exam #1 Flashcards

(118 cards)

1
Q

managers can help their organizations gain __ through cost leadership, differentiation, or focus.

A

competitive advantage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which component of Leavitt’s Diamond defines roles, responsibilities, and lines of authority among members of the organization, which must be understood and accepted for the organization to operate successfully?

A

structure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following is NOT one of the four main components in Leavitt’s Diamond?

A

systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

_____ is/are considered to be the most important element in computer-based information systems.

A

people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following components forms the foundation of every computer-based information system and includes resources such as hardware, software, and data center facilities?

A

tech. infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following components forms the foundation of every computer-based information system and includes resources such as hardware, software, and data center facilities?

A

procedure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In terms of information systems, a collaboration tool that helps a team communicate, organize, plan, schedule, track, and delegate jobs would be an example of _________.

A

a workgroup info. system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Companies that share data with other organizations in a manner that conforms to rigidly defined industry standards are using a type of _____.

A

interorganizational info. system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The concept of a value chain is meaningful to tax preparers and restaurants because these businesses _____.

A

add value to their products and services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following is considered a primary rather than a support process within a supply chain?

A

marketing and sales

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The process that helps managers identify initiatives and projects that will achieve organizational objectives is known as _____.

A

strategic planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Autumn develops a strategic plan that will allow her organization to take advantage of opportunities and trends by _____.

A

being proactive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Fabiola’s IS management team is formulating their IS strategic plan. Fabiola reminds them that they must consider _____.

A

corporate strategy and business unit strategies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Corporate strategy, business unit strategies, innovative thinking, and technology innovations are all _____.

A

drivers that set info. systems organizational strategy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. When an IS organization is viewed as a cost center/service provider:
A

the strategic planning process is typically directed inward and focused on determining how to do what it is currently doing but doing it cheaper, faster, and better

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

When an IS organization is viewed as a game changer:

A

their strategic planning process is outwardly focused and involves meeting with customers, suppliers, and leading IS consultants and vendors to answer questions like “What do we want to be?”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Because Marcus works within an IS organization viewed as a cost center and service provider by the rest of his organization, one of his major goals is to _____.

A

consolidate IS resources and eliminate redundant functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

When an IS organization is viewed as a business partner/business peer:

A

the strategic planning process is based on understanding the collective business plans for the next year and determining what those mean for the IS organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

ou might be a successful information systems worker if you _________.

A

enjoy learning new techniques and enjoy working with people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Important functions of the chief information officer include

A

employing an IS department’s equipment and staff to help the organization reach its goals.
monitoring the financial considerations of the IS department, such as return on investment.
ensuring the organization complies with laws and regulations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

In a large IS organization, the professional who is responsible for maintaining the security and integrity of the organization’s systems and data is the __________.

A

info sys security analyst

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which of the following is NOT a task typically associated with the systems analyst role?
a. conveying system requirements to software developers and network architects
b. troubleshooting problems after implementation
C. collaborating with others to build a software product from scratch
d. choosing and configuring hardware and software

A

collaborating with others to build a software product from scratch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Tim relies on his solid analytical and decision-making skills when converting a program design he receives from Minnie, the systems analyst, to a working program written in one of the languages used at his firm. Who is Tim?

A

a programmer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Clive completes specific coursework provided by a vendor to help him prepare to take an examination so that he can obtain _____.

