ISM Test 3 USF – Flashcards
100 test answers
Unlock all answers in this set
Unlock answers 100question
Which of the following is NOT an example of a static? report?
answer
BI server
Unlock the answer
question
An OLAP report has measures and dimensions. Which of the following is an example of a? dimension?
answer
Purchase date
Unlock the answer
question
Which of the following is true of unsupervised data? mining?
answer
Analysts do not create a model before running the analysis.
Unlock the answer
question
Which of the following is a standard for subscribing to content? sources?
answer
Real simple syndication
Unlock the answer
question
Operational data can have many problems that make it unsuitable for data mining. Among the? following, which is NOT a data problem in operational data that creates issues for data? mining?
answer
Data is highly integrated
Unlock the answer
question
A BI system enabled Target to identify customers who might be pregnant by? ________.
answer
customer purchasing patterns of lotions and vitamins
Unlock the answer
question
The functions of a data warehouse are to do all of the? following, EXCEPT? ________.
answer
filter data
Unlock the answer
question
?________ attempt to capture human expertise and put it into a format that can be used by nonexperts.
answer
Expert systems
Unlock the answer
question
Among the different types of social media to manage and deliver organizational? knowledge, the tool NOT in use for problem solving is? ________.
answer
blogs
Unlock the answer
question
Which of the following is NOT part of the BI? system?
answer
Capacity
Unlock the answer
question
Which of the following is NOT true regarding? Hadoop?
answer
Hadoop is a? market-basket analysis tool.
Unlock the answer
question
Which of the following is an example of a supervised data mining? technique?
answer
Regression analysis
Unlock the answer
question
Which of the following statements is NOT true about business intelligence? (BI) systems?
answer
BI systems support only? decision-making activities.
Unlock the answer
question
AllRoad Parts used a BI system to find candidate parts for the sale of 3D parts designs by using all of the following? criteria, EXCEPT? ________.
answer
by finding parts ordered in large quantities
Unlock the answer
question
Among the? following, what is the best way to distinguish between reporting tools and data mining? tools?
answer
Complexity of techniques used
Unlock the answer
question
?________ reports enable users to drill down to view increasingly detailed levels of the data.
answer
OLAP
Unlock the answer
question
An RFM score of? ________ probably means this customer has taken their business elsewhere and is most likely not worth spending too many marketing resources on.
answer
555
Unlock the answer
question
Which of the following is NOT an example of a task supported by business? intelligence?
answer
Payroll
Unlock the answer
question
Which of the following is NOT a primary activity in the BI? process?
answer
Tracking the access and use of the data mining results
Unlock the answer
question
?________ involves searching for patterns and relationships among data.
answer
Data mining
Unlock the answer
question
In? market-basket terminology, the ratio of confidence to the base probability of buying an item is the? ________.
answer
lift
Unlock the answer
question
Which of the following is likely to occur in the next 10? years?
answer
Major incidents of cyberwarfare are likely.
Unlock the answer
question
According to the study done by? Ponemon, which of the following has the lowest cost due to computer? crime?
answer
Stolen devices
Unlock the answer
question
The most secure and? hard-to-break passwords have all of the following? characteristics, EXCEPT? ________.
answer
has six or fewer characters
Unlock the answer
question
Data safeguards include all of the? following, EXCEPT? ________.
answer
data mining
Unlock the answer
question
What among the following is NOT a type of security? loss?
answer
Forgotten passwords
Unlock the answer
question
Technical safeguards against computer security threats include all of the following EXCEPT? ________.
answer
passwords
Unlock the answer
question
Which of the following is a critical security function of senior management in an? organization?
answer
Establishing the security policy and managing risk
Unlock the answer
question
Which of the following is considered a threat caused by human? error?
answer
An employee inadvertently installs an old database on top of the current one.
