conducting external audits
Which of the following is NOT a function of the information systems department?
writing programs
Which of the following is NOT a responsibility of a systems analyst?
system analyst
A ________ must work with users to determine system requirements and must also help determine system test plans.
Changing IS systems is expensive and time-consuming.
Which of the following is true for changes in IS infrastructure?
steering committee
A(n) ________ is a group of senior managers from the major business functions that works with the CIO to set the IS priorities and decide among major IS projects and alternatives.
A decentralized organization requires information systems that facilitate autonomous activity.
Which of the following statements is true for the structure of IS infrastructure?
legacy information system
A(n) ________ is a system that has outdated technologies and techniques but is still used, despite its age.
Technical writers
________ develop product installation instructions, help text, and other support documentation.
dictionary
A data ________ is a file or database that contains data definitions.
Web storefronts
Sites like Amazon.com provide ________ for product vendors and distributors who choose not to develop their own online presence.
The vendor can replace the CIO of the organization.
Which of the following is a negative consequence of outsourcing IS/IT functions?
Sniffing
________ is a technique for intercepting computer communications, either through a physical connection to the network or, in the case of wireless networks, with no physical connection.
A hacker floods a Web server with millions of bogus service requests.
Which of the following usually happens in a malicious denial-of-service attack?
Uncertainty; risk
________ refers to things we do not know, while ________ is the likelihood of an adverse occurrence.
assess what the threats are
Which of the following is the first step in risk management?
a loss of customer goodwill due to an outage
Which of the following is an example of an intangible consequence?
firewall
Which of the following is an example of a technical safeguard?
Biometric authentication often faces resistance from users for its invasive nature.
Which of the following statements is true for biometric identification?
symmetric
With ________ encryption, the sender and receiver transmit a message using the same key.
Malware
________ is the term used to denote Trojan horses, spyware, and adware.
physical security procedures
Maintaining the DBMS on computers in a locked room is part of ________.
remove accounts and passwords
When an employee is terminated, IS administrators should receive advance notice so they can ________.
is defined as information containing patterns, relationships, and trends.
business intelligence
In most cases, data-mining tools are used to make ________
predicitons
Knowledge-management tools differ from reporting and data-mining tools because the source of their data is _____
human knowledge
RFM analysis ranks customers by considering the recency, frequency, and ________ of their orders.
dollar amount
Which of the following describes a dimension in an OLAP report?
it is a characteristic of a measure
is the application of statistical techniques to find patterns and relationships among data for classification and prediction
data mining
Which of the following is true of unsupervised data mining?
analysts do not create a model or hypothisis before running the test/ analysis
n ________, statistical techniques identify groups of entities that have similar characteristics.
cluster analysis
hich of the following is a hierarchical arrangement of criteria that predict a classification or a value?
decision tree
A data warehouse contains a special database that stores the ________, which records the source, format, assumptions and constraints, and other facts about the data.
metadata
A ________ is a data collection, smaller than the datawarehouse, that addresses a particular component or functional area of the business.
data mart
In a business process, a role is ________.
a collection of procedures
an as-is model is
documents the current situation of a business process
a business process that crosses into multiple companies is known as a(n) ________ business process.
interorganizational
Which of the following is true for the relationship between business processes and information systems?
.
Starting with processes and working toward systems is more likely to result in processes and systems that are aligned with the organization's strategy and direction.
Which of the following terms refers to the process of creating and maintaining information systems?
systems development
Once we have defined the project's goals and scope, the next step is to ________.
assesses feasibility
___feasibility refers to whether existing information technology is likely to be able to meet the needs of the new system.
technical
during the requirements definition stage of developing an information system, the project team will include mostly _____
business and systems analysts
tasks in the ________ phase of the system development process are to build, test, and convert the users to the new system.
implementation
in a ____ installation, the new system runs alongside the old one until it has been tested and is fully operational.
parallel
according to the Brook's Law, adding more people to a system development project will ________.
delay the projects completion