ISM-1

QUIZ # 1

Question 1

10 / 10 pts

The value of information is directly linked to how it helps decision makers achieve their organization’s _____.

  

cost/profit target

Correct!

  

goals

  

cost reduction initiatives

  

customer satisfaction levels

Question 2

10 / 10 pts

_____ are people who work directly with information systems to get results.

  

System analysts

  

Database administrators

  

System developers

Correct!

  

End users

Question 3

10 / 10 pts

To keep information beyond reach of unauthorized users, is to keep the information _____.

Correct!

  

secure

  

economical

  

simple

  

verifiable

Question 4

10 / 10 pts

All of the following are examples of ethical issues related to data and information systems EXCEPT _________.

  

job losses due to humanlike technologies

  

invasion of privacy through technology

Correct!

  

the cost of system development

  

freedom of expression vs. censorship

Question 5

10 / 10 pts

All of the following are functions of a knowledge management system EXCEPT:

  

storing and retrieving knowledge.

  

improving collaboration.

  

locating knowledge sources.

Correct!

  

designing information systems.

Question 6

10 / 10 pts

_____ is/are considered to be the most important element in computer-based information systems.

  

Bandwidth 

  

Software applications

  

Standard operating procedures

Correct!

  

People

Question 7

10 / 10 pts

A(n) _____ can replace many applications with one unified set of programs, making the system easier to use and more effective. 

  

materials resource planning system

  

management information system 

Correct!

  

enterprise resource planning system

  

decision support system

Question 8

10 / 10 pts

The process of defining relationships among data to create useful information requires ______.

  

an information system

  

a formal education

Correct!

  

knowledge

  

intuition

Question 9

10 / 10 pts

Suppose an oil exploration company wishes to collect, codify,  and store knowledgethat is used in the organization, they should use _______.

  

a virtual reality system

  

an expert system

  

a transaction processing system

Correct!

  

a knowledge management system

Question 10

10 / 10 pts

Authoritarian regimes sometimes limit citizens’ access to certain Websites, reject the use of certain keywords in search engine searches, and track and monitor the Internet activities of individuals, which are all forms of ___________.

  

cybercrime

  

cyberoppression

  

cyberterrorism

Correct!

  

censorship

Quiz Score: 100 out of 100


QUIZ # 2

Question 1

10 / 10 pts

_____ encompasses all the activities required to get the right product into the right consumer’s hands in the right quantity at the right time and at the right cost, from acquisition of raw materials through customer delivery.

Correct!

  

Supply chain management

  

Value chain management

  

Inventory management

  

Customer management

Question 2

10 / 10 pts

All of the following are potential drawbacks to outsourcing EXCEPT:

  

loss of flexibility and control

  

low employee morale

Correct!

  

greater focus on core business

  

potential for data breaches

Question 3

10 / 10 pts

Which of the following is NOT a potential drawback to downsizing?

Correct!

  

reduced payroll costs

  

decreasing employee morale

  

lower quality

  

none of these

Question 4

10 / 10 pts

You might be an information systems worker if you _________.

  

prefer a slow-paced environment, where technology rarely changes

 

prefer to work only on the computer and are not interested in the business 

Correct!

  

enjoy learning new techniques and enjoy working with people

  

are good in book-keeping, like an accountant

Question 5

10 / 10 pts

In most large organizations, the IS department is divided into the following functions __________.

  

operations and development

Correct!

  

operations, development, and support

  

operations and support

  

systems, operations, and development

Question 6

10 / 10 pts

Important functions of the chief information officer include

 

employing an IS department’s equipment and staff to help the organization reach its goals

 

monitoring the financial considerations of the IS department, such as return on investment

  

ensuring the organization complies with laws and regulations

Correct!

  

all of these

Question 7

0 / 10 pts

In a large IS organization, the professional who is responsible for maintaining the security and integrity of the organization’s systems and data is__________.

  

the data center manager

You Answered

  

the data security manager

  

the system security operator

Correct Answer

  

the information systems security analyst

Question 8

10 / 10 pts

One method an IS professional might use to find a new job would be ____________.

  

seeking referrals from colleagues, friends, and family members

  

searching and applying for open positions on Internet job sites

  

networking through an IS professionals’ organization

Correct!

