MIS 3000 Final Exam

MIS 3000 Final Exam

Or get it used now for:

Regular price $10.00 Sale

MIS 3000 Final Exam

Question 1 1. A Web store front is an example of a(n) ________. interenterprise information system departmental information system functional information system collaborative information system 5 points Question 2 1. A ________ connects computers at different geographic locations. LAN VPN SOHO LAN WAN 5 points Question 3 1. A ________ is a content structure that has emerged from the processing of many user tags. bookmark folksonomy metalanguage chrome 5 points Question 4 1. A ________ is a data collection that addresses the needs of a particular department or functional area of the business. data mart data center data warehouse data mine 5 points Question 5 1. A ________ is a special-purpose computer that receives and transmits wired traffic on the LAN. domain SOHO LAN switch protocol 5 points Question 6 1. A ________ is used to provide seamless flow of data across networks. UTP switch point-to-point protocol layered protocol 5 points Question 7 1. A ________ receives requests from users via the Web server, takes some action, and returns a response to the users via the Web server. commerce server URL Web farm database server 5 points Question 8 1. A customer relationship management system is ________. a suite of applications, a database, and a set of inherent processes for consolidating business operations into a single, consistent, computing platform a suite of software applications that integrates existing systems by providing layers of software that connect applications together a Web application that allows businesses to manage customer suggestions and complaints in a structured fashion a suite of applications, a database, and a set of inherent processes for managing all the interactions with the customer, from lead generation to customer service 5 points Question 9 1. A password ________ a user. conceals authenticates encrypts identifies 5 points Question 10 1. A systems analyst ________. advises the CIO, executive groups, and project managers on emerging technologies works with users to determine system requirements, designs and develops job descriptions and procedures, and helps determine system test plans helps users solve problems and provides training works with business leaders and planners to develop processes and systems that implement business strategy and goals 5 points Question 11 1. A test plan ________. should cause every line of program code to be executed should cause only critical error messages to be displayed should not include the incorrect actions that users will take should be constructed by PQA personnel alone 5 points Question 12 1. A(n) ________ is a set of rules that two communicating devices follow. domain database protocol attribute 5 points Question 13 1. According to McAfee's Enterprise 2.0 model, creating enterprise content via blogs, wikis, discussion groups, and presentations is part of ________. searching authoring tagging signaling 5 points Question 14 1. According to McAfee's Enterprise 2.0 model, pushing enterprise content to users based on subscriptions and alerts is part of ________. tagging searching signaling authoring 5 points Question 15 1. According to McAfee, Enterprise 2.0 workers want applications that enable them to rate tagged content and to use the tags to predict content that will be of interest to them. Which of the following characteristics of Enterprise 2.0 does this refer to? extensions search authoring signals 5 points Question 16 1. Adding more people to a late systems development project will make the project later because ________. budgeting project costs becomes complicated training new people slows down team members allocating tasks becomes easier analyzing the system requirements becomes complex 5 points Question 17 1. As a user of IS, an employee has a responsibility to avoid ________. applying software patches unauthorized hardware modifications changing system password too frequently backup procedures 5 points Question 18 1. As development teams become larger, the average contribution per worker ________. increases, but only marginally increases decreases stabilizes 5 points Question 19 1. As staff size increases, ________. diseconomies of scale tend to level off and eventually decrease more meetings and coordination activities are required to keep everyone in sync economies of scale consistently increase almost proportionately the average contribution per worker also increases 5 points Question 20 1. Because encryption keys can be lost or destroyed, a copy of the key should be stored with a trusted party. This safety procedure is sometimes called ________. biometric authentication white hat key escrow key encryption 5 points Question 21 1. Being linked to a network of highly regarded contacts is a form of ________. mobility social credential personal reinforcement influence 5 points Question 22 1. Data ________ is the process of obtaining, cleaning, organizing, relating, and cataloging source data. interpretation retention application acquisition 5 points Question 23 1. Devices such as wireless mice and keyboards use ________ to connect to the computer. NIC cable broadband Bluetooth 5 points Question 24 1. During the ________ phase of the SDLC process, developers construct, install, and test the components of the information system. implementation requirements analysis feasibility assessment database design 5 points Question 25 1. During which stage of the customer life cycle do win-back processes categorize customers according to value? customer acquisition loss relationship management marketing 5 points Question 26 1. Each device on the LAN