high-value data assets from the computer Using strong passwords Clearing cookies and browser history Using http at trusted vendor sites Updating​ anti-virus software

Using strong passwords

An asynchronous communication method that keeps the​ team's work product organized and encourages participation is​ __________. a discussion forum file sharing a webinar virtual meeting email

a discussion forum

The most common criterion used by student teams to judge the success of the team effort is​ _______ have the fewest possible team meetings perceive the team experience to be satisfying and meaningful achieve a successful outcome minimize conflict and aggravation strengthen the​ team's capabilities

achieve a successful outcome

Collaborative information systems must support the primary collaborative purpose of​ _________, which means ensuring that team members are conceiving information in the same way. managing projects making friends becoming informed making decisions

becoming informed

An organization with a social media goal of increasing brand awareness might choose the metric of​ __________ to track performance. brand mentions in social media posts visitor frequency rate social media referral traffic reshares of social media content social media content click rate

brand mentions in social media posts

The likelihood that someone who clicks on an ad completes a transaction that benefits the advertiser is termed the​ __________. monetization rate completion rate advertising success rate conversion rate customer retention rate

conversion rate

________ is a group of people working together, all doing essentially the same work to accomplish a job A) Cooperation B) Collaboration C) Team work D) Working together E) Strategists

cooperation

A team of customer service representatives provides service to an​ organization's customers by answering questions from individual customers and solving individual customer problems. This team follows a​ ____________ work process. consistent complex matrix cooperative collaborative complimentary

cooperative

It is important that organizations​ __________ as the first step in developing a social media information system. identify success metrics define their goals make personal connections gather and analyze data identify the target audience

define their goals

A​ popular, widely-used team communication method that is likely to be disorganized and disconnected is​ ________. discussion forums chat sessions wikis surveys emails

emails

The use of social media to facilitate cooperative work of people within an organization is termed​ a(n) __________. enterprise social network employee social network management social network functional social network corporate social network

enterprise social network

TRUE/FALSE Human error cannot cause unauthorized data disclosure

false

By​ 2029, collaboration systems will result in​ __________. decreased ability of employees to work at home increased need for​ classroom-style corporate training far more​ face-to-face (F2F) meetings increased need for business travel far fewer​ face-to-meetings (F2F)

far fewer​ face-to-meetings (F2F)

Preventing unauthorized network access using hardware or a​ hardware/software combination is accomplished with​ a(n) __________. firewall key escrow authentication encryption key malware definition

firewall

The use of social networks within an organization includes all of the following characteristics EXCEPT​ __________. links search tags signals folklore

folklore

Jerry is in a group that only provides positive feedback because of group cohesion. Jerry is concerned the group is participating in ________. A) cooperation B) collaboration C) groupthink D) criticism E) a feedback loop

groupthink

When an organization encrypts sensitive​ data, it is important that it follow a procedure called a​ __________ to safeguard the loss or damage to the encryption key. key template duplicate key key locker random key key escrow

key escrow

An important aspect of a business​ team's successful outcome is​ ____________. improvement camaraderie meeting a deadline and budget completing a task decision making

meeting a deadline and budget

The next major security challenges will likely be those affecting​ __________. personal computers mobile devices software applications people DBMS

mobile devices

By​ 2029, security threats will continue to​ exist, but​ __________. human error will not cause problems the loss potential will be minimal organizations can be better prepared for them they will not affect most organizations organizations can ignore them

organizations can be better prepared for them

The computers that run the DBMS and all devices that store database data should reside in​ locked, controlled-access facilities. This is an example of​ __________. a key escrow a technical safeguard firewall physical security encryption

physical security

An​ often-overlooked aspect of an​ organization's incident response plan is​ __________. failing to respond quickly virus detection knowing who to inform training practicing the incident response

practicing the incident response

When organizations enable social media communities to rapidly propose and evaluate complex supply chain problem​ solutions, the primary concern is​ __________. contradictory advice uncertainty privacy loss of control how to provide compensation

privacy

Collaborative information systems​ _______ specify​ standards, policies, and techniques for conducting the​ team's work. data hardware software procedures people

procedures

The data component of a collaborative information system that includes the​ team's schedules,​ tasks, and budgets is the​ __________. project data schedule task list project budget project metadata

project metadata

In a security system the purpose of a username is to​ __________. enable screening provide authentication add complexity provide identification provide interpretation

provide identification

Organizations such as​ Facebook, LinkedIn, and Twitter are termed social media​ __________, since they provide the platforms that enable the creation of social networks. participants providers content enablers communities