  

all of these

Question 9

10 / 10 pts

Providing value to a _____ is the primary goal of any organization. 

Correct!

  

stakeholder

  

product

  

competitor

  

service

Question 10

10 / 10 pts

_____ are responsible for running  and maintaining  information system equipment and also for scheduling, hardware maintenance, and preparing input and output.

  

Data-entry operators

Correct!

  

System operators

  

Web operators

  

Local area network operators


Quiz # 3

Question 1

10 / 10 pts

What are Porter’s Five Forces Model?

 

evaluates an organization’s strengths, weaknesses and threats to identify significant influenses that work for or against business strategies

Correct!

 

analyzes competitive forces that a company operates to asses the potential for productivity in an industry

  

views a firm as a series of business processes

  

none of the above

Question 2

0 / 10 pts

What company exhibits broad market and low cost?

  

Payless

You Answered

  

Tiffany

Correct Answer

  

WAL MART

  

Nieman Marcus

Question 3

10 / 10 pts

What directly determines the information system design?

  

competition

Correct!

  

business processes

  

industry structure

  

suppliers

Question 4

10 / 10 pts

What is a common way to decrease supplier power?

  

charge lower prices

Correct!

  

use MIS to find and create alternative products

  

charge higher prices

  

can not find a way

 Question 5

10 / 10 pts

_______advantage features a product or service on which customers place a greater value than they do on similar offerings from competitors

Correct!

  

competitve

  

competitor

  

power

  

first mover

Question 6

10 / 10 pts

Kevin is an incoming freshman at your college. Kevin is frustrated by the cost of books, tuition, and expenses and he also needs to purchase a rather expensive laptop. In an effort to save money, Kevin organizes a Facebook group with other college students who need to purchase laptops. Soon, Kevin’s Facebook group has close to 100,000 students. Kevin decides to collectively approach different computer companies to see if his group qualifies for a special discount. What business strategy is Kevin using to purchase laptops?

  

collecting business intelligence

  

decreasing entry barriers

  

purchasing a substitute product

Correct!

  

increasing buyer power

Question 7

10 / 10 pts

Shawn is on the executive board for ABC pharmaceuticals. The company produces the number one selling cancer-fighting drug on the market. Due to its incredible success, ABC pharmaceuticals has decided to increase the cost of the drug from $8 a pill to $15 a pill. Which force is ABC pharmaceutical using to increase its drug price?

Correct!

  

supplier power

  

buyer power

  

threat of false entrants

  

business power

Question 8

10 / 10 pts

Amazon.com uses a customer profiling system whenever a customer visits its website. Using this system, Amazon can offer products tailored to that particular customer’s profile and buying pattern. What is Amazon using to achieve this competitive advantage?

  

rivalry

  

buyer power

Correct!

  

product differentiation

  

substitute product

Question 9

10 / 10 pts

How can a company reduce the threat of substitute products or services?

  

market the product to less than ten customers

  

ignore competitive forces

Correct!

  

offer additional value through wider product distribution

 

offer less value, making the product far more generic and similar to the competition

Question 10

10 / 10 pts

What is threat of new entrants?

  

the ability of buyers to affect the price they must pay for an item

 

the suppliers’ ability to influence the prices they charge for supplies (including materials, labor, and services)

Correct!

 

high when it is easy for new competitors to enter a market and low when there are significant entry barriers to joining a market

 

high when there are many alternatives to a product or service and low when there are few alternatives from which to choose


Quiz # 4

Question 1

10 / 10 pts

The smallest piece of data used by a computer is a(n) _____.

  

entity

  

byte

Correct!

  

bit

  

character

Question 2

10 / 10 pts

A database is a collection of integrated and related _____.

  

fields

  

attributes

  

records

Correct!

  

files

Question 3

10 / 10 pts

A collection of fields all related to a single object, activity, or individual is a(n) _____.

Correct!

  

record

  

file

  

attribute

  

character

Question 4

10 / 10 pts

A(n) _____ is a field or set of fields in a record that uniquely identifies the record.

  

attribute

  

entity

Correct!