A

a certification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Suppose you need to advise someone about getting a certification. Which of the following will be appropriate advice?
Certifications are often vendor-specific.
26
Finn designs and sells screen-printed t-shirts. He is reviewing sales data from previous years to decide which colors are the most popular, and would therefore be the best investments for his next batch of t-shirts. This is an example of _________.
business analytics
27
In computing, an attack on an information system that takes advantage of a particular system vulnerability is called a(n) _______.
exploit
28
Which of the following is considered the most likely source of cyberattacks, based on a poll of global executives, information security managers, and IT leaders?
careless insiders
29
After being passed over for a promotion, an accountant accesses his firm's database and deletes or alters key information in an effort to take revenge on his superiors. This is an example of a cyberattack initiated by _____.
a malicious employee
30
Debbie is a programmer who attacks corporate computer networks for financial gain. She is a _____.
cybercriminal
31
Someone who attempts to destroy the infrastructure components of governments is known as a ______________.
cyberterrorist
32
Someone who violates computer or Internet security maliciously or for illegal personal gain is known as a(n) _______.
lone wolf attacker
33
A hacktivist is someone who _______.
hacks computers or Web sites in an attempt to promote a political ideology
34
Once a _____ is installed, the attacker can gain full access to the computer.
rootkit
35
The attack vector that relies on email messaging to deceive the victim into revealing personal data is known as _____.
phishing
36
A hacker writes some programming code that will cause a computer to behave in an unexpected and undesirable manner, but disguises it as something else to make it difficult to detect. Which attack vector has this attacker chosen to use?
virus
37
Viruses and worms are both attack vectors, but they differ in that _____.
worms can propagate without human intervention
38
Your business has a web server that has suddenly become unresponsive. When you study the server's logs there are a huge number of requests from what appear to be legitimate computers. The problem is likely because of _____.
a distributed denial-of-service attack
39
A botnet is a ____.
network of computers that send out access requests to servers repeatedly
40
After a successful cyberattack, the funds spent on repairing affected systems, restoring lost data, and performing a post-incident analysis are considered part of the _____.
business disruption
41
Why is an iceberg, most of which is underwater, an appropriate analogy for the consequences of a cyberattack?
most people only think of the direct impact of the attack, not the many other, oft-hidden effects
42
Thanks to the Identity Theft and Assumption Deterrence Act, _____.
identity theft is a federal crime for which perpetrators may be sentenced to up to 15 years in prison.
43
Your ex-colleague was apprehended and charged with a crime based on the Fraud and Related Activity in Connection with Access Devices Statute. He was caught using unauthorized or stolen _________.
credit cards
44
Which of the following activities does the USA Patriot Act define?
cyberterrorism
45
A company's risk assessment process can consider numerous threats to the computers and networks. Which of the following should an organization identify as loss events or threats to assess?
distributed denial-of-service attack email attachment with harmful worm harmful virus
46
Which of the following is the correct description of a firewall?
a software and hardware combination that limits incoming and outgoing Internet traffic
47
While conducting a security self-assessment of his personal laptop use, Vann realizes that he is putting himself at risk by _____.
putting off installing available software updates that he has been notified about
48
Many organizations outsource their network security operations to a(n) _____.
MSSP
49
What discipline combines elements of law and computer science to identify, collect, examine, and preserve data from computer systems, networks, and storage devices in a manner that preserves the integrity of the data gathered so that it is admissible as evidence in a court of law?
computer forensics
50
A data breach at your business resulted in the loss of some customer data. Several angry customers have filed charges. What is a recommended course of action to prepare for future events?
activate the forensics analysis team and prepare documentation
51
It is not against the law for Ethel to possess an automatic weapon, but she believes possessing one is the wrong thing to do. For Ethel, possessing an automatic weapon is _____.
legal but unethical
52
Robin Hood famously steals from the rich to give to the poor. Robin considers this his moral responsibility because he believes it is unjust for a few wealthy people to live in luxury while many others struggle to meet their basic needs. Given that it is against the law to steal, for Robin, his activities are _____.
illegal but ethical
53
While giving her students a physics exam, Professor Thompson noticed that Jack, one of her students who has been struggling with the course material, appeared to be copying answers from Graydon, one of the best students in the class. She decides that she should compare their answers when the class period is over before deciding what to do about the situation. In which phase of the ethical decision-making process is Professor Thompson?
