Flashcards on ISM 3011 FINAL

Unlock all answers in this set

Unlock answers
question
An example of malicious human activity could include an employee who, in the course of backing up a database, inadvertently installs an old database on top of the current one. A. True B. False
answer
B. False
question
Drive-by spoofers take computers with wireless connections through an area and search for unprotected wireless networks. A. True B. False
answer
B. False
question
The IT department should set the security policy for an organization. A. True B. False
answer
B. False
question
HIPAA sets limits on who can receive your health information. A. True B. False
answer
A. True
question
Encryption is an example of a technical safeguard. A. True B. False
answer
A. True
question
The ________ pretends to be a legitimate company and sends an email requesting confidential data, such as account numbers, Social Security numbers, account passwords, and so forth. A. hawker B. phisher C. spoofer D. sniffer
answer
B. phisher
question
Which of the following usually happens in a malicious denial-of-service attack? A. A hacker monitors and intercepts wireless traffic at will. B. A hacker floods a Web server with millions of bogus service requests. C. A hacker uses unauthorized programs to invade a computer system and replace legitimate programs. D. A phisher pretends to be a legitimate company and sends an email requesting confidential data.
answer
B. A hacker floods a Web server with millions of bogus service requests.
question
Which of the following is a critical security function of senior-management involvement? A. safeguarding computer hardware and software B. planning response to security incidents C. establishing the security policy D. managing the security program on a real-time basis
answer
C. establishing the security policy
question
Which of the following is an example of a technical safeguard? A. backup and recovery B. encryption C. procedure design D. compliance
answer
B. encryption
question
A security policy covering personal use of computers at work would be an example of a ________. A. data policy B. issue-specific policy C. system-specific policy D. personnel policy
answer
B. issue-specific policy
question
Which of the following is used for biometric authentication? A. smart cards B. facial features C. passwords D. chromosome data
answer
B. facial features
question
________ encryption uses the same key for both parties. A. Symmetric B. Asymmetric C. SSL D. TLS
answer
A. Symmetric
question
You are doing an online fund transfer through the Web site of a reputed bank. Which of the following displayed in your browser's address bar will let you know that the bank is using the SSL protocol? A. http:// B. www3 C. https:// D. .com
answer
C. https://
question
Managing outsourcing relationships is one of the major functions of the information systems (IS) department. A. True B. False
answer
A. True
question
The system analyst works with users to determine system requirements. A. True B. False
answer
A. True
question
An organization should implement all good ideas that are in alignment with its strategy. A. True B. False
answer
B. False
question
Legacy systems usually require special maintenance teams and activities to keep them running. A. True B. False
answer
A. True
question
________ is another more common title given to the VP of information services. A. CTO B. CEO C. CIO D. CFO
answer
C. CIO
question
The ________ group includes system and network administrators. A. technology B. operations C. development D. outsourcing relations
answer
B. operations
question
If you are a senior manager in finance, it is possible that you may be asked to be a member of the ________ in order to help evaluate and prioritize new IS projects from a finance perspective. A. steering committee B. outsourcing relations group C. project management group D. enterprise application group
answer
A. steering committee
question
Because the IS department essentially functions as a ________ organization, it must have a system to record user problems and monitor their resolution. A. for profit B. service C. product D. volunteer
answer
B. service
question
A file which contains data definitions is called a ________. A. data standard B. data dictionary C. data plan D. data policy
answer
B. data dictionary
question
Which of the following statements is true regarding outsourcing? A. There is no guarantee that outsourcing will provide a certain level of quality. B. Outsourcing leads to greater budgetary instability. C. Outsourcing saves direct management time but increases indirect management time. D. Outsourcing involves significant implementation risk.
answer
A. There is no guarantee that outsourcing will provide a certain level of quality.
question
A major concern with outsourcing is that the company may lose ________ by being forced to reveal proprietary trade secrets. A. market position B. employees C. market value D. intellectual capital
answer
D. intellectual capital
question
________ is the process whereby multiple operating systems share the same computer hardware, usually a server. A. Virtualization B. Green computing C. System outsourcing D. Application outsourcing
answer
A. Virtualization
question
Information systems are never off-the-shelf. A. True B. False
answer
A. True
question
The single most important criterion for information systems success is for users and the business to take ownership of their systems. A. True B. False
answer
A. True
question
According to Brooks' Law, adding more people to a system development project will ________. A. lower the total project cost B. speed up the project C. delay the project's completion D. require less coordination
answer
C. delay the project's completion
question
During requirements definition of a project, the team will be heavy with systems analysts. A. True B. False
answer
A. True
question
Identify the most important phase in the systems development process. A. determining requirements B. component design C. implementation D. system maintenance
answer
A. determining requirements
question
A ________ installation is the riskiest because the old system is turned off and the new system is turned on. A. pilot B. phased C. parallel D. plunge
answer
D. plunge
question
Software vendors often bundle large bunches of fixes for low-priority problems into groups called ________. A. technical fixes B. patches C. service packs D. enterprise packs
answer
C. service packs
question
In order to address the problems facing development forecasting, development methodologies other than the SDLC have emerged for developing systems through a series of small, manageable chunks. Which of the following is not one of them? A. rapid application development B. integrated development C. extreme programming D. object-oriented development
answer
B. integrated development
question
Project decisions are based on the starting plan called ________ that stipulates the tasks to be accomplished, the labor and other resources assigned to those tasks, and the schedule for completion. A. template B. estimate C. baseline D. pre-report
answer
C. baseline
question
Project teams create a(n) ________, which is a hierarchy of the tasks required to complete a project, to reduce the confusion of complex interrelated tasks. A. enterprise task sheet B. work-breakdown structure C. Gantt chart D. scope statement
answer
B. work-breakdown structure
question
The ________ is the sequence of activities that determines the earliest date by which the project can be completed. A. work-breakdown structure B. Gantt chart C. critical path D. baseline WBS
answer
C. critical path
question
Reporting tools are programs that read data from a variety of sources, process that data, format it into structured reports, and deliver those reports to the users who need them. A. True B. False
answer
A. True
question
Which of the following is the most accurate description of business intelligence? A. information used to organize routine business operations B. information relating to key business processes C. information containing patterns, relationships, and trends D. information concerning key competitors in the industry
answer
C. information containing patterns, relationships, and trends
question
Which of the following is an example of question that data-mining will help address? A. Will a given customer default on a loan? B. What has happened in the last two years? C. What is the current situation? D. How does the current situation compare to the situation one year ago?
answer
A. Will a given customer default on a loan?
question
An RFM score of ________ probably means that this customer has taken their business elsewhere and is probably not worth spending too many marketing resources on. A. 121 B. 231 C. 555 D. 111
answer
C. 555
question
Focused differentiation occurs when ____
answer
industry segmented relying on quality of products over another
question
Which of the following is a support activity in the value chain?
answer
procurement, HR, Infrastructure, technology
question
Organizations can lock in suppliers by making it difficult to switch to another organization or by
answer
Making it easy to connect or work with suppliers
question
MIS is best defined as
answer
development and use of information systems that help a business achieve their goals and objectives
question
Which of the following accurately describes the five-component framework of information systems?
answer
Model of components: hardware, software, data, procedures, people
question
Which of the following is true about the quality of information?
answer
It's accurate, timely, just sufficient, and worth its cost
question
The operating system employs ___ so that users can run multiple applications and files at the same time
answer
Memory Swap
question
A network of computers that appears to operate as an integrated whole is known as a ____
answer
grid
question
A client-server application that requires nothing more than a browser is called a ____
answer
thin client
question
A ___ is a column or group of columns that identifies a unique row in a table.
answer
key
question
Metadata are ___
answer
data that describes data
question
A ___ is a computing device that prevents unauthorized network access
answer
Firewall
question
Information silos arise as a consequence of an organization's ___
answer
Growth and increasing use of information systems
question
Information silos are not a problem until they ___
answer
Begin to share data about the same entities/duplicate data
question
E-commerce leads to ___, which is the elimination of middle layers of distributors and suppliers
answer
disintermediation
question
Which one of the following characteristics is true for companies such as Google, Amazon.com, and eBay that exemplify Web 2.0?
answer
They don't sell software licenses. They use SAAS software as a service. - even faster - advertising revenue models - flexibility - rise of user generated content
question
Which of the following is an example of a question that data-mining will help address?
answer
Make predictions like... will a customer default on a loan? Will an employee respond positively to a promotion?
question
Which of the following statements is true about operational data?
answer
- is designed to support fast transaction processing and might need to be reformatted to be useful for BI application - most operational and purchased data have problems that inhibit their usefulness for business intelligence
question
A business process that crosses into multiple companies is known as a(n) ____ business process
answer
interorganizational
question
In cross-functional business process management, ____
answer
- business processes crosses into multiple departments within a single company - Ex. CRM, ERP - BPM authority shared across several departments. Problem resolution via committee and policy
question
In a BPMN process diagram, a ___ represents the start of a process
answer
open circle with thinner outline
question
In BPMN notation, ___ represent decisions and usually contain a question that can be answered with yes or no.
answer
diamonds
question
In a BPMN process diagram, dotted arrows depict the flow of
answer
messages and data flows
question
In BPMN diagrams, a square with a plus sign means that
answer
activity is considered to be independent of this process and that it is defined in greater detail in another diagram
question
Which of the following is NOT a way for process designers to increase the performance of a business process?
answer
Three ways they CAN 1) add more resources to roles of a given process without changing its structure (add people, equipment or systems -- ADDS COST) 2) Change the structure of a process without resource allocation change 3) Change both the structure and adding resources
question
Which of the following is true for the relationship between business processes and information systems?
answer
- IS elements are embedded within the BP but there are activities in the BP that are not part of the IS - BP uses two separate IS, and can utilize 0, 1, or more IS - A particular IS may be bused by one or more BP
question
What are the four dimensions of feasibility?
answer
1) cost 2) schedule 3) technical 4) organizational
question
An element of ___ feasibility concerns whether the new system fits within legal requirements.
answer
organizational
question
During the requirements definition stage of developing an information system, the project team will include mostly ___
answer
Business and system analysis
question
The ___ stage of the information systems development process involves identifying what is to be procured, how frequently and how fast it is to be produced
answer
Determining requirements
question
In a business process, a role is _____
answer
a collection of procedures
question
In business process management, teams build a(n) ___ model that documents the current situation and then make adjustments necessary to solve the problems
answer
as-is model
question
A functional business process ____
answer
Resides with a single business function, authority belongs to a single manager Ex. accounts payable
question
Which of the following is true of business processes in nonprofit and governmental organizations?
answer
- Have all three types of processes: functional, cross-functional, interorganizational - Most processes are service-oriented, rather than revenue-oriented
question
The first step in the system definition phase of systems development is to ___
answer
Define the goals and scope of the new IS
question
___ feasibility refers to whether existing information technology is able to meet the needs of the new system
answer
Technical
question
Does the company have management policy that prohibits releasing customer data? Such a question is critical to understanding ___ feasibility.
answer
organizational
question
Tasks in the ___ phase of the system development process are to build, test, and convert the users to the new system
answer
Implementation
question
With ___ installation, the organization implements the entire system/business process on a limited portion of the business
answer
Pilot
question
Fixing the system so that it works correctly or adapting it to changes in requirements occurs in the __ phase of the information system development process
answer
maintenance
question
According to Brooks' Law, adding more people to a system development project will ___
answer
make the project later
question
A ___ shows the tasks, start and finish dates, and dependencies for the tasks of a project.
answer
Gant Chart (or possibly WBS)
question
___ is the process by which project managers compress the schedule by moving resources, typically people, from noncritical path tasks onto critical path tasks
answer
Critical Path Analysis
question
The situation that occurs when adding more resources creates inefficiencies is known as ___
answer
diseconomies of scale
question
The term ___ refers to a set of management policies, practices, and tools that developers use to maintain control over the project's resources
answer
Configuration control
question
Which of the following is not a process modeling deliverable?
answer
An entity relationship diagram
question
Data contained on a customer order form would be represented on a data-flow diagram as a:
answer
data flow
question
Data in motion, moving from one place in a system to another, best describes a:
answer
data flow
question
Data at rest, which may take the form of many different physical representations, best describes a:
answer
data store
question
The calculation of an employee's salary would be represented on a data-flow diagram as a(n):
answer
process
question
A supplier of auto parts to your company would be represented on a data-flow diagram as a:
answer
source
question
The origin and/or destination of data, sometimes referred to as external entities defines:
answer
source
question
An arrow on a data-flow diagram represents a(n):
answer
data flow
question
A square on a data-flow diagram represents a:
answer
source
question
On a data-flow diagram, a rectangle with rounded corners represents a(n):
answer
process
question
On a data-flow diagram, a rectangle with the right vertical line missing represents a:
answer
data store
question
Which of the following is most likely a source/sink for a manufacturing system?
answer
know examples of a source/sink
question
Which of the following is true regarding the context diagram?
answer
know that the process symbol is labeled 0 and has only one process
question
If two processes are connected by a data flow, they are said to:
answer
be coupled to each other
question
By placing a data store between two processes, this:
answer
decouples the processes
question
A miracle process is one that:
answer
has only outputs
question
A black hole is a process that:
answer
has only inputs
question
On a data-flow diagram, you may:
answer
repeat both data stores and sources/sinks
question
The act of going from a single system to several component processes refers to:
answer
decomposition
question
The conservation of inputs and outputs to a data-flow diagram process when that process is decomposed to a lower level defines:
answer
balancing
question
Which of the following is a true statement?
answer
An information system design based on a data orientation, rather than a process or logic orientation, should have a longer useful life
question
Conceptual data modeling is typically done in parallel with other requirements analysis and structuring steps during:
answer
systems analysis
question
Process, logic, and data-model descriptions of a system must be consistent and complete since:
answer
they each describe different but complementary views of the same information system
question
The most common format used for data modeling is:
answer
entity-relationship diagramming
question
During systems analysis:
answer
a conceptual data model (E-R with attributes) is prepared
question
During systems planning and selection:
answer
an enterprise-wide data model is prepared
question
During systems design:
answer
a logical model (relational) is prepared
question
During systems implementation and operation:
answer
database and file definitions are prepared
question
The primary deliverable from the conceptual data-modeling step within the analysis phase is:
answer
an entity-relationship diagram
question
The data modeling perspective that derives the business rules for a data model from an intimate understanding of the nature of the business, rather than from any specific information requirements in screens, reports, or business forms, is referred to as the:
answer
top-down approach
question
Gathering the information you need for data modeling by reviewing specific business documents handled within the system describes the:
answer
bottom-up approach
question
Reviewing computer screens, reports, and business forms for the purpose of gaining an understanding of data is indicative of the:
answer
bottom-up approach
question
Asking system users and business managers "How many instances of each object might exist?" would help determine:
answer
the data entities and their descriptions
question
A detailed, logical, and graphical representation of the entities, associations, and data elements for an organization or business area best describes a(n):
answer
entity-relationship diagram or E-R diagram
question
A person, place, object, event, or concept in the user environment about which the organization wishes to maintain data refers to a(n):
answer
entity
question
A collection of entities that share common properties or characteristics best defines:
answer
entity type
question
A single occurrence of an entity type defines:
answer
entity instance
question
A named property or characteristic of an entity that is of interest to the organization defines:
answer
attribute
question
An attribute (or combination of attributes) that uniquely identifies each instance of an entity type defines:
answer
candidate key
question
When selecting an identifier, one should:
answer
choose a candidate key that will not change its value over the life of each instance of the entity type
question
Human interface design is performed during:
answer
systems design
question
Which of the following is the standard method of gathering and displaying information on the Internet?
