ISM Exam 3

Your page rank:

Total word count: 2779
Pages: 10

Calculate the Price

- -
275 words
Looking for Expert Opinion?
Let us have a look at your work and suggest how to improve it!
Get a Consultant

*When the bicycle parts supplier described in the textbook acquired data for its BI system from its operational​ database, it used all of the following filtering​ conditions, except​ ________.

only select items with a unit price of more than​ $100

A future concern about unsupervised data mining applications is​ _________.

the machines that are running the analysis will possess and create information for themselves

Among the following​ statements, which one is NOT applicable to Big​ Data?

Big Data can be processed with traditional techniques.

​__________ process​ operational, social, and other data to identify​ patterns, relationships, and trends for use by business professionals.

Business intelligence​ (BI) systems

*The bicycle parts supplier described in the textbook used a BI system to find candidate parts for the sale of 3D parts designs by using all of the following​ criteria, except​ ________.

by finding parts ordered in large quantities

*An employee at Falcon Security is studying an analysis of data regarding the occurrence of problems and failures with its drones and cameras. Based on the​ analysis, the employee may schedule maintenance on the equipment. Falcon Security is using the analysis for​ __________.

decision making

​A(n) __________ is a facility for managing an​ organization’s business intelligence data.

data warehouse

*The challenges associated with content management systems include all of the following except​ ________.

small size of the content databases

*​________ attempt to capture human expertise and put it into a format that can be used by​ non-experts.

Expert systems

*A BI system enabled Target to identify customers who might be pregnant by​ ________.

customer purchasing patterns of lotions and vitamins

​A(n) _________ produces dynamic​ reports, supports​ alerts/RSS functionality, and supports user subscriptions.

BI server

*An RFM score of​ ________ probably means this customer has taken their business elsewhere and is most likely not worth spending too many marketing resources on.

111

Which of the following is not typically included as a data source for business​ intelligence?

rumors

*An employee at Falcon Security is studying an analysis of data that compares the actual number of drone flights over the last month with the planned number of drone flights. Falcon Security is using the analysis for​ __________.

informational purposes

A key aspect of a data warehouse is the​ __________ describing the​ data’s source,​ format, assumptions and constraints.

metadata

​________ involves searching for patterns and relationships among data.

Data mining

*If an organization wishes to provide a data collection focused on the needs of a single department or functional area of the​ business, it will​ employ______.

Data marts

*Breaking a BigData collection into​ pieces, applying a large number of simultaneous processors to search the​ pieces, then combining the results is known as​ ________.

MapReduce

Which of the following is a standard for subscribing to content​ sources?

Real simple syndication

*When the granularity of data is too​ fine, ______

it can be made coarser by summing and combining

The functions of a data warehouse are to do all of the​ following, except​ ________.

filter data

-Functions of data warehouse

obtain data catalog data cleanse data organize and relate data

*A major problem with data that is purchased from data vendors is​ ________.

missing values

A business intelligence reporting application is likely to employ all of the following basic operations except​ _______.

interpreting

-A business intelligence reporting application is likely to employ all of the following basic operations

calculating filtering formatting summing

A data mining technique that has proven very useful in helping salespeople increase sales through​ cross-selling is called​ ________.

​market-basket analysis

*One of the challenges with unsupervised data mining is​ _______

the analyst must develop explanations for patterns after observing the pattern

A safety procedure that enables a trusted party to have a copy of the encryption key is called key​ ________

escrow

**Studies of computer crime reveal that​ ________ is the single most expensive consequence of computer crime.

business disruption

Which of the following is considered a computer​ crime?

Hacking of information systems

When a person transmits personal data over the Internet in the course of a​ transaction, the transmitted data is​ _________ to threats unless appropriate​ ________ are taken.

​vulnerable; safeguards

A​ _________ is a type of malware that masquerades as a useful program or​ file, but actually does significant damage.

Trojan horse

​________ are false targets for computer criminals to attack.

Honeypots

​Long-term attacks focused on stealing confidential data and intellectual property that are perpetrated by​ large, well-funded organizations are called​ __________.

Advanced Persistent Threats

*The best safeguard from threats from public users of Web sites is to​ ______ the site against attack.

harden

A university professor accidently leaves a sheet of paper in a classroom containing the scores on the recent exam for the​ class, listed by student ID number. This represents what type of​ loss?

