Info System in Management Ch9-Ch12

D.
interpreting

A business intelligence reporting application is likely to employ all of the following basic operations except? _______.
A.
summing
B.
formatting
C.
filtering
D.
interpreting
E.
calculating

A.
by finding parts ordered in large quantities

The bicycle parts distributor described in the textbook used a BI system to find candidate parts for the sale of 3D parts designs by using all of the following? criteria, except? ________.
A.
by finding parts ordered in large quantities
B.
by finding part

A.
missing values

A major problem with data that is purchased from data vendors is? ________.
A.
missing values
B.
inconsistent data
C.
nonintegrated data
D.
granularity is too small
E.
granularity is too large

C.
data warehouse

?A(n) __________ is a facility for managing an? organization's business intelligence data.
A.
data inventory
B.
data distributor
C.
data warehouse
D.
operational database
E.
transaction facility

D.
only select items with a unit price of more than? $100

When the bicycle parts distributor described in the textbook acquired data for its BI system from its operational? database, it used all of the following filtering? conditions, except? ________.
A.
only select items that were ordered in average quantities

C.
small size of the content databases

The challenges associated with content management systems include all of the following except? ________.
A.
need to support multiple languages
B.
short content? "shelf-life"
C.
small size of the content databases
D.
frequent change in the content
E.
compl

B.
Business intelligence? (BI) systems

?__________ process? operational, social, and other data to identify? patterns, relationships, and trends for use by business professionals.
A.
Transaction processing systems? (TPS)
B.
Business intelligence? (BI) systems
C.
Expert systems? (ES)
D.
Compute

C.
Real simple syndication

Which of the following is a standard for subscribing to content? sources?
A.
Data transfer protocol
B.
EDI application
C.
Real simple syndication
D.
Knowledge discovery in databases
E.
Online analytical processing

D.
the analyst must develop explanations for patterns after observing the pattern

One of the challenges with unsupervised data mining is? ________.
A.
the statistical methods used are complex
B.
data mining is difficult to do without supervision
C.
it is rarely performed
D.
the analyst must develop explanations for patterns after obser

D.
informational purposes

An employee at Falcon Security is studying an analysis of data that compares the actual number of drone flights over the last month with the planned number of drone flights. Falcon Security is using the analysis for? __________.
A.
forecasting
B.
decision

A.
rumors

Which of the following is not typically included as a data source for business? intelligence?
A.
rumors
B.
operational databases
C.
purchased data
D.
employee knowledge
E.
social data

D.
?market-basket analysis

A data mining technique that has proven very useful in helping salespeople increase sales through? cross-selling is called? ________.
A.
cluster analysis
B.
support analysis
C.
combined analysis
D.
?market-basket analysis
E.
regression analysis

...

A BI system enabled Target to identify customers who might be pregnant by? ________.
A.
sending customers coupons for diapers and seeing what got used
B.
identifying what songs customers listened to
C.
customer purchasing patterns of lotions and vitamins

C.
Big Data can be processed with traditional techniques.

Among the following? statements, which one is NOT applicable to Big? Data?
A.
Big Data can consist of multimedia files such as? graphics, audio, and video.
B.
Big Data data sets are at least a petabyte in size.
C.
Big Data can be processed with traditiona

B.
it can be made coarser by summing and combining

When the granularity of data is too? fine, ________.
A.
it will all have to be discarded
B.
it can be made coarser by summing and combining
C.
an extraction project will be needed
D.
it can be separated into smaller components
E.
the troublesome parts can

C.
111

An RFM score of? ________ probably means this customer has taken their business elsewhere and is most likely not worth spending too many marketing resources on.
A.
121
B.
555
C.
111
D.
333
E.
321

D.
the machines that are running the analysis will possess and create information for themselves

A future concern about unsupervised data mining applications is? _________.
A.
they will be unlikely to exist due to high storage costs
B.
they will lack sufficient data to be useful
C.
they will be ineffective due to poor data mining techniques
D.
the ma

D.
MapReduce

Breaking a Big Data collection into? pieces, applying a large number of simultaneous processors to search the? pieces, then combining the results is known as? ________.
A.
Cluster Analysis
B.
Reduction Analysis
C.
Data Matching
D.
MapReduce
E.
Data Mappin

B.
filter data

The functions of a data warehouse are to do all of the? following, except? ________.
A.
catalog data
B.
filter data
C.
organize and relate data
D.
cleanse data
E.
obtain data

