Ism test 2

conducting external audits

Which of the following is NOT a function of the information systems department?

writing programs

Which of the following is NOT a responsibility of a systems analyst?

system analyst

A ________ must work with users to determine system requirements and must also help determine system test plans.

Changing IS systems is expensive and time-consuming.

Which of the following is true for changes in IS infrastructure?

steering committee

A(n) ________ is a group of senior managers from the major business functions that works with the CIO to set the IS priorities and decide among major IS projects and alternatives.

A decentralized organization requires information systems that facilitate autonomous activity.

Which of the following statements is true for the structure of IS infrastructure?

legacy information system

A(n) ________ is a system that has outdated technologies and techniques but is still used, despite its age.

Technical writers

________ develop product installation instructions, help text, and other support documentation.

dictionary

A data ________ is a file or database that contains data definitions.

Web storefronts

Sites like Amazon.com provide ________ for product vendors and distributors who choose not to develop their own online presence.

The vendor can replace the CIO of the organization.

Which of the following is a negative consequence of outsourcing IS/IT functions?

Sniffing

________ is a technique for intercepting computer communications, either through a physical connection to the network or, in the case of wireless networks, with no physical connection.

A hacker floods a Web server with millions of bogus service requests.

Which of the following usually happens in a malicious denial-of-service attack?

Uncertainty; risk

________ refers to things we do not know, while ________ is the likelihood of an adverse occurrence.

assess what the threats are

Which of the following is the first step in risk management?

a loss of customer goodwill due to an outage

Which of the following is an example of an intangible consequence?

firewall

Which of the following is an example of a technical safeguard?

Biometric authentication often faces resistance from users for its invasive nature.

Which of the following statements is true for biometric identification?

symmetric

With ________ encryption, the sender and receiver transmit a message using the same key.

Malware

________ is the term used to denote Trojan horses, spyware, and adware.

physical security procedures

Maintaining the DBMS on computers in a locked room is part of ________.

remove accounts and passwords

When an employee is terminated, IS administrators should receive advance notice so they can ________.

is defined as information containing patterns, relationships, and trends.

business intelligence

In most cases, data-mining tools are used to make ________

predicitons

Knowledge-management tools differ from reporting and data-mining tools because the source of their data is _____

human knowledge

RFM analysis ranks customers by considering the recency, frequency, and ________ of their orders.

dollar amount

Which of the following describes a dimension in an OLAP report?

it is a characteristic of a measure

is the application of statistical techniques to find patterns and relationships among data for classification and prediction

data mining

Which of the following is true of unsupervised data mining?

analysts do not create a model or hypothisis before running the test/ analysis

n ________, statistical techniques identify groups of entities that have similar characteristics.

cluster analysis

hich of the following is a hierarchical arrangement of criteria that predict a classification or a value?

decision tree

A data warehouse contains a special database that stores the ________, which records the source, format, assumptions and constraints, and other facts about the data.

metadata

A ________ is a data collection, smaller than the datawarehouse, that addresses a particular component or functional area of the business.

data mart

In a business process, a role is ________.

a collection of procedures

an as-is model is

documents the current situation of a business process

a business process that crosses into multiple companies is known as a(n) ________ business process.

interorganizational

Which of the following is true for the relationship between business processes and information systems?

.
Starting with processes and working toward systems is more likely to result in processes and systems that are aligned with the organization's strategy and direction.

Which of the following terms refers to the process of creating and maintaining information systems?

systems development

Once we have defined the project's goals and scope, the next step is to ________.

assesses feasibility

___feasibility refers to whether existing information technology is likely to be able to meet the needs of the new system.

technical

during the requirements definition stage of developing an information system, the project team will include mostly _____

business and systems analysts

tasks in the ________ phase of the system development process are to build, test, and convert the users to the new system.

implementation

in a ____ installation, the new system runs alongside the old one until it has been tested and is fully operational.

parallel

according to the Brook's Law, adding more people to a system development project will ________.

delay the projects completion