MIS quizzies for my lovey dove

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/109

flashcard set

Earn XP

Description and Tags

Does this count as helping you study :)

Last updated 1:51 AM on 11/13/24
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

110 Terms

1
New cards

The set of activities involved in building information systems, large and small, to meet users needs is called ___.

System Development

2
New cards

Your new software project manager is comfortable working on projects without fully specifying the requirements up front. He recommends a team-based approach to development. He is very likely to be a proponent of the ___ approach to software development.

Agile

3
New cards

Rosie's software development team, which has always relied on a Waterfall approach, is considering trying Agile for a few projects. One potential problem Rosie should anticipate if they make this change is that ___.

Stakeholders might be annoyed when it places greater demands on their time.

4
New cards

Buying off-the-shelf software ___.

Is less risky than building software.

5
New cards

You are part of a testing team at a software business. Your job is to see how many concurrent users the system can host and how many database transactions the system can handle without a noticeable drop in performance. You are doing ___ testing.

Volume

6
New cards

___ involves testing the complete, integrated system (hardware, software, databases, people, and procedures) to validate that an information system meets all specified requirements.

System Testing

7
New cards

What does "agility" mean in the context of the Agile development process?

Highly responsive to emerging requirements.

8
New cards

With the Waterfall approach, a mismatch between system capabilities, users' expectations, and organizational needs can occur. Why is this more likely with the Waterfall approach?

Users do not interact with the solution until the integration and testing phase.

9
New cards

Phil has been working on a new version of his company's best-selling sales management software and now he'd like to ask several co-workers and a handful of the existing version's top users to perform an acceptance test. Phil is preparing for ___.

Alpha Testing.

10
New cards

A major advantage to building customized software is that it ___.

Can help a business to achieve a competitive advantage.

11
New cards

Emily, as a part of a Scrum team, must keep her fellow team members focused on their goals through each iteration of the software product they are developing. She coordinates their activities and helps them overcome obstacles that might prevent them from achieving these goals. What role is Emily fulfilling for this project?

Scrum Master.

12
New cards

___ creates a complete set of technical specifications that can be used to construct an information system.

System Design

13
New cards

Mavis is working with her colleagues on a software selection project. They must already know the desired scope of the system as well as critical business and user requirements to make a selection because ___.

They must judge how well the vendor's solution matches the needs of the users and business.

14
New cards

Which statement about Agile software development is true?

It is an intense process that increases the risk for burnout among team members.

15
New cards

An organization that builds software via a sequential multistage system development process in which work on the next stage cannot begin until the results of the current stage are reviewed and approved or modified as necessary is using what system development process?

Waterfall.

16
New cards

___ involves running a complete new system for one group of users rather than all users.

Pilot start-up.

17
New cards

When comparing potential software solutions for her company, Mavis observes that two of the three packages meet their needs closely and are similar in price, whereas the third is significantly cheaper but would require custom modifications to meet their needs. Which of the following is true?

Mavis should investigate the costs for modifying the less expensive option.

18
New cards

You are part of the team assigned to implement new software at XYZ Inc. The employees at XYZ Inc. trust the results of the old software programs, but are cautious about accepting the outcomes of the proposed new software programs. What software implementation strategy would you recommend in this situation?

Parallel start-up.

19
New cards

The major advantage of the Waterfall approach to software development is the ___.

High degree of management control.

20
New cards

Which of the following statements is true of user acceptance testing (UAT)?

UAT must be completed successfully before newly developed software can be rolled out to the market.

21
New cards

Laura is carefully estimating the time required for each phase of a proposed system development project to see if her company can meet the client's desired time for completion. Laura is checking on ___.

Schedule feasibility

22
New cards

Suppose the customer data analysis software used by ABC Bank is significantly changed, and its documentation is therefore revised, but no new features are added. This type of maintenance is called a ___.

Release

23
New cards

Tara and Zach are leading a systems developing project and they want the investigation phase to go smoothly and quickly. They decide to use ___ because it will also help with the analysis and design phases.

Joint Application Development.

24
New cards

The U.S. Department of Veterans Affairs (VA) has undertaken three separate electronic health record system upgrade projects, none of which produced systems that fully met the organization's needs, were well integrated, or met budget or schedule goals. The Waterfall software development approach would likely have benefitted the VA because it offers ___.

Maximum Management Control

25
New cards

As Mavis researches her company's options for new software, she learns that a vendor who produces several of their existing applications offers a product of the types they are looking for and advertises that all of their systems "talk to each other." Mavis recognizes that one reason to select this product is that ___.

It may reduce the effort required to integrate the new software with existing software.