Unauthorized data disclosure

Because users often neglect to create strong​ passwords, some organizations choose to also employ​ ______ authentication using fingerprint scans or retina scans.

biometric

The use of usernames and passwords is an important​ _________ safeguard to identify and authenticate legitimate users of the system.

technical

An email message that appears legitimate arrives in your inbox from your bank and asks you to click on a link in the message and enter your username and password in order to​ "protect" your account. This should cause you to suspect​ a(n) __________ attack.

phishing

Human safeguards involve the people and procedural components of information systems. All of the following constitute effective human​ safeguards, except​ ________

​incident-response plan

-All of the following constitute effective human​ safeguard

hiring and screening termination dissemination and enforcement position definition

Organizations use​ a(n) ______________ to sense when another computer is attempting to scan or access a computer or network.

intrusion detection system

All of the following statements are good practices to protect against security​ threats, except​ ________.

back up your browsing​ history, temporary​ files, and cookies

-good practices to protect against security​ threats

use long and complex passwords never send valuable data such as credit card numbers in email or IM do not use the same password for all your accounts buy only from online vendors that use https in their transactions

Use of strong passwords helps protect against​ ________ in which computing power is used to try every possible combination of characters to guess the password.

brute force attacks

*When user accounts are defined so that the user has access only to the minimum data and actions required in order to complete​ his/her job​ responsibilities, the principle of​ ___________ is in use.

least possible privilege

The most secure and​ hard-to-break passwords have all of the following​ characteristics, except​ ________.

has six or fewer characters

-The most secure and​ hard-to-break passwords have all of the following​ characteristics

mix of letters & numbers contains special characters has uppercase and lowercase characters contains no woird in any language

**According to recent​ research, the source of most of the increase in computer crime costs is​ ________.

malicious insiders

Which of the following is likely to occur in the next 10​ years?

Major incidents of cyberwarfare are likely.

**If an organization takes a strong position and mandates that its employees create strong​ passwords, it is engaging in a​ trade-off between​ ________ and​ ________.

security; freedom

Organizational security policies should address all of the following issues with the exception of​ ________.

whether data marting will be tolerated

-Organizational security policies should address all of the following issues

how employees and others can request changes to inaccurate data whether data will be shared with other organizations what sensitive data the organization will store how sensitive data will be processed

Organizations​ (and you​ personally) can use one or more​ _________ to filter the data transmissions allowed into your computer network.

firewalls

A(n) ________ will stipulate what an employee should do when he notices something like a virus.

​incident-response plan

​__________ is a technical safeguard that ensures that if stored or transmitted data is stolen it cannot be understood.

Encryption

**Professional careers in Information Systems require all of the following except​ ________.

a degree in computer engineering

-Professional careers in Information Systems require all of the following

good written communication skills a​ four-year degree good verbal communication skills a degree in business

*The development group in a​ company’s IS department is staffed primarily by​ programmers, test​ engineers, technical​ writers, and other development personnel. Based on this​ information, which of the following is most likely to be​ true?

The company develops programs​ in-house.

When network access and Internet services are​ ________, it means that the users can do all their required processing without any problems nearly all of the time.

reliable

*Among the following​ responsibilities, which is NOT a responsibility of the​ CIO?

Establish priorities for new projects.

-responsibility of the​ CIO

Oversee and negotiate outsourcing relationships. Communicate with the managers of each IT department. Run the steering committees that review projects. Establish priorities for new projects.

Among the rights you have as a user of computing resources is the right to​ _______

protection from​ viruses, worms, and other threats

When planning the use of​ IS/IT, the IS department should have a group of senior managers from the major business functions that works with the CIO to set the IS priorities and decide among major IS projects and alternatives. This example is part of​ ________.

sponsoring a steering committee

The responsibility for evaluating new​ technologies, new​ ideas, and new capabilities and identifying those that are most relevant to the organization is typically assigned to the​ _______.

chief technology officer​ (CTO)

The typical IS department in a large organization would contain all of the following groups except​ ________.

Engineering

-typical IS department in a large organization would contain all of the following groups

operations outsourcing relations technology development

**One of the management advantages of outsourcing is that the company can​ ________.

gain expertise

**Leasing hardware​ infrastructure, operating system​ software, and application software is feasible and is an example of​ ________.

.SaaS

*The ABC Company has become dissatisfied with the services provided by its IS outsourcing firm because the outsourcing firm was recently acquired by another organization and is no longer prioritizing services to ABC. The outsourcing firm has more knowledge about​ ABC’s information systems operations than any ABC employee. ABC has discovered a major risk of outsourcing is​ ________.

there is no easy exit

Although the title may vary among​ organizations, a common title of the principal manager of the IS department is​ ____________.

chief information officer​ (CIO)

Which of the following is NOT a​ user’s responsibility?

Which of the following is NOT a​ user’s responsibility?

-user’s responsibility

Learning the correct procedures for using the applications you need Using computers and mobile devices according to your​ employer’s computer-use policy Protecting your password Installing only authorized programs

In a manufacturing organization that makes extensive use of information systems in manufacturing​ operations, it is common to see the leader of the IS organization report to the​ ________.

chief executive officer​ (CEO)

An organization is contemplating a merger opportunity. Which of the following statements correctly summarizes the role of the CIO during the executive​ staff’s merger​ discussions?

Present the executive staff with IS integration issues that will be needed to achieve a successful merger.