answer
Form interaction
question
Which of the following best describes a business document that contains only predefined data?
answer
Report
question
Form and report design:
answer
generally follows a prototyping approach
question
When designing a form or report, which of the following is a fundamental question?
answer
know what are the fundamental questions
question
The major deliverables associated with the human interface design stage are:
answer
design specifications
question
Designing usable forms and reports requires:
answer
active interaction with end users
question
Which of the following is a guideline for designing forms and reports?
answer
know the guidelines for designing forms and reports
question
Making sure that all data and entry fields are clearly labeled corresponds to the following form and report guideline:
answer
balance the layout
question
Commonly used methods for highlighting include:
answer
know commonly used methods for highlighting
question
Commonly used methods for highlighting include each of the following except:
answer
spacing
question
Which of the following is a guideline for displaying text?
answer
know the guidelines for displaying text
question
Which of the following focuses on how information is provided to and captured from users?
answer
Interface and dialogue design
question
When designing interfaces and dialogues, you follow a:
answer
prototyping approach
question
The way a user can move from one display to another best describes:
answer
dialogue sequence
question
When designing the navigation procedures within your system, the primary concerns are:
answer
flexibility and consistency
question
Movement to another screen corresponds to the functional requirement of:
answer
exit capabilities
question
"Please wait while I open the file" is an example of:
answer
status information
question
Using lists to break information into manageable pieces conforms to the SOS guideline of:
answer
organize
question
The ability to provide field-level help is often referred to as:
answer
context-sensitive help
question
Which of the following is not associated with logical and physical database design?
answer
The preparation of a final conceptual model and the implementation of the database
question
The most common style for a logical database model is the:
answer
relational database model
question
During logical database design, the work of all systems development team members is coordinated and shared through:
answer
the project dictionary
question
Combining all normalized user views into one consolidated logical database model refers to:
answer
view integration
question
The primary deliverable from logical database design is:
answer
normalized relations
question
A data model that represents data in the form of tables or relations is called a(n):
answer
relational database model
question
A named two-dimensional table of data is a(n):
answer
relation
question
A relation that contains a minimum amount of redundancy and allows users to insert, modify, and delete the rows in a table without errors or inconsistencies is a(n):
answer
well-structured relation
question
The process of converting complex data structures into simple, stable data structures is referred to as:
answer
normalization
question
A particular relationship between two attributes best defines:
answer
functional dependency
question
An attribute that appears as a nonkey attribute in one relation and as a primary key attribute (or part of a primary key) in another relation is a:
answer
foreign key
question
If order number serves as the primary key in the order relation and also appears as a nonkey attribute in the invoice relation, then order number is said to be a:
answer
foreign key
question
Which of the following statements is true regarding normalization?
answer
Normalization produces a set of well-structured relations that contain all of the data mentioned in system inputs and outputs developed in human interface design
question
Which of the following properties should be satisfied when the identifier of the entity type becomes the primary key of the corresponding relation?
answer
The value of the key must uniquely identify every row in the relation
question
Relationships between instances of a single entity type are referred to as:
answer
recursive relationships
question
A foreign key in a relation that references the primary key values of that same relation is referred to as a(n):
answer
recursive foreign key
question
Merging relations is also referred to as:
answer
view integration
question
Two different names that are used to refer to the same data item best defines:
answer
synonym
question
A single name that is used for two or more different attributes best defines:
answer
homonym
question
Which of the following best describes a unique sequential number or random number assigned by the database management system (DBMS) whenever a new record is added to a table?
answer
autonumber
question
The process whereby the physical design specifications created by the design team are turned into working computer code by the programming team is referred to as:
answer
coding
question
The deliverables from the coding, testing, and installation processes include:
answer
the code, program documentation, test scenarios and test data, results of program and system testing, user guides, user training plan, and an installation and conversion plan
question
A strategy for training users so they can quickly learn the new system is a(n):
answer
training plan
question
Training on the use of the system begins during the early stages of:
answer
implementation
question
This plan lays out a strategy for moving from the old system to the new.
answer
Installation plan
question
Testing each module alone in an attempt to discover any errors that may exist in the module's code is referred to as:
answer
unit testing
question
The bringing together of all the programs that comprise a system for testing describes:
answer
system testing
question
The purpose of acceptance testing is to:
answer
determine if the system meets user requirements
question
User testing of a completed information system using simulated data refers to:
answer
alpha testing
question
User testing of a completed information system using real data in the real user environment refers to:
answer
beta testing
question
The organizational process of changing over from the current information system to a new one best defines:
answer
installation
question
Which of the following determines how the system performs on the range of possible environments in which it may be used?
answer
Performance testing
question
Changing over from the old information system to a new one by turning off the old system as the new one is turned on best describes:
answer
direct installation
question
Written or other visual information about an application system, how it works, and how to use it best defines:
answer
user documentation
question
System documentation that includes the outcome of such structured diagramming techniques as data-flow and entity-relationship diagrams best defines:
answer
a. embedded documentation external documentation
question
Which of the following consists of an exhaustive list of the system's functions and commands, usually in alphabetical order?
answer
Reference guide
question
This type of user documentation is intended primarily for those who will install and administer a new system and contains information about the network on which the system will run, software interfaces for peripherals such as printers, troubleshooting, and setting up user accounts.
answer
System administrator's guide
question
This type of user documentation allows users to test for proper system installation and then signify their acceptance of the new system and its documentation with their signatures.
answer
Acceptance sign-off
question
Most user documentation is now delivered:
answer
online, in hypertext format
question
Which of the following are common methods for computer training?
answer
know the common methods of computer training
question
True or false. In a business process, activities are collections of related tasks that receive inputs and produce outputs.
answer
True.
question
True or false. In business processes, resources are collections of procedures.
answer
False; In business processes, roles are collections of procedures.
question
True or false. Roles are collections of related tasks that receive inputs and produce outputs.
answer
False; Activities are collections of related tasks that receive inputs and produce outputs.
question
True or false. A data flow is the movement of data from one activity or another from an activity to a repository.
answer
True.
question
True or false. Resources are people or computer applications that are assigned to roles.
answer
True.
question
True or false. Only a single resource can be assigned to a role.
answer
False;
question
True or false. A business process should be changed only when there is a change in an external situation, such as the market.
answer
False; A business process should be changed only when it doesn't work.
question
True or false. Business process management is a one-time process for systematically creating, assessing, and altering business processes.
answer
False; Business process management is a recurring process for systematically creating, assessing, and altering business processes.
question
True or false. The BPM cycle begins by creating models of business processes.
answer
True
question
True or false. An as-is model documents the targeted situation for a business process.
answer
False; An as-is model documents the current situation for a business process.
question
True or false. In a business process management scenario, teams make adjustments necessary to solve process problems before building an as-is model.
answer
False; In a business process management scenario, business users who have expertise make adjustments necessary to solve process problems before building an as-is model.
question
True or false. The creation of system components can be a manual as well as an automated process.
answer
True.
question
True or false. Business process management applies only to commercial, profit-making organizations.
answer
False; Business process management applies to commercial, profit-making, nonprofit-making, and governmental organizations.
question
True or false. Functional business processes involve activities across several business functions.
answer
False; Functional business processes involve activities across a single business functions.
question
True or false. In functional business process management, BPM authority belongs a single departmental manager who has authority to resolve BPM issues.
answer
True.
question
True or false. In cross-functional business management processes, problem resolution takes place via negotiation and contract.
answer
False; In interorganizational business management processes, problem resolution takes place via negotiation and contract.
question
True or false. In interorganizational business process management, BPM authority is shared by multiple companies.
answer
True
question
True or false. The Object Management Group created a standard det of terms and graphical notations for documenting business processes.
answer
True.
question
True or false. Business Process Modeling Notation is a standard set of terms and graphical notations for documenting business procedures.
answer
False; Object Management Group is a standard set of terms and graphical notations for documenting business procedures.
question
True or false. In a BPMN process diagram, the swim-lane layout is used to simplify process diagrams and to draw attention to interactions among components of the diagram.
answer
True.
question
True or false. In the swim-layout, each resource in the business process is given its own swim lane.
answer
False; In the swim-layout, each role in the business process is given its own swim lane.
question
True or false. In BPMN, all activities for a given role are shown in that role's swim lane.
answer
True.
question
True or false. In BPMN, dotted arrows depict the flow or sequence of the activities in the process.
answer
False; In BPMN, dotted arrows depict the flow of messages.
question
True or false. Diamonds represent decisions usually contain a question that can be answered with a yes or a no.
answer
True.
question
True or false. Adding more resources to the roles of a given process without changing its structure is the brute-force approach to increasing the performance of a business process.
answer
True.
question
True or false. The brute-force approach to improving business processes requires a change in the structure of a process without adding resources.
answer
False; The brute-force approach to improving business processes requires adding more resources without changing its structure.
question
True or false. When trying to improve the performance of a business process, designers cannot change the structure of a process without changing the resource allocations.
answer
False; When trying to improve the performance of a business process, designers can change the structure of a process without changing the resource allocations.
question
True or false. All activities in business processes are part of the information system.
answer
False;
question
True or false. Business processes must include one or more information systems.
answer
False; Business processes can include zero, one or more information systems.
question
True or false. Designing information systems first and working toward processes will cause problems for future processes that use the information systems.
answer
False; Designing business systems first and working toward information systems will cause problems for future processes that use the information systems.
question
True or false. The most common technique for developing information systems is the systems development life cycle.
answer
True.
question
True or false. It is not possible to buy an information off-the-shelf.
answer
True.
question
True or false. The process of assessing feasibility occurs during the components design phase of the system development process.
answer
False; The process of assessing feasibility occurs during the defining of the system development process.
question
True or false. The four dimensions of feasibility are cost, schedule, technical and organizational feasibility.
answer
True.
question
True or false. Technical feasibility refers to whether existing information technology is likely to be able to meet the needs of the new system.
answer
True.
question
True or false. Organizational feasibility concerns whether a new system fits within an organization's customs, culture, charter, or legal requirements.
answer
True.
question
True or false. A systems analyst is someone who is well versed in Porter's models, organizational strategy, and systems alignment theory.
answer
False; A business analyst is someone who is well versed in Porter's models, organizational strategy, and systems alignment theory.
question
True or false. In a project team, programmers are IS professionals who understand both business and technology.
answer
True.
question
True or false. During the requirements definition stage of systems development, the team will be heavy with business and systems analysts.
answer
True.
question
True or false. User involvement is critical throughout the systems development process.
answer
True.
question
True or false. With phased installation, the new system/business processes run in parallel with the old one until the new system is tested and fully operational.
answer
False; With parallel installation, the new system/business processes run in parallel with the old one until the new system is tested and fully operational.
question
True or false. Organizations should avoid the plunge installation style unless the new system is providing a new capability that will not disrupt the operation of the organization if it fails.
answer
True.
question
True or false. According to Brooke's Law, adding more people to a late project makes the project later.
answer
True.
question
True or false. Brooke's Law is true because a larger staff requires increased coordination.
answer
True.
question
True or false. A work-breakdown structure is a hierarchy of the tasks requiredd to complete a project.
answer
True.
question
True or false. A Gantt chart shows the sequence of the activities that determine the earliest date by which the project can be completed.
answer
False; A critical path shows the sequence of the activities that determine the earliest date by which the project can be completed.
question
True or false. The critical path is the sequence of the activities that determine the earliest date by which the project can be completed.
answer
True.
question
True or false. You can trade off project requirements against both time and cost.
answer
True.
question
True or false. Diseconomies of scale is the process by which users agree to one set of requirements, then add a bit more, then add a bit more, until, over time, they have described a completely new project.
answer
False; Diseconomies of scale is a principle that states as development teams become larger, the average contribution per worker decreases.
question
True or false. Configuration control refers to a set of management policies, practices, and tools that developers use to maintain control over the project's resources.
answer
True.
question
A _________ is a network of activities, repositories, roles, resources, and data flows that interact to accomplish a business function.
answer
Business process
question
Activities are _________. A. People or computer applications that are assigned to roles. B. Collections of procedures or processes C. Collections of related tasks that receive inputs and produce outputs. D. Physical repositories or data repositories.
answer
C. Collections of related tasks that receive inputs and produce outputs.
question
A(n) ________ is a physical repository.
answer
Inventory
question
In a business process, a role is _______. A. Movement of data B. A physical repository C. A collection of procedures D. A collection of data
answer
C. A collection of procedures
question
Resources are _________. A. Movement of data from an activity to a repository. B. Collections of related tasks that receive inputs and produce outputs. C. People or computer applications that are assigned to roles. D. Collections of procedures
answer
C. People or computer applications that are assigned to roles
question
Which of the following statements is true for business processes? A. A number of resources can be defined to a single role. B. A data flow is a collection of tasks that receives inputs and produces outputs. C. A role determines the earliest date by which a project can be completed. D. A database is a physical repository, while an inventory is tangible.
answer
A. A number of resources can be assigned to a single role.
question
In business process management, teams build a(n) _________ model that documents the current situation and then make the adjustments necessary to solve problems.
answer
As-is
question
An as-is model __________.
answer
Documents the current situation of a business process
question
In business process management, once the as-is model is created the team must ____________.
answer
Create system components
question
Which of the following is an accurate representation of the steps in the business process management cycle?
answer
Model processes; create components; model processes; asses results.
question
The BPM process begins with the _________ stage.
answer
Model processes
question
A business process that crosses into multiple companies is known as a(n) ____________ business process.
answer
Interorganizational
question
Accounts payable is an example of the ____________ scope of business processes addressed by business process management.
answer
Functional
question
A functional business process ______________.
answer
Resides within a single business function in a single company.
question
In cross-functional business process management, ___________.
answer
BPM authority is shared across several departments in a single company
question
Which of the following is not a functional process in an organization? A. Human resources B. Sales forecasting C. Customer relationship management D. Accounting
answer
C. Customer relationship management
question
Which of the following is true of business processes in nonprofit and governmental organizations? A. Only the functional and interorganizational scope apply in these organizations. B. Business processes in these organizations are service-oriented. C. Interorganizational processes are not possible owing to policies and regulations. D. Authority and responsibility for processes are not clearly defined.