has a hardware component called the ________ that connects the device's circuitry to the cable. switch POP NIC UTP 5 points Question 27 1. Enforcement of security procedures and policies consists of three interdependent factors: ________. account administration, systems procedures, and security monitoring separation of duties, least privilege, and position sensitivity centralized reporting, preparation, and practice responsibility, accountability, and compliance 5 points Question 28 1. Enterprise resource planning is ________. a suite of applications, a database, and a set of inherent processes for consolidating business operations into a single, consistent, computing platform a Web application that allows businesses to manage customer suggestions and complaints in a structured fashion a suite of applications, a database, and a set of inherent processes for managing all the interactions with the customer, from lead generation to customer service a suite of software applications that integrates existing systems by providing layers of software that connect applications together 5 points Question 29 1. If a company's IS-related programs are not developed in-house, then the development group within its IS department will be staffed primarily by ________. technical writers test engineers programmers systems analysts 5 points Question 30 1. In ________, hardware and both operating system and application software are leased. IaaS cloud hosting PaaS SaaS outsourcing 5 points Question 31 1. In ________, statistical techniques identify groups of entities that have similar characteristics. regression analysis content indexing cloud computing cluster analysis 5 points Question 32 1. In ________, the impact of a set of variables on another variable is measured. cloud computing regression analysis context indexing cluster analysis 5 points Question 33 1. In order for a printer or a laptop to connect to a wireless LAN, it must have a ________. POP VPN WNIC UTP 5 points Question 34 1. In organizations where primary information systems support only accounting and finance activities, a reporting arrangement wherein the CIO reports to the ________ is practical. CFO CTO CEO COO 5 points Question 35 1. In the three-tier architecture arrangement, what is the second tier? server tier user tier database tier Web tier 5 points Question 36 1. Information silos arise as a result of ________. an inter-enterprise information system's involvement to find solutions to problems arising within two or more enterprises the individual users of personal information systems an organization's plan to create them data being isolated in separated systems 5 points Question 37 1. Inherent processes are ________. the activities which alter and design business processes to take advantage of new information systems always accompanied by business process reengineering predesigned procedures for using the software products time-consuming business processes and involve substantial investment 5 points Question 38 1. Narrowband lines typically have transmission speeds less than ________. 256 kbps 64 kbps 126 kbps 56 kbps 5 points Question 39 1. Normal processing procedures for system users are ________. procedures to continue operations when the system fails procedures for using the system to accomplish business tasks procedures for backing up data and other resources procedures to convert back to the system after recovery 5 points Question 40 1. Of the following, which is an IS user's responsibility? reliable network and Internet connections installation of authorized programs a secure computing environment protection from viruses and other threats 5 points Question 41 1. One of the reasons for SDLC problems is due to the ________ nature of the SDLC. This implies that the systems development process is supposed to operate in a sequence of nonrepetitive phases. clustered parallel network waterfall 5 points Question 42 1. One very common use of FTP is to ________. maintain Web sites transmit emails format responses implement protocol 5 points Question 43 1. Other titles for the ________ include director of information services and director of computer services. CIO CEO CTO CFO 5 points Question 44 1. Planning and scheduling are applications that fall under ________. manufacturing customer service sales and management accounting 5 points Question 45 1. Social media ________ are companies and other organizations that choose to support a presence on one or more SM sites. sectors application providers sponsors outlets 5 points Question 46 1. Social media ________ are the companies that operate the SM sites. application providers outlets sectors sponsors 5 points Question 47 1. Software vendors usually bundle fixes of low-priority problems into ________. debuggers service packs patches system fixes 5 points Question 48 1. The CTO heads the ________ group in the IS department. operations trading and sales technology outsourcing relations 5 points Question 49 1. The WNIC devices connect to a(n) ________, which is the component of the LAN device that processes wireless traffic and communicates with the wired switch. access point optical fiber cable PSDN router 5 points Question 50 1. The ________ approach is the classical process used to develop information systems. extreme programming (XP) object-oriented design (OOD) systems development life cycle (SDLC) rapid application development (RAD) 5 points Question 51 1. The ________ function of business intelligence servers maintains metadata about the authorized allocation of business intelligence results to users. delivery management processing controlling 5 points Question 52 1. The ________ is the Internet-based network of browsers and