*When the bicycle parts supplier described in the textbook acquired data for its BI system from its operational database, it used all of the following filtering conditions, except ________. |
only select items with a unit price of more than $100 |
A future concern about unsupervised data mining applications is _________. |
the machines that are running the analysis will possess and create information for themselves |
Among the following statements, which one is NOT applicable to Big Data? |
Big Data can be processed with traditional techniques. |
__________ process operational, social, and other data to identify patterns, relationships, and trends for use by business professionals. |
Business intelligence (BI) systems |
*The bicycle parts supplier described in the textbook used a BI system to find candidate parts for the sale of 3D parts designs by using all of the following criteria, except ________. |
by finding parts ordered in large quantities |
*An employee at Falcon Security is studying an analysis of data regarding the occurrence of problems and failures with its drones and cameras. Based on the analysis, the employee may schedule maintenance on the equipment. Falcon Security is using the analysis for __________. |
decision making |
A(n) __________ is a facility for managing an organization’s business intelligence data. |
data warehouse |
*The challenges associated with content management systems include all of the following except ________. |
small size of the content databases |
*________ attempt to capture human expertise and put it into a format that can be used by non-experts. |
Expert systems |
*A BI system enabled Target to identify customers who might be pregnant by ________. |
customer purchasing patterns of lotions and vitamins |
A(n) _________ produces dynamic reports, supports alerts/RSS functionality, and supports user subscriptions. |
BI server |
*An RFM score of ________ probably means this customer has taken their business elsewhere and is most likely not worth spending too many marketing resources on. |
111 |
Which of the following is not typically included as a data source for business intelligence? |
rumors |
*An employee at Falcon Security is studying an analysis of data that compares the actual number of drone flights over the last month with the planned number of drone flights. Falcon Security is using the analysis for __________. |
informational purposes |
A key aspect of a data warehouse is the __________ describing the data’s source, format, assumptions and constraints. |
metadata |
________ involves searching for patterns and relationships among data. |
Data mining |
*If an organization wishes to provide a data collection focused on the needs of a single department or functional area of the business, it will employ______. |
Data marts |
*Breaking a BigData collection into pieces, applying a large number of simultaneous processors to search the pieces, then combining the results is known as ________. |
MapReduce |
Which of the following is a standard for subscribing to content sources? |
Real simple syndication |
*When the granularity of data is too fine, ______ |
it can be made coarser by summing and combining |
The functions of a data warehouse are to do all of the following, except ________. |
filter data |
-Functions of data warehouse |
obtain data catalog data cleanse data organize and relate data |
*A major problem with data that is purchased from data vendors is ________. |
missing values |
A business intelligence reporting application is likely to employ all of the following basic operations except _______. |
interpreting |
-A business intelligence reporting application is likely to employ all of the following basic operations |
calculating filtering formatting summing |
A data mining technique that has proven very useful in helping salespeople increase sales through cross-selling is called ________. |
market-basket analysis |
*One of the challenges with unsupervised data mining is _______ |
the analyst must develop explanations for patterns after observing the pattern |
A safety procedure that enables a trusted party to have a copy of the encryption key is called key ________ |
escrow |
**Studies of computer crime reveal that ________ is the single most expensive consequence of computer crime. |
business disruption |
Which of the following is considered a computer crime? |
Hacking of information systems |
When a person transmits personal data over the Internet in the course of a transaction, the transmitted data is _________ to threats unless appropriate ________ are taken. |
vulnerable; safeguards |
A _________ is a type of malware that masquerades as a useful program or file, but actually does significant damage. |
Trojan horse |
________ are false targets for computer criminals to attack. |
Honeypots |
Long-term attacks focused on stealing confidential data and intellectual property that are perpetrated by large, well-funded organizations are called __________. |
Advanced Persistent Threats |
*The best safeguard from threats from public users of Web sites is to ______ the site against attack. |
harden |
A university professor accidently leaves a sheet of paper in a classroom containing the scores on the recent exam for the class, listed by student ID number. This represents what type of loss? |
Unauthorized data disclosure |
Because users often neglect to create strong passwords, some organizations choose to also employ ______ authentication using fingerprint scans or retina scans. |
biometric |
The use of usernames and passwords is an important _________ safeguard to identify and authenticate legitimate users of the system. |
technical |
An email message that appears legitimate arrives in your inbox from your bank and asks you to click on a link in the message and enter your username and password in order to "protect" your account. This should cause you to suspect a(n) __________ attack. |
phishing |
Human safeguards involve the people and procedural components of information systems. All of the following constitute effective human safeguards, except ________ |
incident-response plan |
-All of the following constitute effective human safeguard |
hiring and screening termination dissemination and enforcement position definition |
Organizations use a(n) ______________ to sense when another computer is attempting to scan or access a computer or network. |
intrusion detection system |
All of the following statements are good practices to protect against security threats, except ________. |