  

primary key

  

data item

Question 5

10 / 10 pts

_____ is the term used to describe enormous and complex data collections that traditional data management software, hardware, and analysis processes are incapable of handling.

  

Data warehouse

  

Data mart

Correct!

  

Big data

  

Knowledge base

Question 6

10 / 10 pts

Starting from monthly sales data, if you wish to get weekly sales data, use the ___ feature.

  

roll up

Correct!

  

drill down

  

slice and dice

  

extract data

Question 7

10 / 10 pts

Suppose a new tech startup wants to define the data model. They would then ____.

  

collect and cleanse the data

  

define user access privileges

Correct!

  

create the entity-relationship model

  

acquire a new database management system

Question 8

10 / 10 pts

A _____ is a subset of a data warehouse that is used by small- and medium-sized businesses and departments within large companies to support decision making.

  

data dictionary

  

data model

Correct!

  

data mart

  

data mine

Question 9

10 / 10 pts

_____ is a special-purpose programming language for accessing and manipulating data stored in a relational database.

  

Query by Example (QBE)

  

Access

Correct!

  

Structured Query Language (SQL)

  

Java

Question 10

10 / 10 pts

The position of a _____ is a non-technical position responsible for defining and implementing consistent principles for setting data standards and data definitions that apply across all the databases in an organization.

  

data analyst

Correct!

  

data administrator

  

database administrator

  

data owner


Quiz # 5

Question 1

10 / 10 pts

_____ refers to a computing environment where software and storage are provided as an Internet service and accessed with a Web browser.

  

Grid computing

  

Distributed computing

  

Utility computing

Correct!

  

Cloud computing

Question 2

10 / 10 pts

_____ is the standard page description language for Web pages.

  

Extensible Markup Language (XML)

  

JavaScript

  

.NET

Correct!

  

Hypertext Markup Language (HTML)

Question 3

10 / 10 pts

_____ consist of standards and tools that streamline and simplify communication among Websites and that promise to revolutionize the way the Web is developed and used for business and personal purposes.  

  

Web browsers

Correct!

  

Web  services

  

Hyperlinks

  

Web forms

Question 4

10 / 10 pts

Web client software, such as Chrome, Firefox, Internet Explorer, Safari, and Opera, that are used to view Web pages are known as _____.

  

Web portals

Correct!

  

Web browsers

  

Web analytics software

  

search engines

Question 5

10 / 10 pts

_____ is a process for driving traffic to a Web site by using techniques that improve the site’s ranking in search results.

  

Web content streaming

Correct!

  

Search engine optimization

  

Tunneling

  

Internet censorship

Question 6

10 / 10 pts

The area covered by one or more interconnected wireless access points is commonly called a(n) _____.

  

reception area

Correct!

  

hot spot

  

coverage zone

  

access area

Question 7

10 / 10 pts

A _____ is a telecommunications network that connects users and their computers in a geographical area that spans a campus or a city.  

Correct!

  

metropolitan area network (MAN)

  

local area network (LAN)

  

wide area network (WAN)

  

personal area network (PAN)

Question 8

10 / 10 pts

When you connect your computer to a printer using _____, the distance between them cannot be longer than 30 feet.

Correct!

  

Bluetooth

  

Wi-Fi

  

near field communication

  

infrared

Question 9

10 / 10 pts

Which of the following systems can help identify your geolocation?

  

Geographic information systems

  

Extranets

  

VPNs

Correct!

  

GPS

Question 10

0 / 10 pts

You wish to learn a programming language that can be used on any computer. What language would it be?

  

php

You Answered

  

JavaScript

Correct Answer

  

Java

  

ASP.Net


Quiz # 6

Question 1

10 / 10 pts

Which of the following forms of e-commerce is more likely to offer a more customized product offering?

  

Business-to-government (B2G) e-commerce

  

Business-to-business (B2B) e-commerce

  

Consumer-to-consumer (C2C) e-commerce

Correct!

  

Business-to-consumer (B2C) e-commerce

Question 2

10 / 10 pts

The elimination of organizations that operate between the producer and the consumer is called _____.

  

market segmentation

  

downsizing

Correct!

  

disintermediation

  

personalization

Question 3

10 / 10 pts

_____ is a subset of e-commerce that involves electronic transactions between consumers using a third party to facilitate the process.