servers that process HTTP or HTTPS. FTP Web SMTP Data link 5 points Question 53 1. The broadest definition of ________ includes viruses, worms, Trojan horses, spyware, and adware. malware widgets metadata software 5 points Question 54 1. The easiest and cheapest time to alter the information system is in the ________ phase of the SDLC. component design implementation requirements analysis system definition 5 points Question 55 1. The results generated by BigData processors are combined in what is referred to as the ________ phase. Reduce Process Construct Control 5 points Question 56 1. The summation of all the problems of information silos leads to ________. reduced organizational innovation increased costs for the organization diseconomies of scope diminishing marginal returns 5 points Question 57 1. Users of smart cards are required to enter a ________ to be authenticated. biometric detail PIN key password 5 points Question 58 1. What is a VPN? It is a markup language that fixes several HTML deficiencies and is commonly used for program-to-program interaction over the Web. It uses the Internet to create private point-to-point connections. It is the most common language for defining the structure and layout of Web pages. It is an add-on to browsers that was developed by Adobe and is useful for providing animation, movies, and other advanced graphics inside a browser. 5 points Question 59 1. What is the protocol commonly used for wireless LAN? EVDO IEEE 802.11n DSL IEEE 802.3 5 points Question 60 1. What is the similarity between adware and spyware? Both are used to steal data. Both masquerade as useful programs. Both are installed without the user's permission. Both are specifically programmed to spread. 5 points Question 61 1. When an individual uses the Internet, but not the Web, he or she is using ________. HTTP XUP SOAP FTP 5 points Question 62 1. When implementing new enterprise systems, the only solution for resolving process issues and providing enterprise process management is ________. establishing clear and absolute contractual guidelines developing committees and steering groups communicating the need for the change to the employees reinforcing employees' sense of self-efficacy 5 points Question 63 1. When prospects become customers who need to be supported, the organization is in the ________ stage of the customer life cycle. loss customer acquisition marketing relationship management 5 points Question 64 1. Which is the most important phase in the systems development process? defining the goals and scope of the new information system adapting systems to changes in requirements implementing the information system determining the system's requirements 5 points Question 65 1. Which of the following activities in the business intelligence process involves creating business intelligence? business intelligence analysis results publishing problem solving data acquisition 5 points Question 66 1. Which of the following activities in the business intelligence process involves delivering business intelligence to the knowledge workers who need it? business intelligence analysis problem solving results publishing data acquisition 5 points Question 67 1. Which of the following are malware masquerading as useful programs? worms payloads macro viruses Trojan horses 5 points Question 68 1. Which of the following is a component of the user tier? computers that have browsers that request and process Web pages computers that run a DBMS that processes SQL requests computers that run Web servers and process application programs computers that work to minimize customer delays in a facility called a Web farm 5 points Question 69 1. Which of the following is a function of EAI? It consolidates business operations into a single, consistent, computing platform. It posts activities in the general ledger and other accounting applications. It enables a gradual move to ERP. It is used to forecast sales and to create manufacturing plans and schedules to meet those forecasts. 5 points Question 70 1. Which of the following is an IS user's right? learning basic computer skills reporting trivial problems installing only authorized programs effective training 5 points Question 71 1. Which of the following is an example of a personal information system? ordering of restaurant supplies from suppliers contact manager charging of membership fees scheduling of groundskeeping 5 points Question 72 1. Which of the following is an example of a security threat resulting from malicious human activity? an employee who inadvertently installs an old database on top of the current one an employee who misunderstands operating procedures an employee who accidentally deletes customer records an employee who intentionally destroys data or other system components 5 points Question 73 1. Which of the following is true about enterprise resource planning (ERP)? ERP systems are used to forecast sales and to create manufacturing plans and schedules to meet those forecasts. The layers of ERP software enable existing applications to communicate with each other and to share data. ERP is a suite of software applications that integrates existing systems by providing layers of software that connect applications together. ERP, though unable to incorporate functions of CRM, includes accounting, manufacturing, inventory, and human resources applications. 