developing a problem statement
54
Graydon noticed Jack, his friend and classmate, cheating on a physics exam and now he is trying to decide what to do about it. He knows he could keep quiet about it, but that would violate his moral values, plus the school's code of ethics requires students to report incidents of cheating. On the other hand, if he reports the incident, both his friend and probably all of their other friends will be mad at him. In which phase of the ethical decision-making process is Graydon?
identifying alternatives
55
The 2,000-year-old Hippocratic oath, which medical schools offer as an affirmation to their graduating classes, is considered an example of _____.
a professional code of ethics
56
A professional _____ states the principles and core values that an organization wishes to develop in its leaders and members and therefore defines desired behavior in these individuals.
code of ethics
57
Which of the following statements about professional organizations for information systems professionals is true?
many codes of ethics have been developed by IS professional organizations and can be accessed on their Web sites.
58
What can you obtain for free once a year from three key agencies in order to find out what is stored about you in existing databases?
credit report
59
Which federal statute protects individuals against unreasonable searches and seizures by requiring warrants to be issued only upon probable cause?
4th amendent
60
The _____ requires telephone companies to hold customer telephone records and Internet metadata and to respond to queries about from the National Security Agency if the agency can prove that the records are relevant to a terrorism investigation.
USA freedom act of 2015
61
Which country has both the largest online population and probably the most rigorous Internet censorship in the world?
china
62
Which of the following legislation protects Facebook, Twitter, and other social networking organizations from defamation suits in connection with posts made by their users?
section 230 of the communications decency act
63
Anne and Jordan have two preteen sons and they're concerned about what their kids might see and share on the Internet. They should probably invest in _______.
filtering software
64
_____ involves publishing an intentionally false written statement that is damaging to a person's or an organization's reputation.
libel
65
Which of the following is a defining feature of a safety-critical software system?
defects could result in human injury
66
Completing an instruction involves two phases—instruction and execution—which are each broken down into two steps for a total of four steps. Which of the following is NOT one of the four steps?
process data
67
CPU clock speed is the predetermined rate at which the processor _____.
produces a series of electronic pulses
68
The simultaneous execution of two or more instructions at once by a computer is known as _____.
multiprocessing
69
_____ is the use of a collection of computers, often owned by many people or different organizations, to work in a coordinated manner to solve a common problem
grid computing
70
The component of a computer that provides the CPU with a working storage area for program instructions and data is called the __________.
main memory
71
A type of memory whose contents are not lost if the power is turned off or interrupted is said to be _____.
nonvolatile
72
A(n) _____ device provides data and instructions to the computer and receives results from it.
input/output
73
3D printing is ________.
used to make solid objects from filaments or powder
74
Helen is 72 years old and is a retired school teacher on a fixed income. She would like to buy a new computer so that she can communicate via email, follow friends and family on social media, and occasionally access recipes and gardening tips from the Web. An important thing to consider is that Helen has arthritis in her hands, making it difficult for her to work with small buttons and gadgets. So, of the following options, her best choice is probably a(n) ________.
nettop
75
A _____ is a computer employed by many users to perform a specific task, such as running network or Internet applications.
server
76
The class of computer systems used by multiple concurrent users offers businesses the potential to increase their processing capability to handle more users, more data, or more transactions in a given period, which is known as _____.
scalability
77
_____ are the most powerful computers with the fastest processing speed and highest performance.
supercomputers
78
A _____ is a climate- and access-controlled building or a set of buildings that houses the computer hardware that delivers an organization’s data and information services.
data center
79
What criteria are used by the Uptime Institute to classify data centers into four tiers?
expected annual downtime, fault tolerance, and power outage protection
80
_____ is an approach concerned with the efficient and environmentally responsible design, manufacture, operation, and disposal of IS-related products.
green computing
81
The _____ is the heart of the operating system and controls its most critical processes.
kernel
82
45. All of the following are examples of activities performed by an operating system EXCEPT ________.
providing word processing capabilities to users
83
An operating system with _____ capabilities allows a user to run more than one program concurrently
multitasking
84
An information system that operates in the _____ sphere of influence supports teamwork between two or more people who work together to achieve a common goal, regardless of where those team members live.
workgroup
