Please enter something

ISM Test 3 USF

question

In the next 10? years, BI applications can become so sophisticated that they might replace the BI? analyst, due to all of the following? reasons, EXCEPT? ________.
answer

supervised learning is more accurate than unsupervised learning
question

Among the following? statements, which one is NOT applicable to Big? Data?
answer

Big Data can be processed with traditional techniques.
question

When AllRoad Parts acquired data for its BI system from its operational? database, it used all of the following? conditions, EXCEPT? ________.
answer

only select items with a unit price of more than? $100
question

RFM analysis is a way of analyzing and ranking customers according to their? ________.
answer

purchasing patterns
question

Which of the following is NOT an example of a static? report?
answer

BI server
question

An OLAP report has measures and dimensions. Which of the following is an example of a? dimension?
answer

Purchase date
question

Which of the following is true of unsupervised data? mining?
answer

Analysts do not create a model before running the analysis.
question

Which of the following is a standard for subscribing to content? sources?
answer

Real simple syndication
question

Operational data can have many problems that make it unsuitable for data mining. Among the? following, which is NOT a data problem in operational data that creates issues for data? mining?
answer

Data is highly integrated
question

A BI system enabled Target to identify customers who might be pregnant by? ________.
answer

customer purchasing patterns of lotions and vitamins
question

The functions of a data warehouse are to do all of the? following, EXCEPT? ________.
answer

filter data
question

?________ attempt to capture human expertise and put it into a format that can be used by nonexperts.
answer

Expert systems
question

Among the different types of social media to manage and deliver organizational? knowledge, the tool NOT in use for problem solving is? ________.
answer

blogs
question

Which of the following is NOT part of the BI? system?
answer

Capacity
question

Which of the following is NOT true regarding? Hadoop?
answer

Hadoop is a? market-basket analysis tool.
question

Which of the following is an example of a supervised data mining? technique?
answer

Regression analysis
question

Which of the following statements is NOT true about business intelligence? (BI) systems?
answer

BI systems support only? decision-making activities.
question

AllRoad Parts used a BI system to find candidate parts for the sale of 3D parts designs by using all of the following? criteria, EXCEPT? ________.
answer

by finding parts ordered in large quantities
question

Among the? following, what is the best way to distinguish between reporting tools and data mining? tools?
answer

Complexity of techniques used
question

?________ reports enable users to drill down to view increasingly detailed levels of the data.
answer

OLAP
question

An RFM score of? ________ probably means this customer has taken their business elsewhere and is most likely not worth spending too many marketing resources on.
answer

555
question

Which of the following is NOT an example of a task supported by business? intelligence?
answer

Payroll
question

Which of the following is NOT a primary activity in the BI? process?
answer

Tracking the access and use of the data mining results
question

?________ involves searching for patterns and relationships among data.
answer

Data mining
question

In? market-basket terminology, the ratio of confidence to the base probability of buying an item is the? ________.
answer

lift
question

Which of the following is likely to occur in the next 10? years?
answer

Major incidents of cyberwarfare are likely.
question

According to the study done by? Ponemon, which of the following has the lowest cost due to computer? crime?
answer

Stolen devices
question

The most secure and? hard-to-break passwords have all of the following? characteristics, EXCEPT? ________.
answer

has six or fewer characters
question

Data safeguards include all of the? following, EXCEPT? ________.
answer

data mining
question

What among the following is NOT a type of security? loss?
answer

Forgotten passwords
question

Technical safeguards against computer security threats include all of the following EXCEPT? ________.
answer

passwords
question

Which of the following is a critical security function of senior management in an? organization?
answer

Establishing the security policy and managing risk
question

Which of the following is considered a threat caused by human? error?
answer

An employee inadvertently installs an old database on top of the current one.
question

?________ are false targets for computer criminals to attack.
answer

Honeypots
question

?________ a site means to take extraordinary measures to reduce a? system’s vulnerability, using special versions of the operating system.
answer