5 points Question 74 1. Which of the following is true for inherent processes? Inherent processes are an expensive and time-consuming practise. Inherent processes help avoid business process reengineering. Organizations cannot license the software that is used in various inherent processes. Inherent processes are almost always a perfect fit. 5 points Question 75 1. Which of the following is true for the various groups in an IS department? The operations group investigates new information systems technologies and determines how the organization can benefit from them. The technology group manages individual computers, computer centers, networks, and communications media. The development group monitors the user experience and responds to user problems. The development group manages the process of creating new information systems. 5 points Question 76 1. Which of the following is true of DSL modems? DSL services and speed are standardized across applications. Their signals do not interfere with voice telephone service. DSL modems use television lines for data transmission. DSL modems use the same protocols as cable modems. 5 points Question 77 1. Which of the following is true of VPN? Remote access is difficult in case of VPN. It is a virtual, private pathway over a public or shared network from the client to the server. One disadvantage of VPN is that it does not encrypt messages. VPN communications are secure even though they are transmitted over the public Internet. 5 points Question 78 1. Which of the following is true of Web servers? They run on a user tier computer. They send and receive Web pages to and from clients. They are not programs. They can manage items in a shopping cart. 5 points Question 79 1. Which of the following is true of an ISP? An ISP facilitates a one-way information transfer process between the user's computer and the Internet. An ISP provides free access to the Internet. An ISP converts digital data in the user's computer to an analog signal. An ISP serves as a user's gateway to the Internet. 5 points Question 80 1. Which of the following is true of defenders of belief? When confronted with contrary evidence, they change their opinion. They seek conformity and want to convince others of the wisdom of their belief. They are effective for activities that involve innovation and problem solving. Their communities do not facilitate activities like sales and marketing. 5 points Question 81 1. Which of the following is true of personal information systems? Personal information systems that support a particular department are sometimes called departmental information systems. Adapting to changes in personal information systems is difficult. The solutions to problems in a personal information system usually involve more than one department. Such systems have only one user and hence procedures need not be documented or formalized in any way. 5 points Question 82 1. Which of the following is true of social capital? The value of social capital is determined by the number of the relationships in a social network. Social capital can be gained by limiting the number of friends. Social capital is the investment in human knowledge and skills for future profit. Being linked into social networks undermines a professional's image and position in an organization. 5 points Question 83 1. Which of the following is true of social networking problems? Responses are best reserved for when the problematic content has caused the organization to do something positive as a result. Inappropriate contributions that contain obscene or otherwise inappropriate content should be ignored indefinitely. It is unnecessary to communicate the criticism to the product development team. If the problematic content represents reasonable criticism of the organization's products, the best response is to delete it. 5 points Question 84 1. Which of the following means an address on the Internet? DSL URL ISP FTP 5 points Question 85 1. Which of the following provides reliable internet transport? DSL TCP HTTP FTP 5 points Question 86 1. Which of the following purposes does an HTTP protocol serve? provide reliable internet transporting enable communication among programs conduct internet routing flow among switches and access points 5 points Question 87 1. Which of the following sentences is true about customer relationship management system (CRM)? CRM incorporates accounting, manufacturing, inventory, and human resources applications. CRM is a suite of applications, a database, and a set of inherent processes for consolidating business operations into a single, consistent, computing platform. CRM systems are designed to avoid being customer-centric. CRM systems vary in the degree of functionality they provide. 5 points Question 88 1. Which of the following statements about enterprise information systems is true? It leads to data duplication among employees. Its users do not require any formal training. Users of such systems undergo formal procedure training. It is easy to manage change to enterprise information systems. 5 points Question 89 1. Which of the following statements is true with regard to system maintenance? Software developers usually group enhancement requests and failures together. All organizations track system failures and enhancements using word-processing documents. All commercial software products are shipped with known failures. IS personnel prioritize system problems on a first-come-first-served basis. 