Management Information Systems – Test 1 – Flashcards
Unlock all answers in this set
Unlock answersquestion
An organization's information technology architecture
answer
integrates the information requirements of the organization and all users
question
Which of the following is an IT job within an organization?
answer
Program Manager CIO System Analyst Network Manager
question
___ consists of information that has been processed to convey expertise as it applies to a business problem.
answer
Knowledge
question
Telepresence systems can help make ___________ a more popular choice for small and medium enterprises
answer
global outsourcing
question
_____ is (are) data that have been organized to have meaning and value to a recipient.
answer
Information
question
Which of the following is NOT a characteristic of today's business environment?
answer
Static
question
The title of the executive who is in charge of the people who design and build information systems, the people who use those systems, and the people responsible for managing those systems is
answer
CIO
question
Which of the following is a useful, cost-effective, hands-on, and safe teaching tool in the medical field?
answer
Simulation environments
question
IT affects middle managers by _______________.
answer
Increasing their productivity
question
If Amazon uses a list of all your purchases (books bought, price paid, dates) to recommend other books to you, then Amazon can be said to be applying _____.
answer
Knowledge
question
Which of the following statements concerning the management of information resources is NOT true?
answer
Managing mainframes has become more difficult
question
Managing information systems in a modern organization is challenging because:
answer
The systems are very expensive to acquire, operate, and maintain. & the systems are critical to the organization's operations.
question
_____ is/are the computer hardware, software, and communications technologies that are used by IT personnel to produce IT services.
answer
IT components
question
Global outsourcing helps an organization to:
answer
Implement spatial and temporal flexibility. Find the best person for the job. Find more economical resources.
question
_____ conveys understanding, accumulated learning, and expertise as they apply to a current problem
answer
Knowledge
question
The list of all your purchases from Amazon (books bought, price paid, dates) is defined as ___________
answer
Information
question
A listing of all courses offered at your university would be considered _____, whereas a listing of all courses required in your major would be considered _____.
answer
Data, information
question
Which of the following is NOT a benefit of being an informed user of IT?
answer
Working in the IT side of the organization
question
HR information systems, POM information systems, CRM information systems, and marketing information systems are usually classified as:
answer
Functional area information systems
question
An organization's _____ consists of the physical facilities, IT components, IT services, and IT management that will support the entire organization.
answer
information technology infrastructure
question
An organization's IT components include all of the following except:
answer
Procedures
question
Today's customers have ________ .
answer
higher expectations
question
In today's business environment, it is rare for a company not to have a significant Web presence. This trend can be attributed primarily to:
answer
technological pressures
question
The digital divide is an example of which type of societal pressure?
answer
social responsibility
question
Which of the following is not an example of the growing initiative called green IT?
answer
Building computer applications that use less energy.
question
Which strategy for competitive advantage involves offering different products, services, or product features?
answer
differentiation
question
The Surui Tribe of the Amazon: The Surui Tribe's use of technology demonstrates how IT can be used to
answer
to prevent deforestation
question
Reconciling bank accounts is an example of a(n):
answer
Accounting Business Process
question
Which of the following statements concerning business processes is false?
answer
A process cannot cross functional area boundaries.
question
Producing identical items in large quantities is called:
answer
mass production
question
While referring to competitive advantage and strategic information systems, which of the following is NOT a primary activity?
answer
procurement
question
A(n) _____ is a collection of related activities that produce a product or a service of value to an organization.
answer
business process
question
Which of the following processes involves the warehouse, purchasing, and accounting functional areas?
answer
Procurement
question
Which of the following statements concerning technology pressures on modern businesses is true?
answer
New technologies offer alternative service options.
question
Which of the following processes involves the warehouse, sales, and accounting functional areas?
answer
Fulfillment
question
The term "digital divide" refers to the gap between:
answer
Individuals who have access to information and communication technologies and those who do not.
question
Which strategy for competitive advantage involves improving the manner in which an organization executes its internal business processes?
answer
operational effectiveness
question
Business pressures on organizations are created when there are changes in
answer
Business pressures on organizations are created when there are changes in
question
Which one of the following statements is false?
answer
Government deregulation reduces competition.
question
Market pressures include which of the following?
answer
the global economy
question
The radical redesign of business practices to reduce costs and increase quality is called:
answer
BPR
question
___ is a less radical, less disruptive approach to redesigning business processes
answer
BPM
question
Which strategy for competitive advantage involves introducing new products and putting new features in existing products?
answer
innovation
question
The workforce in developed countries is exhibiting all of the following trends except:
answer
It includes fewer people with disabilities
question
Managing pay and payroll is an example of a(n):
answer
Human Resources Business Process
question
Business-IT alignment refers to the synchronization of a company's IT operations with its:
answer
business objectives
question
Producing customized items in large quantities is called:
answer
mass customization
question
A _____ is a document that grants the holder exclusive rights on an invention for 20 years
answer
patent
question
The term _____ refers to clandestine software that is installed on your PC through duplicitous channels but is not particularly malicious.
answer
alien software
question
In _____, the organization takes concrete actions against risks.