back up your browsing history, temporary files, and cookies |
-good practices to protect against security threats |
use long and complex passwords never send valuable data such as credit card numbers in email or IM do not use the same password for all your accounts buy only from online vendors that use https in their transactions |
Use of strong passwords helps protect against ________ in which computing power is used to try every possible combination of characters to guess the password. |
brute force attacks |
*When user accounts are defined so that the user has access only to the minimum data and actions required in order to complete his/her job responsibilities, the principle of ___________ is in use. |
least possible privilege |
The most secure and hard-to-break passwords have all of the following characteristics, except ________. |
has six or fewer characters |
-The most secure and hard-to-break passwords have all of the following characteristics |
mix of letters & numbers contains special characters has uppercase and lowercase characters contains no woird in any language |
**According to recent research, the source of most of the increase in computer crime costs is ________. |
malicious insiders |
Which of the following is likely to occur in the next 10 years? |
Major incidents of cyberwarfare are likely. |
**If an organization takes a strong position and mandates that its employees create strong passwords, it is engaging in a trade-off between ________ and ________. |
security; freedom |
Organizational security policies should address all of the following issues with the exception of ________. |
whether data marting will be tolerated |
-Organizational security policies should address all of the following issues |
how employees and others can request changes to inaccurate data whether data will be shared with other organizations what sensitive data the organization will store how sensitive data will be processed |
Organizations (and you personally) can use one or more _________ to filter the data transmissions allowed into your computer network. |
firewalls |
A(n) ________ will stipulate what an employee should do when he notices something like a virus. |
incident-response plan |
__________ is a technical safeguard that ensures that if stored or transmitted data is stolen it cannot be understood. |
Encryption |
**Professional careers in Information Systems require all of the following except ________. |
a degree in computer engineering |
-Professional careers in Information Systems require all of the following |
good written communication skills a four-year degree good verbal communication skills a degree in business |
*The development group in a company’s IS department is staffed primarily by programmers, test engineers, technical writers, and other development personnel. Based on this information, which of the following is most likely to be true? |
The company develops programs in-house. |
When network access and Internet services are ________, it means that the users can do all their required processing without any problems nearly all of the time. |
reliable |
*Among the following responsibilities, which is NOT a responsibility of the CIO? |
Establish priorities for new projects. |
-responsibility of the CIO |
Oversee and negotiate outsourcing relationships. Communicate with the managers of each IT department. Run the steering committees that review projects. Establish priorities for new projects. |
Among the rights you have as a user of computing resources is the right to _______ |
protection from viruses, worms, and other threats |
When planning the use of IS/IT, the IS department should have a group of senior managers from the major business functions that works with the CIO to set the IS priorities and decide among major IS projects and alternatives. This example is part of ________. |
sponsoring a steering committee |
The responsibility for evaluating new technologies, new ideas, and new capabilities and identifying those that are most relevant to the organization is typically assigned to the _______. |
chief technology officer (CTO) |
The typical IS department in a large organization would contain all of the following groups except ________. |
Engineering |
-typical IS department in a large organization would contain all of the following groups |
operations outsourcing relations technology development |
**One of the management advantages of outsourcing is that the company can ________. |
gain expertise |
**Leasing hardware infrastructure, operating system software, and application software is feasible and is an example of ________. |
.SaaS |
*The ABC Company has become dissatisfied with the services provided by its IS outsourcing firm because the outsourcing firm was recently acquired by another organization and is no longer prioritizing services to ABC. The outsourcing firm has more knowledge about ABC’s information systems operations than any ABC employee. ABC has discovered a major risk of outsourcing is ________. |
there is no easy exit |
Although the title may vary among organizations, a common title of the principal manager of the IS department is ____________. |
chief information officer (CIO) |
Which of the following is NOT a user’s responsibility? |
Which of the following is NOT a user’s responsibility? |
-user’s responsibility |
Learning the correct procedures for using the applications you need Using computers and mobile devices according to your employer’s computer-use policy Protecting your password Installing only authorized programs |
In a manufacturing organization that makes extensive use of information systems in manufacturing operations, it is common to see the leader of the IS organization report to the ________. |
chief executive officer (CEO) |
An organization is contemplating a merger opportunity. Which of the following statements correctly summarizes the role of the CIO during the executive staff’s merger discussions? |
Present the executive staff with IS integration issues that will be needed to achieve a successful merger. |
A major concern with outsourcing is that the company may lose ________ by being forced to reveal proprietary trade secrets. |
intellectual capital |
Hiring another organization to perform a service is known as ____________ |
outsourcing |
*The major planning functions of the information systems department include the following, except ________. |
managing the charge back of information system resource usage |