providers

The Comprehensive set of collaboration tools requires a significant time investment to learn and​ ________. is readily available to all users provides little value to the users most team members already know how to use these tools provides a high degree of utility is typically cost free to use

provides a high degree of utility

Which of the following is vitally important to a meaningful work experience? A) Teaching other team members tasks. B) Having a successful outcome C) Recognizing individuals for their contribution to the team. D) Promotion opportunities. E) Shortening the learning curve for new activities

recognizing individuals for their contribution to the team

Your personal IS security goal should be to find an effective​ trade-off between​ __________ and​ __________. level of​ threats; level of vulnerabilities risk of​ loss; level of complexity risk of​ loss; cost of safeguards level of​ threats; level of inconvenience level of​ complexity; cost of safeguards

risk of​ loss; cost of safeguards

When it comes to risk of security threats and​ losses, __________. sources of risk are diminishing risks cannot be eliminated risk is declining every year risk is unimportant to senior management only the IS department employees need be involved in this issue

risks cannot be eliminated

The​ simplest, most​ effective, and least expensive way to share a task list is​ _________. post the task list in the discussion forum share the task list on Google Drive share the task list using LibreOffice distribute the task list as an email attachment share the task list using SharePoint

share the task list on Google Drive

The purpose of developing​ a(n) __________ is to delineate​ employees' rights and responsibilities regarding social media. work rule guideline social media policy enterprise policy restricted action statement social media promotion

social media policy

Organizations seek to​ __________ relationships to increase the likelihood that the other party in the relationship will do something beneficial to the organization. broaden promote review strengthen expand

strengthen

A collaborative team is not likely to be tasked with dealing with​ _________. unstructured decisions solving problems managing projects becoming informed structured decisions

structured decisions

In the​ future, collaboration systems are expected to​ _____________. increase the need for​ face-to face​ (F2F) meetings substantially improve international business operations increase the need for large office spaces to house employees increase the need for business travel decrease the ability of employees to work from any location

substantially improve international business operations

A difficult aspect of understanding the cost of computer security threats is the fact that most data are based on​ __________ methods that have several weaknesses. forecasting survey projection estimation verification

survey

A​ well-managed team makes sure that all of the following are accomplished at the end of a​ meeting, EXCEPT​ __________. the task list is updated tasks are written so that completion of the task is measurable task completion dates are established task responsibility is assigned the date of the next team social event is in the calendar

the date of the next team social event is in the calendar

TRUE/FALSE A spreadsheet model is a physical representation of a larger or more complicated thing or idea

true

TRUE/FALSE Column Charts are useful when comparing different categories of items or the same category over time

true

TRUE/FALSE Email spoofing is a synonym for phishing

true

TRUE/FALSE Line charts are useful for identifying trends in a dataset

true

TRUE/FALSE Pie Charts express the parts of a data series as percentages

true

TRUE/FALSE The two key characteristics of collaboration are iteration and feedback

true

TRUE/FAlSE Social media allows people to form communities.

true

Besides selling​ advertising, social media providers frequently make money by​ __________. collecting member fees charging users when pages are created using the freemium model monetizing​ "Likes" selling​ ad-blocking software

using the freemium model

A​ __________ is an opportunity for threats to gain access to individual or organizational assets. target vulnerability security flaw safeguard threat

vulnerability

An​ organization's policy statement about customer data should include all of the following elements EXCEPT​ __________. whether sensitive data will be shared what sensitive data will be stored what field is used as the primary key who can see sensitive data how sensitive data will be processed

what field is used as the primary key

__________ personnel have​ been, often​ inadvertently, the source of serious security risks. Data administration ​Help-desk Senior management Database administration IS operations

​Help-desk

_________ includes the risk of inappropriate and negative comments. ​User-generated content Controlled content Purposeful content Open content Restricted content

​User-generated content

Social media data consists of two​ components, __________ and​ __________. Question content area bottom ​content; social ​content; connection ​friend; social ​user; friend ​friend; connection

​content; connection

When a team of students decide to meet together at a specific date and time using​ videoconferencing, they are utilizing​ a(n) __________ communication practice. ​asynchronous, single location ​asynchronous, multi-location ​synchronous, single location ​synchronous, virtual meeting ​synchronous, multi-location

​synchronous, virtual meeting


Related study sets

Cg1 - all questions from past papers with answers

View Set

Marketing Final 3, 14, 15, 16Change Culture is communicated through four ways, including Stories. Which of the following is an example of this type of story? Group of answer choices having a contractor solve the problem creatively by rotating the brick

View Set

SPHR - All topics, terms to definitions

View Set