Final Flashcards

1
Q

Out of the following choices, the least critical aspect of good information:
A.) data accuracy
B.) sufficiency of data
C.) timeliness of data
D.) additional data
E.) elevance of data

A

D.) additional Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Dr. Guo emphasized in his lectures the importance of ____ because it is the bridge between the computer side and the human side in the five-component model.

A

Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Automation is represented in the IS model as moving the work being done from:
A.) the digital mode to the analog mode
B.) processing to storage
C.) processes to procedures
D.) the human side to the computer side
E.) procedures to people

A

D.) the human side to the computer side

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Tomas requests a report from HR that shows the rate employees quit over the last three months, but HR instead sends him a report that shows the salary details of new hires over the last three months. The data HR sent is missing which of the five characteristics of good information?
A.) uncleaned
B.) miscalculated
C.) not timely
D.) not relevant
E.) inaccurate

A

D.) not relevant

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Sam is on a team that will implement an entirely new information system at his company. When they implement the new information system, which of the following actions will be the most difficult?
A.) training the employees to use and manage the new system
B.) changing the structure of existing databases that reflect supplier and customer data
C.) writing the programs to create the software
D.) upgrading the computer systems used by the retail chain
E.) installing new transaction processing hardware

A

A.) training the employees to use and manage the new system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following statements is TRUE of data characteristics within the context of information systems?
A.) Data generated should be in excess of what is required.
B.) An appropriate relationship should exist between the cost of data and its value.
C.) Freely available data is always accurate and timely.
D.) Data should be relevant to the context, not necessarily to the subject.
E.) Larger data sets yield more accurate information.

A

B.) An appropriate relationship should exist between the cost of data and its value.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Caroline asks her secretary to send information on the meetings that she needs to attend next month. Her secretary, Joanne, provides her with the details immediately, but leaves out certain additional details that are irrelevant to Caroline’s requirements. Which of the following statements is TRUE about this scenario?
A.) The information that Caroline obtained through Joanne was not accurate.
B.) The information that Joanne gave was accurate and sufficient for Caroline’s purpose.
C.) The information that Joanne provided was partly good, as it was timely but inaccurate.
D.) The information that Caroline obtained through Joanne was not timely or worth its cost.
E.) Joanne provided adequate and timely information, but the information was of no value to Caroline.

A

B.) The information that Joanne gave was accurate and sufficient for Caroline’s purpose.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Leon follows a set of instructions to create a custom Web site for a team assignment in his MIS course. The set of instructions Leon followed are an example of the ________ component of an information system.

A

software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Amber needed to improve the efficiency of her eBay shop, so she designed a relational database. She
made sure to include ____________ to figure out how many orders are associated with each customer.
A. A primary key
B. A foreign key
C. A crow’s Foot Cardinality as the maximum cardinality
D. Cardinalities
E. A Cardinality as the minimum cardinality

A

C. A crow’s Foot Cardinality as the maximum cardinality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In Figure 1, a(n) ________ symbol in the minimum position on the line symbol means that an instance
of that type is mandatory.
A. oval
B. arrow
C. bar
D. crow’s foot
E. Cardinality

A

C. bar

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In Figure 1, the square symbols each represent a(n) _____.
A. cardinality
B. entity
C. relationship
D. table
E. attribute

A

B. entity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In Figure 1, the consist of the small vertical bar, small oval, and crow’s foot symbols.
A. cardinalities
B. entities
C. relationships
D. tables
E. attributes

A

A. cardinalities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

In a database built based on the ERD shown in Figure 2, the logical association between Major and
Student is created when the ________ of Major is posted into Student where it plays the part of a(n)________ .
A. primary key, foreign key
B. primary key, non-key attribute
C. foreign key, primary key
D. foreign key, non-key attribute

A

A. primary key, foreign key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

When querying a database built based on the ERD shown in Figure 2, you want the output that shows
how many students there are for one major. Which of the following clauses should be added to the
query to produce the desired output?
SELECT MajorCode, COUNT(SID)
FROM Student ____________________ ;
A. WHERE SID IS NOT NULL
B. GROUP BY MajorCode
C. AS “Total Number of Students”
D. ORDER BY SID
E. ORDER BY MajorCode