answer
B. Business processes in these organizations are service-oriented.
question
The ___________ is a software-industry standards organization that created a standard set of terms and graphical notations for documenting business processes.
answer
OMG
question
___________ is a standard set of terms and graphical notations for documenting business processes.
answer
Business Process Modeling Notation
question
In BPMN process diagram, data is represented by ___________.
answer
Square with one folded corner
question
In a BPMN process diagram, a _________ represents the start of a process.
answer
circle
question
In a BPMN process diagram, a _________ represents an activity.
answer
Rectangle with rounded corners
question
In BPMN notation, ___________ represents decisions and usually contain a question that can be answered with a yes or no.
answer
Diamonds
question
In a BPMN process diagram, dotted arrows depict the flow of ___________.
answer
Messages and data flows
question
In BPMN, __________ depict the flow or sequence of the activities in the process.
answer
Solid arrows
question
In BPMN diagrams, a square with a plus sign means that ___________.
answer
The activity is independent of the process and is defined in detail in another diagram.
question
Which of the following is NOT a way for prcoess designers to increase the performance of a business process? A. Changing the structure and resource allocations B. Adding steps to the process without changing structure or resources C. Changing the structure without changing resource allocations. D. Adding more resources to the roles of a given process without changing the structure.
answer
A. Changing the structure and resource allocations
question
Which of the following is true for the relationship between business processes and information systems? A. Starting from processes and working toward information systems is the best option to anticipate future demands and new business processes. B. Information systems incorporate all business process activities, and hence should be developed before business processes. C. Starting with processes and working toward systems is more likely to result in processes and systems that are aligned with the organization's strategy and direction. D. Developing information systems before business processes ensures that all activities are considered in the development process.
answer
Starting with processes and working toward systems is more likely to result in processes and systems that are aligned with the organization's strategy and direction.
question
Which of the following terms relies on the process of treating and maintaining information systems?
answer
Systems development
question
Which of the following is true of information systems? A. Information systems include all business process activities. B. Every business process must include at least one information system. C. Database data for information systems is provided in-house. D. They can be bought off the shelf.
answer
C. Database data for information systems is provided in-house.
question
An organization will be able to buy an information system using all of the following options, EXCEPT __________.
answer
Off the shelf
question
The first step in the system definition phase of systems development is to _________.
answer
Define the goals and scope
question
Once we have defined the project's goals and scope, the next step is to _________.
answer
Access feasibility
question
What are the four dimensions of feasibility?
answer
Cost, schedule, technical, and organizational feasibility
question
__________ feasibility refer to whether existing information technology is likely to able to meet the needs of the new system.
answer
Technical
question
Organizational feasibility ____________.
answer
Concerns whether the new system fits within the company's customs and culture.
question
An element of _________ feasibility concerns whether the new system fits within legal requirements.
answer
Organizational
question
Does the company have a management policy that prohibits releasing customer data? Such a question is important to understanding __________ feasibility.
answer
Organizational
question
If the defined project is determined to be feasible, the next step is to ________.
answer
Form the project team
question
During the requirements stage of developing a new information system, the project team will include mostly ___________.
answer
Business and systems analysts
question
The ___________ stage of the information systems development process involves identifying what is to be produced, how frequently, and how fast it is to be produced.
answer
Requirement analysis
question
Tasks in the _______ phase of the systems development process are to build, test and convert the new users to the system.
answer
Implementation
question
A ________ is a formal description of the system's response to use or misuse scenarios.
answer
Test plan
question
Once the system has passed integrated testing, the organization installs the new system. Which term is used to refer to this activity?
answer
System conversion
question
With _________ installation, the organization implements the entire system/business processes on a limited portion of the business.
answer
Pilot
question
In a _________ installation, the new system runs alongside of the old system until it has been tested and is fully operational.
answer
Phased
question
A _____ installation is the riskiest because the old system is turned off and the new system is turned on.
answer
Plunge
question
Plunge installation is sometimes called ______ installation.
answer
Direct
question
In the __________ installation style of system conversion style, the organization shuts off the old system/business processes and starts the new one directly.
answer
Plunge
question
Fixing the system so that it works correctly or adapting it to changes in requirements occurrs in the _________ phase of the information systems development process.
answer
Maintenance
question
Which of the following is not one of the five components of an information system?
answer
Policies
question
To which of the following does Brooke's Law apply?
answer
Diseconomies of scale
question
According to Brooke's Law, adding more people to a systems development project will ________.
answer
Delay the projects completion
question
In systems development, documents, designs, prototypes, data models, database designs, working data entry screens and the likes are examples of ___________.
answer
Deliverables
question
Project teams create a ________ which is a hierarchy of the tasks required to complete a project to reduce the confusion of complex in a related task.
answer
Work-breakdown structure
question
A _________ shows the tasks start and finished states in the dependencies of the tasks in a project.
answer
Gantt chart
question
The __________ is a sequence of activities that determine the earliest date by which the project can be completed.
answer
Critical path
question
__________ is the process by which project managers compress the schedule by moving resources, typically people, from noncritical path tasks onto critical path tasks.
answer
Critical path analysis
question
A situation that occurs when adding more resources creates inefficiencies is known as __________
answer
Diseconomies of scale
question
The term ___________ refers to a set of managment policies, practices, and tools that developers use to maintain control over the projects resources.
answer
Configuration control
question
Explain why process management is necessary for an organization.
answer
Processes are dynamic and need to be changed.
question
What is systems development? What are the main activities in systems development?
answer
Systems development is the process of creating and maintaining an information system. The main activities in systems development are defining the system, determine requirements, design system components, implement system and maintain system.
question
What are the dimensions of feasibility?
answer
The four dimensions of feasibility are: cost, schedule, technical, and organizational feasibility.
question
Describe the composition of a development team for an information system.
answer
Systems analysts are in the development team and they integrate the work of programmers, testers, and users. Depending on the nature of the project, the team may include hardware and communications specialists, database designers and administrators, and other possible IT specialists.
question
What is system conversion. What are the types of conversions?
answer
System conversion is often used for this activity because it implies the process of converting business activity from the old system to the new system. Four types of conversions are possible: Pilot, phased, parallel, and plunge.
question
Briefly describe the five major challenges to systems development.
answer
1. Requirements are difficult to determine 2. Changes in requirements 3. Difficulties involving scheduling and budgeting 4. Changing technology 5. Diseconomies of scale
question
True or false. As problems caused by human errors are not malicious, they are not security threats.
answer
True
question
True or false. An example of malicious human activity could include an employee who inadvertently installs an old database on top of the current one.
answer
False; An example of human error could include an employee who inadvertently installs an old database on top of the current one.
question
True or false. Unauthorized data disclosures can occur from malicious human activity.
answer
True
question
True or false. Phishing is a technique for intercepting computer communications.
answer
False; Sniffing is a technique for intercepting computer communications.
question
True or false. Pretexting occurs when a person receives a confidential SMS by mistake.
answer
False; Pretexting occurs when a person pretends to be someone else.
question
True or false. Sniffing occurs when an intruder uses another site's IP address as if it were that other site.
answer
False; IP spoofing occurs when an intruder uses another site's IP address as if it were that other site.
question
True or false. Email spoofing is a synonym for phishing.
answer
True
question
True or false. Drive-by spoofers take computers with wireless connections through an area and search for unprotected wireless networks.
answer
True
question
True or false. Drive-by sniffers can access wireless computer networks.
answer
True
question
True or false. People who intentionally gain unauthorized access to computer systems are called hackers.
answer
True
question
True or false. Faulty service includes incorrectly billing customers or sending the wrong information to employees, but not incorrect data modification.
answer
False; Faulty service includes incorrectly billing customers or sending the wrong information to employees, as well as incorrect data modification.
question
True or false. When a hacker floods a Web server with millions of bogus service requests so that it cannot service legitimate requests, this is called a denial-of-service attack.
answer
True
question
True or false. A denial-of-service situation is always the result of a malicious attack.
answer
False;
question
True or false. According to the NIST Handbook, responsibility for information security in a particular department rests with the manager of that department.
answer
True
question
True or false. According to the NIST Handbook, defining a security policy and managing computer-security risk are the responsibilities of a company's IT department.
answer
False; According to the NIST Handbook, defining a security policy and managing computer-security risk are the responsibilities of the manager of that department.
question
True or false. According to the elements of company security outlined in the NIST Handbook, computer security cannot be constrained by societal factors.
answer
False; According to the elements of company security outlined in the NIST Handbook, computer security is constrained by societal factors.
question
True or false. Uncertainty is the liklihood of an adverse occurrence.
answer
False; Risk is the liklihood of an adverse occurrence.
question
True or false. Uncertainty is different from risk.
answer
True
question
True or false. Risk management can only be approximated because of uncertainty.
answer
True
question
True or false. According to the NIST handbook, there is always a residual risk that the safeguard will not protect the assets in all circumstances.
answer
True
question
True or false. Intangible consequences are those whose financial impact can be measured.
answer
False; Tangible consequences are those whose financial impact can be measured.
question
True or false. Tangible consequences when an asset is compromised include such things as loss of customer goodwill.
answer
False; Intangible consequences when an asset is compromised include such things as loss of customer goodwill.
question
True or false. Probable loss is the probability that a given asset will be compromised by a given threat, despite the safeguards.
answer
False; Likelihood is the probability that a given asset will be compromised by a given threat, despite the safeguards.
question
True or false. Probable loss is concerned only with tangible consequences; it does not include intangible consequences.
answer
False; Probable loss is concerned both with tangible and intangible consequences.
question
True or false. The Privacy Act of 1974 gives individuals the right to acces health data.
answer
False; HIPAA gives individuals the right to acces health data.
question
True of false. HIPAA sets limits on who can receive your health information.
answer
True
question
True or false. The Gramm-Leach-Bliley Act set limits on how health care providers use your medical information.
answer
False; The Privacy Act of 1974 sets limits on how health care providers use your medical information.
question
True or false. Technical safeguards involve the hardware and software components of an information system.
answer
True
question
True or false. Smart cards are convenient and easy to use since they don't require any PIN numbers for authentication.
answer
False; Smart cards do require as PIN number.
question
True or false. A magentic strip holds far more data than a microchip.
answer
False; A microchop holds far more data than a magnetic strip.
question
True or false. A retina scan would be considered as a biometric authentication technique.
answer
True
question
True or false. Encryption is an example of a technical safeguard.
answer
True
question
True or false. Windows, Linus, Unix, and other operatin systems employ Kerberos and can authenticate user requests across networks of computers using a mixture of those operating systems.
answer
True
question
True or false. Wireless networks are more secure than wired networks.
answer
False; Wireless networks are less secure than wired networks.
question
True or false. To gain access to a wired network, a potential intruder must obtain physical access to the network.
answer
True
question
True or false. It is not possible to protect wireless networks.
answer
False; It is possible to protect wireless networks through the use of a password.
question
True or false. WEP is the newest and most advanced wireless security standard.
answer
False; WEP has tons of flaws.
question
True or false. With symmetric encryption, both the sender and receiver use the same key to transmit messages.
answer
True
question
True or false. Digital signatures use public keys to encrypt the message digest.
answer
False; Digital signatures use private keys to encrypt the message digest.
question
True or false. Secure Socket Layer (SSL) is a protocol that is restricted to assymmetric encryption.
answer
False; Secure Socket Layer (SSL) is a protocol that is restricted to symmetric encryption.
question
True or false. The letters "http://" in the browser's address bar indicate that it is safe to send data over the Internet.
answer
False; The letters "https://" in the browser's address bar indicate that it is safe to send data over the Internet.
question
True or false. When a message is hashed to produce a message digest, the message digest can be unhashed to produce the original message.
answer
False; When a message is hashed to produce a message digest, the message digest cannot be unhashed to produce the original message.
question
True or false. Public keys are supplied by third parties called certificate authorities.
answer
True
question
True or false. A certificate authority verifies the legitimacy of the business sending the digital certificate.
answer
False; A certificate authority does not verify the legitimacy of the business sending the digital certificate.
question
True or false. A Trojan horse is a virus that masquerades as a useful program or file.
answer
True
question
True or false. Viruses and worms are examples of malware.
answer
True
question
True or false. Most spyware is benign in that it does not perform malicious acts or steal data.
answer
False; Most spyware is malicious in that it does perform malicious acts or steal data.
question
True or false. The term bot is a new catch-all term that refers to any type of virus, worm, Trojan horse, spyware, adware, or other program not installed and controlled by the computer's owner or manager.
answer
True
question
True or false. A botnet is a network of bots that is created and managed by the individual or organization that infected the network with the bot program.
answer
True
question
True or false. Data safeguards are measures used to protect computer hardware from external threat.
answer
False; Data safeguards are measures used to protect databases and other organizational data from external threat.
question
True or false. Employee termination may lead to a security threat for an organization.
answer
True
question
True or false. Business requirements may necessitate opening information systems to the public that can threaten its security. The best safeguard from such threats is to harden the website.
answer
True
question
True or false. The different systems procedure types are:normal operations, review, control and recovery.
answer
False; The different systems procedure types are:normal operations, backup, and recovery.
question
True or false. Cold sites are cheaper to lease than hot sites.
answer
True
question
True or false. Following a disaster, hot sites provide office space, but customers must themselves provide and install the equipment needed to continue operations.
answer
False; Following a disaster, cold sites provide office space, but customers must themselves provide and install the equipment needed to continue operations.
question
Which of the following is considered malicious human activity?
answer
Hacking of information systems
question
The ________ pretends to be a legitimate company and sends an email requesting confidential data, such as account numbers, Social Security numbers, account passwords, and so forth.
answer
Phisher
question
________ is a technique for intercepting computer communications, either through a physical connection to the network or, in the case of wireless networks, with no physical connection.
answer
Sniffing
question
________ occurs when someone deceives by pretending to be someone else.
answer
Pretexting
question
Email spoofing is a synonym for __________.
answer
Phishing
question
_________ take computers with wireless connections through an area and search for unprotected wireless networks and then monitor and intercept wireless traffic at will.
answer
Drive-by sniffers
question
Which of the following is an example of a sniffing technique?
answer
Adware
question
When referring to security threats, pretexting, sniffing, IP spoofing, and phishing are all examples of what?
answer
Unauthorized data disclosure
question
_______ occurs when a person gains unauthorized access to a computer system, invading a network to obtain critical data or to manipulate the system for financial gain.
answer
Hacking
question
Which of the following could most likely be the result of hacking?
answer
An unexplained reduction in your account balance
question
_________ occurs when unauthorized programs invade a computer system and replace legitimate programs, shutting down the legitimate system and substituting their own process.