Unlock the answer
question
?________ are false targets for computer criminals to attack.
answer
Honeypots
Unlock the answer
question
?________ a site means to take extraordinary measures to reduce a? system's vulnerability, using special versions of the operating system.
answer
Hardening
Unlock the answer
question
Human safeguards involve the people and procedural components of information systems. All of the following constitute effective human? safeguards, EXCEPT? ________.
answer
?incident-response plan
Unlock the answer
question
At a? minimum, an? organization's security policy about protecting the data it gathers on employees must include all of the? following, except? ________.
answer
what? non-organizational activities employees can do
Unlock the answer
question
A safety procedure that enables a trusted party to have a copy of the encryption key is called key? ________.
answer
escrow
Unlock the answer
question
All of the following statements are good practices to protect against security? threats, EXCEPT? ________.
answer
back up your browsing? history, temporary? files, and cookies
Unlock the answer
question
We do not know the full extent of losses due to computer security? threats, because of all of the following? reasons, EXCEPT? ________.
answer
computer equipment prices are falling
Unlock the answer
question
All of the following are ways an organization prepares to respond to a security? incident, EXCEPT? ________.
answer
back up the data
Unlock the answer
question
?________ is an opportunity for threats to gain access to assets.
answer
Vulnerability
Unlock the answer
question
A? ________ pretends to be a legitimate company and sends an email requesting confidential? data, such as account? numbers, Social Security? numbers, account? passwords, and so forth.
answer
phisher
Unlock the answer
question
?A(n) ________ will stipulate what an employee should do when he notices something like a virus.
answer
?incident-response plan
Unlock the answer
question
All of the following are projected trends for computer security for the next 10? years, EXCEPT? ________.
answer
computer equipment will be more? secure, with less threats and vulnerabilities
Unlock the answer
question
All of the following are types of? malware, except? ________.
answer
cookies
Unlock the answer
question
?Non-word passwords are vulnerable to? a(n) ________? attack, in which the password cracker tries every possible combination of characters.
answer
Brute force
Unlock the answer
question
Which of the following is considered a computer? crime?
answer
Hacking of information systems
Unlock the answer
question
The longer a security incident goes? on, the? _______.
answer
greater the cost
Unlock the answer
question
?A(n) ___________ is a computer program that senses when another computer is attempting to scan or access a computer or network.
answer
intrusion detection system? (IDS)
Unlock the answer
question
A major concern with outsourcing is that the company may lose? ________ by being forced to reveal proprietary trade secrets.
answer
intellectual capital
Unlock the answer
question
Users have responsibilities such as learning basic computer skills. This? responsibility, and? others, include all of the following EXCEPT? ________.
answer
learning to use the systems to perform your job
Unlock the answer
question
Cloud hosting is feasible and is an example of? ________.
answer
IaaS
Unlock the answer
question
Which of the following statements is NOT true about a steering? committee?
answer
It meets to resolve the most critical problems.
Unlock the answer
question
A company hires a travel agency to manage employee travel arrangements. This is an example of? ________.
answer
outsourcing an entire business function
Unlock the answer
question
As a? user, you have a responsibility to do all of the? following, except________.
answer
apply software patches and fixes on your own
Unlock the answer
question
The major planning functions of the information systems department include the? following, EXCEPT? ________.
answer
managing the charge back of information system resource usage
Unlock the answer
question
Which of the following statements is true regarding? outsourcing?
answer
There is no guarantee that outsourcing will provide a certain level of quality.
Unlock the answer
question
The CTO often heads the? ________ group
answer
technology
Unlock the answer
question
Ensuring end users get prompt attention to their problems is? __________.
answer
an example of a? user's rights
Unlock the answer
question
The major functions of the information systems department are as? follows, EXCEPT? ________.
answer
create an organizational strategy
Unlock the answer
question
Among the following? responsibilities, which is NOT a responsibility of the? CIO?
answer
Manage the computing infrastructure.
Unlock the answer
question
A? ________ works with users to determine system? requirements, designs and develops job descriptions and? procedures, and helps determine system test plans.
answer
system analyst
Unlock the answer
question
Because of the movement toward? outsourcing, some companies have started a separate group in the IS department for? ________.
answer
outsourcing relations
Unlock the answer
question
One of the management advantages of outsourcing is that the company can? ________.
answer
gain expertise
Unlock the answer
question
As a? user, you have a right to all of the? following, EXCEPT? ________.
answer
access to social media and? Web-based email programs
Unlock the answer
question
The? help-desk function and assistance with individual computers is usually part of the? ________ group within the IS department.
answer
operations
Unlock the answer
question
Companies that outsource face a certain loss of control when they hire other organizations to perform certain services. A particular disadvantage related to the loss of control is? ________.
answer
that there is no easy way of exiting the outsourcing agreement
Unlock the answer
question
Bring your own device? (BYOD) is a policy that applies? to________.
answer
mobile devices such as tablets
Unlock the answer
question
Because the company and the outsourcing vendor can become so tightly? integrated, ________ the agreement can be very costly and risky.
answer
ending
Unlock the answer
question
The development group in a? company's IS department is staffed primarily by? programmers, test? engineers, technical? writers, and other development personnel. Based on this? information, which of the following is most likely to be? true?
answer
The company develops programs? in-house.