A

B. GROUP BY MajorCode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

When querying a database built based on the ERD shown in Figure 2, which of the following options
should be entered into the blank to correctly complete this FROM clause?
FROM Major JOIN Student ON Major.MajorCode = ________
A. Product.SaleProdID
B. Student.SID
C. Major.SID
D. Student.MajorCode
E. Student.Decl_Date

A

D. Student.MajorCode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

When querying a database built based on the ERD shown in Figure 2, if we know that the students are from various countries including the USA, which of the following statements about the query output
will be TRUE when we run the following query?
SELECT SID, Name, Country
FROM Student
WHERE Country = “USA”;
A. The number of records in the query output will be more than as in the student table.
B. The number of records in the query output will be the same as in the Student table.
C. The number of records in the query output will be less than as in the Student table.
D. None of the above.
E. A & C are correct.

A

C. The number of records in the query output will be less than as in the Student table.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

You are querying a database built based on the ERD shown in Figure 2. The Student table contains multiple records with same names, such as Garcia, Smith, etc., so if you wish each unique name to be listed only once in the query output, which of the following SELECT clauses should you choose?
A. SELECT Name DISTINCT FROM Student;
B. SELECT DISTINCT Name FROM Student;
C. SELECT UNIQUE Name FROM Student;
D. SELECT Name UNIQUE FROM Student;
E. SELECT Name FROM Student;

A

B. SELECT DISTINCT Name FROM Student;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which of the following terms refers to a very large collection of servers
that a company with needs beyond those supplied by a single server may choose
to maintain?
a. server farm
b. server database
c. firmware
d. parallel nodes

A

a. server farm - all the other things are not revlevent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

________ is a category of cloud hosting where vendors provide not only
hardware infrastructure and an operating system but application programs and
databases as well.
a. PaaS
b. BaaS
c. SaaS
d. IaaS

A

c. SaaS - sofware as a service; encopuses everything-not just hardware but
software too

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

ABC Inc. wants to securely share electronic documents internally with the
employees. Which of the following is the best way to implement this strategy?
a. create a private cloud
b. use an access point
c. create a bridge
d. send documents via interoffice mail
e. use Google docs

A

a. create a private cloud - keyword in this question is security and private cloud
gives you the max amount of security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Compared to in-house hosting, cloud-based hosting ________.
a. requires significant development effort
b. provides greater control over the location of data
c. provides better visibility of security and disaster preparedness
capabilities
d. minimizes the risk of investing in technology that will soon become
obsolete
e. requires a significant amount of capital

A

d. minimizes the risk of investing in technology that will soon become
obsolete - keyword is in-house

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

The resources that are part of a Cloud-based service agreement are
described as being “pooled” which means organizations ________.
a. offer their services to each other free of charge, in a give-and-
take arrangement
b. share the same physical address range
c. share the same physical hardware through virtualization
d. use the public Internet to create the appearance of a private
connection
e. use open source standards that enable users to modify a program’s
source code

A

c. share the same physical hardware through virtualization - virtualization
is the keyword

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Virtualization is the process by which ________.
a. one physical computer hosts many different virtual computers within it
b. a single operating system is licensed for multiple computers
c. a single server is used to host the operations of a workstation
d. a single operating system is shared by multiple users

A

a. one physical computer hosts many different virtual computers within
it - run many virtual computers within one laptop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

One disadvantage of entering into a Cloud-based service agreement is:
a. significant development effort
b. loss of control over data location
c. increased management requirements
d. ongoing support costs

A

b. loss of control over data location - hosted by an external company so in
some sense you lose control over your data based off of location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

The term ________ means that the computing resources leased can be
increased or decreased dynamically in a short span of time and that organizations pay for just the resources that they use.
a. portable
b. pooled
c. programmatic
d. elastic
e. incremental

A

d. elastic - cloud service can be as big or small as you want and can
go back to its original