C.
decision making

An employee at Falcon Security is studying an analysis of data regarding the occurrence of problems and failures with its drones and cameras. Based on the? analysis, the employee may schedule maintenance on the equipment. Falcon Security is using the anal

A.
BI server

A(n) _________ produces dynamic? reports, supports? alerts/RSS functionality, and supports user subscriptions.
A.
BI server
B.
SharePoint server
C.
Web server
D.
email server
E.
file server

A.
Data mining

?________ involves searching for patterns and relationships among data.
A.
Data mining
B.
Data processing
C.
Data warehousing
D.
Knowledge management
E.
Data marting

E.
metadata

A key aspect of a data warehouse is the? __________ describing the? data's source,? format, assumptions and constraints.
A.
data extraction program
B.
megadata
C.
data cleansing program
D.
data organizing program
E.
metadata

E.
Expert systems

________ attempt to capture human expertise and put it into a format that can be used by? non-experts.
A.
Fuzzy logic systems
B.
Neural networks
C.
CMS systems
D.
RSS services
E.
Expert systems

D.
data marts

If an organization wishes to provide a data collection focused on the needs of a single department or functional area of the? business, it will? employ______.
A.
data mining
B.
data processing
C.
data facilities
D.
data marts
E.
knowledge management

D.
firewalls

Organizations? (and you? personally) can use one or more? _________ to filter the data transmissions allowed into your computer network.
A.
data moats
B.
security fences
C.
screens
D.
firewalls
E.
brick walls

E.
?vulnerable; safeguards

When a person transmits personal data over the Internet in the course of a? transaction, the transmitted data is? _________ to threats unless appropriate? ________ are taken.
A.
?immune; countermeasures
B.
?invulnerable; threats
C.
?exposed; loss leaders

D.
harden

The best safeguard from threats from public users of Web sites is to? ______ the site against attack.
A.
protect
B.
?Teflon-ize
C.
encrypt
D.
harden
E.
emboss

D.
Unauthorized data disclosure

A university professor accidently leaves a sheet of paper in a classroom containing the scores on the recent exam for the? class, listed by student ID number. This represents what type of? loss?
A.
Loss of infrastructure
B.
Faulty service
C.
Incorrect dat

A.
intrusion detection system

Organizations use? a(n) ______________ to sense when another computer is attempting to scan or access a computer or network.
A.
intrusion detection system
B.
crossing guard system
C.
threat catalog
D.
network sentinel
E.
data scanner

B.
technical

The use of usernames and passwords is an important? _________ safeguard to identify and authenticate legitimate users of the system.
A.
firewall
B.
technical
C.
human
D.
malware
E.
data

C.
?security; freedom

If an organization takes a strong position and mandates that its employees create strong? passwords, it is engaging in a? trade-off between? ________ and? ________.
A.
?convenience; compliance
B.
?cost; safety
C.
?security; freedom
D.
?compliance; safety

A.
Major incidents of cyberwarfare are likely

Which of the following is likely to occur in the next 10? years?
A.
Major incidents of cyberwarfare are likely.
B.
Threats from? cyber-gangs will cease to exist.
C.
Improvements in technology will mean cloud vendors will no longer need to invest in safegu

C.
back up your browsing? history, temporary? files, and cookies

All of the following statements are good practices to protect against security? threats, except? ________.
A.
never send valuable data such as credit card numbers in email or IM
B.
do not use the same password for all your accounts
C.
back up your browsin

E.
Advanced Persistent Threats

?Long-term attacks focused on stealing confidential data and intellectual property that are perpetrated by? large, well-funded organizations are called? __________.
A.
criminal hack threats
B.
denial of service attacks
C.
repetitive threat syndrome
D.
hac

C.
escrow

A safety procedure that enables a trusted party to have a copy of the encryption key is called key? ________.
A.
CRM
B.
encryption
C.
escrow
D.
exchange
E.
data safeguard

E.
business disruption

Studies of computer crime reveal that? ________ is the single most expensive consequence of computer crime.
A.
employee confusion
B.
infrastructure damage
C.
information loss
D.
equipment loss
E.
business disruption

D.
biometric

Because users often neglect to create strong? passwords, some organizations choose to also employ? ______ authentication using fingerprint scans or retina scans.
A.
biological
B.
human
C.
smart
D.
biometric
E.
feature

A.
Honeypots

?________ are false targets for computer criminals to attack.
A.
Honeypots
B.
Bot herders
C.
Beacons
D.
Hot sites
E.
Bot nets

C.
least possible privilege

When user accounts are defined so that the user has access only to the minimum data and actions required in order to complete? his/her job? responsibilities, the principle of? ___________ is in use.
A.
compliance
B.
separation of duties
C.
least possible