Hardening
question

Human safeguards involve the people and procedural components of information systems. All of the following constitute effective human? safeguards, EXCEPT? ________.
answer

?incident-response plan
question

At a? minimum, an? organization’s security policy about protecting the data it gathers on employees must include all of the? following, except? ________.
answer

what? non-organizational activities employees can do
question

A safety procedure that enables a trusted party to have a copy of the encryption key is called key? ________.
answer

escrow
question

All of the following statements are good practices to protect against security? threats, EXCEPT? ________.
answer

back up your browsing? history, temporary? files, and cookies
question

We do not know the full extent of losses due to computer security? threats, because of all of the following? reasons, EXCEPT? ________.
answer

computer equipment prices are falling
question

All of the following are ways an organization prepares to respond to a security? incident, EXCEPT? ________.
answer

back up the data
question

?________ is an opportunity for threats to gain access to assets.
answer

Vulnerability
question

A? ________ pretends to be a legitimate company and sends an email requesting confidential? data, such as account? numbers, Social Security? numbers, account? passwords, and so forth.
answer

phisher
question

?A(n) ________ will stipulate what an employee should do when he notices something like a virus.
answer

?incident-response plan
question

All of the following are projected trends for computer security for the next 10? years, EXCEPT? ________.
answer

computer equipment will be more? secure, with less threats and vulnerabilities
question

All of the following are types of? malware, except? ________.
answer

cookies
question

?Non-word passwords are vulnerable to? a(n) ________? attack, in which the password cracker tries every possible combination of characters.
answer

Brute force
question

Which of the following is considered a computer? crime?
answer

Hacking of information systems
question

The longer a security incident goes? on, the? _______.
answer

greater the cost
question

?A(n) ___________ is a computer program that senses when another computer is attempting to scan or access a computer or network.
answer

intrusion detection system? (IDS)
question

A major concern with outsourcing is that the company may lose? ________ by being forced to reveal proprietary trade secrets.
answer

intellectual capital
question

Users have responsibilities such as learning basic computer skills. This? responsibility, and? others, include all of the following EXCEPT? ________.
answer

learning to use the systems to perform your job
question

Cloud hosting is feasible and is an example of? ________.
answer

IaaS
question

Which of the following statements is NOT true about a steering? committee?
answer

It meets to resolve the most critical problems.
question

A company hires a travel agency to manage employee travel arrangements. This is an example of? ________.
answer

outsourcing an entire business function
question

As a? user, you have a responsibility to do all of the? following, except________.
answer

apply software patches and fixes on your own
question

The major planning functions of the information systems department include the? following, EXCEPT? ________.
answer

managing the charge back of information system resource usage
question

Which of the following statements is true regarding? outsourcing?
answer

There is no guarantee that outsourcing will provide a certain level of quality.
question

The CTO often heads the? ________ group
answer

technology
question

Ensuring end users get prompt attention to their problems is? __________.
answer

an example of a? user’s rights
question

The major functions of the information systems department are as? follows, EXCEPT? ________.
answer

create an organizational strategy
question

Among the following? responsibilities, which is NOT a responsibility of the? CIO?
answer

Manage the computing infrastructure.
question

A? ________ works with users to determine system? requirements, designs and develops job descriptions and? procedures, and helps determine system test plans.
answer

system analyst
question

Because of the movement toward? outsourcing, some companies have started a separate group in the IS department for? ________.
answer

outsourcing relations
question

One of the management advantages of outsourcing is that the company can? ________.
answer

gain expertise
question

As a? user, you have a right to all of the? following, EXCEPT? ________.
answer

access to social media and? Web-based email programs
question

The? help-desk function and assistance with individual computers is usually part of the? ________ group within the IS department.
answer

operations
question

Companies that outsource face a certain loss of control when they hire other organizations to perform certain services. A particular disadvantage related to the loss of control is? ________.
answer

that there is no easy way of exiting the outsourcing agreement
question

Bring your own device? (BYOD) is a policy that applies? to________.
answer

mobile devices such as tablets
question

Because the company and the outsourcing vendor can become so tightly? integrated, ________ the agreement can be very costly and risky.
answer

ending
question

The development group in a? company’s IS department is staffed primarily by? programmers, test? engineers, technical? writers, and other development personnel. Based on this? information, which of the following is most likely to be? true?
answer