answer
Usurpation
question
Which of the following usually happens in a malicious denial-of-service attack.
answer
A hacker floods a Web server with millions of bogus service requests.
question
Which of the following is an example of a human safeguard? A. firewalls B. Application design C. Database backups D. Procedure design
answer
D. Procedure design
question
Customers often object to thorough physical searches at airports. Which aspect of a computer security described in the NIST Handbook is reflected here?
answer
Computer security is constrained by societal factors.
question
Which of the following is a critical security function of senior-management involvement? A. Establishing the security policy and managing risk. B. Managing the security program on a real-time basis. C. Planning responses to specific security incidents D. Safeguarding computer hardware and software.
answer
A. Establishing the security policy and managing risk.
question
Which of the following is the responsibility of the senior management organization? A. Protecting the computer network from sneak attacks by installing safeguards. B. Training junior employees about the organization's security policy. C. Implementing disaster recovery safeguards in individual department systems. D. Manage risk by balancing the costs and other benefits of the security program.
answer
D. Manage risk by balancing the costs and other benefits of the security program.
question
Which of the following is NOT an element of organizational security policy? A. Resource-specific policy B. A general statement of the security program C. Issue-specific policy D. System-specific policy
answer
A. Resource-specific policy
question
A security policy covering personal use of computers at work would be an example of a(n) __________.
answer
Issue-specific
question
An example of a system-specific security policy would be ___________. A. Limiting personal use of an organization's computer systems B. A general statement about the goals of the organization's overall security program. C. Deciding what customer data from the order-entry system will be shared with other organizations. D. Inspection of an employee's personal email for compliance with company policy.
answer
C. Deciding what customer data from the order-entry system will be shared with other organizations.
question
Which element of the security policy specifies how the organization will ensure the enforcement of security programs and policies?
answer
The general statement of the security program.
question
_______ refers to things we do not know, while _______ is the liklihood of an adverse occurrence.
answer
Uncertainty; risk
question
Which of the following is the first step in risk management?
answer
Assess what the threats are
question
Which factor of risk assessment refers to the probability that a given asset will be compromised by a given threat, despite the safeguards?
answer
Likelihood
question
Which of the following is an example of an intangible consequence?
answer
A loss of customer goodwill due to an outage
question
A weakness in a security system is known as _______.
answer
Vulnerability
question
To obtain a measure of probable loss, companies _________.
answer
Multiply the likelihood by the cost of the consequences
question
Which of the following is covered by the Gramm-Leach-Bliley Act of 1999?
answer
Consumer financial data stored by financial institutions.
question
Which of the following was passed to give individuals the right to access their own health data created by doctors and other health-care providers?
answer
HIPAA
question
The Privacy Act of 1974 covers ______.
answer
Records held by the U.S. government
question
Which of the following is an example of a technical safeguard?
answer
Firewall
question
A(n) ________ card has a microchip on it to hold the data,
answer
Smart
question
Which of the following is used for biometric authentication?
answer
Facial features
question
Which of the following cards does NOT use a magnetic strip to hold data?
answer
Smart
question
Which of the following statements is true for biometric identification? A. A major advantage of biometric identification is that it is a relatively cheap mode of authentication. B. One drawback of biometric methods is their unreliability; they provide only weak authentication. C. Users of biometric authentication systems need to enter a PIN for authentication. D. Biometric authentication often faces resistance from users for its invasive nature.
answer
D. Biometric authentication often faces resistance from users for its invasive nature.
question
A system called ________ authenticates users without sending their passwords across the computer network.
answer
Kerberos
question
The IEEE 802.11 Committee, the group that develops and maintains wireless standards, first developed a wireless security standard called the _________.
answer
Wired Equivalent Privacy
question
_______ eliminate(s) spoofing of public keys and requires browser to have a CA's public key.
answer
Digital certificates
question
With ________encryption, the sender and receiver transmit a message using the same key.
answer
Symmetric
question
Which of the following observations concerning Secure Socket Layer (SSL) is true? A. It is a useful hybrid of symmetric and assymmetric excryption techniques. B. It works between Levels 2 and 3 of the TCP-OSI architecture. C. It was originally developed by Microsoft D. It uses only assymetric encryption
answer
A. It is a useful hybrid of symmetric and assymmetric excryption techniques.
question
You are doing an online fund transfer through the Web site of a reputed bank. Which of the following displayed in your browser's address bar will let you know that the bank is using the SSL protocol?
answer
Https
question
__________ is a method of mathematically manipulating the message to create a string of bits that characterize the message.
answer
Hashing
question
Which of the following is a technique used to ensure that plaintext messages are received without alteration?
answer
Digital signatures
question
A program that asks a sender to transmit its public key could be fooled. To solve this problem, trusted, independent third-party companies called __________ supply public keys.
answer
Certificate authorities
question
_______ is the term used to denote Trojan horses, spyware, and adware.
answer
Malware
question
A virus is a computer program that replicates itself. The program code that causes unwanted activity is called the ________.
answer
Payload
question
A(n) __________ is a type of virus that propogates itself using the Internet or other computer networks.
answer
Worm
question
_______ are viruses that masquerade as useful programs or files.
answer
Trojan horse
question
What is a major difference between spyware and adware?
answer
Unlike spyware, adware does not perform malicious acts.
question
The term ______ refers to any type of program that is surreptitiously installed and that takes actions unknown and uncontrolled by the computer's owner or administrator.
answer
Bot
question
Which of the following is not an example of a data safeguard?
answer
Storing all backups on organization premises.
question
Because encryption keys can be lost or destroyed, a copy of the key should be stored with a trusted third party. This procedure is called __________.
answer
Key escrow
question
Maintaining the DBMS on computers in a locked room is part of _________.
answer
Physical security procedures
question
Which of the following statements about human safeguards for employees is true? A. There are only two main aspects to security enforcement; responsibility and accountability. B. Given appropriate job descriptions, user's computer accounts should give users the least possible privilege necessary to perform their jobs. C. Companies should provide user accounts and passwords to employees prior to their security training. D. Security screening in an organization applies only to new employees.
answer
B. Given appropriate job descriptions, user's computer accounts should give users the least possible privilege necessary to perform their jobs.
question
When an employee is terminated, IS administration should receive advance notice so they can __________.
answer
Remove accounts and passwords
question
_________ a site means to take extraordinary measures to reduce a system's vulnerability, using special versions of the operating system, and eliminating features and functions that are not required by the application.
answer
Hardening
question
The three main systems procedure types are ________.
answer
Normal operation, backup, and recovery
question
Activity log analyses, security testing, and investigating and learning from security incidents are activites included in _________.
answer
Security monitoring
question
In disaster-preparedness terminology, a ________ is a utility company that can take over another company's processing with no forewarning.
answer
Hot site
question
Which of the following observations is true of a cold site? A. The total cost is always less than that of a hot site. B. Customers will have to install and manage the systems themselves. C. It is more expensive to lease than a hot site.
answer
B. Customers will have to install and manage the systems themselves.
question
When an employee notices a virus on his or her machine, the _________ plan should specify what to do.
answer
Incident-response.
question
What is a security threat? What are the three general sources of security threats?
answer
A security threat is a challenge to the integrity of information systems that arises from one of three sources: human error and mistakes, malicious human activity, and natural events and disasters.
question
What is a denial-of-service security problem? How does this result from actions by the various sources of security threats?
answer
A denial-of-service is a security problem in which users are not able to access an information system; can be caused by human errors, natural disaster, or human activity.
question
What are the three components of a security program?
answer
A security program has three components: Senior-management involvement, safeguards of various kinds, and incident response.
question
What are the key elements of a security program?
answer
1. Computer security should support the mission of the organization. 2. Computer security is an integral element of sound management. 3. Computer security should be cost-effective 4. Computer security responsibilities and accountability should be made explicit. 5. System owners have computer security responsibilities outside their own organizations. 6. Computer security requires a comprehensive and integrated approach. 7. Computer security should be periodically reassessed. 8. Computer security is constrained by societal factors.
question
Explain encryption and the various types of encryption for computer systems.
answer
Encryption is the process of transforming clear text into coded, unintelligible text for secure storage or communication. The various types of encryption are: Symmetric, asymmetric, SSL/TLS, Digital signatures, and digital certificates.
question
Differentiate between Trojan horses and worms.
answer
Trojan horses are viruses that masquerade as useful programs or files. A worm is a virus that propogates using the Internet or other computer network.
question
What are spyware and adware programs?
answer
Spyware and adware programs are installed on the user's computer without the user's knowledge or permission.
question
What is key escrow?
answer
Key escrow is a control procedure whereby a trusted party is given a copy of a key used to encrypt database data.
question
Discuss some human safeguards for employees that can ensure the security of information systems.
answer
Some human safeguards include separate duties and authorities, documenting position sensitivity, hiring and screening, and dissemination and enforcement.
question
What is a hot site? How is it different from a cold site?
answer
A hot site is a utility company that can take over another company's processing with no forewarning. A cold site, in contrast, provides computers and office space.
question
True or false. One of the major functions of the information systems department is to develop, operate, and maintain enterprise applications.
answer
True
question
True or false. In IS departments, the technology office investigates new information systems technologies and determines how the organization can benefit from them.
answer
True
question
True or false. In the IS department, the development group manages the computing infrastructure, including individual computers, computer centers, networks, and communications media.
answer
False; In the IS department, the operations group manages the computing infrastructure, including individual computers, computer centers, networks, and communications media.
question
True or false. If the organization does not develop programs in-house, then the development group will include programmers, test engineers, technical writers, and other personnel.
answer
True
question
True or false. All IS departments include a development group, an operational group, and an outsourcing relations group.
answer
False; All IS departments CAN include a development group, an operational group, and an outsourcing relations group.
question
True or false. Information technology (IT) is simply technology. IT must be placed into the structure of an IS before an organization can use it.
answer
True
question
True or false. Information systems operate independently of the organization's competitive strategy. They have little effect on a company's goals and objectives.
answer
False;
question
True or false. Information system infrastructure is not malleable as changing a network requires time and resources.
answer
True
question
True or false. The chief information officer is the representative for information system and information technology issues within the executive staff.
answer
True
question
True or false. When considering a merger, it is important that the company consider integration of information systems in the merged entities.
answer
True
question
True or false. It is the CIO's responsibility to establish and communicate priorities, while the responsibility for enforcement rests with others.
answer
False; It is the CIO's responsibility to establish and communicate priorities and enforce them.
question
True or false. Every organization must implement every good idea. The objective of everyone in the information system department must be to develop the most appropriate systems possible, without constraints on time and money.
answer
False;
question
True or false. A steering committee is a group of senior managers from the major business functions that works with the CIO to set the information system (IS) priorities and decide among major IS projects and alternatives.
answer
True
question
True or false. The steering committee provides a forum for users to express their needs, frustrations, and other issues they have with the IS department.
answer
True
question
True or false. The steering committee serves an important communication function between department managers and users of IS systems.
answer
False; The steering committee serves an important communication function between IS and users.
question
True or false. A highly controlled and centralized organization and needs decentralized information systems.
answer
False; A highly controlled and centralized organization and needs centralized information systems.
question
True or false. A decentralized organization needs decentralized information systems.
answer
True
question
True or false. One of the tasks in managing the computing infrastructure is to create and maintain infrastructure for ender-user computing.
answer
True
question
True or false. The IS department has to create, operate, and maintain the computers, software, and personnel in the data warehouse and all of the data and marts.
answer
True
question
True or false. The IS department cannot afford to allow every computer user to have his or her own personal configuration.
answer
True
question
True or false. A user's computing needs vary according to the work they do, most IS departments have developed a number of different standard configurations.
answer
True
question
True or false. The IS department needs to work solely with the steering committee to ensure the standards are effective for most of the users.
answer
False; The IS department needs to work with the steering committee and other user groups to ensure the standards are effective for most of the users.
question
True or false. When the Is department provides the computing infrastructure to users, a system must exist to record user problems and monitor their resolutions.
answer
True
question
True or false.Problems are prioritized on the basis of how easy they are for the IS department to solve.
answer
False; Problems are prioritized on the basis of how critical they are to users work.
question
True or false. In addition to its other functions , the IS department also must manage the computing infrastructure staff.
answer
True
question
True or false. Green computing is environmentally conscious computing consisting of three major components: power management, visualization, and e-waste management.
answer
False; Green computing is environmentally conscious computing consisting of three major components: power management, virtualization, and e-waste management.
question
True or false. In addition to managing the computing infrastructure, the IS department aligns its priorities with the departments strategy but not the organizations strategy.
answer
True
question
True or false. Maintenance, under the IS department, means to fix the system to do what it was supposed to do in the first place, as well as to adapt the system to changed requirements.
answer
True
question
True or false. Maintenance work for legacy systems is always conducted in-house.
answer
False; Maintenance work for legacy systems is conducted in-house or outsourced.
question
True or false. Companies need special maintenance activities to support legacy systems.
answer
True
question
True or false. A legacy information system is one that has outdated technologies and techniques but is still used by an organization.
answer
True
question
True or false. The IS department must have a means to track user issues and problems. Although such a tracking system is similar that provided for infrastructure management, the department usually uses different systems for those two functions.
answer
True
question
True or false. In large organizations, there is a single problem-tracking and resolution system for each enterprise application.
answer
False;
question
True or false. To integrate disparate systems, companies usually outsource the development of enterprise application integration, a special-purpose IS.
answer
False; Companies work in-house
question
True or false. Sustaining-application developers work on existing applications.
answer
True
question
True or false. The term database administration describes a function that pertains to all of an organization's data assets.
answer
False; The term data administration describes a function that pertains to all of an organization's data assets.
question
True or false. The term data administration describes a function that pertains to a particular database.
answer
False; The term database administration describes a function that pertains to a particular database.
question
True or false. Data standards describe the format, and other features of data items that are shared across the organization.
answer
False; Data standards describe the definitions.
question
True or false. A data dictionary contains an entry for each standard data item.
answer
True
question
True or false. Data administration is concerned with the creation and dissemination of data policies. These policies vary in scope and are created independently by the data administration.
answer
False; Data administration is concerned with the creation and dissemination of data policies. These policies vary in scope and the data administration as well as other people created it.
question
True or false. Once created, data policies remain static throughout the lifetime of the organization; they rarely change for any reason.
answer
False; Once created, data policies need to be changed
question
True or false. Outsourcing is the process of hiring another organization to perform a service. It is done to save costs, to gain expertise, and to free management time.
answer
True
question
True or false. Outsourcing saves direct management time, but not indirect management.
answer
False; Outsourcing saves direct management time as well as indirect management.
question
True or false. Once a company has chosen a vendor, further risk management is up to that vendor.
answer
True
question
True or false. Acquiring licensed software is a form of outsourcing.
