The more attributes there are in a sample data, the easier it is to build a model that fits the sample data, but that is worthless as a predictor. Which of the following best explains this phenomenon?
The curse of dimensionality
________ is the process of delivering business intelligence to users without any request from the users.
Push Publishing
________ is the application of statistical techniques to find patterns and relationships among data for classification and prediction.
Data Mining
Which of the following activities in the business intelligence process involves delivering business intelligence to the knowledge workers who need it?
Publish results
Users in a data mart obtain data that pertain to a particular business function from a ________.
Data Warehouse
In the ________ phase, a BigData collection is broken into pieces and hundreds or thousands of independent processors search these pieces for something of interest.
Map
Which of the following statements is TRUE of a data warehouse?
A data warehouse is larger than a data mart.
________ is the process of obtaining, cleaning, organizing, relating, and cataloging source data.
Data Acquisition
Which of the following statements is TRUE of unsupervised data mining?
Analysts create hypotheses only after performing an analysis.
A ________ is a data collection, smaller than the data warehouse that addresses the needs of a particular department or functional area of a business.
Data Mart
Which of the following is a fundamental category of business intelligence (BI) analysis?
Reporting
A ________ is designed to extract data from operational systems and other sources, clean the data, and store and catalog that data for processing by business intelligence tools.
Data Warehouse
________ is an unsupervised data mining technique in which statistical techniques identify groups of entities that have similar characteristics.
Cluster Analysis
All of the ways below are examples of how BI is used for entertainment EXCEPT ________.
HBO decided to create Game of Thrones because the book was well written
Big Data has ________ meaning that it is generated rapidly.
high velocity
The goal of ________, a type of business intelligence analysis, is to create information about past performance.
Reporting Analyses
What is the query language used in Hadoop?
SQL
________ are reports produced when something out of predefined bounds occurs.
Exception Reports
________ requires users to request business intelligence results.
Pull Publishing
Regression analysis is used in ________.
Supervised Data Mining
Which BI activity would a company be participating in if they were cataloging?
pull publishing (I think)
________ is an open source program supported by the Apache Foundation that manages thousands of computers and that implements MapReduce.
Hadoop
Which of the following statements is TRUE of data with granularity?
It can be too fine or too coarse and also have wrong granularity.
Everyday at 4:30 pm. Julie has a report delivered to her email about the sales for the day. This type of report is a ________.
pull report
A ________ a string of bits used to encrypt the data.
Key
Which of the following is a primary means of authentication?
Passwords
________ take computers with wireless connections through an area and search for unprotected wireless networks.
Wardrivers
________ a site means to take extraordinary measures to reduce a system's vulnerability.
Hardening
Every information system today should require users to sign on with a user name and a password. In this case, which of the following functions is performed by the user's password?
Authentication
Which of the following is an example of a data safeguard?
Physical security
When is the most opportune time for a hacker to steal data?
while IT is restoring data due to a natural disaster
The Grey-Sloan hospital was attached by a virus. The interns should check the ________ for next steps.
incident-response plan
Which of the following uses an individual's personal physical characteristics such as fingerprints, facial features, and retinal scans for verification purposes?
Biometric Authentication
________ is a technique for intercepting computer communications.
Sniffing
In terms of password management, when an account is created, users should ________.
Immediately change the password they are given to a password of their own
Which of the following are the three independent factors that constitute the enforcement of security procedures and policies?
Responsibility, accountability, and compliance
Which of the following type of password guidelines are the easiest to crack?
a six-letter password with upper and lower-case letters
Which of the following types of encryption is used by the secure sockets layer protocol?
Public Key Encryption
Jack installed the incorrect security patch on the server. This is an example of what type of security problem?
faulty service
Backup and recovery against computer security threats are ________.
Data Safeguard
A ________ is a plastic card that has a microchip loaded with identifying data.
Smart Card
Which of the following is a human safeguard against security threats?
Procedure Design
________ is the process of transforming clear text into coded, unintelligible text for secure storage or communication.
Encryption
A person calls the Stark residence and pretends to represent a credit card company. He asks Mrs. Stark to confirm her credit card number. This is an example of ________.
Pretexting
A ________ pretends to be a legitimate company and sends emails requesting confidential data.
Phisher
Which of the following statements is TRUE of symmetric encryption?
It uses the same key for both encoding and decoding
Which of the following statements is TRUE of the financial losses due to computer crimes?
All studies on the costs of computer crimes are based on surveys
Currently, which of the following is NOT true about computer crime according to the Ponemon study?
Security safeguards don't work.
One form of professional behavior is to ________ so that you avoid reporting trivial problems.
learn basic computer skills
An organization that wishes to leverage the power of social media and elastic cloud opportunities to help accomplish its goals and objectives should ideally turn to the ________ group within its IT department for information.
Technology
Which of the following is an advantage of outsourcing information systems?
It can be an easy way to gain expertise otherwise not known
A ________ performs a wide range of activities such as programming, testing, database design, communications and networks, project management, and is required to have an entrepreneurial attitude.
Consultant
A ________ monitors, maintains, fixes, and tunes computer networks.
Network Administrator
Which of the following is a risk of outsourcing information systems?