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

TCP stands for _________ and IP stands for ________.
a. Transaction Control Protocol/Internet Protocol
b. Tranfer Control Protocol/Internet Protocol
c. Transportation Control Protocol/Intranet Protocol
d. Transportation Control Protocol/Internet Protocol

A

d. Transportation Control Protocol/Internet Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Which of the following is an example of IaaS?
a. Apple iCloud
b. Microsoft Azure
c. Office 365
d. Amazon S3
e. Google Drive

A

d. Amazon S3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Jerry wants to use ________ so that he can add his own application on top
of the hosted platform.
a. Apple iCloud
b. Amazon S3
c. Microsoft Azure
d. Office 365
e. Skype

A

c. Microsoft Azure - PaaS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Layla runs a startup that makes custom engraved floor tiles. Her business is growing rapidly and she needs a cloud vendor to provide her with an operating system and a database management system. In this scenario, which of the following services will the vendor provide?
a. e-cloud
b. PaaS
c. IaaS
d. SaaS
e. Website hosting

A

b. PaaS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

LAN stands for _____________.
A. Local Area Netzone
B. Local Access Node
C. Local Access Network
D. Local Area Network
E. Local Area Node

A

D. Local Area Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Which of the following companies produce CPU chips?
A. Microsoft
B. Apple
C. Amazon
D. Intel
E. TikTok

A

D. Intel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

A ________ is the basic form of data exchange in TCP/IP networks.
A. packet
B. kilobyte
C. gigabyte
D. megabyte
E. zettabyte

A

A. packet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Which size of main memory is the largest?
A. kilobyte
B. gigabyte
C. exabyte
D. terabyte
E. petabyte

A

C. exabyte

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Which of the following is a characteristic of volatile memory?
A. Processor heats up during the operation.
B. Files are stored permanently.
C. Processing of data is very slow.
D. Contents are lost when power is off.
E. It should be purged at least once a year

A

D. Contents are lost when power is off.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Bits are grouped into 8-bit chunks called ________.
A. switches
B. strings
C. bytes
D. kilobytes
E. nibbles

A

C. bytes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Which of the following devices is an example of a storage hardware device?
A. barcode scanner
B. central processing unit
C. optical disk
D. random access memory
E. the system bus

A

C. optical disk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Which of the following is defined as the elastic leasing of pooled
computer resources over the Internet?
A. broadband
B. wiki
C. the cloud
D. Bluetooth
E. SSD

A

C. the cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Dr. Guo emphasized that when it comes to the scope of services provided,
the correct ranking order for IaaS, PaaS, and SaaS is _____________. (>
means having greater scope than)
A. SaaS > PaaS > IaaS
B. IaaS > PaaS > SaaS
C. SaaS > IaaS > PaaS
D. PaaS > SaaS > IaaS
E. SaaS > IaaS > PaaS

A

A. SaaS > PaaS > IaaS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Which of the following refers to a small, portable storage device that
can be used to back up data and transfer it from one computer to another?
A USB flash drive
B projector
C mouse
D barcode scanner
E Bluetooth speaker

A

A. USB flash drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

A ________ is also called “the brain” of the computer.
A network card
B motherboard
C thumb drive
D central processing unit
E CMOS

A

D central processing unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Vivian wants to book a suite at Baron & Olufsen, a luxury hotel chain in
Europe, for her brief stay in Austria. When she visits the Web page, the
address bar reads http://www.baron-olufsen.com/. This information is the
________ of the Web page.
A) URL
B) IP address
C) protocol
D) email ID
E) MAC address

A

A) URL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

A ________ is a worldwide-unique term that is affiliated with a public IP
address.
A) URL
B) domain name
C) packet
D) hyperlink
E) DNF

A

B) domain name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Which of the following is a benefit of in-house hosting?
A) superior flexibility and adaptability to growing or fluctuating
demand
B) lower capital requirements
C) in-depth visibility of security and disaster preparedness
D) fewer training requirements
E) no obsolescence

