IT 101 Exam 3 – Flashcards
Unlock all answers in this set
Unlock answersquestion
1. In an expert system, the ____ is the component that delivers the expert advice.
answer
inference engine
question
2. For many businesses, robots are used to do the three Ds, dull, dirty, and ____.
answer
dangerous
question
3. After knowledge is created, it is typically stored in a ____.
answer
explanation facility
question
5. The haptic interface, relays the sense of ____ in the virtual world.
answer
touch
question
____ involves converting sound waves into words.
answer
Voice recognition
question
7. ____ is a combination of software and hardware that allows a computer to change how it functions or reacts to situation based on feedback it receives.
answer
Learning systems
question
8. The ____ stores all relevant information, data, rules, cases, and relationships that the expert system uses.
answer
knowledge base
question
9. The ____ is a top-level executive who helps the organization work with a knowledge management system to create, store, and use knowledge to achieve organizational goals.
answer
CKO
question
10. The expert system knowledge acquisition facility serves as an interface between ____.
answer
Experts and Knowledge base
question
11. ____ is a file conversion program that can be used to compress multimedia files to make them easier to download from the Internet or send as an e-mail attachment.
answer
WinZip
question
12. ____ knowledge is hard to measure and document and typically is not objective or formalized.
answer
Tacit
question
13. When video files are played while being downloaded from the Internet, it is called ____.
answer
Video Streaming
question
14. At the initial artificial intelligence conference at Dartmouth College in 1956, many AI pioneers predicted that computers would be as "smart" as people by the ____.
answer
1960s
question
15. ____ has the potential to superimpose digital data over real photos do that GPS maps can be combined with real pictures of stores and streets to help you locate your position.
answer
Augmented reality
question
16. The ____ is the person or group with the expertise or knowledge the expert is trying to capture.
answer
Domain Expert
question
17. The ____ is NOT a key component of an expert system.
answer
Data Warehouse
question
18. ____ tags contain small chips with information about products or packages that can be quickly scanned to perform inventory control or trace a package as it moves through the supply chain.
answer
RFID
question
19. The genetic algorithm approach is based on the theory of evolution that requires (1) variation and (2) ____.
answer
Natural Selection
question
20. ____ were early programming languages developed for and used in artificial intelligence applications.
answer
LISP and Prolog
question
21. _____ is an audio file format.
answer
All of the Above
question
22. Graphic images can be stored in a variety of formats including ____.
answer
Jpeg and GIF
question
23. Special purpose systems that help overcome disabilities or improve health are called ____.
answer
Assistive technology
question
24. ____ can process many pieces of data at the same time and learn to recognize patterns.
answer
Neural Networks
question
25. ____ involves the use of information systems to develop competitive strategies for people, organizations, or even countries.
answer
Game Theory
question
1. ____ results in an installed, operational information system that meets the business needs for which it was developed.
answer
Systems implementation
question
2. The primary outcome of the systems analysis phase is ____.
answer
A prioritized list of system requirements
question
3. Entity-relationships diagrams are used to perform ____.
answer
Data Modeling
question
4. ____ is an assessment of whether the hardware, software, and other system components can be acquired or developed to solve the problem.
answer
Technical feasibility
question
5. ____ determines whether the project can be completed in a reasonable amount of time.
answer
Schedule feasibility
question
6. During the _____ phase of the systems development life cycle, people attempt to answer the questions "What must the information system do to solve the problem?"
answer
System Analysis
question
7. The _____ system development approach requires cooperation and frequent face-to-face meetings with all project participants as they modify, refine, and test how the system meets users' needs and what its capabilities are.
answer
Agile Development
question
8. Organizations are using outsourcing for system development in order to ____.
answer
All of the above
question
9. The second level in the capability maturity model is ____.
answer
Repeatable
question
10. A professional who specializes in analyzing and designing business systems is called a(n) ____.
answer
Systems analyst
question
11. The first of the systems implementation tasks is ____.
answer
Hardware acquisition
question
12. The purpose of system design is to answer the question ____.
answer
"How will the information system solve a problem?"