85
Suppose you wish to run two different operating systems on one server. You can accomplish this by using _______.
virtualization software
86
New cars come with onboard computer systems that control antilock brakes, air bag deployment, fuel injection, etc. They run operating system software known as ____.
an embedded operating system
87
When a business wishes to move away from hosting its own applications, a solution that offers many advantages is to use ______.
microsoft office
88
Currently, though many different programming languages are used, most software is developed using _____.
an integrated development environment
89
_____ is an open-source operating system whose source code is freely available to everyone.
linux
90
Raw facts such as a social security number or catalog item number for a shirt are known as _____.
data
91
When rules and relationships are set up to organize raw facts, creating value beyond that of those individual facts, this produces _____.
information
92
A collection of characteristics that belong to a single person, place, or thing for which data is maintained is a(n) _____.
record
93
A(n) _____ is a characteristic or set of characteristics in a record that uniquely identifies the record.
primary key
94
A group of programs used to access and manage a database as well as provide an interface between the database and its users and other application programs is called a _____.
database management system
95
Mollie's company is having problems with their data integrity because multiple database users sometimes access and alter a record at the same time. A database management system could eliminate these problems by implementing _____.
concurrency control
96
What process detects and then corrects or deletes “bad data”?
data cleansing
97
Mark creates a new relational database table that includes only five of the seven columns in the existing products table. This action is known as ____.
projecting data
98
For the ____ operation, it is required that the the two tables have a common data attribute
joining data
99
Jesse's team is organizing the data in their company's relational database so that all data is stored in only one place and only related data is stored in any given table. What is this process called?
data normalization
100
_____ is a special-purpose programming language for accessing and manipulating data stored in a relational database.
Structured Query Language (SQL)
101
To ensure reliability and integrity, SQL databases conform to four specific properties. Which of the following is NOT one of those four properties? a. atomicity b. durability c. isolation d. currency
currency
102
With _____, the database is stored on a service provider’s servers and accessed by the client over a network, typically the Internet.
database as a service
103
Julie is a non-IS employee who is responsible for, among other tasks, creating and maintaining consistent reference data and master data definitions and for analyzing data for quality. Coworkers consult with Julie to find out what data to use to answer a business question. Julie is a _____.
data steward
104
_____ is the term used to describe enormous and complex data collections that traditional data management software, hardware, and analysis processes are incapable of handling.
big data
105
Haley's employer has asked her to review a database containing thousands of social media posts about their company's products and extract the data the executive team needs to make decisions about these products and their marketing. In terms of the characteristics of big data, Haley is focusing on ________.
value
106
Barry's job responsibilities include helping maintain a large database that holds business information from over a dozen source systems, covering all aspects of his company's processes, products, and customers. This database contains not only enterprise data but also data from other organizations. Barry works with a(n) _____.
data warehouse
107
Which of the following is required to create a traditional data warehouse but NOT a data lake?
extract transform load process
108
A _____ is a subset of a data warehouse that is used by small- and medium-sized businesses and departments within large companies to support decision making.
data mart
109
One key difference between a relational database and a NoSQL database is _____.
the way data storage and retrieval are modeled
110
Donna is a member of a team trying to select the best type of database for a business problem. If the database must handle a variety of data, she would like to store the data on a group of servers, and the data structures must be very flexible, what would you suggest?
A NoSQL database would likely be a better fit than a relational database.
111
A database system that stores the entire database in random access memory is known as a(n) _____.
in-memory database
112
Which of the following is the LEAST essential characteristic for success as a data scientist?
business leadership skills
113
What determines the size of words in a word cloud?
frequency of occurrence of the word in source documents
114
The graphical representation that summarizes the steps a consumer takes in making the decision to buy your product and become a customer is called _____.
a conversion funnel
115
_____ is used to explore large amounts of data for hidden patterns to predict future trends.
data mining
116
____ is the last phase of the six-phase CRISP-DM method.
deployment
117
To identify and make predictions about various alternative scenarios, a manager would use _______.
simulation techniques
118
The purpose of business intelligence is to _____.
support improved decision making