26
New cards

A data breach at your business resulted in the loss of some customer data. Several angry customers have filed charges. What is a recommended course of action to prepare for future events?

Activate the forensics analysis team and prepare documentation.

27
New cards

The purpose of an advanced persistent threat usually is to ___.

Steal Data.

28
New cards

Assume your organization is experiencing an intruder attack. You have an intrusion detection system (IDS) set up. Which of the following events occur first?

The network router sends traffic to the firewall as well as to the IDS.

29
New cards

What is the role of an MSSP?

Monitoring, Managing, and Maintaining Computer and Network Security.

30
New cards

Managed security service providers primarily help organizations keep pace with ___.

Cybercriminals and new laws and regulations.

31
New cards

The final step in the security risk assessment process is to ___.

Decide whether or not to implement particular countermeasures.

32
New cards

Which of the following shortcomings may be revealed during an IT security audit?

Whether only the appropriate personnel have access to critical data.

33
New cards

You wish to use your personal laptop computer at work, but the IT department folks will not allow this. The likely reason is that ___.

Your non-work-related use of the laptop could increase vulnerability.

34
New cards

Your business has a web server that has suddenly become unresponsive. When you study the server's logs there are a huge number of requests from what appear to be legitimate computers. The problem is likely because of ___.

A distributed denial of service attack.

35
New cards

A hacktivist is someone who ___.

Hacks computers or Web sites in an attempt to promote a political ideology.

36
New cards

Kenneth is assisting with step 7 of his organization's security risk assessment. He and his team compare the risks of potential security breaches against the estimated costs of preventing them from happening. Why is this an important step?

No amount of resources can guarantee a perfect security system, so one must balance risks with prevention costs.

37
New cards

The percentage of adults in an area who are interested in opening an account with an investment company drops significantly after the media reports on a successful cyberattack on this organization. This is most likely the result of ___.

Reputation damage related to the cyberattack.

38
New cards

Which of the following is the correct description of a firewall?

A software and hardware combination that limits incoming and outgoing Internet traffic.

39
New cards

Jennifer is a programmer who develops malware and deploys it in the computer systems of her organization's competitors so that she can secretly steal data about new product plans and designs, thus gaining a competitive advantage for her organization. What type of cyberattack is Jennifer involved in?

Cyberespionage.

40
New cards

You have been hired as the new Information Security consultant at XYZ Inc. Which of these employee behaviors would be a top security concern?

Leaving laptop computers unattended in public spaces.

41
New cards

Legal consequences following a successful cyberattack on a well-known organization often include ___.

Lawsuits initiated by consumers who incurred damages.

42
New cards

In a denial-of-service (DDoS) attack, the perpetrator ___.

Instructs the zombie computers to send simple access requests to target computers.

43
New cards

You discover that one of your organization's computers has stopped working properly due to malware. Who is most likely responsible for the presence of malware on this machine.

A careless coworker.

44
New cards

In computing, an attack on an information system that takes advantage of a particular system vulnerability is called a(n) ___.

Exploit.

45
New cards

These days, the biggest threats to IT security are from ___.

Organized groups that have ample resources including money and sophisticated tools, to support their efforts.

46
New cards

A hacker writes some programming code that will cause a computer to behave in an unexpected and undesirable manner, but disguises it as something else to make it difficult to detect. Which attack has this attacker chosen to use?

Virus.

47
New cards

Viruses and worms are both attack vectors, but they differ in that ___.

Worms can propagate without human intervention.

48
New cards

Assessing damage following a computer incident, investigating the unauthorized disclosure of corporate confidential data, and confirming or evaluating the impact of industrial espionage are tasks most appropriate for ___.

Computer forensics.

49
New cards

Once a ___ is installed, the attacker can gain full access to the computer.

Rootkit.

50
New cards

Someone who attempts to destroy the infrastructure components of governments is known as a ___.

Cyberterrorist.

51
New cards

You work for a company that is growing. Originally, all the users in all departments had access to the data in the database. It is considered a security risk. What is an appropriate action to reduce the risk?

Assign roles and privileges to users so that only job-relevant data is accessible to the user.

52
New cards

One drawback with relying on IoT applications to maintain the safety of critical systems is that ___.

A poor or absent network connection can result in missing data.

53
New cards

Which statement about the pros and cons of various cloud computing approaches is accurate?

Hybrid cloud computing provides flexibility, scalability, and cost efficiency with low security risks.

54
New cards

Reagan's firm has not had to make large investments in computer or networking hardware or in personnel to maintain the hardware because they use public cloud computing. Reagan recognizes that this demonstrates which key benefit of public cloud computing?

