ISM Test 3 USF – Flashcards

Unlock all answers in this set

Unlock answers
question
In the next 10? years, BI applications can become so sophisticated that they might replace the BI? analyst, due to all of the following? reasons, EXCEPT? ________.
answer
supervised learning is more accurate than unsupervised learning
question
Among the following? statements, which one is NOT applicable to Big? Data?
answer
Big Data can be processed with traditional techniques.
question
When AllRoad Parts acquired data for its BI system from its operational? database, it used all of the following? conditions, EXCEPT? ________.
answer
only select items with a unit price of more than? $100
question
RFM analysis is a way of analyzing and ranking customers according to their? ________.
answer
purchasing patterns
question
Which of the following is NOT an example of a static? report?
answer
BI server
question
An OLAP report has measures and dimensions. Which of the following is an example of a? dimension?
answer
Purchase date
question
Which of the following is true of unsupervised data? mining?
answer
Analysts do not create a model before running the analysis.
question
Which of the following is a standard for subscribing to content? sources?
answer
Real simple syndication
question
Operational data can have many problems that make it unsuitable for data mining. Among the? following, which is NOT a data problem in operational data that creates issues for data? mining?
answer
Data is highly integrated
question
A BI system enabled Target to identify customers who might be pregnant by? ________.
answer
customer purchasing patterns of lotions and vitamins
question
The functions of a data warehouse are to do all of the? following, EXCEPT? ________.
answer
filter data
question
?________ attempt to capture human expertise and put it into a format that can be used by nonexperts.
answer
Expert systems
question
Among the different types of social media to manage and deliver organizational? knowledge, the tool NOT in use for problem solving is? ________.
answer
blogs
question
Which of the following is NOT part of the BI? system?
answer
Capacity
question
Which of the following is NOT true regarding? Hadoop?
answer
Hadoop is a? market-basket analysis tool.
question
Which of the following is an example of a supervised data mining? technique?
answer
Regression analysis
question
Which of the following statements is NOT true about business intelligence? (BI) systems?
answer
BI systems support only? decision-making activities.
question
AllRoad Parts used a BI system to find candidate parts for the sale of 3D parts designs by using all of the following? criteria, EXCEPT? ________.
answer
by finding parts ordered in large quantities
question
Among the? following, what is the best way to distinguish between reporting tools and data mining? tools?
answer
Complexity of techniques used
question
?________ reports enable users to drill down to view increasingly detailed levels of the data.
answer
OLAP
question
An RFM score of? ________ probably means this customer has taken their business elsewhere and is most likely not worth spending too many marketing resources on.
answer
555
question
Which of the following is NOT an example of a task supported by business? intelligence?
answer
Payroll
question
Which of the following is NOT a primary activity in the BI? process?
answer
Tracking the access and use of the data mining results
question
?________ involves searching for patterns and relationships among data.
answer
Data mining
question
In? market-basket terminology, the ratio of confidence to the base probability of buying an item is the? ________.
answer
lift
question
Which of the following is likely to occur in the next 10? years?
answer
Major incidents of cyberwarfare are likely.
question
According to the study done by? Ponemon, which of the following has the lowest cost due to computer? crime?
answer
Stolen devices
question
The most secure and? hard-to-break passwords have all of the following? characteristics, EXCEPT? ________.
answer
has six or fewer characters
question
Data safeguards include all of the? following, EXCEPT? ________.
answer
data mining
question
What among the following is NOT a type of security? loss?
answer
Forgotten passwords
question
Technical safeguards against computer security threats include all of the following EXCEPT? ________.
answer
passwords
question
Which of the following is a critical security function of senior management in an? organization?
answer
Establishing the security policy and managing risk
question
Which of the following is considered a threat caused by human? error?
answer
An employee inadvertently installs an old database on top of the current one.
question
?________ are false targets for computer criminals to attack.