A

C) in-depth visibility of security and disaster preparedness

43
Q

The term ________ means that the computing resources leased can be
increased or decreased dynamically in a short span of time and that
organizations pay for just the resources that they use.
A) portable
B) pooled
C) programmatic
D) elastic
E) incremental

A

D) elastic

44
Q

Which of the following is the most basic cloud offering?
A) SaaS
B) CDN
C) IaaS
D) VPN
E) SAS

A

C) IaaS

45
Q

________ is a wireless protocol designed for transmitting data over short
distances, replacing cables.
A) IPv6
B) PaaS
C) Bluetooth
D) IPv4
E) 802.5

A

C) Bluetooth

46
Q

________ are programs that run on a server-tier computer and manage
traffic by sending and receiving Web pages to and from clients.
A) Web servers
B) Web browsers
C) Server farms
D) Server racks
E) VPNs

A

A) Web servers

47
Q

Which of the following statements refers to server virtualization?
A) a personal computer, such as a desktop or portable computer, that hosts
several different operating systems
B) a server computer that hosts one or more other server computers
C) a storage area that loses its contents when the power is off
D) a server that hosts many versions of desktop operating systems
E) a server can connect to multiple networks at the same time

A

D) a server that hosts many versions of desktop operating systems

48
Q

Which of the following operating systems is used by Apple?
A) Windows OS
B) Symbian
C) iOS
D) Android
E) AIX

A

C) iOS

49
Q

________ is a concept that computer systems will become sophisticated enough that
they can adapt and create their own software and hence adapt their behavior without
human assistance.
A) Expert systems
B) Artificial Intelligence
C) Knowledge management
D) Business intelligence systems
E) Moore’s Law

A

B) Artificial Intelligence

50
Q

________ is the extraction of knowledge from data based on algorithms created from
training data.
A) Machine learning
B) Historical analysis
C) Simulation
D) Computer analysis
E) Processing data

A

A) Machine learning

51
Q

How do machines learn?
A) By humans teaching them things
B) Through experience
C) By listening to the surroundings
D) With repetition of the same facts
E) By listening for a wake word

A

B) Through experience

52
Q

Machine learning is focused on predicting accurate outcomes based on ________ data.
A) previously known training
B) current
C) future
D) questionable
E) a complete set of

A

A) previously known training

53
Q

A sales report that is current at the time the user accessed it on a Web server is an example of
a(n) ________.
A) static report
B) dynamic or exception report
C) expert system
D) hybrid market report
E) temporal report

A

B) dynamic or exception report

54
Q

Differentiate between unsupervised and supervised data mining.

A

Data mining techniques fall into two broad categories: unsupervised and supervised.
With unsupervised data mining, analysts do not create a model or hypothesis before running the analysis. Instead, they apply a data mining application to the data and observe the results. With this method, analysts create hypotheses after the analysis, in order to explain the patterns
found. With supervised data mining, data miners develop a model prior to the analysis and apply statistical techniques to data to estimate parameters of the model.

55
Q

Which of the following is an example of a supervised data mining technique?
A) cluster analysis
B) market-basket analysis
C) regression analysis
D) click streaming
E) metadata matching

A

C) regression analysis

56
Q

Samuel, a researcher, deduces that single women between the ages of 25 and 30, who usually live in the suburbs and make thrifty purchases, prefer a particular brand of washing machines. In this case, Samuel uses ________ to understand customer behavior.
A) supervised data mining
B) cluster analysis
C) neural networks
D) market-basket analysis
E) unsupervised learning

A

B) cluster analysis

57
Q

A ________ is a person or an organization that seeks to obtain or alter data or other
IS assets illegally, without the owner’s permission and often without the owner’s
knowledge.
A) target
B) vulnerability
C) threat
D) key escrow
E) cipher

A

C) threat

58
Q

Which of the following is considered a threat caused by human error?
A) an employee inadvertently installing an old database on top of the current one
B) an employee intentionally destroying data and system components
C) a virus and worm writer infecting computer systems
D) a hacker breaking into a system to steal for financial gain
E) a tsunami floods a data center causing total data loss