B.
Encryption

__________ is a technical safeguard that ensures that if stored or transmitted data is stolen it cannot be understood.
A.
Identification
B.
Encryption
C.
Malware protection
D.
A firewall
E.
Authentication

C.
brute force attacks

Use of strong passwords helps protect against? ________ in which computing power is used to try every possible combination of characters to guess the password.
A.
spamming attacks
B.
insider attacks
C.
brute force attacks
D.
spoofing attacks
E.
light touc

D.
?incident-response plan

Human safeguards involve the people and procedural components of information systems. All of the following constitute effective human? safeguards, except? ________.
A.
termination
B.
dissemination and enforcement
C.
position definition
D.
?incident-respon

B.
has six or fewer characters

The most secure and? hard-to-break passwords have all of the following? characteristics, except? ________.
A.
has uppercase and lowercase characters
B.
has six or fewer characters
C.
contains no word in any language
D.
is a mix of letters and numbers
E.
c

C.
whether data marting will be tolerated

Organizational security policies should address all of the following issues with the exception of? ________.
A.
how employees and others can request changes to inaccurate data
B.
what sensitive data the organization will store
C.
whether data marting will

D.
Hacking of information systems

Which of the following is considered a computer? crime?
A.
Poorly written programs resulting in data losses
B.
Data corruption through inaccurate updates
C.
Loss of data as a result of flooding
D.
Hacking of information systems
E.
Internal software bug de

E.
Trojan horse

A? _________ is a type of malware that masquerades as a useful program or? file, but actually does significant damage.
A.
caterpillar
B.
worm
C.
spoofer
D.
fireplug
E.
Trojan horse

D.
phishing

An email message that appears legitimate arrives in your inbox from your bank and asks you to click on a link in the message and enter your username and password in order to? "protect" your account. This should cause you to suspect? a(n) __________ attack

E.
?incident-response plan

A(n) ________ will stipulate what an employee should do when he notices something like a virus.
A.
safeguard
B.
malicious code
C.
firewall
D.
cookie
E.
?incident-response plan

B.
malicious insiders

According to recent? research, the source of most of the increase in computer crime costs is? ________.
A.
phishers
B.
malicious insiders
C.
crime syndicates
D.
spoofers
E.
hackers

B.
Manage the computing infrastructure

Among the following? responsibilities, which is NOT a responsibility of the? CIO?
A.
Run the steering committees that review projects.
B.
Manage the computing infrastructure.
C.
Establish priorities for new projects.
D.
Oversee and negotiate outsourcing r

D.
gain expertise

One of the management advantages of outsourcing is that the company can? ________.
A.
reduce time for approving IS projects
B.
have greater control over its operations
C.
get remote support
D.
gain expertise
E.
have unattended installations

A.
an example of a? user's rights

Ensuring end users get prompt attention to their problems is? __________.
A.
an example of a? user's rights
B.
always an outsourcing issue
C.
an expectation of external customers
D.
a steering? committee's responsibility
E.
an example of a? user's respons

A.
Present the executive staff with IS integration issues that will be needed to achieve a successful merger

An organization is contemplating a merger opportunity. Which of the following statements correctly summarizes the role of the CIO during the executive? staff's merger? discussions?
A.
Present the executive staff with IS integration issues that will be nee

D.
Obtaining reliable network and Internet connections

Which of the following is NOT a? user's responsibility?
A.
Using computers and mobile devices according to your? employer's computer-use policy
B.
Protecting your password
C.
Learning the correct procedures for using the applications you need
D.
Obtaining

A.
outsourcing

Hiring another organization to perform a service is known as? ____________.
A.
outsourcing
B.
insourcing
C.
service arrangement
D.
contracting
E.
subcontracting

E.
there is no easy exit

The ABC Company has become dissatisfied with the services provided by its IS outsourcing firm because the outsourcing firm was recently acquired by another organization and is no longer prioritizing services to ABC. The outsourcing firm has more knowledge

A.
chief information officer? (CIO)

Although the title may vary among? organizations, a common title of the principal manager of the IS department is? ____________.
A.
chief information officer? (CIO)
B.
chief data administrator? (CDA)
C.
chief information manager? (CIM)
D.
chief informatio

B.
Engineering

The typical IS department in a large organization would contain all of the following groups except? ________.
A.
Technology
B.
Engineering
C.
Development
D.
Operations
E.
Outsourcing Relations