answer
Honeypots
question
?________ a site means to take extraordinary measures to reduce a? system's vulnerability, using special versions of the operating system.
answer
Hardening
question
Human safeguards involve the people and procedural components of information systems. All of the following constitute effective human? safeguards, EXCEPT? ________.
answer
?incident-response plan
question
At a? minimum, an? organization's security policy about protecting the data it gathers on employees must include all of the? following, except? ________.
answer
what? non-organizational activities employees can do
question
A safety procedure that enables a trusted party to have a copy of the encryption key is called key? ________.
answer
escrow
question
All of the following statements are good practices to protect against security? threats, EXCEPT? ________.
answer
back up your browsing? history, temporary? files, and cookies
question
We do not know the full extent of losses due to computer security? threats, because of all of the following? reasons, EXCEPT? ________.
answer
computer equipment prices are falling
question
All of the following are ways an organization prepares to respond to a security? incident, EXCEPT? ________.
answer
back up the data
question
?________ is an opportunity for threats to gain access to assets.
answer
Vulnerability
question
A? ________ pretends to be a legitimate company and sends an email requesting confidential? data, such as account? numbers, Social Security? numbers, account? passwords, and so forth.
answer
phisher
question
?A(n) ________ will stipulate what an employee should do when he notices something like a virus.
answer
?incident-response plan
question
All of the following are projected trends for computer security for the next 10? years, EXCEPT? ________.
answer
computer equipment will be more? secure, with less threats and vulnerabilities
question
All of the following are types of? malware, except? ________.
answer
cookies
question
?Non-word passwords are vulnerable to? a(n) ________? attack, in which the password cracker tries every possible combination of characters.
answer
Brute force
question
Which of the following is considered a computer? crime?
answer
Hacking of information systems
question
The longer a security incident goes? on, the? _______.
answer
greater the cost
question
?A(n) ___________ is a computer program that senses when another computer is attempting to scan or access a computer or network.
answer
intrusion detection system? (IDS)
question
A major concern with outsourcing is that the company may lose? ________ by being forced to reveal proprietary trade secrets.
answer
intellectual capital
question
Users have responsibilities such as learning basic computer skills. This? responsibility, and? others, include all of the following EXCEPT? ________.
answer
learning to use the systems to perform your job
question
Cloud hosting is feasible and is an example of? ________.
answer
IaaS
question
Which of the following statements is NOT true about a steering? committee?
answer
It meets to resolve the most critical problems.
question
A company hires a travel agency to manage employee travel arrangements. This is an example of? ________.
answer
outsourcing an entire business function
question
As a? user, you have a responsibility to do all of the? following, except________.
answer
apply software patches and fixes on your own
question
The major planning functions of the information systems department include the? following, EXCEPT? ________.
answer
managing the charge back of information system resource usage
question
Which of the following statements is true regarding? outsourcing?
answer
There is no guarantee that outsourcing will provide a certain level of quality.
question
The CTO often heads the? ________ group
answer
technology
question
Ensuring end users get prompt attention to their problems is? __________.
answer
an example of a? user's rights
question
The major functions of the information systems department are as? follows, EXCEPT? ________.
answer
create an organizational strategy
question
Among the following? responsibilities, which is NOT a responsibility of the? CIO?
answer
Manage the computing infrastructure.
question
A? ________ works with users to determine system? requirements, designs and develops job descriptions and? procedures, and helps determine system test plans.
answer
system analyst
question
Because of the movement toward? outsourcing, some companies have started a separate group in the IS department for? ________.
answer
outsourcing relations
question
One of the management advantages of outsourcing is that the company can? ________.
answer
gain expertise
question
As a? user, you have a right to all of the? following, EXCEPT? ________.
answer
access to social media and? Web-based email programs
question
The? help-desk function and assistance with individual computers is usually part of the? ________ group within the IS department.
answer
operations
question
Companies that outsource face a certain loss of control when they hire other organizations to perform certain services. A particular disadvantage related to the loss of control is? ________.