  

Business-to-business (B2B) e-commerce

  

Business-to-consumer (B2C) e-commerce

  

Consumer-to-business (C2B) e-commerce

Correct!

  

Consumer-to-consumer (C2C) e-commerce

Question 4

10 / 10 pts

_____ divides the pool of potential customers into subgroups usually defined in terms of demographic characteristics.

  

Disintermediation

  

Social networking

Correct!

  

Market segmentation

  

Market augmentation

Question 5

10 / 10 pts

Which of the following forms of e-commerce has created an opportunity for many people to make a living out of selling items on auction Websites?

  

Business-to-business (B2B) e-commerce

Correct!

  

Consumer-to-consumer (C2C) e-commerce

  

Consumer-to-business (C2B) e-commerce

  

Business-to-consumer (B2C) e-commerce

 Question 6

10 / 10 pts

The number of mobile Websites worldwide is expected to grow rapidly because of ______________.

  

the availability of more costly handsets

  

typically uniform product offerings

  

advances in artificial intelligence technologies

Correct!

  

the development of new and useful applications

Question 7

10 / 10 pts

Which of the following is NOT one of the key website performance measures commonly used by online retailers?

  

response time

Correct!

  

total sales

  

transaction success rate

  

system availability

Question 8

10 / 10 pts

Authentication technologies are used by many organizations to _____.

  

verify the accuracy of their product descriptions and prices

  

secure sensitive data during e-commerce

  

confirm the uniform resource locator (URL) of their suppliers’ Websites

Correct!

  

confirm the identity of a user requesting access to information or assets

Question 9

10 / 10 pts

Conversion to an e-commerce or m-commerce system enables organizations to _________.

Correct!

  

improve the level of customer service

  

implement an enterprise resource planning (ERP) system

  

increase the cost of doing business

  

reinforce consumer-to-consumer (C2C) e-commerce

Question 10

10 / 10 pts

Through e-government, _____.

  

only government agencies can interact with one another

  

only businesses can interact with the government

  

only individual citizens can interact with the government

Correct!

 

any government unit, business or individual can interact with the government


Quiz # 7

Question 1

10 / 10 pts

A(n) _____ is central to individuals and organizations of all sizes and ensures that information can be shared across all business functions and all levels of management to support the running and managing of a business.

  

transaction processing system

Correct!

  

enterprise system

  

procurement system

  

batch processing system

Question 2

10 / 10 pts

A key feature of an enterprise system is that _________.

 

it helps a business function isolate information other functions and other levels of management.

  

it is exclusive to small and medium-sized enterprises (SMEs)

Correct!

 

it employs a database of key operational and planning data that can be shared by all

  

it is only used by large organizations

Question 3

10 / 10 pts

_____includes the planning, executing, and controlling of all activities involved in raw material sourcing and procurement, converting raw materials to finished products, and the warehousing and delivering finished product to customers.

  

Maintenance, repair and operations (MRO)

  

Materials requirement planning (MRP)

  

Customer relationship management (CRM)

Correct!

  

Supply chain management (SCM)

Question 4

10 / 10 pts

Manufacturing enterprise resource planning (ERP) systems follow a systemic process for developing a production plan that starts with _______ to develop an estimate of future customer demand.  

  

cash flow forecasting

  

demand planning

  

inventory control

Correct!

  

sales forecasting

Question 5

10 / 10 pts

In a manufacturing enterprise resource planning (ERP) system, demand management _______.

  

creates sales forecasts based on historical data

  

determines detailed production schedule

 

determines the amount and timing for placing raw material orders with suppliers

Correct!

 

refines a production plan by determining the amount of weekly or daily production needed to meet the demand for individual products

Question 6

0 / 10 pts

A customer relationship management (CRM) system helps a company in managing ______.

You Answered

  

material sourcing and procurement

  

product development and manufacturing

Correct Answer

  

distribution and accounting

  

human resources and finance

Question 7

10 / 10 pts

In which of the five basic supply chain activities do you build relationships with suppliers to procure raw materials?

  

Plan

Correct!

  

Source

  

Deliver

  

Return

Question 8

10 / 10 pts

What does supply chain management involve?