A

A) an employee inadvertently installing an old database on top of the current one

59
Q

Which of the following is considered a computer crime?
A) accidental deletion of important records
B) poorly written programs resulting in information loss
C) loss of data as a result of flooding
D) hacking of information systems
E) failure to correctly back up customer data

A

D) hacking of information systems

60
Q

A person claiming to be from central IT called Chris and asked him to participate in a password reset audit. The person had Chris change his password to the word “123456”, and then again to a secret passphrase only Chris knew. Later that day Chris noticed odd system behavior, and then the system crashed. Chris was a victim of ________.
A) hacking
B) usurping
C) sniffing
D) pretexting
E) appropriating

A

D) pretexting

61
Q

Sally has been working really hard lately and asks her manager for a raise. Her manager tells her that she is already the highest paid employee on the floor. Sally doesn’t believe her manager, and illegally accesses the employee database to look at salary data. Sally’s act can be termed as ________.
A) pretexting
B) phishing
C) hacking
D) spoofing
E) skimming

A

C) hacking

62
Q

Which of the following statements is TRUE about biometric identification?
A) It involves the use of a personal identification number (PIN) for authentication.
B) It provides weak authentication.
C) It is a relatively inexpensive mode of authentication.
D) It often faces resistance from users for its invasive nature.
E) It will decline in usage in the future.

A

D) It often faces resistance from users for its invasive nature.

63
Q

Which of the following statements is TRUE about the Secure Sockets Layer (SSL)?
A) It uses asymmetric encryption exclusively.
B) It is used to send sensitive data such as credit card numbers.
C) It uses one set of encryption keys for multiple sessions.
D) It is a stronger version of https.
E) It is used in wireless encryption suites.

A

B) It is used to send sensitive data such as credit card numbers.

64
Q

Layla is purchasing a new laptop from an online vendor. Which of the following will be
displayed in the address bar of his browser that will let her know that the online retailer is using the Secure Sockets Layer (SSL) protocol?
A) ftp
B) www
C) https
D) .com
E) smtp

A

C) https

65
Q

Jason attempts to hack into a banking site to steal customer information. He finds the security of the Web site lacking and is able to access the site with ease. Jason is arrested the next day and charged with computer crime. The banking site was able to track Jason’s IP address because he had unknowingly attacked a ________.
A) botnet
B) hot site
C) honeypot
D) Web beacon
E) Trojan horse

A

C) honeypot

66
Q

If an organization turns an employee’s access off to the building while they are at lunch as a means of termination, this would be considered ________.
A) a hostile situation
B) mean
C) an unfriendly termination
D) enforcement of company rules
E) separation termination

A

C) an unfriendly termination

67
Q

Which of the following is an example of a supervised data mining
technique?
a. cluster analysis
b. regression analysis
c. market-basket analysis
d. click streaming
e. metadata matching

A

b. regression analysis

68
Q

What separates classification from cluster analysis?
a. Classification is done by BI, while cluster analysis is done by human
b. Cluster analysis is more powerful than classification
c. Classification has an existing research question knowing what to look for and cluster does not
d. Classification uses the Internet but cluster analysis does not

A

c. Classification has an existing research question knowing what to look for and cluster does not

69
Q

Which of the following reports focuses on reporting anomolies?
a. Exception Report
b. Cluster Report
c. Classification Report
d. Regular Report

A

c. Classification Report

70
Q

Samuel, a researcher, deduces that people between the ages of 25 and 30,
who usually live in downtown and make thrifty purchases, prefer a particular
brand of coffe. In this case, Samuel uses ________ to understand customer
behavior.
a. supervised data mining
b. cluster analysis
c. neural networks
d. market-basket analysis
e. unsupervised learning

A

d. market-basket analysis

71
Q

An OLAP report has measures and dimensions. Which of the following is an
example of a dimension?
a. total sales
b. average sales
c. sales region
d. average cost
e. average net sales

A

c. sales region

72
Q

Porter’s five forces model is used to assess ________.
a. market share
b. internal competition
c. product lifecycle
d. industry structure