question
13. Based on _____, managers make decisions regarding the initiation of each system investigation for potential IS projects.
answer
All of the above
question
14. The training of end users is an important task in the ____ phase of a systems development project.
answer
Systems implementation
question
15. The process of readying managers, decision makers, employees, stakeholders, and others for the new system is called ____.
answer
User preparation
question
16. During the ____ phase of the system development process, potential problems and opportunities are identified and considered in light of the goals of the business.
answer
Systems investigation
question
17. Activities on the critical path of a project have ____ slack time.
answer
Zero
question
18. The systems steering committee ____.
answer
Might suggest a change in project focus
question
19. The systems analysis concludes with a formal system analysis report that includes ____.
answer
All of the above
question
20. Environmental design involves systems development efforts that ____.
answer
• Results in systems that can be disposed of in a manner that does not negatively affect the environment
question
21. The process of physically placing the computer equipment on the site and making it operational is called ____.
answer
Installation
question
22. In a data flow diagram, the ____ symbol reveals a function that is being performed.
answer
Process symbol
question
23. ____ is likely to affect the quality of the systems development effort.
answer
All of the above
question
24. Data flow diagrams ____.
answer
Describe the activities that accomplish a business task
question
25. _____ takes an iterative approach to the systems development process.
answer
Prototyping
question
1. ____ involves publishing an intentionally false written statement that is damaging to a person's or an organization's reputation.
answer
Libel
question
2. A good example of a useful policy to minimize waste and mistake is ____.
answer
Users should implement proper procedures to ensure correct input data
question
3. The ____ requires all financial service institutions to communicate their data privacy rules and honor customer preferences on sharing of data.
answer
Gramm-Leach-Bliley Act
question
4. The ____ prohibits the government from intercepting electronic messages unless it obtains a court order based on probable cause.
answer
Electronic Communications Privacy Act
question
5. Originally, a(n) ____ was a person who enjoyed computer technology and spent time learning and using computer systems.
answer
Hacker
question
6. Most companies have implemented stringent policies on the acquisition of computer systems and equipment requiring ____.
answer
All of the above
question
7. A useful guideline to protect corporate computers from criminal hackers is to ____.
answer
• Install antivirus software on all computers
question
8. A small program hidden in a network or computer system that records identification numbers and passwords is called a(n) ____.
answer
Password sniffer
question
9. The Leads Online Web-based service system is used by law enforcement to ____.
answer
Recover stolen property
question
10. The Privacy Act of 1974 ____.
answer
Applies only to certain federal agencies
question
11. ____ is an aggravation of the pathway for the nerves that travel through the wrist.
answer
Carpal tunnel syndrome
question
12. The practice of disguising illegally gained funds so that they seem legal is called ____.
answer
Money laundering
question
13. If a court determines that a patent infringement is intentional, it can award up to ____ to the patent holder.
answer
Three times the amount of damages claimed by the patent holder
question
14. A ____ is a set of programs that enables its user to gain administrator level access to a computer or network.
answer
Rootkit
question
15. A job that requires sitting at a desk and using a computer all day can lead to ____.
answer
All of the above
question
16. Roughly ____ of U.S. employers monitor their employees Web surfing activities.
answer
75%
question
17. Computer users who work at their machines for several hours a day, should ____.
answer
•Consider the use of artificial tears
question
18. ____ is a screening technology that shields users from sites that do not provide the level of privacy protection they desire.
answer
Platform for Privacy Protection
question
19. Legislation that requires businesses to prove that they are securing their data is ____.
answer
All of the Above
question
20. The ____ requires telephone companies to turn over customer information, including numbers called, without a court order if the FBI claims that the records are relevant to a terrorism investigation.
answer
USA Patriot Act
question
21. Proper use of antivirus software requires that it is ____.
answer
Used to scan all removable storage media before copying or running programs from them
question
22. A ____ is a variable value that is applied using an algorithm to a string or block of unencrypted text to produce encrypted text or to decrypt encrypted text.
answer
Key
question
23. The European Union has a data protection directive that requires firms transporting data ____ to have certain privacy procedures in place.