 

The management of production material flows between and among stages in a supply chain to maximize total supply chain efficiency

 

The management of information flows between and among stages in a supply chain to maximize total supply chain costs

Correct!

 

The management of information flows between and among activities in a supply chain to maximize total supply chain effectiveness and corporate profitability

  

None of the above

Question 9

10 / 10 pts

Which of the following is not one of the five basic components of supply chain management?

  

Plan

  

Source

Correct!

  

Cost

  

Deliver

Question 10

10 / 10 pts

_____ is the use of software to assist in the creation, analysis, and modification of the design of a component or product.

Correct!

  

Computer-aided design

  

Software-aided design

  

Application-aided design

  

Program-aided design


Quiz # 8

Question 1

10 / 10 pts

Which of the following is NOT considered a BI and analytics tool?

  

Data visualization

  

Drill-down analysis

Correct!

  

Online transaction processing

  

Data mining

Question 2

10 / 10 pts

Which of the following is NOT a key capability of BI tools?

  

ability to create graphs of results

  

ability to zoom in to view various levels of details

Correct!

  

ability to provide advice to the user on which model best suits the data

  

ability to link disparate data to gain various levels of insights

Question 3

10 / 10 pts

The goal of business intelligence is to _____.

  

provide access to novel tools to the users

  

reduce the cost of data processing

Correct!

  

support and improve decision making

  

improve employee morale

Question 4

10 / 10 pts

Which of the following is NOT considered business intelligence practice?

  

Analysis

  

Visualization

  

Data extraction

Correct!

  

Transaction processing

Question 5

10 / 10 pts

_____ is used to explore large amounts of data for hidden patterns to predict future trends.

  

Data governance

Correct!

  

Data mining

  

Linear regression

  

Drill down

Question 6

10 / 10 pts

Which of the following is NOT a commonly used BI tool?

  

data visualization

  

linear regression

  

drill-down analysis

Correct!

  

automated customer service

Question 7

10 / 10 pts

Suppose you have access to quantitative data on populations by ZIP code and crime rates. You wish to determine if there is a relationship between the two variables and display the results in a graph. Which BI tool will be most useful?

  

Word cloud tool

  

Querying tool

  

Reporting tool

Correct!

  

Data visualization tool

Question 8

10 / 10 pts

To analzye various alternative scenarios, a manager would use _______.

Correct!

  

the spreadsheet’s ‘what-if’ capability

  

the graphing features of spreadsheet software

  

the reporting feature of a BI tool

  

a data visualization tool

Question 9

10 / 10 pts

The graphical representation that summarizes the steps a consumer takes in making the decision to buy your product and become a customer is called _____.

  

a word cloud

Correct!

  

a conversion funnel

  

a scatter diagram

  

a pivot chart

Question 10

10 / 10 pts

Which of the following is a potential disadvantage with self-service BI?

  

Accelerates and improves decision making. 

Correct!

 

Can lead to over spending on unapproved data sources and business analytics tools. 

 

Encourages nontechnical end users to make decisions based on facts and analyses rather than intuition. 

 

Gets valuable data into the hands of the people who need it the most—end users.


Quiz # 9

Question 1

10 / 10 pts

_____ knowledge is hard to measure and document and typically is not objective or formalized.

Correct!

  

Tacit

  

Shared

  

Technical

  

Explicit

Question 2

10 / 10 pts

A _____ is a group of people with common interests who come together to create, store, and share knowledge of a specific topic.

Correct!

  

community of practice (COP)

  

social network

  

professional learning community (PLC)

  

personal network

Question 3

10 / 10 pts

_____ include the people, procedures, hardware, software, data, and knowledge needed to develop computer systems and machines that can simulate human intelligence processes including learning, reasoning, and self-correction.  

  

Assistive technology systems

  

Intelligence agents

Correct!

  

Artificial intelligence systems

  

Virtual reality systems

Question 4

10 / 10 pts

_____ can process many pieces of data at the same time and learn to recognize patterns.

  

Voice recognition systems

  

Natural language processing systems

  

Learning systems

Correct!

  

Neural networks

Question 5

10 / 10 pts

The _____ stores all relevant information, data, rules, cases, and relationships that an expert system uses.