Reduced costs.

55
New cards

New industry-transforming services that will be made possible by 5G technology include ___.

Performing remote surgery.

56
New cards

In which common approach to cloud computing does a service provider organization own and manage the infrastructure for client organizations that access slices of shared resources?

Public cloud.

57
New cards

One of the first things developers of IoT applications should focus on is ___.

Building security from the start.

58
New cards

What is the Internet of Things?

A network of physical objects embedded with sensors, processors, software, and network connectivity capability.

59
New cards

Why are advances in 5G technology expected to influence the IoT?

5G enables many devices to transmit data quickly to the cloud.

60
New cards

How can IoT devices minimize downtime in a manufacturing plant?

By predicting equipment failures and scheduling preventative maintenance.

61
New cards

Which type of IoT application assists with the creation of new business models, products, and services through the combination of sensor data and external data to provide new insights?

Transform and explore.

62
New cards

Owen's firm runs their critical applications in a public cloud. Recently, their launch of a new product resulted in a surge of customer orders, but they were unable to ramp up their computing capacity fast enough, and some customer's experienced problems. This demonstrates which common issue with public cloud computing?

Wide various in performance over time.

63
New cards

After Rosie's company enters into a contract with a public cloud service provider and transitions to the cloud, they discover that they need greater computing capacity than they expected. To address this, they must ___.

Request that the service provider increase their capacity, incurring a higher monthly fee.

64
New cards

Many IT industry observers believe that many organizations will adopt a hybrid cloud approach because ___.

It offers both agility and security.

65
New cards

What must a networked device possess to truly belong to the IoT?

An IP address.

66
New cards

The way consumers and large enterprises use the IoT is evolving because of advances in ___.

Mobile communications.

67
New cards

Sensors inside IoT wearable devices typically collect information such as ___.

Location and heart rate.

68
New cards

Suppose a business wishes to have access to servers and storage, but does not want to buy them. The business prefers to have their own employees install and maintain the computing platform and application software. What is their best choice?

Cloud computing: infrastructure as a service.

69
New cards

Which type of cloud computing environment is most suitable for an organization that wants to run applications with stringent compliance requirements on-premises while running applications with fluctuating capacity needs on a service provider's cloud?

Hybrid.

70
New cards

A common reason an organization chooses a private rather than a public cloud environment is ___.

Concerns about data security.

71
New cards

Thomas owns a small Web services company and currently owns and maintains all of his own computing hardware. He plans to develop and test a new service offering that will require his computing capacity to double or triple quickly if it proves successful. How might transitioning to the public cloud help Thomas with this situation?

Flexible computing capacity that can be adjusted continually.

72
New cards

Smart cars ___.

Have sensors that monitor objects in the car's blind spots and at the front and rear of the car.

73
New cards

A single-tenant cloud computing environment is also known as a(n) ___.

Private cloud.

74
New cards

Mavis's company migrated its infrastructure and data to a public cloud last year, and have endured several periods of decreased or interrupted performance since then. Marvis is frustrated because the company's leadership is unwilling to change cloud providers. Mavis's company has most likely fallen prey to ___.

Vendor lock-in.

75
New cards

James entered into a public cloud computing arrangement without reviewing the standard contract carefully. What problem is he most likely to face as a result?

Unexpected cloud service costs.

76
New cards

Which type of IoT application performs predictive analysis and initiates preemptive action using sensor data augmented with external data?

Predict and adapt.

77
New cards

Which of the following is a widely-used client-side programming language?

JavaScript

78
New cards

In a ___, all network devices are connected to a common backbone that serves as a shared communications medium.

Bus Network

79
New cards

Which network topology uses multiple access points to link a series of devices that speak to each other to form a network connection across a large area?

Mesh

80
New cards

What very short-range wireless connectivity technology enables exchange of data over a few inches of space between two devices, such as a smartphone and a point-of-sale terminal?

Near Field Communication (NFC)

81
New cards

The World Wide Web uses the ___ Protocol for transmitting content.

Hypertext Transport

82
New cards

A network built using Web technologies that links selected resources of a company's internal corporate network with its suppliers, customers, or other business partners is called a(n) _____.

Extranet.

83
New cards

The World Wide Web uses a networking approach wherein many end-user computing devices request and receive services from host computers on the network, which is known as ___.

Client-Server Architecture

84
New cards

Which type of network device directs data packets to other networks until each packet reaches its destination, and thus forms the Internet backbone?

Router

85
New cards

Liesel is an entrepreneur, and she'd like to publish a website for her small business. Liesel ___.