answer
Across national boundaries
question
24. ____ have extra knowledge that make them especially dangerous - they know logon ids, passwords, and company procedures that help them evade detection.
answer
Insiders
question
25. A ____ is a type of malware that executes when specific conditions occur.
answer
Logic bomb
question
4. The ____ allows the expert system user to understand how the system arrived at its results.
answer
explanation facility
question
A new knowledge base must be built for each new expert system application. T/F
answer
True
question
Disadvantages associated with expert systems are that they can be difficult, expensive, and time consuming to develop.T/F
answer
True
question
On the Internet, Java applets and animated GIF files can be used to create moving images.T/F
answer
True
question
Neugents are neural intelligence agents that "learn" patterns and behaviors and predict what will happen next.T/F
answer
True
question
Many groups use patents, copyrights, trade secrets, and Internet firewalls to keep prying eyes from seeing important knowledge that is expensive and hard to create.T/F
answer
True
question
Expert systems cannot be used at a number of different locations at the same time by different sets of users.T/F
answer
False
question
Secretaries, administrative assistants, bookkeepers, and similar data-entry people are often called data workers.T/F
answer
True
question
Research is ongoing to directly connect the human brain and have human thought control computer activities.T/F
answer
True
question
The technology used to create 3D movies is now being used to help design products and in 3D TV.T/F
answer
True
question
Disadvantages associated with expert systems are that they can be difficult, expensive, and time consuming to develop.T/F
answer
True
question
The user interface makes an expert system easier to both develop and use.T/F
answer
True
question
A study found that a consulting firm was able to earn greater than 1000% return on its knowledge management system.T/F
answer
True
question
A genetic algorithm can be used to search the vast resources of the Internet to find information on any topic.T/F
answer
False
question
An expert system can use cases to develop the solution to a problem by finding cases stored in the knowledge base that are similar to the problem at hand and then modifying the solution to the cases to fit the current problem.T/F
answer
True
question
Computerized AI chess software can "learn" to improve while playing human competitors.T/F
answer
True
question
Many organizations actively attempt to convert tacit knowledge to explicit knowledge.T/F
answer
True
question
Reinforcement learning is a learning system involving sequential decisions with learning taking place in between each decision.T/F
answer
True
question
Expert systems, robotics, vision systems, natural language processing, learning systems, and neural networks are all part of the broad field of artificial intelligence.T/F
answer
True
question
As of this time, there are no practical business applications of the genetic algorithm problem solving approach.T/F
answer
False
question
Many organizations actively attempt to convert tacit knowledge to explicit knowledge.T/F
answer
True
question
After entering the appropriate attributes, the knowledge acquisition facility correctly stores information and relationships in the knowledge base, making the knowledge base easier and less expensive to set up and maintain.T/F
answer
True
question
Research is ongoing to develop a robotic suit to help paraplegics and stroke victims move so they can perform basic functions.T/F
answer
True
question
Hardware and software acquisition, user preparation, and site and data preparation are all part of the system design process.T/F
answer
False
question
A parallel start-up involves running the new system for one group of users while the rest of the users still run the old system.T/F
answer
False
question
Developing new systems in an environmentally sensitive way is becoming less and less an important considerations.T/F
answer
False
question
Proper planning can guarantee that projects will not fall behind schedule, go over budget, or not meet expectations.T/F
answer
False
question
An organization may have to hire and train new IS personnel as part of the effort to implement a new information system.T/F
answer
True
question
The systems development team, accepts a given set of information system objectives and delivers a system that meets those objectives.T/F
answer
False
question
System users and system stakeholders are essentially the same set of people.T/F
answer
False
question
Technical feasibility is an assessment of the technical, economic, legal, operational, and schedule feasibility of a project.T/F
answer
False
question
Vendor proposals are typically evaluated in a two-phase process that includes a preliminary evaluation and a final evaluation.T/F
answer
True
question
Most organizations avoid using outside resources to perform systems development.T/F
answer
False
question
The logical design phase refers to how the tasks are accomplished, including how the components work together and what each component does.T/F