A major concern with outsourcing is that the company may lose​ ________ by being forced to reveal proprietary trade secrets.

intellectual capital

Hiring another organization to perform a service is known as​ ____________

outsourcing

*The major planning functions of the information systems department include the​ following, except​ ________.

managing the charge back of information system resource usage

-The major planning functions of the information systems department include

communicating IS issues to the executive group developing priorities and enforcing them within the IS department sponsor steering committees Your answer is not correct. aligning information systems with organizational strategy

Employees who create weak passwords or who carelessly share passwords with others are violating which​ responsibility?

protect your password

**Companies that outsource face a certain loss of control when they hire other organizations to perform certain services. A particular disadvantage related to the loss of control is​ ________.

that there is no easy way of exiting the outsourcing agreement

Ensuring end users get prompt attention to their problems is​ __________.

an example of a​ user’s rights

*During the Requirements Definition stage of a systems development​ project, the employees who will be the primary users of the new system are not asked about their needs. The IS department is violating which of its​ responsibilities?

Enable users to contribute to requirements for new system features and functions

The IS department has responsibility for all of the following functions except​ ____________.

prosecute hackers

**In ten​ years, the CIO will​ ________.

finally become an integral member of the executive team

Because the company and the outsourcing vendor can become so tightly​ integrated, ________ the agreement can be very costly and risky.

ending

In considering the​ trade-offs for systems development​ processes, what could cause diseconomies of​ scale?

Adding more people

*Business processes may need to change and require management for many reasons. Which of the following is not likely to be the cause of changes to business​ processes?

New computer hardware is available.

-Business processes may need to change and require management for many reasons. Which of the following is likely to be the cause of changes to business​ processes?

Business fundamentals have changed behind the process. The process may be using resources poorly. Your answer is not correct. The process is not able to accomplish its strategy. The process needs to adopt new technology.

*The first activity in the business process management cycle is​ ________.

creating a model of the existing business processes

**A flow that directs the order of activities in a business process is termed​ a(n) ________.

control flow

​________ is the standard set of terms and graphical notations for documenting business processes.

Business process modeling notation​ (BPMN)

**The integration of information systems is​ _________ for international organizations and international information systems.

less important

Which of the following statements is not an accurate statement regarding the scrum​ process?

Large complex projects can be managed with scrum.

-Which of the following statements is an accurate statement regarding the scrum​ process?

In​ scrum, the team meets daily for​ 15-minute stand-ups. Minimal documentation is prepared​ initially, but created as a scrum project progresses. Testing is done​ frequently, possibly many times per day. Three roles are present to represent the​ owner, team​ members, and the scrum master.

Process and systems development will evolve in the following ways in the next 10​ years, except​ ________

systems will become less integrated

The goal of a business process is to align​ activities, repositories,​ roles, resources and flows so that​ __________ are accomplished.

business functions

*In the​ swim-lane format of a business process​ model, all​ _______ for a role are included in that​ role’s swim-lane.

activities

*In a​ ________ installation, the new system installed in a single location​ first, then is rolled out to the entire organization once it is working properly.

pilot

The main problem of the SDLC approach to systems development is the​ ________ nature of the process.

waterfall

**If an​ organization’s process of providing services to its customers makes too many​ mistakes, it needs to be changed because it is​ __________.

ineffective

International IS management is challenging due to​ _______.

​security, size, and complexity

The​ __________ is a phenomenon in which the variability in the size and timing of orders increases at each stage up the supply​ chain, from customer to supplier.

bull whip effect

Despite contradictory statements from Thomas Friedman and Panjak​ Ghemawat, which statement below is​ true?

Information systems have played a key role in the growth of international commerce and will have an even larger effect in the future.

*In a vertical integration​ move, a supplier organization has been acquired. This will necessitate a change in business processes due to​ ___________.

a change in business fundamentals

An​ organization’s computing installation located in an international location could be seized as a part of an overthrow of the existing government by a coup. This is an example of​ ______.

geopolitical risks

Creating new business processes and managing changes to existing processes is known as​ ________.

business process management

*​_________ is a chief element in keeping the costs low and performance high in a supply chain.

Information

A set of standard practices that can be used in the assessment stage of the BPM cycle is called​ _______.

COBIT

The software component of an international information system​ ________.

requires consideration of multiple languages

People and information systems are​ _________ that can be assigned to​ ______ in a business process.

​resources; roles

In a BPMN process​ diagram, you can use​ ________ to simplify process diagrams and draw attention to interactions between roles.

​swim-lane layout

*The most critical decision to make when setting up international information systems is​ ________.

the degree of standardization that can be imposed

*The initial assessment of feasibility is made in the​ ________ phase of the systems development life cycle

system definition

*The network of organizations and facilities that transforms raw materials into products delivered to customers is called the​ _______.

supply chain

Process and systems development will evolve in the following ways in the next 10​ years, except​ ________.

systems will become less integrated

Share This
Flashcard

More flashcards like this

NCLEX 10000 Integumentary Disorders

When assessing a client with partial-thickness burns over 60% of the body, which finding should the nurse report immediately? a) ...

Read more

NCLEX 300-NEURO

A client with amyotrophic lateral sclerosis (ALS) tells the nurse, "Sometimes I feel so frustrated. I can’t do anything without ...

Read more

NASM Flashcards

Which of the following is the process of getting oxygen from the environment to the tissues of the body? Diffusion ...

Read more

Unfinished tasks keep piling up?

Let us complete them for you. Quickly and professionally.

Check Price

Successful message
sending