E.
intellectual capital

A major concern with outsourcing is that the company may lose? ________ by being forced to reveal proprietary trade secrets.
A.
projects
B.
market position
C.
market value
D.
employees
E.
intellectual capital

B.
finally become an integral member of the executive team

In ten? years, the CIO will? ________.
A.
usually be the CEO of the organization
B.
finally become an integral member of the executive team
C.
no longer be a position in most organizations
D.
play a diminished role in the organization
E.
be replaced by ou

B.
managing the charge back of information system resource usage

The major planning functions of the information systems department include the? following, except? ________.
A.
sponsor steering committees
B.
managing the charge back of information system resource usage
C.
developing priorities and enforcing them within

D.
SaaS

Leasing hardware? infrastructure, operating system? software, and application software is feasible and is an example of? ________.
A.
insourcing
B.
PaaS
C.
software licenses
D.
SaaS
E.
IaaS

A.
protect your password

Employees who create weak passwords or who carelessly share passwords with others are violating which? responsibility?
A.
protect your password
B.
learning basic computing skills
C.
perform backups as requested
D.
apply patches and fixes when asked
E.
fol

A.
Enable users to contribute to requirements for new system features and functions

During the Requirements Definition stage of a systems development? project, the employees who will be the primary users of the new system are not asked about their needs. The IS department is violating which of its? responsibilities?
A.
Enable users to co

D.
sponsoring a steering committee

When planning the use of? IS/IT, the IS department should have a group of senior managers from the major business functions that works with the CIO to set the IS priorities and decide among major IS projects and alternatives. This example is part of? ____

C.
a degree in computer engineering

Professional careers in Information Systems require all of the following except? ________.
A.
a degree in business
B.
good written communication skills
C.
a degree in computer engineering
D.
a? four-year degree
E.
good verbal communication skills

A.
chief executive officer? (CEO)

In a manufacturing organization that makes extensive use of information systems in manufacturing? operations, it is common to see the leader of the IS organization report to the? ________.
A.
chief executive officer? (CEO)
B.
chief security officer? (CSO)

E.
that there is no easy way of exiting the outsourcing agreement

Companies that outsource face a certain loss of control when they hire other organizations to perform certain services. A particular disadvantage related to the loss of control is? ________.
A.
that the? vendor's employees have gained significant knowledg

B.
The company develops programs? in-house

The development group in a? company's IS department is staffed primarily by? programmers, test? engineers, technical? writers, and other development personnel. Based on this? information, which of the following is most likely to be? true?
A.
The company o

B.
prosecute hackers

The IS department has responsibility for all of the following functions except? ____________.
A.
plan the use of IS to accomplish organizational goals and strategy
B.
prosecute hackers
C.
manage outsourcing relationships
D.
protect information assets
E.
?

B.
chief technology officer? (CTO)

The responsibility for evaluating new? technologies, new? ideas, and new capabilities and identifying those that are most relevant to the organization is typically assigned to the? _______.
A.
chief information security officer? (CISO)
B.
chief technology

C.
ending

Because the company and the outsourcing vendor can become so tightly? integrated, ________ the agreement can be very costly and risky.
A.
evaluating
B.
suspending
C.
ending
D.
extending
E.
estimating

C.
reliable

When network access and Internet services are? ________, it means that the users can do all their required processing without any problems nearly all of the time.
A.
proactive
B.
restricted
C.
reliable
D.
congested
E.
encrypted

E.
protection from? viruses, worms, and other threat

Among the rights you have as a user of computing resources is the right to? _______.
A.
treat your password carelessly
B.
report trivial problems
C.
use your own mobile device in any way you want at work
D.
ignore the standard techniques for using applica

E.
?swim-lane layout

In a BPMN process? diagram, you can use? ________ to simplify process diagrams and draw attention to interactions between roles.
A.
process flowchart
B.
rectangles with rounded corners
C.
organizational charts
D.
message flows
E.
?swim-lane layout

B.
activities

A business process consists of one or more? _______, many of which are supported by information systems.
A.
operations
B.
activities
C.
processes
D.
programs
E.
people

E.
New computer hardware is available.

Business processes may need to change and require management for many reasons. Which of the following is not likely to be the cause of changes to business? processes?
A.
The process may be using resources poorly.
B.
The process needs to adopt new technolo

B.
a change in business fundamentals

In a vertical integration? move, a supplier organization has been acquired. This will necessitate a change in business processes due to? ___________.
A.
process inefficiency
B.
a change in business fundamentals
C.
process ineffectiveness
D.
technology cha