answer
True
question
True or false. One of the advantages of outsourcing is that the company retains control of all technology and procedures used by the vendor.
answer
False; Vendor has control
question
True or false. When a company outsources a system, it no longer has control over prioritizing fixes for software failures and problems.
answer
True
question
True or false. Users have a right to a secure computing environment; they should not have to worry about security.
answer
True
question
True or false. Users have a responsibility to follow security and backup procedures.
answer
True
question
Developing, operating, and maintaining the organization's computing infrastructure is a major function of the _________ department.
answer
Information systems
question
Which of the following is NOT a function of the information systems department? A. Protecting information assets B. Conducting external audits C. Managing outsourcing relationships D. Maintaining computing infrastructure
answer
B. Conducting external audits
question
In organizations that operate significant non-accounting information systems, the chief information officer reports to the __________.
answer
Cheif executive officer
question
If the primary information systems in an organization support only accounting and finance activities, the CIO should report to the ____________.
answer
CFO
question
In the IS department, the __________ group manages the computing infrastructure, including individual computers, computer centers, networks, and communications media. This group includes system and network administrators.
answer
operations
question
Which of the following is a function of the technology group in an organization's IS department? A. Maintaining existing information systems B. Creating new information systems C. Managing the computing infrastructure D. Investigating new IS technologies
answer
D. Investigating new IS technologies
question
An important function of the __________ group in an IS department is to monitor the user experience and respond to user problems.
answer
Operations
question
Which of the following is true for the various groups in an IS department? A. The development group manages the process of creating new information systems. B. The development group monitors the user experience and responds to user problems. C. The operations group investigates new information systems technologies and determines how the organization can benefit from them. D. The technology group manages individual computers, computer centers, networks, and communications media.
answer
A. The development group manages the process of creating new information systems.
question
In the information systems department, the ___________ group manages the process of creating new information systems as well as maintaining existing information systems.
answer
Development
question
Which of the following is true for the function of maintaining information systems? A. Maintenance means fixing problems or adapting existing information systems. B. The maintenance process is undertaken by the technology group. C. Maintenance is performed by operations, as it involves fixing problems with with existing software. D. Maintenance is only performed by the IS department if programs are developed in-house.
answer
A. Maintenance means fixing problems or adapting existing information systems.
question
If the organization does not develop programs in-house, then the development group of the information systems department will include __________.
answer
System analysts
question
The purpose of the __________ group is to protect data and information assets by establishing data standards and data management practices and policies.
answer
Data administration
question
Developing test plans, designing and writing automated test strips, and performing testing are the responsibilities of a ____________.
answer
PQA test engineer
question
Which of the following is NOT a responsibility of a systems analyst?
answer
Writing programs
question
A _______ must work with users to determine system requirements and must also help determine system test plans.
answer
System analyst
question
The responsibilities of a __________ include advising the CIO, executive group, and project managers on emerging technologies.
answer
Chief technology officer
question
The responsibilities of a computer technician include _______.
answer
Installing software and repairing computer networks
question
Which of the following is true for changes in IS infrastructure. A. IS applications are easily changed to meet requirements. B. Changing IS systems is expensive and time-consuming. C. Information systems change only when organizations merge. D. Once it is developed, it is not possible to change IS infrstructure.
answer
B. Changing IS systems is expensive and time-consuming
question
Which of the following is NOT true for information systems? A. Information systems change only when organizations merge. B. IS infrstructure is not malleable. C. IS must be aligned with the organization's competitive strategy. D. Integrating disparate information systems is time consuming.
answer
A. Information systems change only when organizations merge.
question
The _________ is the representative for IS and IT issues within the executive staff, providing the IS perspective during discussions of problem solutions, proposals, and new initiatives.
answer
CIO
question
The ________ must ensure that priorities consistent with the overall organizational strategy are developed, communicate them to the IS department and enforce them.
answer
CIO
question
A(n) ____________ is a group of senior managers from the major business functions that works with the CIO to test the IS priorities and decide among major IS projects and alternatives.
answer
Steering committee
question
Which of the following is a function of the steering committee for an IS department? A. Network maintenance B. Adapting software C. Setting IS priorities D. Technology sales
answer
C. Setting IS priorities
question
User's computing needs vary according to the work they do. In response, most IS departments ___________. A. Install the configuration suitable for software development personnel for all employees. B. Allow employees to choose their preferred configurations C. Have developed a set of three or four different standard configurations D. Have uniform configurations for all employees.
answer
C. Have developed a set of three or four different standard configurations
question
The IS department needs to work with the steering committee and __________ to ensure the standards are effective for most of the users.
answer
CIO
question
In a well-run IS department, when a user reports a problem the department assigns a tracking number and the problem enters a queue for service. Which of the following statements is true in this case? A. If a problem is not resolved even after an attempt, it reenters the queue at a lower priority. B. Lower- priority items in the queue are serviced first. C. Problems are prioritized on the basis of how critical they are to the user's work. D. Problems are prioritized depending on the available resources of the IS department.
answer
C. Problems are prioritized on the basis of how critical they are to the user's work.
question
In a typical IS operations department, the network manager and the computer center manager will report to the _________.
answer
Operations manager
question
Customer support personnel and the help desk will be managed by the ________.
answer
User support manager
question
Green computing is environmentally conscious computing consisting of the three major components; power management, virtualization, and __________.
answer
E-waste management
question
In addition to managing the computing infrastructure, the __________ manager enterprise applications as well.
answer
IS department
question
In organizations in which individuals and workgroups manage their own applications, with support from the IS department, enterprise applications include ___________.
answer
Some functional applications and all cross functional applications
question
The process of creating a new application begins when the IS department aligns its priorities with the _________.
answer
Organization's strategy
question
A(n) _________ is a system that has outdated technologies and techniques but is still used, despite its age.
answer
Legacy information system
question
EAI is used to enable the _________.
answer
Integration of disparate systems
question
A computer programmer or developer works both as a _________ as well as a programmer.
answer
Software designer
question
Sustaining-application developers work on __________ applications.
answer
Existing
question
__________ specialize in the testing of software.
answer
Product quality assurance engineers
question
___________ develop product installation instructions, help text, and other support documentation.
answer
Technical writers
question
Data administration describes a function that pertains to ________.
answer
All of an organization's data assets
question
Sometimes data standards include the __________, which is department within the organization that is most concerned with the data item and that controls changes of the definition of that data item.
answer
Data owner
question
__________ describe(s) the name, official definition, usage, relationship to other data items, processing restrictions, versions, security restrictions, format, and other features of data items that are shared across the organization.
answer
Data standards
question
A data ________ is a file or database that contains data definitions.
answer
Dictionary
question
A __________ contains an entry for each standard data item.
answer
Data dictionary
question
The _________ must maintain the data dictionary to keep it current. Obsolete entries must be removed, new items inserted, and changes recorded.
answer
Data administrator
question
_________ also is concerned with the creation and dissemination of data policies.
answer
Data administration
question
Outsourcing is the process of hiring another organization to perform a service. Outsourcing is undertaken in order to ___________.
answer
Cap an organization's financial exposure
question
In the case of management time, outsourcing __________.
answer
Saves both direct and indirect management time
question
Outsourcing gathers all of the possible risks into the risk of choosing the right _________.
answer
Vendor
question
________ is a form of outsourcing.
answer
Acquiring licensed software
question
Sites like Amazon.com provide _________ for product vendors and distributors who choose not to develop their own online presence.
answer
Web storefronts
question
In 2005 Marriott International chose Hewitt Associates to handle its human resource needs for the next 7 years. This is an example of _________ outsourcing.
answer
Business function
question
___________ is a form of hardware outsourcing.
answer
Cloud hosting
question
When a company outsources a system, control over prioritizing fixes for software failures and problems belongs to the ___________.
answer
Vendor
question
Which of the following is a negative consequence of outsourcing IS/IT functions? A. The vendor can benefit from the economies of scale. B. Outsourcing can cap financial risk for an organization. C. The vendor can replace the CIO of the organization. D. Outsourcing reduces indirect management activity.
answer
C. The vendor can replace the CIO of the organization
question
Which of the following is a right for users of information systems? A. Making hardware modifications when desired. B. Effective training according to their requirements C. Installing programs and applications of their choice. D. Obtaining the configuration of their choice.
answer
B. Effective training according to their requirements
question
As an IS user, you have a right to secure computing environment, this means that __________.
answer
The organization should protect your computer and its files
question
Which of the following is generally a responsibility of users? A. Upgrading data standards. B. Undertaking hardware modifications C. Replacing legacy systems with improved ones. D. Following security and backup procedures.
answer
D. Following security and backup procedures.
question
Which of the following is true for users of information systems? A. They should install hardware and software themselves, without bothering the IS department. B. They must learn standard techniques and procedures for the applications they use. C. They have a responsibility to protect their computers from viruses by installing protection software. D. They must ensure the availability of reliable and secure Internet connections.
answer
B. They must learn standard techniques and procedures for the applications they use.
question
Users should not bother IS personnel for trivial reasons, so they have a responsibility to __________.
answer
Learn basic computer skills
question
List the major functions of an IS department.
answer
-Plan the use of IS to accomplish organizational goal's and strategies -Develop, operate, and maintain the organization's computing infrastructure -Devolop, operate, and maintain enterprise applications -Protect information assets -Manage outsourcing relationships
question
List and explain the major IS/IT planning functions.
answer
They must align information systems with organizational strategy, communicate IS issues to the executive group, develop priorities and enforce them within the IS department, and sponsor the steering committee.
question
Is it necessary to align infrastructure design with organizational structure? Explain you answer.
answer
Yes; a highly controlled and centralized organization needs highly controlled and centrallized information systems. A decentralized organization with autonomous operating units requires decentralized information systems that facilitate autonomous activity.
question
What tasks are necessary for managing computing infrastructure?
answer
1. Create and maintain infrastructure for ender-user computing. 2. Create, operate, and maintain networks. 3. Create, operate, and maintain data centers, data warehouses, and data marts.
question
How are problems tracked and solutions monitored in a well-run IS department?
answer
In a well run IS department, when a user reports a problem the department assigns a tracking number and the problem enters a queue for service.
question
List and briefly explain the activites that are included in data administration.
answer
The activities included in data administration are: Define data standards, maintain data dictionary, define data policies, and establish disaster-recovery plan.
question
What is a legacy information system? What are the differences between data standards and a data dictionary?
answer
A legacy information system is one that has outdated technologies and techniques but is still used, despite its age. Data standards are definitions, or metadata, for data items shared across the organization. A data dictionary is a file or database that contains data definitions.
question
List the advantages of outsourcing and briefly explain any three of them.
answer
The three advantages of outsourcing are management advantages, cost reduction and risk reduction. Management advantages include obtaining expertise, avoiding management problems, and free management time. Cost reduction includes obtaining part-time services and gain economies of scale. Risk reduction includes cap financial exposure, improve quality, and reduce implementation risk.
question
List the risks of outsourcing and briefly explain three of them
answer
The risks of outsourcing are loss of control, benefits outweighed by long-term costs, and no easy exit. Loss of control includes the vendor being in the driver's seat, technology direction, potential loss of intellectual capital, product fixes, enhancements in wrong priority, vendor management, direction, or identity changes, and CIO superfluous. Benefits outweighed by long-term costs include: High unit cost, forever, Paying for someone else's mismanagement, In time, outsource vendor is de facto sole source, and may not get what you pay for but you didn't know. No easy exit includes: Critical knowledge in minds of vendors, not employees, and expensive and risky to change vendors.
question
List any four rights and four responsibilities of users of information systems.
answer
Four rights of users of information systems: Effective training, Reliable network and internet connections, A secure computing environment, and Protection from viruses, worms, and other threats. Four responsibilities of users of information systems include: Learn basic computer skills, Protect your password(s), Install only authorized programs, and Avoid reporting trivial problems.
question
What is defined as information containing patterns, relationships, and trends?
answer
Business Intelligence
question
Data-mining tools are used to make what?
answer
Predictions
question
RFM analysis ranks customers by considering recency, frequency, and _____ of their orders?
answer
Dollar Amount
question
What is the application of statistical techniques to find patterns and relationships among data for classification and prediction?
answer
Data mining
question
Analysts do not create a model or hypothesis before running the analysis with ________________ data mining.
answer
unsupervised
question
In this type of analysis, statistical techniques identify groups of entities that have similar characteristics.
answer
Cluster analysis
question
A ____ ____ is a data collection, smaller than the datawarehouse, that addresses a particular component or functional area of the business.
answer
Data mart
question
What is used to show the products that customers tend to buy together?
answer
Market-based analysis
question
In market-based terminology, the ratio of confidence to the base probability of buying an item is called the _____
answer
Lift
question
Real Simple Syndication is standard for what?
answer
Subscribing to content sources
question
An alert sent to you is an example of _____ technology
answer
Push
question
E-Commerce leads to ____, which is the elimination of middle layers of distributors.
answer
Disintermediation
question
Price elasticity measures the....
answer
Amount that demand rises or falls with changes in price
question
Software as a service clashes with the software model used by traditional software vendors, such as Microsoft. Traditional software vendors depend on ...
answer
Software License Fees
question
When you attend a business function for the purpose of meeting people and reinforcing relationships, you are investing in your _______ capital.
answer
Social
question
_______ is a Web 2.0 application that allows users to publish 140-character descriptions of anything.
answer
Twitter
question
One of the applications of microblogging in business is _______.
answer
PR
question
________ is the process by which users provide services to or on behalf of a vendor.
answer
CROWDSOURCING
question
If the problematic content posted on a social networking site represents reasonable criticism of the organization's products of services, the best response would be to ______________
answer
LEAVE IT
question
Web 2.0 applications are ______ clients.
answer
thin
question
What is a thin client?
answer
Web servers download the programs as code within HTML
question
A characteristic of Web 2.0 is that the value of a Web site increases with the ________ and ______
answer
Users and Use
question
__________ _________(s) induce people to share your message in Web 2.0 world
answer
Viral hook
question
____ connect computers located in more than one geographic location.
answer
WANS
question
A private internet that is used exclusively within an organization is called a(n) ______
answer
Intranet
question
___________ is a set of rules that two communicating devices follow
answer
PROTOCOL
question
The hardware component that connects with a printer's circuitry to the network is called a(n) ____
answer
NIC
question
Wireless devices connect to a wireless LAN using a(n) ________
answer
Access point
question
___________ is a wireless protocol used to communicate over short distances.
answer
Bluetooth
question
The signals from ________ modems do not interfere with TV signals
answer
Cable
question
The protocols used on the Internet are arranged according to a structure known as the ____ protocol architecture
answer
TCP/IP
question
While sending a file using the FTP, a user is using the Internet but not the ________
answer
WEB
question
A _________ is a piece of a message that is handled by programs that implement IP.
answer
Packet
question
A firewall has a(n) _______, which encodes the rules stating which addresses are to be allowed and which are to be prohibited.