Unlock the answer
question
?________ is another more common title given to the VP of information services.
answer
CIO
Unlock the answer
question
When planning the use of? IS/IT, the IS department should have a group of senior managers from the major business functions that works with the CIO to set the IS priorities and decide among major IS projects and alternatives. This example is part of? ________.
answer
sponsoring a steering committee
Unlock the answer
question
?________ is a form of? hardware/software outsourcing in which organizations offer flexible plans for customers to lease hardware and software facilities.
answer
Cloud computing
Unlock the answer
question
An outsource provider may have its own methods and procedures that will be adopted by the hiring? company; this is? ________.
answer
one of the risks of outsourcing
Unlock the answer
question
Which of the following is done in the maintenance phase of the? SDLC?
answer
Fixing failures
Unlock the answer
question
The easiest and cheapest time to alter the information system is in the? ________ phase.
answer
requirements analysis
Unlock the answer
question
A? ________ shows the? tasks, start and finish? dates, and dependencies for the tasks of a project.
answer
Gantt chart
Unlock the answer
question
Among the? following, which is NOT a stage in business process management? (BPM)?
answer
Change strategy
Unlock the answer
question
?________ are IS professionals who understand both business and technology.
answer
Systems analysts
Unlock the answer
question
The project plan is made in the? ________ phase of the systems development life cycle.
answer
system definition
Unlock the answer
question
Among the following statements about the systems development life cycle? (SDLC), which one is? FALSE?
answer
The average contribution per worker is directly proportional to the team size.
Unlock the answer
question
Which of the following is NOT something to consider when performing a requirements analysis in? SDLC?
answer
Consider organizational standards governing what hardware will be used.
Unlock the answer
question
Among the? following, which is NOT a reason that can cause business processes to need changes and require management.
answer
New computer hardware is available.
Unlock the answer
question
?________ is the standard set of terms and graphical notations for documenting business processes.
answer
Business process modeling notation? (BPMN)
Unlock the answer
question
In considering the? trade-offs for systems development? processes, what could cause diseconomies of? scale?
answer
Adding more people
Unlock the answer
question
Process and systems development will evolve in the following ways in the next 10? years, EXCEPT? ________.
answer
systems will become less integrated
Unlock the answer
question
Among the following statements about information systems? development, which one is? FALSE?
answer
Systems development always aims at a fixed target.
Unlock the answer
question
Which of the following is NOT one of the reasons for the problems with? SDLC?
answer
Lack of implementation training for users
Unlock the answer
question
In the? future, software vendors will find ways to make their solutions more agile using? ________ and Web services.
answer
SOA
Unlock the answer
question
In a BPMN process? diagram, you can use? ________ to simplify process diagrams and draw attention to interactions.
answer
?swim-lane layout
Unlock the answer
question
Among the? following, what is NOT a typical characteristic of a successful project? team?
answer
Team composition remains fixed during the project.
Unlock the answer
question
Which of the following personnel do NOT play a role in the applications development? process?
answer
Business analysts
Unlock the answer
question
In a BPMN process? diagram, a? ________ represents the start of a process.
answer
?thin-lined circle
Unlock the answer
question
The main problem of the SDLC approach to systems development is the? ________ nature of the process.
answer
waterfall
Unlock the answer
question
Which of the following is NOT one of the dimensions of? feasibility?
answer
Planning
Unlock the answer
question
The correct sequence for the five phases in the systems development life cycle? (SDLC) process is? ________.
answer
System? definition; requirements? analysis; component? design; implementation; system maintenance
Unlock the answer
question
In a? ________ installation, the new system runs alongside the old one until it has been tested and is fully operational.
answer
parallel
Unlock the answer
question
Among the following? statements, which one is NOT a key to success of SDLC? projects?
answer
Do not adjust the plan via? trade-offs.
Unlock the answer
question
Which of the following statements does NOT represent an essential of the scrum? process?
answer
Large complex projects can be managed with scrum.
Unlock the answer