  

inference engine

Correct!

  

knowledge base

  

user interface

  

data warehouse

Question 6

10 / 10 pts

_____ do not need any previous training in computers or expert systems.

  

Domain experts

Correct!

  

Knowledge users

  

Knowledge engineers

  

Intelligent agents

Question 7

10 / 10 pts

When video files are played while being downloaded from the Internet, it is called _____.

  

video compression

  

virtual reality

Correct!

  

streaming video

  

file conversion

Question 8

0 / 10 pts

_____ has the potential to superimpose digital data over real photos so that GPS maps can be combined with real pictures of stores and streets to help people locate their position.

  

Immersive virtual reality

You Answered

  

Telepresence

Correct Answer

  

Augmented reality

  

Location reality

Question 9

10 / 10 pts

_____ is a wide range of adaptive and rehabilitative devices to help people with disabilities perform tasks that they were formerly unable to accomplish or had great difficulty accomplishing.

Correct!

  

Assistive technology

  

Virtual reality

  

Forensics software

  

Bioinformatics

Question 10

10 / 10 pts

Executives at Southwestern Construction have noticed that the company’s construction team in the Phoenix office is more efficient with its resources than the other teams in the Las Vegas, Salt Lake, and Santa Fe offices. They decide to construct a knowledge management system that will allow the Phoenix team’s methods to be shared with the other three offices. Which general benefit are they hoping to gain from this new system?

  

fostering innovation through a free flow of ideas

Correct!

  

leveraging the expertise of people across the organization

  

capturing the expertise of key individuals

  

all of these answers


Quiz # 10

Question 1

10 / 10 pts

Suppose a goal your employer sets reads as “95% of our customers will be happy with our product.” For which of the following characteristic is this goal inadequate?

  

Specific

Correct!

  

Measurable

  

Achievable

  

Relevant

Question 2

10 / 10 pts

Your new employer wishes to use strategic planning to grow the business. Which of the following would you advise is the most essential task? 

Correct!

  

create vision/mission statement

  

list the business’s core values

  

list the business objectives

  

define the goals

Question 3

10 / 10 pts

Which type of IS project has the highest risk of failure?

  

Mandatory

Correct!

  

Breakthrough

  

Enhancement

  

Maintenance

Question 4

10 / 10 pts

If an organization considers its IS organization as a cost center or service provider, then its IS goals would be to _______.

  

control IS costs

  

expand IS services

  

make IS investments to deliver new products and services

Correct!

  

reduce IS costs

Question 5

0 / 10 pts

The members of the _______ review and consider the corporate objectives, goals, and strategies, and they can generate many ideas for IS projects that support corporate objectives and goals.

You Answered

  

senior management

  

accounting department

Correct Answer

  

IS organization

  

investors group

Question 6

10 / 10 pts

Which of the following is considered an “expense” among typical IS project-related costs?

  

Employee effort

  

Software license

Correct!

  

Consultant charges

  

Cost of data entry equipment

Question 7

10 / 10 pts

The business unit most affected by the project and the one whose budget will cover the project costs is known as the _____.

  

accounting unit

Correct!

  

sponsoring business unit

  

IT department

  

systems department

 Question 8

10 / 10 pts

A building, office equipment, computer hardware, and network equipment are examples of _____.

Correct!

  

capital assets

  

expense items

  

internal cross-charges

  

None of these answers

Question 9

10 / 10 pts

_______ is a set of activities that includes defining an achievable completion date that is acceptable to the project stakeholders, developing a workable project schedule, and ensuring the timely completion of the project.

  

Scope management

  

Cost management

Correct!

  

Time management

  

Quality management

Question 10

10 / 10 pts

You are part of an Information Systems project team. Your job is to ensure that the technology and vendor suggested for use in the project are consistent with the IS strategy. Your role in the project steering team is _____.

  

project manager

  

project champion

  

project sponsor

Correct!

  

IS Manager


Quiz # 11

Question 1

10 / 10 pts

Laura is carefully estimating the time required for each phase of a proposed system development project to see if her company can meet the client’s desired time for completion. Laura is checking on ___________.

  

technical feasibility

Correct!