answer
that there is no easy way of exiting the outsourcing agreement
question
Bring your own device? (BYOD) is a policy that applies? to________.
answer
mobile devices such as tablets
question
Because the company and the outsourcing vendor can become so tightly? integrated, ________ the agreement can be very costly and risky.
answer
ending
question
The development group in a? company's IS department is staffed primarily by? programmers, test? engineers, technical? writers, and other development personnel. Based on this? information, which of the following is most likely to be? true?
answer
The company develops programs? in-house.
question
?________ is another more common title given to the VP of information services.
answer
CIO
question
When planning the use of? IS/IT, the IS department should have a group of senior managers from the major business functions that works with the CIO to set the IS priorities and decide among major IS projects and alternatives. This example is part of? ________.
answer
sponsoring a steering committee
question
?________ is a form of? hardware/software outsourcing in which organizations offer flexible plans for customers to lease hardware and software facilities.
answer
Cloud computing
question
An outsource provider may have its own methods and procedures that will be adopted by the hiring? company; this is? ________.
answer
one of the risks of outsourcing
question
Which of the following is done in the maintenance phase of the? SDLC?
answer
Fixing failures
question
The easiest and cheapest time to alter the information system is in the? ________ phase.
answer
requirements analysis
question
A? ________ shows the? tasks, start and finish? dates, and dependencies for the tasks of a project.
answer
Gantt chart
question
Among the? following, which is NOT a stage in business process management? (BPM)?
answer
Change strategy
question
?________ are IS professionals who understand both business and technology.
answer
Systems analysts
question
The project plan is made in the? ________ phase of the systems development life cycle.
answer
system definition
question
Among the following statements about the systems development life cycle? (SDLC), which one is? FALSE?
answer
The average contribution per worker is directly proportional to the team size.
question
Which of the following is NOT something to consider when performing a requirements analysis in? SDLC?
answer
Consider organizational standards governing what hardware will be used.
question
Among the? following, which is NOT a reason that can cause business processes to need changes and require management.
answer
New computer hardware is available.
question
?________ is the standard set of terms and graphical notations for documenting business processes.
answer
Business process modeling notation? (BPMN)
question
In considering the? trade-offs for systems development? processes, what could cause diseconomies of? scale?
answer
Adding more people
question
Process and systems development will evolve in the following ways in the next 10? years, EXCEPT? ________.
answer
systems will become less integrated
question
Among the following statements about information systems? development, which one is? FALSE?
answer
Systems development always aims at a fixed target.
question
Which of the following is NOT one of the reasons for the problems with? SDLC?
answer
Lack of implementation training for users
question
In the? future, software vendors will find ways to make their solutions more agile using? ________ and Web services.
answer
SOA
question
In a BPMN process? diagram, you can use? ________ to simplify process diagrams and draw attention to interactions.
answer
?swim-lane layout
question
Among the? following, what is NOT a typical characteristic of a successful project? team?
answer
Team composition remains fixed during the project.
question
Which of the following personnel do NOT play a role in the applications development? process?
answer
Business analysts
question
In a BPMN process? diagram, a? ________ represents the start of a process.
answer
?thin-lined circle
question
The main problem of the SDLC approach to systems development is the? ________ nature of the process.
answer
waterfall
question
Which of the following is NOT one of the dimensions of? feasibility?
answer
Planning
question
The correct sequence for the five phases in the systems development life cycle? (SDLC) process is? ________.
answer
System? definition; requirements? analysis; component? design; implementation; system maintenance
question
In a? ________ installation, the new system runs alongside the old one until it has been tested and is fully operational.
answer
parallel
question
Among the following? statements, which one is NOT a key to success of SDLC? projects?
answer
Do not adjust the plan via? trade-offs.
question
Which of the following statements does NOT represent an essential of the scrum? process?
answer
Large complex projects can be managed with scrum.
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New