Vendors can gain access to critical knowledge of the outsourcing company
________ refers to the leasing of hardware with preinstalled operating systems.
Platform as a Service (PaaS)
A(n) ________ committee is a group of senior managers from the major business functions that works with the chief information officer to set information systems (IS) priorities and decide major IS projects and alternatives.
Steering
In an organization, the IS department's principal manager is called the ________.
Chief Information Officer
Bake a lot, Inc has decided they need someone to manage the security for organization's information systems and information. They decide to hire a _______ to handle this task.
Chief Information Security Officer
Which of the following is a right of a user of information systems (IS)?
contributing to requirements for new system features and functions
The ________ group within the information systems (IS) department manages the process of creating new information systems as well as maintaining existing information systems.
Development
In organizations that operate significant nonaccounting information systems, such as manufacturers, a reporting arrangement wherein the chief information officer reports to the ________ is more common and effective.
Chief Executive Officer
Which of the following is a responsibility of an information systems (IS) user?
Following security and backup procedures
In order to accomplish organizational goals and objectives, an organization's information systems (IS) must be aligned with its ________.
Competitive Strategy
Which of the following statements is TRUE of the development group of a company's information systems (IS) department?
The size and structure of the group depends on whether programs are developed in-house or outsourced.
The ________ group's purpose is to protect information assets by establishing standards and management practices and policies.
Data Administration
________ is the process of hiring another organization to perform a service.
Outsourcing
The chief information security officer (CISO) reports to the ________.
chief information officer
Which of the following is a responsibility of a systems analyst?
determining system requirements
Which of the following is a responsibility of a small-scale project manager?
Initiate, plan, manage, monitor, and close down projects
In which of the following phases of the systems development life cycle do developers identify the particular features and functions of a new system?
Requirement Analysis
Normal processing procedures for operations personnel involve procedures for ________.
starting, stopping, and operating the system
When compared to program development, systems development is ________.
Broader Scope
The first major task of the project team is to ________.
plan the project
Which of the following is the first phase of the systems development life cycle?
System Definition
The process of creating and maintaining information systems is called ________.
Systems Development
Olive Inc., a chain of retail outlets, is converting its existing billing systems to a more robust online tool. In this process, the organization runs both the old and the new systems to compare their performances. In this case, the company is implementin
Parallel
During design and implementation, a development team will be heavy with ________.
Programmers
Which of the following statements is TRUE of system maintenance?
All commercial software products are shipped with known failures.
A design team decides the requirements of a new system are very complicated. They want to show a ________ to the users so they can interact with the new features before the full system is built. This process will also allow users to remember any features
prototype
All of the following are new technologies to deal with the issues of SDLC EXCEPT ________.
object-oriented development
extreme programming
A comprehensive test plan should ________.
cause every line of program code to be executed
________ testing is the process of allowing future system users to try out a new system on their own.
Beta
Which of the following is the most important phase in the SDLC?
Determine the system's requirements
________ feasibility concerns whether a new information system fits within a company's customs, culture, charter, or legal requirements.
Organizational
Which of the following statements is TRUE of information systems?
They can be adapted to fit business needs.
All of these statements are true about the maintenance phase EXCEPT ________.
system test happens during this phase
If a new system involves a new database or substantial changes to an existing database, then the development team will have to create a(n) ________.
Data model
Which of the following steps in the systems definition process aims to eliminate obviously nonsensible projects?
Assess the project feasibility
According to Brooks' Law, adding more people to a late project ________.
Makes the project later
Which of the following statements is TRUE of the composition of a development team over the different phases of the systems development life cycle?
During integrated testing and conversion, the team will be augmented with business users.
The budget was tight when the project entered the testing phase so Bob decided to implement the ________ for the new system. It was a disaster because the customer service agents could not log in to their accounts. So the testing team had to come and rein
plunge installation method
When developing a budget for a large, multi-year projects estimations are ________.
accurate because of past projects
so approximate they are not real
easy based on management experience
In a ________ installation, an organization implements an entire system on a limited portion of the business.
Pilot
During requirements definition, a development team's composition will be typically heavy with ________.
Systems Analysts
Which of the following problems is particularly common for data that have been gathered over time?
Lack of consistency
Which of the following occurs when millions of bogus service requests flood a Web server and prevent it from servicing legitimate requests?
Denial of service
A(n) ________ examines the source address, destination address, and other data of a message and determines whether to let that message pass.
Packet-filtering firewall
The _________ can delete programs or data or even modify data in undetected ways.
Payload
Which of the following is TRUE if the development group of a company's information systems (IS) department is staffed primarily by programmers, test engineers, technical writers, and other development personnel?
The company develops programs in-house.
Which of the following is TRUE of the alignment between information systems and organizational strategies?
Information systems must evolve with changes made in organizational strategies.
Which of the following statements is TRUE of systems development?
It requires business knowledge and an understanding of group dynamics.
According to Brooks' Law, which of the following is a consequence of adding more people to late projects?
The costs of training new people can overwhelm the benefits of their contribution
In the ________ phase of the systems development life cycle, developers use management's statement of the system needs in order to develop a new information system.
System definition
During the ________ phase of the systems development life cycle process, developers construct, install, and test the components of the information system.
Implementation
...
...