A

a. market share

73
Q

The bargaining power of customers will likely be high when they purchase:
a. limited edition apparel
b. patented drugs
c. A bit that represents on
d. standardized products
e. rare antique arts

A

d. standardized products

74
Q

A company develops and patents a unique reusable rocket transportation
technology allowing man travel to the moon, and is totally safe. This
situation is characterized by ________.
a. low threat of substitutions
b. high bargining power of suppliers
c. low bargining power of customers
d. low threat of new entrants

A

a. low threat of substitutions

75
Q

One of the support activities in a value chain is:
a. Outbound logistics
b. Inbound logistics
c. Hiring employees
d. Manufacturing products

A

c. Hiring employees

76
Q

An example of a primary value chain activity is:
a. Procurement
b. Customer Service
c. Human Resources
d. Information Systems

A

b. Customer Service

77
Q

Many companies create ________, which are false targets for computer criminals to attack.
a. honeypots
b. operational procedures
c. backups of company data
d. security checkpoints
e. hacker centers

A

a. honeypots

78
Q

All of the following should be in an incident-response plan except
________.
a. how employees respond to security problems
b. the person who caused the incident
c. who should be contacted in case of an incident
d. the reports that should be created because of the incident
e. how to reduce further loss

A

b. the person who caused the incident

79
Q

The Gramm-Leach-Bliley (GLB) Act protects consumer data stored by many
financial insitutions EXCEPT for _____.
a. JP Morgan Chase
b. Wells Fargo
c. Department of Treasury
d. Citigroup

A

c. Department of Treasury

80
Q

Machine learning is an important tool for Artificial Intelligence to
_____.
a. increase data capacity
b. enhance data security
c. improve data quality
d. identify and reveal hidden patterns among data

A

d. identify and reveal hidden patterns among data

81
Q

Which unsupervised technique below identifies the patter without a prior
model or research question/hypothesis?
a. Classification
b. Regression Analysis
c. Cluster Analysis
d. Statistics

A

c. Cluster Analysis

82
Q

What separates unsupervised data mining from supervised data mining?
a. The amount of memory needed
b. The speed of data processing
c. Unsupervised analysis does not create a model or hypothesis beforehand
d. Supervised analysis does not create a model or hypothesis beforehand
e. Unsupervised analysis develop a model prior to the analysis

A

c. Unsupervised analysis does not create a model or hypothesis beforehand

83
Q

Sally has been working really hard lately and asks her manager for a raise. Her manager tells her that she is already the highest paid employee on the floor. Sally doesn’t believe her manager, and illegally accesses the
employee database to look at salary data. Sally’s act can be termed as
________.
a. phishing
b. pretexting
c. spamming
d. hacking

A

d. hacking

84
Q

Which of the following characteristics is NOT important for an effective
collaborator to have?
a. target
b. threat
c. key escrow
d. cipher

A

a. target

85
Q

Carlos owns a small business and is striving to keep his organization running smoothly while remaining profitable in a highly competitive market. He chooses to use process implementation to give his company a competitive pricing edge over others. Which of the following principles is he most likely to implement?
a. enhancing service
b. differentiate products
c. create a new product
d. reducing cost

A

d. reducing cost

86
Q

Make Time for You, Inc. provides therapeutic massage therapy services via
a mobile spa which enables them to provide those services at the time and
place most convenient to their clientele. Which of the following is most likely the reason the owners of Make Time for You, Inc. chose this business model?
a. reducing cost
b. locking in customers
c. raising barriers for new entrants
d. Software

A

b. locking in customers

87
Q

Some Web sites use _________, small files that enable an individual to access the site without having to sign in every time they visit.
A) Botnet
B) Web bug
C) Public key
D) Payload
E) Cookie

A

E) Cookie

88
Q

Network data transmissions can be intercepted by performing _________.
A) Spoofing
B) Sniffing
C) Port scanning
D) Phishing
E) Pretexting

A

B) Sniffing

89
Q

To enter a secure room at work, Elise proves her identity by having her retina scanned. This is an example of what type of authentication?
A) Somewhere you are
B) Something you have
C) Something you know
D) Some time you are
E) Something you are