answer
Access Control LIST
question
Security threats arise from 3 sources:
answer
Human error/mistakes, malicious human activity (spear phishing) and natural events and disasters
question
What are the 5 types of security problems?
answer
Unauthorized data disclosure, incorrect data modification, faulty service, denial of service, and loss of infrastructure
question
What are the 3 components of a security program?
answer
Senior-management involvement, safeguards of various kinds, and incident response
question
What are the 2 critical security functions for senior management?
answer
Establish security policy, manage risk by balancing costs and benefits of security program
question
Hardware and software are ______ safeguards and include encryption, firewalls, and authorization.
answer
Technical
question
Procedures and people are ____ safeguards and include training, education, and accountability.
answer
Human
question
Data is a ______ safeguard and includes backup and recovery, passwords, and encryption.
answer
Data
question
What are the elements of a security policy?
answer
General statement of organization's security program, issue-specific policy, and system-specific policy
question
What is an example of issue-specific policy?
answer
Personal use of computers at work and email privacy.
question
_________ is the likelihood of an adverse occurence.
answer
Risk
question
________ is the lack of knowledge especially about chance of occurrence or risk of an outcome of even.
answer
Uncertainty
question
What are some risk assessment factors?
answer
Assets, consequences, threats, likelihood, safeguards, probable loss, and vulnerability
question
________ loss is the "bottom line" of risk assessment- contains intangible consequences.
answer
Probable
question
What are some authentication methods?
answer
Password, smart card, biometric
question
What are some examples of biometric authentication?
answer
fingerprints, retina scans
question
Symmetric encryption is when....
answer
sender and receiver transmit a message using the same key
question
Some other types of encryption are...
answer
asymmetric, SSL/TLS (HTTPS), digital signatures, and digital certificates
question
____________ contains things such as viruses, worms, Trojan horses, spyware, and adware
answer
Malware
question
A _________ causes a computer program to replicate itself and take unwanted and harmful actions.
answer
Virus
question
a _______ _______ attaches to word, excel or other types of documents and infects every file that the application creates.
answer
Macro Virus
question
a _____ is a virus that propagates using the internet or other computer network and can choke a network.
answer
Worm
question
_______ can capture keystrokes to obtain user names, passwords, account numbers, and other information--some supports marketing analyses. (pop-ups)
answer
Spyware
question
__________ can slow computer performance (pop-ups)
answer
Adware
question
A way to safeguard from malware is to install __________ and _______ programs on your computer.
answer
antispyware and antivirus programs
question
A ______ is a computer program surreptitiously install and takes actions unknown and uncontrolled by comps. owner.-- some steal important data and create pop-ups
answer
BOT
question
A ______ is a network of bots created and managed by individual or organization
answer
BotNet
question
A ______ _______ is an organization that controls the botnet Botnets and bot herders.
answer
Bot Herder
question
a _____ Site is a backup site where a utility company can take over another company's processing in disaster recovery
answer
Hot Site
question
A ______ Site provide computers and office space
answer
Cold
question
IS vary by 4 scopes...
answer
Personal, workgroup, enterprise, and interenterprise
question
An enterprise has _______ of users, procedures formalized, and charges membership fees.
answer
100-1000s
question
Interenterprises have ______ of users
answer
1000s
question
SAP is an example of _______ resource management
answer
enterprise
question
Purpose of customer life cycle:
answer
marketing, customer acquisition, relationship management and loss/chum
question
True or false. A terabyte is larger than a petabyte in terms of computer storage.
answer
False; A terabyte is smaller than a petabyte in terms of computer storage.
question
True or false. Data mining tools process data using statistical techniques.
answer
True.
question
True or false. Reporting tools are programs that read data from a variety of sources, process that data, format it into structured reports, and deliver those reports to the users who need them.
answer
True.
question
True or false. Data compression involves searching for patterns and relationships among data.
answer
False; Data mining involves searching for patterns and relationships among data.
question
True or false. In most cases, data-mining tools are used to make assessments.
answer
False; In most cases, data mining tools are used to make predictions.
question
True or false. Reporting tools tend to use simpler operations while data-mining tends to use more sophisticated statistical techniques.
answer
True.
question
True or false. Knowledge-management tools differ from reporting and data-mining tools because the source of the data is recorded facts and figures.
answer
False; Knowledge management tools differ from reporting and data-mining tools because the source of the data is human knowledge.
question
True or false. Reporting tools produce information from data using five basic operations: sorting, grouping, calculating, filtering, and formatting.
answer
True.
question
True or false. RFM analysis, a technique readily implemented using reporting tools, us used to analyze and rank customers according to their purchase patterns.
answer
True.
question
True or false. RFM analysis considers how recently (R) a customer ordered, how frequently (F) they ordered, and how much margin (M) the company made on the orders.
answer
False; RFM analysis considers how recently (R) a customer ordered, how frequently (F) they ordered, and how much money they've spent (M on the orders.
question
True or false. An OLAP cube and an OLAP report are the same thing.
answer
True.
question
True or false. OLAP stands for Organizational Lead Analysis Program and is used extensively to generate reports for marketing and sales.
answer
False; OLAP stands for Online Analytical Processing and is used extensivel to generate reports for marketing and sales.
question
True or false. OLAP provides the ability to sum, count, average, and perform other simple arithmetic operations on groups of data.
answer
True.
question
True or false. In an OLAP report, a measure is the data item of interest.
answer
True.
question
True or false. Total sales, average sales, and average cost are examples of dimensions used in an OLAP report.
answer
False; Total sales, average sales, and average cost are examples of measures used in an OLAP report.
question
True or false. A drawback associated with OLAP reports is their inability to let users drill down into the data.
answer
False;
question
True or false. Normally, for performance and security reasons the OLAP server and DBMS run on separate servers.
answer
True.
question
True or false. Data mining is the application of statistical techniques to find patterns and relationships among data for classification and prediction.
answer
True.
question
True or false. Knowledge discovery in database (KDD) is used as a synonym for data mining.
answer
True.
question
True or false. With unsupervised data mining, analysts do not create a model or hypothesis before running the analysis.
answer
True.
question
True or false. Cluster analysis is used to identify groups of entities that have similar characteristics.
answer
True.
question
True or false. In supervised data mining, a model is developed after the analysis.
answer
In supervised data mining, a model is developed prior to the analysis.
question
True or false. Neural networks are a popular unsupervised data-mining technique.
answer
Neural networks are a popular supervised data-mining technique.
question
True or false. A market-basket analysis is a data-mining technique used for determining sales patterns.
answer
True.
question
True or false. In marketing transactions, the fact that customers who buy the product X also buy product Y creates a cross-selling opportunity.
answer
True.
question
True or false. In market basket terminology, a conditional probability estimate is called a lift.
answer
False; In market basket terminology, a conditional probability estimate is called the confidence.
question
True or false. Decision-tree analyses are an unsupervised data-mining technique because data miners develop a model prior to the analysis.
answer
False; Decision-tree analyses are an unsupervised data-mining technique because data miners develop a model after the analysis.
question
True or false. Market-basket analysis is based on an "If....then..." analysis.
answer
False; Decision-tree analysis is based on an "If.....then..." analysis.
question
True or false. CurrentLTV is the current ratio of outstanding balance of a loan to the value of the loan's collateral.
answer
True.
question
True or false. Operational data is designed to support fast transaction processing and might need to be reformatted to be useful for BI applications.
answer
True.
question
True or false. Data marts are also referred to as data houses.
answer
False
question
True or false. A value 999-999-9999 for a U.S. phone number is an example of dirty data.
answer
True.
question
True or false. Problematic data are termed dirty data.
answer
True.
question
True or false. Wrong granularity implies that data is either too fine or too coarse.
answer
True.
question
True or false. A file of order totals cannot be used for a market-basket analysis. This is a problem associated with the data being too fine.
answer
False; A file of order totals cannot be used for a market-basket analysis. This is a problem associated with the data being too coarse.
question
True or false. It is possible to capture the customer's clicking behavior using a clickstream data.
answer
True.
question
True or false. It is better to have data that is too coarse than data that is too fine.
answer
False; It is better to have data that is too fine than data that is too coarse.
question
True or false. A data warehouse, is a data collection, smaller than the data mart, that addresses a particular component or functional area of the business.
answer
False; A data mart, is a data collection, smaller than the data warehouse, that addresses a particular component or functional area of the business.
question
True or false. Knowledge management enables employees to leverage organizational knowledge to work more efficiently.
answer
True
question
True or false. Knowledge management applications are concerned with minimizing content use.
answer
False; Knowledge management applications are concerned with maximizing content use.
question
True or false. Indexing is the single most important content function in KM applications.
answer
True.
question
True or false. Real Simple Syndication (RSS) is a special case of a BI application server that serves only reports.
answer
False;
question
True or false. Knowledge management applications are concerned with minimizing content use.
answer
True.
question
True or false. Expert systems attempt to capture human expertise and put it into a format that can be used by non-experts.
answer
True.
question
True or false. Expert systems are rule-based systems that use "If....then" rules similar to those created by decision-tree analysis.
answer
True.
question
True or false. Expert systems are difficult to develop but are easy to maintain.
answer
False; Expert systems are difficult to develop and difficult to maintain.
question
True or false. In a generic business intelligence system, applications results are processed by a BI tool to produce a data source.
answer
False; In a generic business intelligence system, a data source is processed by a BI tool to produce application results.
question
True or false. Portal servers are like Web servers except that they do not have a customizable user interface.
answer
False; Portal servers are like Web servers except that they do have a customizable user interface.
question
True or false. Report servers are messages transmitted via e-mail or phone that notify a user that a particular condition has occurred.
answer
False; Alerts are messages transmitted via e-mail or phone that notify a user that a particular condition has occurred.
question
True or false. The credit card reform law passed by U.S. Congress in May 2009 requires the Federal Trade Commission (FTC) to investigate data mining by credit card employees.
answer
True.
question
__________ is defined as information containing patterns, relationships, and trends.
answer
Business intelligence
question
1 petabyte is made up of __________ bytes.
answer
10^15
question
Which of the following can store the maximum amount of data?
answer
1 exabyte (EB)
question
How big is 1 gigabyte?
answer
10^9 bytes
question
______ tools are programs that read data from a variety of sources, process that data, format it into structured reports, and deliver those reports to the users who need them.
answer
Reporting
question
Which of the following is an example of a question that a reporting tool will help address?
answer
How does the current situation compare to the past?
question
What are reporting tools primarily used for?
answer
Assessment
question
In most cases, data-mining tools are used to make __________.
answer
Predictions
question
Which of the following is an example of a question that data-mining will help address?
answer
Will a given customer default on a loan?
question
Among the following, which is the best way to distinguish between reporting tools and data-mining tools?
answer
Complexity of techniques used
question
Knowledge management tools differ from reporting and data-mining tools because the source of their data is _________.
answer
Human knowledge
question
Which of the following is a description of a business intelligence (BI) application? A. It is an information system that employs BI tools to deliver information. B. It implements the logic of a particular procedure or process. C. It stores employee knowledge and makes it available to those who need it. D. It is the use of a tool on a particular type of data for a particular type of purpose.
answer
D. It is the use of a tool on a particular type of data for a particular purpose.
question
Which of the following is a basic operation used by reporting tools to produce information from data?
answer
Calculating
question
Which basic operation structures a report so that it is easier to understand?
answer
Formatting
question
__________ analysis is a way of analyzing and ranking customers according to their purchasing patterns.
answer
RFM
question
An RFM score of ________ most likely means that a customer has taken its business elsewhere and is probably not worth spending too many marketing resources on.
answer
555
question
RFM analysis ranks customers by considering the recency, frequency, and __________ of their orders.
answer
dollar amount
question
Ajax is one of the customers of a well-known linen manufacturing company. Ajax has not ordered linen in some time, but when it did order in the past, it ordered frequently, and its orders were of the highest monetary value. Under the given circumstances, Ajax's RFM score is most likely ___________.
answer
511
question
A sales team should attemp to up-sell more expensive products to a customer who has an RFM score of __________.
answer
113
question
How should a sales team respond to a customer who has an RFM score of 545?
answer
The sales team should let go of this customer; the loss will be minimal.
question
Rubber trees is a well known manufacturing company. Bloominghams, one of the customers of Rubber trees holds an RFM score of 111. Which of the following characteristics relates Bloominghams with its RFM score?
answer
Bloominghams has ordered recently and orders frequently, and it orders the most expensive goods.
question
OLAP stands for ________.
answer
Online Analytical Processing
question
The viewer of an OLAP report can change its format. Which term implies this capability?
answer
Dimension
question
An OLAP report has measures and dimensions. Which of the following is an example of a dimension?
answer
Sales region
question
Which of the following describes a dimension in an OLAP report?
answer
It is a characteristic of a measure
question
An OLAP report has measures and dimensions. Which of the following is an example of a measure?
answer
Average cost
question
Because they are online, OLAP reports are ____________ reports.
answer
Dynamic
question
An _______ and an OLAP report are the same thing.
answer
OLAP cube
question
Which of the following observations is true? A. RFM reports have measures and dimensions. B. RFM is more generic than OLAP C. OLAP reports are more dynamic then RFM reports. D. RFM reports can drill down into the data.
answer
C. OLAP reports are more dynamic than RFM reports.
question
_________ reports allow users to drill down into the data and divide it into more detail.
answer
OLAP
question
________ is the application of statistical techniques to find patterns and relationships among data for classification and prediction.
answer
Data mining
question
Which term is used as a synonym for data mining?
answer
Knowledge discovery in databases
question
Which of the following is true of unsupervised data mining? A. Analysts use tools such as regression analysis. B. Analysts apply statistical techniques to data to estimate parameters of a model. C. Analysts fit data to suggested hypotheses. D. Analysts do not create a model or hypothesis before running the analysis.
answer
D. Analysts do not create a model or hypothesis before running the analysis.
question
In ________, statistical techniques identify groups of entities that have similar characteristics.
answer
Cluster analysis
question
Which of the following is an example of an unsupervised data-mining technique? A. Regression analysis B. Data streaming C. Cluster analysis D. Neural networks
answer
C. Cluster analysis
question
Which of the following is an example of an supervised data-mining technique? A. Regression analysis B. A decision tree C. Market-basket analysis D. Neural networks
answer
A. Regression analysis
question
Which of the following is used to show the products that customers tend to buy together?
answer
Market-basket analysis
question
In marketing transactions, the fact that customers who buy product X also buy from product Y creates a(n) __________ opportunity. That is, "If they're buying X, sell them Y," or "If they're buying Y, sell them X."
answer
Cross-selling
question
In market-basket terminology, _______ is the term that describes the probability that two items will be purchased together.
answer
Support
question
In market-basket terminology, the ratio of confidence to the base probability of buying an item is the ________.