A.
business analyst

A? __________ ensures that business processes and information systems meet the? organization's competitive strategies.
A.
business analyst
B.
systems analyst
C.
operations analyst
D.
technology analyst
E.
computer engineer

D.
requirements analysis

The easiest and cheapest time to alter the information system is in the? ________ phase.
A.
implementation
B.
system definition
C.
component design
D.
requirements analysis
E.
system maintenance

B.
system definition

The initial assessment of feasibility is made in the? ________ phase of the systems development life cycle.
A.
system maintenance
B.
system definition
C.
requirements analysis
D.
implementation
E.
component design

D.
Business process modeling notation? (BPMN)

?________ is the standard set of terms and graphical notations for documenting business processes.
A.
Business process execution language
B.
Unified modeling language? (UML)
C.
ISO 9000
D.
Business process modeling notation? (BPMN)
E.
Interface standards

E.
application

A combination of? hardware, software and data that accomplishes a set of requirements is termed? a(n) _________.
A.
host
B.
infrastructure
C.
cloud vendor
D.
process
E.
application

A.
waterfall

The main problem of the SDLC approach to systems development is the? ________ nature of the process.
A.
waterfall
B.
iterative
C.
fluid
D.
cyclical
E.
sporadic

B.
activities

In the? swim-lane format of a business process? model, all? _______ for a role are included in that? role's swim-lane.
A.
programs
B.
activities
C.
forecasts
D.
processes
E.
purposes

E.
ineffective

If an? organization's process of providing services to its customers makes too many? mistakes, it needs to be changed because it is? __________.
A.
inefficient
B.
inadequate
C.
incomprehensible
D.
invalid
E.
ineffective

E.
business functions

The goal of a business process is to align? activities, repositories,? roles, resources and flows so that? __________ are accomplished.
A.
information systems
B.
value chains
C.
strategies
D.
competitive advantages
E.
business functions

B.
COBIT

A set of standard practices that can be used in the assessment stage of the BPM cycle is called? _______.
A.
REFIT
B.
COBIT
C.
ORBIT
D.
BPMN
E.
REVISE

B.
systems will become less integrated

Process and systems development will evolve in the following ways in the next 10? years, except? ________.
A.
the business model of how software vendors make money will change
B.
systems will become less integrated
C.
prototypes and finished systems will

B.
Large complex projects can be managed with scrum

Which of the following statements is not an accurate statement regarding the scrum? process?
A.
Three roles are present to represent the? owner, team? members, and the scrum master.
B.
Large complex projects can be managed with scrum.
C.
In? scrum, the te

D.
IS are related to one or more business? processes; business processes are related to zero or more IS.

Which of the following statements regarding information systems and business processes is? correct?
A.
They are unrelated concepts.
B.
Every business process is related to at least one IS.
C.
Every business process is related to one and only one IS.
D.
IS

E.
systems analyst

?A(n) __________ focuses on IS development and the successful completion of IS development projects following either the SDLC or scrum methodologies.
A.
computer engineer
B.
operations analyst
C.
business analyst
D.
technology analyst
E.
systems analyst

C.
?resources; roles

People and information systems are? _________ that can be assigned to? ______ in a business process.
A.
?resources; repositories
B.
?resources; flows
C.
?resources; roles
D.
?flows; resources
E.
?flows; repositories

A.
creating a model of the existing business processe

The first activity in the business process management cycle is? ________.
A.
creating a model of the existing business processes
B.
implementing processes
C.
creating process components
D.
evaluating results
E.
developing an information system

B.
System? definition; requirements? analysis; component? design; implementation; system maintenance

The correct sequence for the five phases in the systems development life cycle? (SDLC) process is? ________.
A.
Requirements? analysis; component? design; system? definition; implementation; system maintenance
B.
System? definition; requirements? analysis

E.
Adding more people

In considering the? trade-offs for systems development? processes, what could cause diseconomies of? scale?
A.
Reducing budgetary allocations
B.
Unexpected events
C.
Revising requirements
D.
Lack of operational support by users
E.
Adding more people

B.
business process management

Creating new business processes and managing changes to existing processes is known as? ________.
A.
evolutionary development
B.
business process management
C.
the SDLC
D.
application development
E.
agile development

A.
control flow

A flow that directs the order of activities in a business process is termed? a(n) ________.
A.
control flow
B.
information flow
C.
data flow
D.
repository flow
E.
operational flow

D.
pilot

In a? ________ installation, the new system installed in a single location? first, then is rolled out to the entire organization once it is working properly.
A.
direct
B.
parallel
C.
plunge
D.
pilot
E.
phased