MIS 3063 Quizzes for Final

Which of the following is true of social media (SM)?

Organizations know social media is popular and can be strategically beneficial.

A(n) ________ refers to the percent of people who visit a Web site and then immediately leave.

bounce rate

A(n) ________ refers to a content structure employed by Enterprise social networks (ESNs) that emerges from the processing of many user tags.

folksonomy

________ are rule-based systems that encode human knowledge in the form of If/Then rules.

Expert systems

Which of the following statements is true of identifying an organization's target audience in a social media information system (SMIS)?

Identifying a target audience helps organizations focus its marketing efforts.

Which of the following is a use of social media (SM) in human resources?

It is used for recruiting candidates.

A(n) ________ social networking service like Yammer can be used to provide managers with real-time feedback about how to resolve internal operational inefficiencies.

enterprise

________ refers to data and responses to data that are contributed by users and SM sponsors.

Content data

Since its inception, social media (SM) has been widely used to market products to end users in ________.

business-to-consumer (B2C) relationships

A ________ is a statement that delineates employees' rights and responsibilities in an organization.

social media policy

Platforms that enable the creation of social networks, or social relationships among people with common interests, are offered by social media ________.

providers

Which of the following statements is a feature of social media (SM) providers?

They use elastic, cloud-based servers to host SM presence.

Value chains determine ________.

structured business processes

Being linked to a network of highly regarded contacts is a form of ________.

social credential

Which of the following statements is true of social networking problems?

Responses to problematic content are best reserved for instances where it has caused an organization to do something positive.

Social media (SM) ________ are formed based on mutual interests and transcend familial, geographic, and organizational boundaries.

communities

Which of the following statements is a characteristic of social media (SM) user communities?

Most users of SM belong to several different user communities.

Internal personnel social media sites such as MySite and MyProfile in SharePoint and other similar enterprise systems are used for ________.

employee communication

In the context of the five components of social media information systems (SMIS), which of the following statements is true of social media (SM) providers?

They store and retrieve SM data on behalf of users.

A person gains social capital by ________.

adding more friends

________ are reports produced when something out of predefined bounds occurs.

Exception reports

The source, format, assumptions and constraints, and other facts concerning certain data are called ________.

metadata

________ is an unsupervised data mining technique in which statistical techniques identify groups of entities that have similar characteristics.

Cluster analysis

Which of the following problems is particularly common for data that have been gathered over time?

lack of consistency

Users in a data mart obtain data that pertain to a particular business function from a ________.

data warehouse

Which of the following statements is true of unsupervised data mining?

Analysts create hypotheses only after performing an analysis.

Which of the following refers to data in the form of rows and columns?

structured data

________ is the application of statistical techniques to find patterns and relationships among data for classification and prediction.

Data mining

________ is an open source program supported by the Apache Foundation that manages thousands of computers and that implements MapReduce.

Hadoop

The use of an organization's operational data as the source data for a business intelligence system is not usually recommended because it ________.

requires considerable processing and can drastically reduce system performance

________ is the process of sorting, grouping, summing, filtering, and formatting structured data.

Reporting analysis

________ are business intelligence documents that are fixed at the time of creation and do not change.

Static reports

Which of the following statements is true of business intelligence (BI) systems?

Business intelligence systems analyze an organization's past performance to make predictions.

In the case of ________, data miners develop models prior to conducting analyses and then apply statistical techniques to data to estimate parameters of the models.

supervised data mining

The ________ of business intelligence servers maintains metadata about the authorized allocation of business intelligence results to users.

management function

________ is the process of delivering business intelligence to users without any request from the users.

Push publishing

Which of the following statements is true of a data warehouse?

A data warehouse is larger than a data mart.

The goal of ________, a type of business intelligence analysis, is to create information about past performance.

reporting analyses

Which of the following statements is true of BigData?

BigData refers to data sets that are at least a petabyte in size.

In the ________ phase, a BigData collection is broken into pieces and hundreds or thousands of independent processors search these pieces for something of interest.

map

A ________ pretends to be a legitimate company and sends emails requesting confidential data.

phisher

A(n) ________ is a measure that individuals or organizations take to block a threat from obtaining an asset.

safeguard

Backup and recovery against computer security threats are ________.

data safeguards

Which of the following uses an individual's personal physical characteristics such as fingerprints, facial features, and retinal scans for verification purposes?

biometric authentication

Adware and spyware are similar to each other in that they both ________.

reside in the background and observe a user's behavior

Which of the following information should be provided by users of smart cards for authentication?

personal identification number

A(n) ________ includes how employees should react to security problems, whom they should contact, the reports they should make, and steps they can take to reduce further loss.

incident-response plan

Mark receives an email from his bank asking him to update and verify his credit card details. He replies to the mail with all the requested details. Mark later learns that the mail was not actually sent by his bank and that the information he had shared h

phishing

Which of the following statements is true of the financial losses due to computer crimes?

All studies on the costs of computer crimes are based on surveys.

The procedure of entrusting a party with a copy of an encryption key that can be used in case the actual key is lost or destroyed is called ________.

key escrow

________ a site means to take extraordinary measures to reduce a system's vulnerability.

Hardening

________ is a broad category of software that includes viruses, worms, Trojan horses, spyware, and adware.

Malware

A(n) ________ examines the source address, destination address, and other data of a message and determines whether to let that message pass.

packet-filtering firewall

Which of the following are the three independent factors that constitute the enforcement of security procedures and policies?

responsibility, accountability, and compliance

With https, data are encrypted using a protocol called the ________.