answer
Lift
question
Which of the following is a hierarchal arrangement of criteria that predict a classification or a value?
answer
A decision-tree
question
Because of problems with operational data, many organizations choose to extract operational data into a(n) ___________.
answer
Data warehouse
question
A data warehouse contains a special database that stores the __________, which records the source, format, assumptions and constraints, and other facts about the data.
answer
Metadata
question
Problematic operational data are termed _________.
answer
Dirty data
question
Which of the following statements is true about operational data? A. Problematic operational data are termed rough data. B. If the data granularity is too fine, there is no way to separate the data into constituent parts. C.It is always better to have data with too coarse granularity than data with too fine a granularity. D. Purchased operational data often contains missing elements.
answer
D. Purchased operational data often contains missing elements.
question
Because of a phenomenon called the _________, the more attributes there are, the easier it is to build a model that fits the sample data but that is worthless as a predictor.
answer
Curse of dimensionality
question
A ________ takes data from data manufacturers, cleans and processes the data, and then stores it.
answer
Data warehouse
question
Which of the following statements of data mart is true? A. It addresses a particular component of a functional area of a business. B. Its users possess the data management expertise that data warehouse employees have. C. It is larger than the data warehouse. D. It is like a distributor supply chain.
answer
A. It addresses a particular component or functional area of business.
question
A ________ is a data collection, smaller than the datawarehouse, that addresses a particular component or functional area of the business.
answer
Data mart
question
_________ is the process of creating value from intellectual capital and sharing that knowledge with employees, managers, suppliers, customers, and others who need it.
answer
Knowledge management
question
Which of the following is a major category of knowledge assets?
answer
Employees
question
__________ is the single most important content function in knowledge management applications.
answer
Indexing
question
The world's best-known indexing engine is operated by __________.
answer
Google
question
Which of the following is a standard for subscribing to content sources?
answer
Real Simple Syndication
question
With a(n) __________ you can subscribe to content sources and be notified when they have been changed.
answer
RSS reader
question
__________ attempt to capture human expertise and put it into a format that can be used by nonexperts.
answer
Expert systems
question
Which of the following observations concerning expert systems is true? A. The "If....then" rules used in these systems are created by mining data. B. They are easy to maintain C. They are difficult and expensive to develop D. They have lived up to the high expectations set by their name.
answer
C. They are difficult and expensive to develop
question
Portal servers are like Web servers except that they __________.
answer
Have a customizable user interface.
question
An alert sent to you is an example of ________ technology.
answer
push
question
A(n) __________ notifies the user of an exceptional event, such as a dramatic fall is a stock price.
answer
Exception alert
question
How are BI tools categorized?
answer
We can categorize BI tools in one of three ways: as reporting tools, as data mining tools, and as knowledge management tools.
question
What is an RFM analysis?
answer
RFM analysis is a technique readily implemented using reporting tools and is used to analyze and rank customers according to their purchase patterns.
question
What is OLAP? What are some of its features?
answer
Online analytical processing is a second type of reporting tool and is more generic than RFM. An OLAP provides the ability to sum, count, average, and perform other simple arithmetic operations on groups of data.
question
Differentiate between unsupervised and supervised data-mining.
answer
With supervised data mining, data miners develop a model prior to the analysis and apply statistical techniques to data to estimate parameters of the model. With unsupervised data mining, analysts do not create a model or hypothesis before running the analysis.
question
What is the objective of performing a market-basket analysis?
answer
The objective of market-basket analysis is to determine sales patterns.
question
What are the problems with using operational data for data-mining applications? How do organizations overcome these issues?
answer
The problems associated with using operational data for data-mining applications are: Dirty data, missing values, inconsistent data, data not integrated, wrong granularity, and too much data. The curse of dimesionality is a way they overcome some of these issues.
question
What is knowledge management? What are its primary benefits?
answer
Knowledge management is the process of creating value from intellectual capital and sharing the knowledge with employees, managers, suppliers, customers and others who need it. KM applications enable employees and others to leverage organizational knowledge to work smarter.
question
What are some of the technologies that are used for sharing content?
answer
Indexing, RSS, RSS reader, RSS feed.
question
What are the expert systems? What are their primary disadvantages?
answer
Expert systems attempt to capture human expertise and put it into a format that can be used by nonexperts. Expert systems are rule based systems that use If...then rules similar to those created by decision tree analysis. Expert systems can have hundred of thousands of rules.
question
Describe the management functions of a business intelligent server.
answer
The two management functions of a BI server are management and delivery. The management function maintains metadata about the authorized allocation of BI results to users. BI servers use metadata to determine what to send to users and it can be sent on a computer, PDAs, phones, applications such as Microsoft Office and as an SOA service.
question
The organizational role most responsible for the analysis and design of information systems best describes a
answer
systems analyst
question
The process of developing and maintaining an information system best describes
answer
information systems analysis and design
question
Software designed to support the payroll function would best be classified as
answer
application software
question
A sequence of step-by-step approaches that help develop the information system best describes
answer
methodologies
question
A group of interrelated procedures used for a business function, with an identifiable boundary, working together for some purpose, best defines
answer
system
question
Which of the following is not a system characteristic:
answer
Scope
question
An aggregation of parts is also called a(n)
answer
Subsystem
question
The point of contact where a system meets its environment or where subsystems meet each other best describes
answer
Interfaces
question
Which of the following is not a function of decomposition:
answer
Know the functions of decomposition
question
Which of the following is a direct result of decomposition:
answer
Modularity
question
Today, systems development focuses on
answer
systems integration
question
Transaction processing systems
answer
automate the handling of data about business activities or transactions
question
Management information systems
answer
take raw data that have been previously captured and convert them into a meaningful aggregated form that managers need to conduct their responsibilities
question
Decision support systems
answer
are designed to help organizational decision makers make decisions
question
Which of the following is an IS characteristic for a transaction processing system?
answer
Has a high-volume, data capture focus
question
Which of the following is an IS characteristic for a decision support system?
answer
Often involves semistructured problems and the need to access data at different levels of detail
question
Which of the following is an IS characteristic for a management information system?
answer
Draws on diverse yet predictable data resources to aggregate and summarize data
question
The need for a new or enhanced system is identified during
answer
systems planning and selection
question
In which SDLC phase will the analyst study the organization's current procedures and the information systems used to perform tasks?
answer
Systems analysis
question
In which phase will the systems analyst convert the description of the recommended alternative solution into logical and then physical system specifications?
answer
Systems design
question
A description of the alternative solution recommended by the analysis team is provided during the
answer
systems analysis phase
question
In which SDLC phase is the information system coded, tested, and installed in the organization?
answer
Systems implementation and operation
question
Priorities for systems and projects are deliverables for the
answer
systems planning and selection phase
question
Which of the following is not an approach to systems development?
answer
Reengineering analysis
question
An individual with a diverse set of skills-management, leadership, technical, conflict management, and customer relationship-who is responsible for initiating, planning, executing, and closing down a project best defines
answer
project manager
question
Which of the following is not a project planning activity?
answer
Establishing management procedures
question
During which of the following project planning activities do you use the information regarding tasks and resource availability to assign time estimates to each activity in the work breakdown structure?
answer
Develop a preliminary schedule
question
Indicating when and how written and oral reports will be provided by the team, how team members will coordinate work, what messages will be sent to announce the project to interested parties, and what kinds of information will be shared with vendors and external contractors involved with the project describes
answer
developing a communication plan
question
The third phase of the project management process in which the plans created in the prior phases are put into action is
answer
project execution
question
Which of the following occurs during project execution?
answer
Monitoring project progress against the Baseline Project Plan
question
A technique that uses optimistic, pessimistic, and realistic time to calculate the expected time for a particular task best defines
answer
Program Evaluation Review Technique (PERT)
question
Optimistic time refers to
answer
the minimum period of time for an activity to be completed
question
Pessimistic time refers to
answer
the maximum period of time for an activity to be completed
question
Realistic time refers to
answer
the planner's "best guess" of the amount of time the activity actually will require for completion
question
The amount of time that an activity can be delayed without delaying the project refers to
answer
slack time
question
Which of the following possible project sources most often reflects the broader needs of the organization?
answer
Top management
question
The extent to which the project is viewed as improving profits, customer service, etc., and the duration of these benefits best defines which of the following evaluation criteria?
answer
Potential benefits
question
The extent to which the project is viewed as helping the organization achieve its strategic objectives and long-term goals describes
answer
strategic alignment
question
Analyzing an organization's activities to determine where value is added to products and/or services and the costs incurred best describes
answer
value chain analysis
question
The primary deliverable from the project identification and selection phase is
answer
schedule of specific IS development projects
question
As a rule of thumb estimate, what percentage of the entire development effort should be devoted to the project initiation and planning process?
answer
Between 10 and 20 percent
question
The objective of the project planning process is the development of
answer
Baseline Project Plan and Project Scope Statement
question
A major outcome and deliverable from project initiation and planning that reflects the best estimate of the project's scope, benefits, costs, risks, and resource requirements defines the
answer
Baseline Project Plan
question
A major outcome and deliverable from the project initiation and planning phase that contains an estimate of the project's scope, benefits, costs, risks, and resource requirements best defines
answer
Business Case
question
A benefit derived from the creation of an information system that can be measured in dollars and with certainty is a(n)
answer
tangible benefit
question
The reduction of waste creation is an example of a(n)
answer
intangible benefit
question
A cost associated with project start-up and development or system start-up refers to a(n)
answer
one-time cost
question
A cost resulting from the ongoing evolution and use of a system best defines a(an)
answer
recurring cost
question
Application software maintenance, new software and hardware leases, and incremental communications are examples of
answer
recurring costs
question
The concept of comparing present cash outlays to future expected returns best defines
answer
time value of money
question
The interest rate used to compute the present value of future cash flows refers to
answer
discount rate
question
The current value of a future cash flow is referred to as
answer
present value
question
The analysis technique that uses a discount rate determined from the company's cost of capital to establish the present value of a project is commonly called
answer
net present value (NPV)
question
The ratio of the net cash receipts of the project divided by the cash outlays of the project, enabling trade-off analysis to be made between competing projects, is often referred to as
answer
return on investment (ROI)
question
The analysis technique that finds the amount of time required for the cumulative cash flow from a project to equal its initial and ongoing investment is referred to as
answer
break-even analysis (BEA)
question
A document prepared for the customer during project initiation and planning that describes what the project will deliver and outlines generally at a high level all work required to complete the project is the
answer
Project Scope Statement
question
An Internet-based communication that supports business-to-business activities best describes
answer
Extranet
question
The use of telecommunications technologies to transfer business documents directly between organizations best defines
answer
electronic data interchange (EDI)
question
Which of the following is a subphase of analysis?
answer
Requirements determination
question
Analysts gathering information from as many sources as possible about what the new system should do is indicative of
answer
requirements determination
question
The primary deliverables from requirements determination include
answer
observation notes; interview transcripts; analysis from documents
question
The purpose of requirements structuring is to
answer
enable the large amount of information gathered during requirements determination to be organized
question
Techniques developed to keep the analysis effort minimal, yet still effective include
answer
JAD
question
Traditional methods of collecting systems requirements include
answer
Interviews
question
The analysis of documents can help you identify
answer
Problems with existing systems; special info processing circumstances that occur irregularly; the reason why current systems are designed the way they are; the organizational direction that can influence info system requirements
question
If your analysis of several written procedures reveals a duplication of effort in two jobs, you should
answer
call the duplication to the attention of management as an issue to be resolved before system design can proceed
question
The official way a system works as described in organizational documentation is referred to as a(n)
answer
formal system
question
The way a system actually works is referred to as a(n)
answer
informal system
question
Forms are important for understanding a business because they
answer
indicate what data flow in or out of a system and which are necessary for the system to function
question
Forms are most useful
answer
when they contain actual organizational data
question
A report
answer
enables you to work backward from the information on the document and identify the data that must have been necessary to generate it
question
When reviewing job procedures, you may find
answer
a missing procedure; duplicate procedures; out of date procedures; a contradiction between a formal procedure and interview or observation results
question
Which of the following is a modern method for collecting system requirements?
answer
Joint Application Design
question
Drawbacks to prototyping include
answer
Know the drawbacks to prototyping
question
Prototyping is most useful for requirements determination when
answer
communication problems have existed in the past between users and analysts
question
The search for, and implementation of, radical change in business processes to achieve breakthrough improvements in products and services best defines
answer
business process reengineering
question
The structured, measured set of activities designed to produce a specific output for a particular customer or market best defines
answer
key business processes
question
Which of the following system requirement determination techniques can be applied to discovering and understanding key business processes?
answer
JAD; document analysis; observation; interview
question
Technologies that enable the breaking of long-held business rules that inhibit organizations from making radical business changes best defines
answer
disruptive technologies
question
Which of the following technologies disrupted the business rule that information can appear only in one place at a time?
answer
Distributed databases
question
Which of the following technologies disrupted the business rule of you having to find out where things are?
answer
Automatic identification and tracking technology
question
Disruptive technologies include
answer
Distributed databases; expert systems; decision support tools; automatic identification and tracking technology
question
The types of customers to be supported by Pine Valley Furniture's new WebStore include
answer
Corporate customers; home office customers; student customers
question
The practice of turning over responsibility of some or all of an organization's information systems applications and operations to an outside firm is referred to as
answer
Outsourcing
question
When developing information systems, an organization could use
answer
Info tech services firm; open-source software; enterprise-wide solution software; in-house development
question
A system that integrates individual traditional business functions into a series of modules so that a single transaction occurs seamlessly within a single information system rather than several separate systems best describes
answer
enterprise resource planning (ERP)
question
All of the following are benefits of enterprise solutions, EXCEPT
answer
shifting toward enterprise solutions means changing business processes
question
One key difference between application service providers (ASPs) and managed service providers (MSPs) is that
answer
MSPs offer network-based services
question
Open-source software is developed by
answer
communities of interested people
question
An organization should acquire software from in-house developers when
answer
the resources and staff are available and the system must be built from scratch
question
Which of the following describes the internal staffing requirements when software components are acquired from packaged software producers?
answer
Some information systems (IS) and user staff to define requirements and evaluate packages are needed
question
Which of the following describes the internal staffing requirements when software components are acquired from enterprise-wide solutions providers?
answer
Some internal staff are necessary, but mostly consultants are needed.
question
Which of the following are common criteria to consider when selecting off-the-shelf software
answer
Flexibility; vendor viability; functionality; cost
question
Two criteria that are always among the most important when choosing software are
answer
ease of installation & flexibility
question
In terms of criteria to consider when choosing off-the-shelf software, ease of customization is also referred to as
answer
flexibility
question
In terms of criteria to consider when choosing off-the-shelf software, documentation refers to all of the following EXCEPT
answer
the baseline project plan
question
The document sent to vendors asking them to propose hardware and software that will meet the requirements of your new system is called a
answer
request for proposal (RFP)
question
Reuse typically refers to using previously written
answer
objects; components
question
Reusing software can
answer
decrease development time
question
Technologies that enable the breaking of long-held business rules that inhibit organizations from making radical business changes best defines
answer
disruptive technologies
question
________ refers to the ability to model system components and show how the component inputs and outputs relate to one another.