-The major planning functions of the information systems department include |
communicating IS issues to the executive group developing priorities and enforcing them within the IS department sponsor steering committees Your answer is not correct. aligning information systems with organizational strategy |
Employees who create weak passwords or who carelessly share passwords with others are violating which responsibility? |
protect your password |
**Companies that outsource face a certain loss of control when they hire other organizations to perform certain services. A particular disadvantage related to the loss of control is ________. |
that there is no easy way of exiting the outsourcing agreement |
Ensuring end users get prompt attention to their problems is __________. |
an example of a user’s rights |
*During the Requirements Definition stage of a systems development project, the employees who will be the primary users of the new system are not asked about their needs. The IS department is violating which of its responsibilities? |
Enable users to contribute to requirements for new system features and functions |
The IS department has responsibility for all of the following functions except ____________. |
prosecute hackers |
**In ten years, the CIO will ________. |
finally become an integral member of the executive team |
Because the company and the outsourcing vendor can become so tightly integrated, ________ the agreement can be very costly and risky. |
ending |
In considering the trade-offs for systems development processes, what could cause diseconomies of scale? |
Adding more people |
*Business processes may need to change and require management for many reasons. Which of the following is not likely to be the cause of changes to business processes? |
New computer hardware is available. |
-Business processes may need to change and require management for many reasons. Which of the following is likely to be the cause of changes to business processes? |
Business fundamentals have changed behind the process. The process may be using resources poorly. Your answer is not correct. The process is not able to accomplish its strategy. The process needs to adopt new technology. |
*The first activity in the business process management cycle is ________. |
creating a model of the existing business processes |
**A flow that directs the order of activities in a business process is termed a(n) ________. |
control flow |
________ is the standard set of terms and graphical notations for documenting business processes. |
Business process modeling notation (BPMN) |
**The integration of information systems is _________ for international organizations and international information systems. |
less important |
Which of the following statements is not an accurate statement regarding the scrum process? |
Large complex projects can be managed with scrum. |
-Which of the following statements is an accurate statement regarding the scrum process? |
In scrum, the team meets daily for 15-minute stand-ups. Minimal documentation is prepared initially, but created as a scrum project progresses. Testing is done frequently, possibly many times per day. Three roles are present to represent the owner, team members, and the scrum master. |
Process and systems development will evolve in the following ways in the next 10 years, except ________ |
systems will become less integrated |
The goal of a business process is to align activities, repositories, roles, resources and flows so that __________ are accomplished. |
business functions |
*In the swim-lane format of a business process model, all _______ for a role are included in that role’s swim-lane. |
activities |
*In a ________ installation, the new system installed in a single location first, then is rolled out to the entire organization once it is working properly. |
pilot |
The main problem of the SDLC approach to systems development is the ________ nature of the process. |
waterfall |
**If an organization’s process of providing services to its customers makes too many mistakes, it needs to be changed because it is __________. |
ineffective |
International IS management is challenging due to _______. |
security, size, and complexity |
The __________ is a phenomenon in which the variability in the size and timing of orders increases at each stage up the supply chain, from customer to supplier. |
bull whip effect |
Despite contradictory statements from Thomas Friedman and Panjak Ghemawat, which statement below is true? |
Information systems have played a key role in the growth of international commerce and will have an even larger effect in the future. |
*In a vertical integration move, a supplier organization has been acquired. This will necessitate a change in business processes due to ___________. |
a change in business fundamentals |
An organization’s computing installation located in an international location could be seized as a part of an overthrow of the existing government by a coup. This is an example of ______. |
geopolitical risks |
Creating new business processes and managing changes to existing processes is known as ________. |
business process management |
*_________ is a chief element in keeping the costs low and performance high in a supply chain. |
Information |
A set of standard practices that can be used in the assessment stage of the BPM cycle is called _______. |
COBIT |
The software component of an international information system ________. |
requires consideration of multiple languages |
People and information systems are _________ that can be assigned to ______ in a business process. |
resources; roles |
In a BPMN process diagram, you can use ________ to simplify process diagrams and draw attention to interactions between roles. |
swim-lane layout |
*The most critical decision to make when setting up international information systems is ________. |
the degree of standardization that can be imposed |
*The initial assessment of feasibility is made in the ________ phase of the systems development life cycle |
system definition |
*The network of organizations and facilities that transforms raw materials into products delivered to customers is called the _______. |
supply chain |
Process and systems development will evolve in the following ways in the next 10 years, except ________. |
systems will become less integrated |
ISM Exam 3
Share This
Unfinished tasks keep piling up?
Let us complete them for you. Quickly and professionally.
Check Price