Can use hosting services

86
New cards

Web client software, such as Chrome, Firefox, Internet Explorer, Safari, and Opera, that are used to view Web pages are known as ___.

Web Browsers

87
New cards

Joan's organization has just set up a corporate intranet. In order to use the intranet effectively, most likely Joan ___.

Can rely on her familiarity with Internet technology.

88
New cards

Data will zip through a 5G network much faster than through a 4G network because of the 10-fold difference in ___.

Latency

89
New cards

Jocelyn uses a company-owned smartphone for her job, and has noticed that applications, data, and patches are installed on her smartphone for her by a central control group. She cannot change the system or security settings on the smartphone because the central control group handles those as well. Jocelyn's company can do this using ___.

Mobile device management software.

90
New cards

___ is a process for driving traffic to a Web site by using techniques that improve the site's ranking in search results.

Search engine optimization

91
New cards

A ___ network is one in which all network devices are connected to one another through a single central device called the hub node.

Star

92
New cards

George is in charge of ordering supplies for his employer, and he usually buys these supplies from the same vendors. One of the vendors, Business Office Supplies, has given George limited access to their inventory system so that he can see if they have what he needs without contacting a salesperson by using ___.

an extranet.

93
New cards

A ___ is a telecommunications network that connects users and their computers in a geographical area that spans a campus or a city.

Metropolitan Area Network (MAN)

94
New cards

Early 5G users should be aware that their coverage may be limited compared with 4G coverage, at least initially. Why will 5G networks likely be less widespread at first?

More cell towers will need to be installed.

95
New cards

Which piece of network hardware keeps a record of the MAC address of all devices connected to it and uses this information to direct data packets to the appropriate port?

Switch.

96
New cards

When you successfully connect your computer to a printer using ___, the two devices will be 10 to 30 feet apart and the computer will transmit to the printer at a rate of about 2 Mbps.

Bluetooth

97
New cards

An internal corporate network built using Internet and World Wide Web standards and products is known as a(n) ___.

Intranet

98
New cards

Why is managing a typical large network in today's current network environment a labor-intensive and error-prone effort?

Network devices must each be configured individually.

99
New cards

The area covered by one or more interconnected wireless access points is commonly called a(n) ___.

Hot Spot

100
New cards

What emerging approach allows administrators to manage a network via a controller that does not require physical access to all the network devices?

Software-Defined Networking

Explore top notes

note
World War 1 Review Pt. 5
Updated 1768d ago
0.0(0)
note
Ch 5: Soil Systems and Societies
Updated 1057d ago
0.0(0)
note
Geo Notes - Sem 2 2024
Updated 505d ago
0.0(0)
note
4.1 Technological Innovations
Updated 286d ago
0.0(0)
note
Early Polyphony
Updated 1407d ago
0.0(0)
note
Reasoning
Updated 1258d ago
0.0(0)
note
World War 1 Review Pt. 5
Updated 1768d ago
0.0(0)
note
Ch 5: Soil Systems and Societies
Updated 1057d ago
0.0(0)
note
Geo Notes - Sem 2 2024
Updated 505d ago
0.0(0)
note
4.1 Technological Innovations
Updated 286d ago
0.0(0)
note
Early Polyphony
Updated 1407d ago
0.0(0)
note
Reasoning
Updated 1258d ago
0.0(0)

Explore top flashcards

flashcards
AP gov: Amendments (1-27)
27
Updated 726d ago
0.0(0)
flashcards
Reading Check 1 Language
46
Updated 1160d ago
0.0(0)
flashcards
Arson/Mystery Unit List #2
20
Updated 651d ago
0.0(0)
flashcards
The Giver Vocabulary
60
Updated 1087d ago
0.0(0)
flashcards
Narrate a story
42
Updated 1043d ago
0.0(0)
flashcards
Component 1 Section B: Fortnite
49
Updated 873d ago
0.0(0)
flashcards
abeka biology 10 section 5.1
31
Updated 908d ago
0.0(0)
flashcards
AP gov: Amendments (1-27)
27
Updated 726d ago
0.0(0)
flashcards
Reading Check 1 Language
46
Updated 1160d ago
0.0(0)
flashcards
Arson/Mystery Unit List #2
20
Updated 651d ago
0.0(0)
flashcards
The Giver Vocabulary
60
Updated 1087d ago
0.0(0)
flashcards
Narrate a story
42
Updated 1043d ago
0.0(0)
flashcards
Component 1 Section B: Fortnite
49
Updated 873d ago
0.0(0)
flashcards
abeka biology 10 section 5.1
31
Updated 908d ago
0.0(0)