  

schedule feasibility

  

deadline feasibility

  

economic feasibility

Question 2

10 / 10 pts

_____ determines whether the expected benefits associated with a project outweigh the expected costs sufficiently to make the project financially attractive.

Correct!

  

Economic feasibility

  

Technical feasibility

  

Legal feasibility

  

Operational feasibility

Question 3

10 / 10 pts

_____ creates a complete set of technical specifications that can be used to construct an information system.

Correct!

  

Systems design 

  

Systems investigation

  

Systems analysis

  

Systems development

Question 4

0 / 10 pts

In the context of data-flow diagrams (DFDs), the _____ includes arrows that show the direction of data movement.

  

process symbol

You Answered

  

entity symbol

Correct Answer

  

data-flow line

  

data store symbol

Question 5

10 / 10 pts

Once new software has been selected, implementation will include all of these tasks EXCEPT _________.

  

customizing any aspects of the solution needed

Correct!

  

consulting with stakeholders to establish future needs

  

training end users

 

configuring all of the software’s capabilities and options to meet requirements

Question 6

10 / 10 pts

_____ involves testing the complete, integrated system (hardware, software, databases, people, and procedures) to validate that an information system meets all specified requirements.

  

Integration testing

Correct!

  

System testing

  

Volume testing

  

User acceptance testing

Question 7

10 / 10 pts

You are part of the team to implement new software at XYZ Inc. The employees at XYZ Inc. trust the results of the old software programs, but are cautious about accepting the outcomes of the proposed new software programs. What software implementation strategy would you recommend in this situation?

  

Direct cutover

  

Phase-in approach

  

Pilot startup

Correct!

  

Parallel start up

Question 8

10 / 10 pts

_____ is the process of analyzing systems to make sure they are operating as intended.

Correct!

  

System review

  

System operation

  

System maintenance

  

System construction

Question 9

10 / 10 pts

_____ requires unbiased and careful questioning of whether system elements are related in the most effective ways, considering new or different relationships among system elements, and possibly introducing new elements into the system.

  

Causal analysis  

  

Creative analysis

Correct!

  

Critical analysis

  

Data flow analysis

Question 10

10 / 10 pts

The goals of _____ are to determine the work load at which systems performance begins to degrade and to identify and eliminate any issues that prevent the system from reaching its required system-level performance.

  

unit testing

  

user acceptance testing

Correct!

  

volume testing

  

integration testing


Quiz # 12

Question 1

10 / 10 pts

A hacktivist is someone who _______.

 

attempts to gain financially and/or disrupt a company’s information systems and business operations

Correct!

 

hacks computers or Web sites in an attempt to promote a political ideology 

  

attempts to destroy the infrastructure components of governments

 

violates computer or Internet security maliciously or for illegal personal gain

Question 2

10 / 10 pts

These days, the biggest threats to IT security are from ________.

 

“geeks” working on their own and motivated by the desire to gain some degree of notoriety

  

international drug cartels

  

terrorist organizations

Correct!

 

organized groups that have ample resources, including money and sophisticated tools, to support their efforts

Question 3

10 / 10 pts

A botnet is a ____.

  

network of robots that control an assembly line at a factory

  

network of servers that exchange traffic data

  

network of devices that are used for managing security

Correct!

  

network of computers that send out access requests to servers repeatedly

Question 4

10 / 10 pts

On the back of a credit card the three-digit number above the signature panel is used to _____.

  

verify the identity of the credit card holder

Correct!

  

verify the card is legitimate and not a stolen card number

  

enter your account into a raffle

  

track your transactions for rewards program purposes

Question 5

10 / 10 pts

In a denial-of-service (DDoS) attack, the perpetrator ____.

Correct!

 

instructs the zombie computers to send simple access requests to target computers

 

sends out a huge number of spam emails to all of those in your contacts list

  

changes the configuration information of the infected computers

  

refuses to accept any email from any sender

Question 6

10 / 10 pts

A company’s risk assessment process can include numerous threats to the computers and networks. Which of the following can be considered an adverse event?

  

Distributed denial-of-service attack

  

Email attachment with harmful worm

  

Harmful virus

Correct!

  

All of the above

Question 7

10 / 10 pts

Which of the following subject areas does the USA Patriot Act cover?