answer
risk mitigation
question
Which of the following statements is false?
answer
it is easy to assess the value of a hypothetical attack
question
Biometrics are an example of:
answer
something the user is
question
A _____ is any danger to which an information resource may be exposed.
answer
threat
question
Which of the following is(are) designed to use your computer as a launch pad for sending unsolicited e-mail to other computers?
answer
spamware
question
The most overlooked people in information security are:
answer
janitors and guards
question
Employees in which functional areas of the organization pose particularly grave threats to information security?
answer
human resources, management information systems
question
Access controls involve _____ before _____.
answer
authentication, authorization
question
_____ are segments of computer code that attach to existing computer programs and perform malicious acts.
answer
Viruses
question
_____ involves building an inappropriate trust relationship with employees for the purpose of gaining sensitive information or unauthorized access privileges.
answer
social engineering
question
Organizations use hot sites, warm sites, and cold sites to insure business continuity. Which of the following statements is not true?
answer
a hot site needs to be located close to the organization's offices
question
In a _____ attack, a coordinated stream of requests is launched against a target system from many compromised computers at the same time.
answer
distributed denial-of-service
question
Which of the following is not a strategy for mitigating the risk of threats against information?
answer
continue operating with no controls and absorb any damages that occur; transfer the risk by purchasing insurance; install controls that block the risk; implement controls that minimize the impact of the threat
question
A pharmaceutical company's research and development plan for a new class of drugs would be best described as which of the following?
answer
a trade secret
question
_____ are segments of computer code embedded within an organization's existing computer programs that activate and perform a destructive action at a certain time or date
answer
logic bombs
question
The cost of a stolen laptop includes all of the following except:
answer
backup costs
question
Voice and signature recognition are examples of:
answer
something the user does
question
_____ are software programs that hide in other computer programs and reveal their designed behavior only when they are activated
answer
trojan horses
question
Passwords and passphrases are examples of:
answer
something the user knows
question
An information system's _____ is the possibility that the system will be harmed by a threat
answer
vulnerability
question
A _____ is intellectual work that is known only to a company and is not based on public information.
answer
trade secret
question
_____ is the process in which an organization assesses the value of each asset being protected, estimates the probability that it will be compromised, and compares the probable costs of an attack with the costs of protecting the asset
answer
risk analysis
question
In _____, the organization purchases insurance as a means to compensate for any loss.
answer
risk transference
question
You start a new job, and human resources gives you a ten-page document that outlines the employee responsibilities for information security. Which of the following statements is most likely to be true?
answer
you are expected to read the document, and you could be reprimanded if you don't follow its guidelines
question
Cybercriminals can obtain the information they need in order to assume another person's identity by
answer
infiltrating an organization that stores large amounts of personal information; phishing; hacking into a corporate database; stealing mail
question
A _____ attack uses deception to fraudulently acquire sensitive personal information by masquerading as an official e-mail.
answer
phishing
question
_____ controls are concerned with user identification, and they restrict unauthorized individuals from using information resources.
answer
access
question
If broadband is not available in your area, which fo the following Internet connection methods would allow you to connect to the Internet?
answer
satellite
question
A collection of the following devices ? two desktop computers, three laptops, two smart phones and a printer ? can be described as a(n):
answer
LAN
question
_____ portals support communities such as hobby groups or a political party.
answer
affinity
question
The popularity of online classes and online universities can be attributed to which of the following network applications?
answer
Discovery Communications Collaboration
question
Network protocols describe
answer
The rules for communication within the network.
question
__________ are high speed central networks to which multiple smaller networks connect
answer
corporate backbone networks
question
A single point of entry to an entire community of common interests is:
answer
affinity portal
question
Most Internet search engines maintain an index of billions of Web pages. These indexes are updated using:
answer
automated webcrawlers
question
Networks enable which of the following applications?
answer
Discovery Communications Collaboration
question
With _____, phone calls are treated as just another kind of data.
answer
voice over IP
question
Place the different types of computer networks in size order, ranging from smallest to largest.
answer
PAN-LAN-MAN-WAN
question
Workflow, groupware, and telepresence systems are examples of which network application?
answer
collaboration
question
The least expensive cable medium is:
answer
twisted-pair wire
question
Many organizations have implemented corporate portals for which of the following reasons?
answer
To cut costs To free up time for busy managers To improve profitability To offer customers self-service opportunities
question
Which of the following is not a basic function of transmission control protocol?
answer
analyzing the packets for size
question
A network that connects computing devices within the same building is:
answer
LAN
question
IPv6 will allow for ___ unique IP addresses
answer
2128
question
An Intranet that allows limited access to its partners, suppliers, and customers is called a(n):
answer
extranet
question
Where in a domain name do you find the top-level domain (TLD)?
answer
all the way to the right
question
With _____, phone calls are treated as just another kind of data
answer
voice over internet protocol
question
Workflow, groupware, and telepresence systems are examples of which network application?
answer
collaboration
question
A high-speed network that connects a firm's LANs and WANS is:
answer
backbone network