A

E) Something you are

90
Q

The secure storage and processing of credit card data is legally safeguarded by:
A) the Health Insurance Portability and Accountability Act (HIPAA)
B) the Privacy Principles
C) the Payment Card Industry Data Security Standard (PCI DSS)
D) a Key Escrow
tE) he Gramm-Leach-Bliley (GLB) Act

A

C) the Payment Card Industry Data Security Standard (PCI DSS)

91
Q

Pretexting, sniffing, spoofing, and phishing are security issues considered to be examples of:
A) faulty services
B) unauthorized data disclosure
C) loss of infrastructure
D) SQL injection
E) incorrect data modification

A

B) unauthorized data disclosure

92
Q

A ____________ is a software program that appears to be legitimate and useful but secretly steals a victim’s data.
A) Trojan horse
B) Spyware program
C) Hydra
D) Worm
E) Adware program

A

A) Trojan horse

93
Q

When a system requires smart cards to enter the building, this is an example of using _____________ to authenticate.
A) what you have
B) public key
C) what you know
D) private key
E) Social Security number

A

A) what you have

94
Q

The information system components of people and procedures are protected primarily with:
A) Payloads
B) Technical safeguards
C) Port scanners
D) Firewalls
E) Human safeguards

A

E) Human safeguards

95
Q

When practicing safe computing, which of the following behaviors should be avoided?
A) updating malware definitions
B) browsing only reputable Web sites
C) using public unfamiliar Wi-Fi
D) installing and updating antivirus software
E) opening email attachments only from known sources

A

C) using public unfamiliar Wi-Fi

96
Q

Most encryption systems rely on a _________ to securely carry out confidential data communications.
A) Password
B) Personal identification numbers
C) CA key ring
D) Cipher
E) Private key

A

D) Cipher

97
Q

Competitive strategy determines all of the following except
________.
A) structure of the information system
B) goals and objectives
C) features
D) functions
E) the company’s PE ratio

A

E) the company’s PE ratio

98
Q

Porter’s five forces model is used to assess ________.
A) industry structure
B) market share
C) internal competition
D) life cycles of products
E) future product demand

A

B) market share

99
Q

A mining company develops a new processing technique using only light, 3-D
printed drills and patents the process. This situation is characterized by ________.
A) low threat of substitutions
B) high bargaining power of customers
C) high threat of new entrants
D) low bargaining power of suppliers
E) low threat of new entrants

A

A) low threat of substitutions

100
Q

Focused cost leadership is observed when a product has the lowest cost
________.
A) within an industry segment
B) across the product mix offered by a company
C) across the entire industry
D) among a group of competitors
E) across multiple product categories

A

A) within an industry segment

101
Q

A retail company sells agricultural produce and consumer products. The
company procures materials from farmers and local producers. This process is an
example of ________.
A) outbound logistics
B) inbound logistics
C) operational management
D) internal marketing
E) customer service

A

B) inbound logistics

102
Q

A(n) ________ is a network of activities that generate worth by transforming
inputs into outputs.
A) business process
B) competitive strategy
C) value chain
D) information system
E) linked investment

A

A) business process

103
Q

The cost of the business process is the sum of the cost of the inputs and the
________.
A) cost of the activities
B) cost of the outputs
C) value of the outputs
D) value of the products
E) cost of the products

A

A) cost of the activities

104
Q

RAC Associates is a car rental company that rents cars to tourists in the United States. The company uses tracking devices and magnetic locks to prevent car theft. These procedures are examples of ________.
A) primary business processes
B) core activities
C) strategic activities
D) supporting business processes
E) premeditated activities

A

D) supporting business processes

105
Q

Streamtech, a manufacturer of automobiles, recently received a patent for an unmanned search boat. By doing this, Streamtech has ________.
A) created an entry barrier
B) introduced product differentiation
C) locked in its suppliers
D) reduced the cost of operations
E) established an alliance

A

B) introduced product differentiation