BCIS exam3 review

________ is the process of obtaining, cleaning, organizing, relating, and cataloging source data

acquisition

________ is a technique for harnessing the power of thousands of computers working in parallel

MapReduce

________ analysis is a way of analyzing and ranking customers according to their purchasing patterns

RFM

Which of the following statements is true of source data for a business intelligence (BI) system?

Business intelligence systems analyze an organization's past performance to make predictions.

Problematic operational data is termed as ________.

dirty data

Knowledge management (KM) benefits organizations because it ________.

improves process quality and increases team strength

A ________ takes data from the data manufacturers, cleans and processes the data, and locates the data on the shelves.

data warehouse

Which of the following is a characteristic of decision trees?

They are used to select variables that are then used by other types of data mining tools.

Which of the following statements is true about business intelligence (BI) publishing alternatives?

Publishing dynamic BI is more difficult than publishing static content.

In market-basket terminology, ________ describes the probability that two items will be purchased together.

SUPPORT

When an employee is terminated, IS administrators should receive advance notice so that they can ________.

remove the user account and password

With ________, the sender and receiver transmit a message using different keys.

asymmetric encryption

Removing and disabling ________ that may contain sensitive security data presents an excellent example of the trade-off between improved security and cost.

cookies

Kate was among the top ten applicants for an honorary scholarship at her university. The scholarship would be decided by a written exam and an interview. Kate had outperformed the others in the interview, but she was not sure of her written exam's results

hacking

In the context of malware protection, the program code that causes the unwanted actions is called the ________.

payload

________ are viruses that masquerade as useful programs or files.

Trojan horses

________ present(s) the largest risk for an organization's infrastructure loss.

Natural disasters

________ is a function pertaining to a particular database that develops procedures and practices to control and protect the database.

Database administration

A ________ is a type of virus that self-propagates using the Internet or other computer network.

worm

Which of the following statements is true about human safeguards for employees?

User accounts should be defined to give users the least possible privilege needed to perform their jobs.

Which of the following statements is true about information systems (IS) planning functions?

The steering committee represents the IS department exclusively in high-level discussions.(WW)

If an organization does not develop programs in-house, then the development group of the information system (IS) department will be staffed primarily by ________ who work with users, operations, and vendors to acquire and install licensed software and to

business and systems analyst

KPL Inc. is an outsource vendor. It handles the recruiting process for Numero Uno Computers. KPL recently changed its business strategy to a more profit-oriented one. This modification would require the company to charge more for its services. This change

loss of control

Which of the following statements is true about the changes and developments foreseen by the year 2026?

Most organizations will move their internal hardware infrastructure into the cloud.

SFA Inc. has a team of ten information systems (IS) personnel. The personnel are kept busy throughout the day as they help employees solve even the most trivial issues. In which of the following ways can the employees assist the IS personnel in this scena

learning basic computer skills

Which of the following statements is true about users of information systems?

They should learn standard techniques and procedures for the applications they use.

Which of the following statements is true of the operations group in an organization's information system (IS) department?

it monitors the UX and responds to their problems

Which of the following is a responsibility of a chief information officer (CIO)?

serving as the principal manager of the IS dept

Which of the following statements is true of the information systems (IS) department?

The operations group monitors user experience and responds to user problems.

Developing, operating, and maintaining an organization's computing infrastructure is a major function of the ________ department.

IS

According to the scrum process, once the tasks are known for a given set of requirements, the next step is to assign each task a difficulty score, called ________.

points

In business process management (BPM), an as-is model ________.

documents the existing business process

In the system implementation phase of the systems development life cycle (SDLC), with the ________ installation, the organization installs the next piece of the system only after the previous piece works.

maintaining the system

Which of the following is the key to successful systems development life cycle (SDLC) projects?

work breakdown structure

In the system implementation phase of the systems development life cycle (SDLC), with ________ installation, the organization implements the entire new system/business processes on a limited portion of the business.

pilot

ACES is a quality auditing firm. It has dedicated a team of managers, business analysts, and system analysts to develop an information system that receives data and produces quarterly reports that grade companies on their quality rating. The team is using

Requirements analysis

In the system implementation phase of the systems development life cycle (SDLC), with ________ installation, the new system runs alongside the old one until it has been tested and is fully operational.

parallel

During the system implementation phase of the systems development life cycle (SDLC), once a system has passed testing, the organization installs the new system. Which of the following terms is used to refer to this activity?

system conversion

Which of the following statements is true about the relationship between business processes and information systems?

Starting with processes and working toward systems is more likely to result in processes and systems that are aligned with the organization's strategy and direction.

In a business process, a role refers to ________.

activities