BCIS Ch. 9-12 quiz

________ techniques emerged from the combined discipline of statistics, mathematics, artificial intelligence, and machine-learning

Data mining (Ch.9)

Which of the following statements is TRUE of a data warehouse?

A data warehouse is larger than a data mart. (Ch.9)

A ________ is designed to extract data from operational systems and other sources, clean the data, and store and catalog that data for processing by business intelligence tools.

Data warehouse (Ch.9)

Which of the following statements is TRUE of BigData?

BigData refers to data sets that are at least a petabyte in size. (Ch.9)

Which of the following statements is TRUE of unsupervised data mining?

Analysts create hypotheses only after performing an analysis. (Ch.9)

The source, format, assumptions and constraints, and other facts concerning certain data are called ________.

Metadata (Ch.9)

Which of the following statements is TRUE of data with granularity?

It can be too fine or too coarse and also have wrong granularity. (Ch.9)

Which of the following statements is TRUE of business intelligence (BI) publishing alternatives?

Publishing dynamic BI is more difficult than publishing static content. (Ch.9)

Which of the following problems is particularly common for data that have been gathered over time?

Lack of consistency (Ch.9)

Which BI activity would a company be participating in if they used data mining to determine when to place rain boots on the shelves?

Performing analysis (Ch.9)

________ are created by companies as false targets for computer criminals to attack.

Honeypots (Ch. 10)

Every information system today should require users to sign on with a user name and a password. In this case, which of the following functions is performed by the user's password?

Authentification (Ch. 10)

Which of the following is a synonym for phishing?

Email spoofing (Ch. 10)

The _________ can delete programs or data or even modify data in undetected ways.

Payload (Ch. 10)

What is one of the drawbacks of removing and disabling cookies?

It will slow down the process of loading websites onto your computer. (Ch. 10)

Which of the following is a data safeguard against security threats?

Backup and physical security (Ch. 10)

Thomas is responsible for creating backup copies of information in a system. He also works along with IT personnel to ensure that the backups are valid and that effective recovery procedures exist. Thomas is involved in establishing ________.

Data safeguards (Ch. 10)

Which of the following is a task for the system user during the recovery system procedure?

Prepare for the loss of system functionality. (Ch. 10)

Which of the following type of password guidelines are the easiest to crack?

a six-letter password with upper and lower-case letters

A ________ is a plastic card that has a microchip loaded with identifying data.

Smart card (Ch. 10)

Most secure communications over the Internet use a protocol called ________.

HTTPS (Ch. 10)

A(n) ________ is a measure that individuals or organizations take to block a threat from obtaining an asset.

Safeguard (Ch. 10)

________ occurs when a threat obtains data that is supposed to be protected.

Unauthorized data disclosure (Ch. 10)

________ refers to an organization-wide function that is in charge of developing data policies and enforcing data standards.

Data administration (Ch. 10)

In terms of password management, when an account is created, users should ________.

immediately change the password they are given to a password of their own (Ch. 10)

________ take computers with wireless connections through an area and search for unprotected wireless networks.

Drive-by sniffers (Ch. 10)

Backup and recovery against computer security threats are ________.

Data safeguards (Ch. 10)

Which of the following is the most expensive consequence of computer crime?

Information loss (Ch. 10)

The Grey-Sloan hospital was attached by a virus. The interns should check the ________ for next steps.

incident response plan (Ch. 10)

________ are small files that browsers store on users' computers when they visit Web sites.

cookies (Ch. 10)

Which of the following statements is TRUE of symmetric encryption?

It uses the same key for both encoding and decoding. (Ch. 10)

Jack installed the incorrect security patch on the server. This is an example of what type of security problem?

faulty service (Ch. 10)

________ is a broad category of software that includes viruses, worms, Trojan horses, spyware, and adware.

Malware (Ch. 10)

Mark receives an email from his bank asking him to update and verify his credit card details. He replies to the email with all the requested details. Mark later learns that the email was not actually sent by his bank and that the information he had shared

Phishing (Ch. 10)

A ________ pretends to be a legitimate company and sends emails requesting confidential data.

Phisher (Ch. 10)

A(n) ________ examines the source address, destination address, and other data of a message and determines whether to let that message pass.

Packet-filtering firewall (Ch. 10)

A ________ monitors, maintains, fixes, and tunes computer networks.

network administrator (Ch. 11)

Jack and Jill, Inc. decides to outsource their accounting functions because of the company's expertise. The company is experiencing the ________ side of outsourcing advantages.