5 points Question 90 1. Which protocol standard used for wired LAN connections specifies hardware characteristics, such as which wire carry which signals? intranet EVDO Ethernet WiMax 5 points Question 91 1. With ________ data mining, data miners develop a model prior to the analysis and apply statistical techniques to data to estimate parameters of the model. nonsequential supervised unsupervised sequential 5 points Question 92 1. With respect to the five components of SMIS, which of the following is true of community users? They need to be trained on both SMIS user procedures as well as on the organization's social networking policy. They process SM sites using elastic, cloud-based servers. Their procedures are informal, evolving, and socially oriented. They develop and operate their own custom social networking application software to read and submit data. 5 points Question 93 1. With respect to the five components of SMIS, which of the following is true of application providers? They store and retrieve SM data on behalf of sponsors and user communities. They process SM sites using desktops, laptops, and smartphones. Their procedures are informal, evolving, and socially oriented. They employ browsers and native mobile applications to read and submit data. 5 points Question 94 1. With respect to the five components of SMIS, which of the following is true of SM sponsors? They need to be trained on both SMIS user procedures as well as on the organization's social networking policy. They process SM sites using elastic, cloud-based servers. They employ browsers and native mobile applications to read and submit data. Their procedures are informal, evolving, and socially oriented. 5 points Question 95 1. ________ are information systems that are shared by two or more independent organizations. Personal information systems Enterprise information systems Inter-enterprise information systems Workgroup information systems 5 points Question 96 1. ________ data is data about relationships. Capital Content Connection Custom 5 points Question 97 1. ________ data is data in the form of rows and columns. Integrated Problematic Structured Granulated 5 points Question 98 1. ________ firewalls can prohibit outsiders from starting a session with any user behind the firewall. Internal Packet-filtering Perimeter Malware 5 points Question 99 1. ________ have the final say on whether a system is ready. Managers Systems analysts Users PQA personnel 5 points Question 100 1. ________ is a major task when implementing enterprise systems. Module development Gap identification Encapsulation Process blueprinting 5 points Question 101 1. ________ is a person's belief that he or she can be successful at his or her job. Hope Arrogance Faith Self-efficacy 5 points Question 102 1. ________ is an application of the human resources department. Planning Financial reporting Compensation Lead tracking 5 points Question 103 1. ________ is another, more common title given to the vice president of information systems. CEO CIO COO CTO 5 points Question 104 1. ________ is the activity of altering and designing business processes to take advantage of new information systems. Business process management Business process improvement Business process interoperability Business process reengineering 5 points Question 105 1. ________ is the application of statistical techniques to find patterns and relationships among data for classification and prediction. Data warehousing Data mining Data integration Data encryption 5 points Question 106 1. ________ is the dynamic social media process of employing users to participate in product design or product redesign. Social capitalization Process reengineering User interface designing Crowdsourcing 5 points Question 107 1. ________ is the last stage of the customer life cycle. Customer acquisition Marketing Relationship management Loss 5 points Question 108 1. ________ is the leasing of hardware and pre-installed operating systems. SaaS Outsourcing PaaS IaaS cloud hosting 5 points Question 109 1. ________ is the process of allowing future system users to try out the new system on their own. Pretesting Beta testing PQA testing Acceptance testing 5 points Question 110 1. ________ is the process of sorting, grouping, summing, filtering, and formatting structured data. Reporting analysis Knowledge management Data mining analysis Cloud computing 5 points Question 111 1. ________ is the process of transforming clear text into coded, unintelligible text for secure storage or communication. Usurpation Standardization Encryption Authentication 5 points Question 112 1. ________ is the use of information technology to support the sharing of content among networks of users. Data warehousing Social media Electronic data interchange Cloud computing 5 points Question 113 1. ________ occurs when a person gains unauthorized access to a computer system. Spoofing Phishing Usurpation Hacking 5 points Question 114 1. ________ publishing requires the user to request business intelligence results. Pull Push Indirect Direct 5 points Question 115 1. ________ refers to the process of moving the business activity from an old information system to a new system. Test plan System conversion System definition Parallel installation 5 points Question 116 1. ________ reports are business intelligence documents that are fixed at the time of creation and do not change. Extension Static Informal Stable 5 points Question 117 1. ________ reports are reports produced when something out of predefined bounds occurs. Static Exception Dynamic Informal 5 points Question 118 1. ________ systems are information systems that process operational and other data to analyze past performance, and to make predictions. Business intelligence Enterprise planning Data mining Internal communication 5 points Question 119 1. ________ techniques emerged from the combined discipline of statistics, mathematics, artificial intelligence and machine-learning. Data mining Data encryption Data warehousing Data integration 5 points Question 120 1. ________ use(s) personal physical characteristics such as fingerprints, facial features, and retinal scans to verify users. Biometric authentication Personal identification numbers Smart cards Passwords

Preview

0