The company develops programs? in-house.
question

?________ is another more common title given to the VP of information services.
answer

CIO
question

When planning the use of? IS/IT, the IS department should have a group of senior managers from the major business functions that works with the CIO to set the IS priorities and decide among major IS projects and alternatives. This example is part of? ________.
answer

sponsoring a steering committee
question

?________ is a form of? hardware/software outsourcing in which organizations offer flexible plans for customers to lease hardware and software facilities.
answer

Cloud computing
question

An outsource provider may have its own methods and procedures that will be adopted by the hiring? company; this is? ________.
answer

one of the risks of outsourcing
question

Which of the following is done in the maintenance phase of the? SDLC?
answer

Fixing failures
question

The easiest and cheapest time to alter the information system is in the? ________ phase.
answer

requirements analysis
question

A? ________ shows the? tasks, start and finish? dates, and dependencies for the tasks of a project.
answer

Gantt chart
question

Among the? following, which is NOT a stage in business process management? (BPM)?
answer

Change strategy
question

?________ are IS professionals who understand both business and technology.
answer

Systems analysts
question

The project plan is made in the? ________ phase of the systems development life cycle.
answer

system definition
question

Among the following statements about the systems development life cycle? (SDLC), which one is? FALSE?
answer

The average contribution per worker is directly proportional to the team size.
question

Which of the following is NOT something to consider when performing a requirements analysis in? SDLC?
answer

Consider organizational standards governing what hardware will be used.
question

Among the? following, which is NOT a reason that can cause business processes to need changes and require management.
answer

New computer hardware is available.
question

?________ is the standard set of terms and graphical notations for documenting business processes.
answer

Business process modeling notation? (BPMN)
question

In considering the? trade-offs for systems development? processes, what could cause diseconomies of? scale?
answer

Adding more people
question

Process and systems development will evolve in the following ways in the next 10? years, EXCEPT? ________.
answer

systems will become less integrated
question

Among the following statements about information systems? development, which one is? FALSE?
answer

Systems development always aims at a fixed target.
question

Which of the following is NOT one of the reasons for the problems with? SDLC?
answer

Lack of implementation training for users
question

In the? future, software vendors will find ways to make their solutions more agile using? ________ and Web services.
answer

SOA
question

In a BPMN process? diagram, you can use? ________ to simplify process diagrams and draw attention to interactions.
answer

?swim-lane layout
question

Among the? following, what is NOT a typical characteristic of a successful project? team?
answer

Team composition remains fixed during the project.
question

Which of the following personnel do NOT play a role in the applications development? process?
answer

Business analysts
question

In a BPMN process? diagram, a? ________ represents the start of a process.
answer

?thin-lined circle
question

The main problem of the SDLC approach to systems development is the? ________ nature of the process.
answer

waterfall
question

Which of the following is NOT one of the dimensions of? feasibility?
answer

Planning
question

The correct sequence for the five phases in the systems development life cycle? (SDLC) process is? ________.
answer

System? definition; requirements? analysis; component? design; implementation; system maintenance
question

In a? ________ installation, the new system runs alongside the old one until it has been tested and is fully operational.
answer

parallel
question

Among the following? statements, which one is NOT a key to success of SDLC? projects?
answer

Do not adjust the plan via? trade-offs.
question

Which of the following statements does NOT represent an essential of the scrum? process?
answer

Large complex projects can be managed with scrum.