Cost reduction (Ch. 11)

The ________ group's purpose is to protect information assets by establishing standards and management practices and policies.

Data administration (Ch. 11)

In organizations the ________ is responsible for all of the organization's assets.

Chief Security Officer (Ch. 11)

The chief information security officer (CISO) reports to the ________.

Chief Information Officer (Ch. 11)

Which of the following statements is TRUE of the development group of a company's information systems (IS) department?

The size and structure of the group depends on whether programs are developed in-house or outsourced. (Ch. 11)

The ________ group within the information systems (IS) department manages the process of creating new information systems as well as maintaining existing information systems.

Development (Ch. 11)

A ________ performs a wide range of activities such as programming, testing, database design, communications and networks, project management, and is required to have an entrepreneurial attitude.

Consultant (Ch. 11)

The ________ group investigates new information systems and determines how the organization can benefit from them.

Technology (Ch. 11)

One form of professional behavior is to ________ so that you avoid reporting trivial problems.

Learn basic computer skills (Ch. 11)

In organizations where primary information systems support only accounting activities, a reporting arrangement wherein the chief information officer reports to the ________ is practical.

Chief Financial Officer (Ch. 11)

The ________ group manages the computing infrastructure, including individual computers, in-house server farms, networks, and communications media.

Operations (Ch. 11)

Which of the following is a responsibility of an information systems (IS) user?

following security and backup procedures (Ch. 11)

Bake a lot, Inc has decided they need someone to manage the security for organization's information systems and information. They decide to hire a _______ to handle this task.

Chief Security Officer (Ch. 11)

Which of the following is a responsibility of a small-scale project manager?

initiate, plan, manage, monitor, and close down projects (Ch. 11)

In order to accomplish organizational goals and objectives, an organization's information systems (IS) must be aligned with its ________.

competitive strategy (Ch. 11)

Which of the following is a right of a user of information systems (IS)?

contributing to requirements for new system features and functions (Ch. 11)

________ refers to the leasing of hardware with pre-installed operating systems.

Platform as a service (PaaS) (Ch. 11)

In ________, hardware and both operating system and application software are leased.

Software as a service (PaaS) (Ch. 11)

The ________ evaluates new technologies, new ideas, and new capabilities and identifies those that are most relevant to the organization.

CTO functions (Ch. 11)

Which of the following is TRUE of the alignment between information systems and organizational strategies?

Information systems must evolve with changes made in organizational strategies. (Ch. 11)

Which of the following statements is TRUE of the composition of a development team over the different phases of the systems development life cycle?

During integrated testing and conversion, the team will be augmented with business users.

All of the following are new technologies to deal with the issues of SDLC EXCEPT ________.

scrum

When developing a budget for a large, multi-year projects estimations are ________.

so approximate they are not even real

Software vendors usually bundle fixes of low-priority problems into larger groups called ________.

service packs

Which of the following statements is TRUE of information systems?

They can be adapted to fit business needs.

All of these steps are part of the requirements analysis phase EXCEPT ________.

developing a uniform funding solution for the system

Projects are said to be in analysis paralysis if so much time is spent ________.

documenting the requirements

Which of the following is the most expensive style of system conversion?

parallel installation

Which of the following personnel in a development team has the final say on whether a system is ready for use?

users

All of the following are major challenges in systems development EXCEPT ________.

...

Which of the following steps in the systems definition process aims to eliminate obviously nonsensible projects?

assessing the project feasibility

Which of the following statement describes why SDLC is considered a process?

because the maintenance phase starts the cycle over again

System ________ refers to the process of changing business activity from an old information system to a new system.

conversion

In a ________ installation, a new system runs alongside the old one until the new one has been tested and is fully operational.

parallel

During the ________ phase of the systems development life cycle process, developers construct, install, and test the components of the information system.

implementation

According to Brooks' Law, which of the following is a consequence of adding more people to late projects?

The costs of training new people can overwhelm the benefits of their contribution.

Which of the following statements is TRUE of system maintenance?

All commercial software products are shipped with known failures.

If a new system involves a new database or substantial changes to an existing database, then the development team will have to create a(n) ________.

data model

Which of the following is the first step in defining a new information system?

explain the goals and scope of the project

Which of the following is the most important phase in the SDLC?

determine the system's requirements

Normal processing procedures for operations personnel involve procedures for ________.

starting, stopping, and operating the system

The first major task of the project team is to ________.

plan the project

Jason desires to build a new system, but first he must decide if the potential benefits of the system are work the development and operational costs. To accomplish this, he must create a ________ report.

cost feasibility