Secure Sockets Layer (SSL)

In terms of password management, when an account is created, users should ________.

immediately change the password they are given to a password of their own

A person calls the Stark residence and pretends to represent a credit card company. He asks Mrs. Stark to confirm her credit card number. This is an example of ________.

pretexting

________ is the process of transforming clear text into coded, unintelligible text for secure storage or communication.

Encryption

________ are viruses that masquerade as useful programs like a computer game, an MP3 file, or some other useful innocuous program.

Trojan horses

________ occurs when computer criminals invade a computer system and replace legitimate programs with their own unauthorized ones.

Usurpation

The ________ group investigates new information systems and determines how the organization can benefit from them.

Technology

Which of the following is a responsibility of an information systems (IS) user?

following security and backup procedures

The ________ group within the information systems (IS) department manages the process of creating new information systems as well as maintaining existing information systems.

development

Which of the following is an advantage of outsourcing information systems?

It can be an easy way to gain expertise otherwise not known.

In ________, hardware and both operating system and application software are leased.

software as a service (SaaS)

Which of the following is true of the alignment between information systems and organizational strategies?

Information systems must evolve with changes made in organizational strategies.

A ________ designs and writes computer codes.

programmer

An organization that wishes to leverage the power of social media and elastic cloud opportunities to help accomplish its goals and objectives should ideally turn to the ________ group within its IT department for information.

technology

The ________ group's purpose is to protect information assets by establishing standards and management practices and policies.

data administration

Which of the following staff functions is at the top-most level of a typical senior-level reporting relationship?

chief operating officer (COO)

In organizations where primary information systems support only accounting activities, a reporting arrangement wherein the chief information officer reports to the ________ is practical.

chief financial officer

Which of the following is true if the development group of a company's information systems (IS) department is staffed primarily by programmers, test engineers, technical writers, and other development personnel?

The company develops programs in-house.

A(n) ________ committee is a group of senior managers from the major business functions that works with the chief information officer to set information systems (IS) priorities and decide major IS projects and alternatives.

steering

________ is a title given to the principal manager of an organizations IS department

Chief information officer

Which of the following is a responsibility of a small-scale project manager?

Initiate, plan, manage, monitor, and close down projects.

In order to accomplish organizational goals and objectives, an organization's information systems (IS) must be aligned with its ________.

competitive strategy

In organizations that operate significant nonaccounting information systems, such as manufacturers, a reporting arrangement wherein the chief information officer reports to the ________ is more common and effective.

chief executive officer

Which of the following is a right of a user of information systems (IS)?

contributing to requirements for new system features and functions

Which of the following is a risk of outsourcing information systems?

Vendors can gain access to critical knowledge of the outsourcing company.

If a company's information systems (IS) related programs are not developed in-house, then the development group of the IS department will be staffed primarily by ________.

systems analysts

Normal processing procedures for operations personnel involve procedures for ________.

starting, stopping, and operating the system

Olive Inc., a chain of retail outlets, is converting its existing billing systems to a more robust online tool. In this process, the organization runs both the old and the new systems to compare their performances. In this case, the company is implementin

parallel

Which of the following is a major concern for developers in a systems development life cycle process?

performing repetitive tasks of a completed phase

The easiest and cheapest time to alter an information system is in the ________ phase of the systems development life cycle.

requirements analysis

Which of the following personnel in a development team has the final say on whether a system is ready for use?

users

Which of the following steps in the systems definition process aims to eliminate obviously nonsensible projects?

Assess the project feasibility.

Which of the following is the most expensive style of system conversion?

parallel installation

Which of the following statements is true of the composition of a development team over the different phases of the systems development life cycle?

During integrated testing and conversion, the team will be augmented with business users.

Software developers group the fixes for high-priority failures into a group that can be applied to all copies of a given product called a ________.

patch

During requirements definition, a development team's composition will be typically heavy with ________.

systems analysts

Which of the following statements is true of systems development?

It requires business knowledge and an understanding of group dynamics.

During the ________ phase of the systems development life cycle process, developers construct, install, and test the components of the information system.

implementation

During design and implementation, a development team will be heavy with ________.

programmers

When compared to program development, systems development is ________.

broader in scope

Which of the following is the first phase of the systems development life cycle?

system definition

Which of the following styles of system conversion shuts off the old system and starts a new system?

plunge installation

In a ________ installation, an organization implements an entire system on a limited portion of the business.

pilot

Which of the following statements is true of information systems?

They can be adapted to fit business needs.

In which of the following phases of the systems development life cycle do developers identify the particular features and functions of a new system?

requirements analysis

According to Brooks' Law, which of the following is a consequence of adding more people to late projects?

The costs of training new people can overwhelm the benefits of their contribution.

Data breach notifications to users should include ________.

a sincere apology and an acceptance of responsibility for the incident

________ refers to the process of placing a small charge on a credit card to ensure it is working.

Carding

Executives, managers, and all systems personnel of an organization discuss the actions to be taken by each employee in case a data breach occurs. They identify areas that would need immediate attention and assign specific responsibilities to each employee

walkthrough

A(n) ________ is a hierarchy of the tasks required to complete a project.

work breakdown structure

Venclave Hospital is a privately-owned organization that specializes in treating neurological diseases. Which of the following regulatory laws governs the data security measures to be taken by this hospital for protecting against data breach?

the Health Information Portability and Accountability Act (HIPAA)

Which of the following is a direct cost of handling a data breach?

legal fees and consultation

________ are software or procedures used to prevent an information security attack.

the Health Information Portability and Accountability Act (HIPAA)