Correct!

  

Cyberterrorism

  

Identity theft

  

Credit card fraud

  

Transmitting virus programs

Question 8

10 / 10 pts

Which of these organizations offers guidelines on developing security policies?

  

DHS

Correct!

  

SANS

  

IBM

  

CISCO

Question 9

10 / 10 pts

You have been hired as the new Information Security consultant at XYZ Inc. Which of these employee behaviors would be a top security concern?

Correct!

  

Leaving laptop computers unattended in public spaces

  

Using office computers for personal e-mails

  

Drinking water or coffee while working on computers

  

Banging on the keyboard, when the computer is running slow

Question 10

10 / 10 pts

Which of the following is the correct description of a firewall?

  

It is a software that deletes viruses from attachments.

  

It is hardware that prevents unauthorized data to enter the private network.

Correct!

 

It is a software and hardware combination that limits the incoming and outgoing Internet traffic.

  

It is a concept used in developing security policies.


Quiz # 13

Question 1

10 / 10 pts

_____ is/are considered to be the most important element in computer-based information systems.

  

Bandwidth 

  

Software applications

  

Standard operating procedures

Correct!

  

People

Question 2

10 / 10 pts

_____ are people who work directly with information systems to get results.

  

System analysts

  

Database administrators

  

System developers

Correct!

  

End users

Question 3

10 / 10 pts

To keep information beyond reach of unauthorized users, is to keep the information _____.

Correct!

  

secure

  

economical

  

simple

  

verifiable

Question 4

10 / 10 pts

Authoritarian regimes sometimes limit citizens’ access to certain Websites, reject the use of certain keywords in search engine searches, and track and monitor the Internet activities of individuals, which are all forms of ___________.

  

cybercrime

  

cyberoppression

  

cyberterrorism

Correct!

  

censorship

Question 5

10 / 10 pts

All of the following are examples of ethical issues related to data and information systems EXCEPT _________.

  

job losses due to humanlike technologies

  

invasion of privacy through technology

Correct!

  

the cost of system development

  

freedom of expression vs. censorship

Question 6

10 / 10 pts

Which of the following key terms represents the principles and standards that guide our behavior toward other people?

Correct!

  

Ethics

  

Intellectual property

  

Standards of living

  

Security

Ethics are the represents the principles and standards that guide our behavior toward other people.

Question 7

10 / 10 pts

Which of the following governs the ethical and moral issues arising from the development and use of information technologies, and the creation, collection, duplication, distribution, and processing of information?

  

Ethical information

  

Information technology

  

Information policies

Correct!

  

Information ethics

Information ethics governs the ethical and moral issues arising from the development and use of information technologies, and the creation, collection, duplication, distribution, and processing of information.

Question 8

10 / 10 pts

Determining what is ethical can sometimes be difficult because certain actions can be justified or condemned depending on how you view the relationship between ___ and ________.

  

Legal; confidential

Correct!

  

Legal; ethical

  

Legal; technical

  

Confidential; open

When discussing information ethics, determining what is ethical can sometimes be difficult be certain actions can be justified or condemned depending on how you view the relationship between legal and ethical.

Question 9

10 / 10 pts

Sophie Black works as a computer programmer for a software company. Her boss, Mike Jones, is responsible for developing a new software game for the Wii. After completion of the project Mike gives all of the team members a free copy of the game without consent from the company. Sophie is a little hesitant and unsure about accepting the game because legally it would be considered _________.

  

Counterfeit software

Correct!

  

Pirated software

 

  

Ethical software

  

Governance software

Pirated software is the unauthorized use, duplication, distribution, or sale of copyrighted software.

Question 10

10 / 10 pts

Which of the following is included in the four quadrants of ethical and legal behavior?

  

Legal behavior and ethical behavior

  

Illegal behavior and ethical behavior

  

Legal behavior and unethical behavior

Correct!

  

All of the above

 

All of the above are contained in the four quadrants of ethical and legal behavior.

Contact Us

a2zAssignment Education Services
3768 SW, E16th Street
New York,10003, U.S.A

EmailSupport@a2zassignment.com

Ph: +1(786) 667-3215

WhatsApp: +1(786) 667-3215

Quick Links: