BCIS Exam Three

The more attributes there are in a sample data, the easier it is to build a model that fits the sample data, but that is worthless as a predictor. Which of the following best explains this phenomenon?

The curse of dimensionality

________ is the process of delivering business intelligence to users without any request from the users.

Push Publishing

________ is the application of statistical techniques to find patterns and relationships among data for classification and prediction.

Data Mining

Which of the following activities in the business intelligence process involves delivering business intelligence to the knowledge workers who need it?

Publish results

Users in a data mart obtain data that pertain to a particular business function from a ________.

Data Warehouse

In the ________ phase, a BigData collection is broken into pieces and hundreds or thousands of independent processors search these pieces for something of interest.

Map

Which of the following statements is TRUE of a data warehouse?

A data warehouse is larger than a data mart.

________ is the process of obtaining, cleaning, organizing, relating, and cataloging source data.

Data Acquisition

Which of the following statements is TRUE of unsupervised data mining?

Analysts create hypotheses only after performing an analysis.

A ________ is a data collection, smaller than the data warehouse that addresses the needs of a particular department or functional area of a business.

Data Mart

Which of the following is a fundamental category of business intelligence (BI) analysis?

Reporting

A ________ is designed to extract data from operational systems and other sources, clean the data, and store and catalog that data for processing by business intelligence tools.

Data Warehouse

________ is an unsupervised data mining technique in which statistical techniques identify groups of entities that have similar characteristics.

Cluster Analysis

All of the ways below are examples of how BI is used for entertainment EXCEPT ________.

HBO decided to create Game of Thrones because the book was well written

Big Data has ________ meaning that it is generated rapidly.

high velocity

The goal of ________, a type of business intelligence analysis, is to create information about past performance.

Reporting Analyses

What is the query language used in Hadoop?

SQL

________ are reports produced when something out of predefined bounds occurs.

Exception Reports

________ requires users to request business intelligence results.

Pull Publishing

Regression analysis is used in ________.

Supervised Data Mining

Which BI activity would a company be participating in if they were cataloging?

pull publishing (I think)

________ is an open source program supported by the Apache Foundation that manages thousands of computers and that implements MapReduce.

Hadoop

Which of the following statements is TRUE of data with granularity?

It can be too fine or too coarse and also have wrong granularity.

Everyday at 4:30 pm. Julie has a report delivered to her email about the sales for the day. This type of report is a ________.

pull report

A ________ a string of bits used to encrypt the data.

Key

Which of the following is a primary means of authentication?

Passwords

________ take computers with wireless connections through an area and search for unprotected wireless networks.

Wardrivers

________ a site means to take extraordinary measures to reduce a system's vulnerability.

Hardening

Every information system today should require users to sign on with a user name and a password. In this case, which of the following functions is performed by the user's password?

Authentication

Which of the following is an example of a data safeguard?

Physical security

When is the most opportune time for a hacker to steal data?

while IT is restoring data due to a natural disaster

The Grey-Sloan hospital was attached by a virus. The interns should check the ________ for next steps.

incident-response plan

Which of the following uses an individual's personal physical characteristics such as fingerprints, facial features, and retinal scans for verification purposes?

Biometric Authentication

________ is a technique for intercepting computer communications.

Sniffing

In terms of password management, when an account is created, users should ________.

Immediately change the password they are given to a password of their own

Which of the following are the three independent factors that constitute the enforcement of security procedures and policies?

Responsibility, accountability, and compliance

Which of the following type of password guidelines are the easiest to crack?

a six-letter password with upper and lower-case letters

Which of the following types of encryption is used by the secure sockets layer protocol?

Public Key Encryption

Jack installed the incorrect security patch on the server. This is an example of what type of security problem?

faulty service

Backup and recovery against computer security threats are ________.

Data Safeguard

A ________ is a plastic card that has a microchip loaded with identifying data.

Smart Card

Which of the following is a human safeguard against security threats?

Procedure Design

________ is the process of transforming clear text into coded, unintelligible text for secure storage or communication.

Encryption

A person calls the Stark residence and pretends to represent a credit card company. He asks Mrs. Stark to confirm her credit card number. This is an example of ________.

Pretexting

A ________ pretends to be a legitimate company and sends emails requesting confidential data.

Phisher

Which of the following statements is TRUE of symmetric encryption?

It uses the same key for both encoding and decoding

Which of the following statements is TRUE of the financial losses due to computer crimes?

All studies on the costs of computer crimes are based on surveys

Currently, which of the following is NOT true about computer crime according to the Ponemon study?

Security safeguards don't work.

One form of professional behavior is to ________ so that you avoid reporting trivial problems.

learn basic computer skills

An organization that wishes to leverage the power of social media and elastic cloud opportunities to help accomplish its goals and objectives should ideally turn to the ________ group within its IT department for information.

Technology

Which of the following is an advantage of outsourcing information systems?

It can be an easy way to gain expertise otherwise not known

A ________ performs a wide range of activities such as programming, testing, database design, communications and networks, project management, and is required to have an entrepreneurial attitude.

Consultant

A ________ monitors, maintains, fixes, and tunes computer networks.

Network Administrator

Which of the following is a risk of outsourcing information systems?

Vendors can gain access to critical knowledge of the outsourcing company

________ refers to the leasing of hardware with preinstalled operating systems.

Platform as a Service (PaaS)

A(n) ________ committee is a group of senior managers from the major business functions that works with the chief information officer to set information systems (IS) priorities and decide major IS projects and alternatives.

Steering

In an organization, the IS department's principal manager is called the ________.

Chief Information Officer

Bake a lot, Inc has decided they need someone to manage the security for organization's information systems and information. They decide to hire a _______ to handle this task.

Chief Information Security Officer

Which of the following is a right of a user of information systems (IS)?

contributing to requirements for new system features and functions

The ________ group within the information systems (IS) department manages the process of creating new information systems as well as maintaining existing information systems.

Development

In organizations that operate significant nonaccounting information systems, such as manufacturers, a reporting arrangement wherein the chief information officer reports to the ________ is more common and effective.

Chief Executive Officer

Which of the following is a responsibility of an information systems (IS) user?

Following security and backup procedures

In order to accomplish organizational goals and objectives, an organization's information systems (IS) must be aligned with its ________.

Competitive Strategy

Which of the following statements is TRUE of the development group of a company's information systems (IS) department?

The size and structure of the group depends on whether programs are developed in-house or outsourced.

The ________ group's purpose is to protect information assets by establishing standards and management practices and policies.

Data Administration

________ is the process of hiring another organization to perform a service.

Outsourcing

The chief information security officer (CISO) reports to the ________.

chief information officer

Which of the following is a responsibility of a systems analyst?

determining system requirements

Which of the following is a responsibility of a small-scale project manager?

Initiate, plan, manage, monitor, and close down projects

In which of the following phases of the systems development life cycle do developers identify the particular features and functions of a new system?

Requirement Analysis

Normal processing procedures for operations personnel involve procedures for ________.

starting, stopping, and operating the system

When compared to program development, systems development is ________.

Broader Scope

The first major task of the project team is to ________.

plan the project

Which of the following is the first phase of the systems development life cycle?

System Definition

The process of creating and maintaining information systems is called ________.

Systems Development

Olive Inc., a chain of retail outlets, is converting its existing billing systems to a more robust online tool. In this process, the organization runs both the old and the new systems to compare their performances. In this case, the company is implementin

Parallel

During design and implementation, a development team will be heavy with ________.

Programmers

Which of the following statements is TRUE of system maintenance?

All commercial software products are shipped with known failures.

A design team decides the requirements of a new system are very complicated. They want to show a ________ to the users so they can interact with the new features before the full system is built. This process will also allow users to remember any features

prototype

All of the following are new technologies to deal with the issues of SDLC EXCEPT ________.

object-oriented development
extreme programming

A comprehensive test plan should ________.

cause every line of program code to be executed

________ testing is the process of allowing future system users to try out a new system on their own.

Beta

Which of the following is the most important phase in the SDLC?

Determine the system's requirements

________ feasibility concerns whether a new information system fits within a company's customs, culture, charter, or legal requirements.

Organizational

Which of the following statements is TRUE of information systems?

They can be adapted to fit business needs.

All of these statements are true about the maintenance phase EXCEPT ________.

system test happens during this phase

If a new system involves a new database or substantial changes to an existing database, then the development team will have to create a(n) ________.

Data model

Which of the following steps in the systems definition process aims to eliminate obviously nonsensible projects?

Assess the project feasibility

According to Brooks' Law, adding more people to a late project ________.

Makes the project later

Which of the following statements is TRUE of the composition of a development team over the different phases of the systems development life cycle?

During integrated testing and conversion, the team will be augmented with business users.

The budget was tight when the project entered the testing phase so Bob decided to implement the ________ for the new system. It was a disaster because the customer service agents could not log in to their accounts. So the testing team had to come and rein

plunge installation method

When developing a budget for a large, multi-year projects estimations are ________.

accurate because of past projects
so approximate they are not real
easy based on management experience

In a ________ installation, an organization implements an entire system on a limited portion of the business.

Pilot

During requirements definition, a development team's composition will be typically heavy with ________.

Systems Analysts

Which of the following problems is particularly common for data that have been gathered over time?

Lack of consistency

Which of the following occurs when millions of bogus service requests flood a Web server and prevent it from servicing legitimate requests?

Denial of service

A(n) ________ examines the source address, destination address, and other data of a message and determines whether to let that message pass.

Packet-filtering firewall

The _________ can delete programs or data or even modify data in undetected ways.

Payload

Which of the following is TRUE if the development group of a company's information systems (IS) department is staffed primarily by programmers, test engineers, technical writers, and other development personnel?

The company develops programs in-house.

Which of the following is TRUE of the alignment between information systems and organizational strategies?

Information systems must evolve with changes made in organizational strategies.

Which of the following statements is TRUE of systems development?

It requires business knowledge and an understanding of group dynamics.

According to Brooks' Law, which of the following is a consequence of adding more people to late projects?

The costs of training new people can overwhelm the benefits of their contribution

In the ________ phase of the systems development life cycle, developers use management's statement of the system needs in order to develop a new information system.

System definition

During the ________ phase of the systems development life cycle process, developers construct, install, and test the components of the information system.

Implementation

...

...