answer
False
question
The overall purpose of requirements analysis is to determine user, stakeholder, and organizational needs.T/F
answer
True
question
Managers and employees in all functional work areas are helping with systems development and, in many cases, leading the way.T/F
answer
True
question
Apple's application store is called AppWorld while Blackberry's store is called App Store.T/F
answer
False
question
The systems maintenance form is a document that is filled out by someone who wants the IS department to initiate systems investigation.T/F
answer
False
question
Data about the problems or needs for the new system can come from both sources internal and external to the organization.T/F
answer
True
question
Getting users and stakeholders involved in systems development is not critical to the success of a systems development effort.T/F
answer
False
question
Each generation of a prototype is a refinement of the previous generation based on user feedback.T/F
answer
True
question
The IS plan translates strategic and organizational goals into specific information system requirements.T/F
answer
False
question
The capability maturity model is a measure of the maturity of the software development process in an organization.T/F
answer
True
question
Once the new system development process has begun, management cannot call a stop to the effort.T/F
answer
False
question
Developing information systems that meet both end user and organizational needs and delivering them on time and within budget is a relatively easy and straight forward process.T/F
answer
False
question
Information systems planning transforms organizational goals outlined in the strategic plan into specific system development activities.T/F
answer
True
question
Copyright laws protect processes, machines, and compositions of matter.T/F
answer
False
question
Recent court cases and police reports involving computer crime show that lawmakers are not yet ready to introduce newer and tougher computer crime legislation.T/F
answer
False
question
Over one-fourth of office workers spend in excess of 90 minutes per week at work viewing adult pornographic Web sites.T/F
answer
True
question
It has been clearly proven that increased use of cell phones can lead to an increased chance of brain cancer.T/F
answer
false
question
Federal law prohibits private employers from monitoring e-mail sent or received by their employees.T/F
answer
False
question
Because of the importance of maintaining accurate data and of people understanding their responsibilities, companies converting to ERP and e-commerce systems invest weeks of training for key users of the system's various modules.T/F
answer
True
question
The vast majority of computer-related crimes are reported to authorities.T/F
answer
False
question
Fingerprint authentication devices to provide security in the PC environment are sometimes employed rather than passwords.T/F
answer
True
question
While a virus can completely halt the operation of a computer system, it is incapable of destroying programs or data.T/F
answer
False
question
The use of e-mail among public officials might violate "transborder data flow" laws.T/F
answer
False
question
The patent review and granting process of the U.S. Patent Office is generally conceded to be one of the most smoothly functioning processes of the U.S. government.T/F
answer
False
question
The National Infrastructure Protection Center serves as a focal point for threat assessment, warning, investigation, and response to cyberterrorism attacks against the country's critical infrastructure.T/F
answer
False
question
Rejected e-mail automatically goes to the junk e-mail of your e-mail service.T/F
answer
True
question
When waste is identified, it usually points to one common cause: the improper management of information systems and resources.T/F
answer
True
question
Unfortunately, many Intrusion Detection Systems frequently provide false alarms that result in wasted effort.T/F
answer
True
question
Flexibility is a major component of ergonomics and an important feature in computer devices.T/F
answer
True
question
All U.S. companies are required to have privacy policies.T/F
answer
False
question
Posting information to the Internet using anonymous e-mail accounts or screen names makes it impossible to identify the poster.T/F
answer
False
question
Cyberterrorists are believed to have invaded the U.S. power grid and planted software that could interrupt the system during a time of crises or war.T/F
answer
True
question
Few small and medium sized organizations are willing to outsource their network security operations.T/F
answer
False
question
Deleting the contents of the Recycle Bin makes it impossible for individuals to view the deleted data.T/F
answer
False
question
To protect your PC and prevent it from spreading malware to your co-workers, some antivirus software scans and cleans both incoming and outgoing e-mail messages.T/F
answer
True
question
The CAN-SPAM Act allows the sending of most e-mail spam as long as it adheres to two basic forms of compliance related to how receivers can unsubscribe and the content of the e-mail.T/F
answer
False