answer
Systems thinking
question
________ is the activity of two or more people working together to achieve a common goal, result, or work product.
answer
Collaboration
question
The single most important skill for effective collaboration is ....
answer
to give and receive critical feedback.
question
What are the five-component framework of information systems?
answer
computer hardware, software, data, procedures, and people
question
An operating system like Windows or Linux is an example of the ________ component of an information system.
answer
Software
question
What component of an IS is the easiest to change and causes the least amount of organizational disruption?
answer
Hardware
question
Information can be defined as ________.
answer
Knowledge derived from data
question
Data is defined as ________.
answer
Recorded facts or figures
question
The return on investment of an advertising campaign is an example of...
answer
information, and is not mere data
question
As production manager at a bottling plant for a cola manufacturer, you receive reports containing figures for raw materials from last year, but stated as the current year's. This information would qualify as bad information because it is ________.
answer
Inaccurate
question
What is a component of an IS but not of IT?
answer
People
question
In a business process, a role is ________.
answer
a collection of procedures
question
An as-is model ________.
answer
documents the current situation of a business process
question
A business process that crosses into multiple companies is known as a(n) ________ business process.
answer
Interorganizational
question
Starting with processes and working toward systems is more likely to result in processes and systems that are aligned with the organization's strategy and direction is T or F for the relationship between business processes and information systems?
answer
TRUE
question
The process of creating and maintaining information systems is referred to as....
answer
systems development
question
Once we have defined the project's goals and scope, the next step is to ________.
answer
Assess feasibility
question
________ feasibility refers to whether existing information technology is likely to be able to meet the needs of the new system.
answer
Technical
question
During the requirements definition stage of developing an information system, the project team will include mostly ________.
answer
Business and systems analysts
question
Tasks in the ________ phase of the system development process are to build, test, and convert the users to the new system.
answer
Implementation
question
In a ________ installation, the new system runs alongside the old one until it has been tested and is fully operational.
answer
Parallel
question
According to Brooks' Law, adding more people to a system development project will ________.
answer
Delay the project's completion
question
An organization's goals and objectives are determined by its ________.
answer
Competitive strategy
question
Porter's five forces model is used to assess ________.
answer
Industry structure
question
A new drug that has shown promise in curing lung cancer has been discovered by a famous chemical laboratory. This is the only drug effective for treatment of this disease. The laboratory obtains a patent for the product and decides to sell it. This situation is characterized by a ________.
answer
Low threat of substitutions
question
The automobile industry is characterized by many manufacturers and intense competition among them. This statement represents ________.
answer
High levels of rivalry
question
This is defined as an organization's response to the structure of its industry...
answer
Competitive strategy
question
Porter defined value as the ________.
answer
amount of money that a customer is willing to pay for a resource
question
Lynn is going through this week's delivery schedule. She calls her team and assigns territories for each executive. She contacts the fleet supervisor to arrange trucks for transportation. Which activity of the value chain is Lynn executing?
answer
Outbound logistics
question
A ________ is a network of activities that generate value by transforming inputs into outputs.
answer
Business process
question
A(n) ________ is a collection of something, such as data and raw materials.
answer
Repository
question
What is true of business process designs?
answer
Most process designs require people to work in new ways.
question
Locking in customers by making it difficult or expensive for customers to move to another product is called establishing high ________.
answer
Switching costs
question
The ________ is called the "brain" of the computer.
answer
CPU
question
A ____________is an input hardware device
answer
Bar-code scanner
question
To run a program or process data, the computer first transfers the program or data from disk to the ________.
answer
Main memory
question
Cloud computing refers to ________.
answer
A computing network on the internet
question
Microsoft Word is an example of a(n)...
answer
application program
question
A(n) _______ _________ is a program that controls the computer's resources.
answer
Operating system
question
________ consist of programs that perform business functions such as general ledger and accounting.
answer
Application softwares
question
When you buy an operating system for your personal computer, you are actually buying a software ________.
answer
License
question
Software developed in-house is most likely to be the ______ ________ ______ when deciding to acquire an application software
answer
last-choice alternative
question
________ is installed in special, read-only memory in devices like printers or communication devices.
answer
Firmware
question
The term "open source" means that the source code of the program is ________.
answer
Available to the public
question
A collection of similar records is called a(n)________.
answer
File
question
In a relational database, a collection of similar records is called a(n) ________.
answer
Table
question
A ________ is a column or group of columns that identifies a unique row in a table.
answer
Key
question
A _______ is a program used to create, process, and administer a database.
answer
DBMS
question
SQL is a(n) ________.
answer
Query language
question
A hospital is using a software to analyze treatment regimen and recovery times. The software relates the dosages, regularity, and therapeutic procedures to the time taken by patients segmented across age- and illness-groups. This software is an example of a(n) ________.
answer
Application program
question
A(n) ________ DBMS is designed to process large organizational and workgroup databases.
answer
Enterprise
question
A ________ describes the data and relationships that will be stored in the database.
answer
Data model
question
A person, place, or object would be represented in a database application as a(n) ________.
answer
Entity
question
If a student is allowed to have multiple majors and advisors are assigned to handle multiple students, it would be an example of a ________ relationship.
answer
N:M
question
________ is the process of converting a poorly structured table into two or more well-structured tables.
answer
Normalization
question
________ Law makes cost of data storage and data communications essentially zero
answer
Moore's Law
question
Abstract reasoning, collaboration, systems thinking and the ability to experiment are examples of ______ _______ cognitive skills.
answer
Non-routine
question
MIS is defined as...
answer
The development and use of information systems
question
Information systems exist to help business ___________
answer
PEOPLE (aka users)
question
Characteristics of GOOD information are...
answer
Accurate, timely, relevant, just sufficient, worth its cost
question
The components of a collaboration system are:
answer
Hardware, software, data, procedures, and people
question
What are Porter's 5 forces?
answer
Bargaining power of customers, threat of substitutions, Bargaining power of suppliers, threat of new entrants, and rivalry
question
The structure of business processes determines...
answer
The design of supporting information systems
question
The difference between value and the activity generated that determines its cost is called __________
answer
Margin
question
Out-bound logistics is ...
answer
Collecting, storing and physically distributing the product to customers
question
Operations/Manufacturing refers to ...
answer
Transforming inputs into the final product
question
Inbound logistics is the ---
answer
receiving, storing and disseminating inputs to the product
question
Industry structure--> ________________--> Value Chains--> ________________ --> Information systems
answer
Competitive strategy; Business processes
question
When a business process resides within a single business function the scope is ____
answer
Functional
question
Cross-functional is when
answer
Business processes cross into different fields within the same company
question
Interorganizational scope is when
answer
Business processes involve multiple companies
question
The steps of a business process are ...
answer
Model processes, create components, Implement processes, assess results
question
The 5 step system in developing a product are..
answer
Define system, determine requirements, design system components, Implement system, maintain system
question
The purpose of a database is to..
answer
organize and keep track of things
question
Spread sheets keep track of __-
answer
a single theme
question
Databases keep track of _____ theme(s)
answer
multiple
question
In a database, columns are called ____
answer
Fields
question
IN a database, rows are called ____
answer
Records
question
_____________ is the formal name for a table
answer
Relation
question
___________ processes database tables for applications
answer
DBMS (database management system)
question
The 4 DBMS roles are :
answer
read, insert, modify and delete
question
A ____ transfers program or data from disk to main memory
answer
CPU
question
Operating system contains
answer
program that controls computer
question
True or false. The global economy has intensified rivalry by increasing product and vendor choices and by accelerating the flow of information about price, product, availability and service.
answer
True
question
True or false. Unlike business processes, information systems procedures need not reflect local cultural values and norms.
answer
False;
question
True or false. Distributed database processing refers to the process of multiple databases that reside in a single location.
answer
False;
question
True or false. Although lack of integration is disadvantageous in many situations, it has advantages for international organizations and international systems.
answer
True
question
True or false. A supply chain is a network of organizations and facilities that transform raw materials into products delivered to customers.
answer
True
question
True or false. The bullwhip effect is a phenomenon in which the variability in the size and timing of orders decreases at each stage up the supply chain, from customer to supplier.
answer
False; The bullwhip effect is a phenomenon in which the variability in the size and timing of orders increases at each stage up the supply chain, from customer to supplier.
question
True or false. The bullwhip effect increases the overall profitability of the supply chain.
answer
False; The bullwhip effect decreases the overall profitability of the supply chain.
question
True or false. International organizations have more IS and IT assets, and those assets are exposed to more risk and greater uncertainty.
answer
True
question
True or false. Regarding planning, the principle task is to align IT and IS resource's with the organizations competitive strategy. The task does not change character for international companies; it just becomes more complex and difficult.
answer
True
question
True or false. Regarding safeguards, technical and data safeguards do not change for international information systems.
answer
True
question
The global economy has changed the competitive environment in each of the following ways EXCEPT___________. A. Making Market entry easier in all cases. B. Allowing both suppliers and consumers to benefit from the greater size of the economy. C. Customizing products to suit local preferences. D. Enabling consumers to access a wider range of vendors.
answer
A. Making market entry easier in all cases
question
Which of the following statements is true about the impact of globalization on value chains and business processes? A. Increased globalization calls for greater attention to promotional aspects of the marketing mix as opposed to the product. B. Companies prefer to perform all their processes in-house as it is much more feasible than outsourcing. C. Manufacturing of a final product is frequently distributed throughout the world. D. Companies must develop a standardized global strategy irrespective of where they are operating from.
answer
C. Manufacturing of a final product is frequently distributed throughout the world.
question
Which of the following components of an international IS is least affected by internationalization?
answer
Hardware
question
When localizing a computer program, which of the following must a firm NOT do? A. Avoid redesigning labels in forms and reports. B. Redraw and translate diagrams. C. Adjusting sorting order for different character sets. D. Translate the user interface.
answer
A. Avoid redesigning labels in forms and reports.
question
The process of making a computer program work in a second language, which is surprisingly hard, is called ____________ software.
answer
Localizing
question
Distributed data processing refers to the processing of _______________.
answer
A single database that resides in multiple locations.
question
Because an order processing functional system located in, say, the United States is independent of the manufacturing systems located in, say, Taiwan, it implies that ____________.
answer
Integration of the two systems is not required as long as there is sufficient interface between the two systems.
question
Which of the following statements is true about the supply chain? A. The supply chain includes transportation companies, warehouses, and inventories. B. All members of the supply chain of a firm must have geographical proximity. C. Each organization in the chain includes is connected to just one company up the chain (toward the supplier) and down the chain (toward the customer). D. Every supply chain must include suppliers, manufacturers, distributors, retailers, and customers.
answer
The supply chain includes transportation companies, warehouses, and inventories.
question
Cross functional, integrated systems, such as ERP, solve the problems of data isolation by integrating data into a database that provides a comprehensive and organization-wide view. However, this would require ____________.
answer
The company to customize its product offerings.
question
Which of the following describes the bullwhip effect? A. The variability in the size and timing of orders increases at each stage up the supplu chain, from the customer to supplier. B. The performance improvement to be gained from using some faster mode of execution is limited by the fraction of the time the faster mode can be used. C. New classes create new applications resulting in new markets and new industries. D. The value of a telecommunications network is proportional to the square of the number of connected users of the system.
answer
A. The variability in the size and timing of orders increases at each stage up the supplu chain, from the customer to supplier.
question
The bullwhip effect __________. A. Increases the overall profitability of of the supply chain. B. Forces distributors, manufacturers, and suppliers to carry smaller inventories than necessary. C. Is not related to erratic consumer demand. D. Can be eliminated by not giving all participants in the supply chain access to consumer-demand information from the retailer.
answer
C. Is not related to erratic consumer demand.
question
To overcome challenges in international IS, some organizations develop alternative versions of the system that support different processes in different countries. This results in __________. A. Standardized development rates across countries. B. A short term profit but long term losses. C. High maintenance cost D. Defining a set standard of business processes that meets all requirements.
answer
C. High maintenance cost
question
One of the challenges for international IS project management is that the development rates vary among cultures and countries, because ____________.
answer
Workers expectations vary among cultures and nations.
question
The four primary responsibilities of the IT department are: plan, operate, develop, and protect information systems and IT infrastructure. Regarding planning, the principle task is to _________________.
answer
Align IT and IS resources with the organization's competitive strategy.
question
International outsourcing is most advantageous ____________.
answer
For functions that need to be operational 24/7.
question
Briefly explain the two major ways in which thinking about competitive strategies has changed in today's global economy.
answer
First, the sheer size and complexity of the global economy means that any organization that chooses a strategy allowing it to compete industry-wide is taking a very big bite! The second major way today's world economy changes competitive strategies is that its size, combined with the Internet, enables unprecedented product differentiation.
question
List the issues that need to be addressed when localizing a computer program.
answer
-Translate the user interface, including menu bars and commands. -Translate, and possibly redesign, labels in forms, reports, and query prompts. - Translate all documentation and help text. - Redraw and translate diagrams and examples in help text. -Translate all error messages. -Translate text in all message boxes. -Adjust sorting order for different character set. -Fix special problems in Asian character sets and in languages that read and write from right to left.
question
How are international business processes likely to be developed to overcome the present challenges of international cross-functional applications?
answer
Cross-functional integrated systems solve the problems of data isolation by integrating data into a database that provides a comprehensive and organization-wide view.
question
How can information reduce/eliminate the bullwhip effect?
answer
One way to eliminate the bullwhip effect is to give all participants in the supply chain access to consumer-demand information from the retailer.
question
Explain how managing a global IS development project will involve challenges in the areas of time, quality and costs.
answer
Time-Development rates vary among cultures and countries. Cost-Cost of development varies widely among countries. Quality- Quality standards vary among cultures. Different expectations of quality may result in an inconsistent system.
question
The three primary activities in the BI (Business Intelligence) process are to acquire data, perform analysis, and publish results
answer
True
question
Which of the following is a fundamental category of Business Analytics?
answer
Data Mining
question
International outsourcing is most advantageous ________.
answer
For functions that need to be operational 24/7
question
Rules of conduct describing what people ought and ought not to do in various situations are called:
answer
Ethics
question
The Software Code of Ethics was developed by:
answer
ACM
question
Which of the following is a risk of outsourcing IS/IT functions?
answer
It involves the potential loss of intellectual capital
question
________ present the largest risk for an organization's infrastructure loss.
answer
Natural disasters
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New