Info Systems Final

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/203

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

204 Terms

1
New cards

Managers can help their organizations gain _____ through cost leadership, differentiation, or focus.

technology infrastructure

information systems expertise

a set of procedures

a competitive advantage

a competitive advantage

2
New cards

Franklin is responsible for helping to ensure that his organization meets the Payment Card Industry Data Security Standard when handling customers' credit card information. Franklin maintains information systems with influence within the _____.

workgroup sphere

personal sphere

enterprise sphere

interorganizational sphere

enterprise sphere

3
New cards

Autumn develops a strategic plan that will allow her organization to take advantage of opportunities and trends by _____.

reacting passively

being proactive

staying focused on costs

remaining in state of flux

being proactive

4
New cards

When entering a customer order, Josie ensures that the desired end result is achieved and any problems are reported to the correct person by following a(n) _____.

procedure

EDI standard

supply chain

process

procedure

5
New cards

Jude, a senior executive, and the managers who report to him must make many decisions for their business units. To assist them with

this, they rely on strategic planning to provide _____.

new and loyal customers

a reactive approach to market changes

a framework and a clearly defined direction

the human and material resources they need

a framework and a clearly defined direction

6
New cards

Which type of information system do organizations use to define structured interactions among employees or between the organizational

and external customers, suppliers, or business partners?

workgroup information system

interorganizational information system

enterprise information system

personal information system

enterprise information system

7
New cards

Which of the following components forms the foundation of every computer-based information system and includes resources such as

hardware, software, and data center facilities?

people

processes

structure

technology infrastructure

technology infrastructure

8
New cards

Collaboration between two or more organizations that lowers costs and reduces manual effort among employees is enabled by a(n) _____.

interorganizational information system

workgroup information system

personal information system

enterprise information system

interorganizational information system

9
New cards

A high-level IS manager has his firm utilize sophisticated information systems to digitally design its products so that design defects can be detected and removed early in the process, reducing development cost. What business strategy does this represent?

focus

differentiation

cost leadership

high standards

cost leadership

10
New cards

A senior IS manager implements a vendor-managed inventory system that reduces both the administrative costs of managing inventory and inventory holding costs. What business strategy does this represent?

focus

high standards

cost leadership

differentiation

cost leadership

11
New cards

Fabiola's IS management team is formulating their IS strategic plan. Fabiola reminds them that they must consider __.

limiting communication with lower-level managers

corporate strategy and business unit strategies

the IS organization isolated from the rest of the organization

previous but not future IT investments

corporate strategy and business unit strategies

12
New cards

An IS manager recommends that his organization invest in improving its customer information system so as to more clearly define the target market and improve service to that market. What business strategy does this represent?

focus

high standards

differentiation

cost leadership

focus

13
New cards

Janelle is helping create a strategic plan for her organization. What should she anticipate will be stable--that is, change little, if at all--over time?

economic growth

suppliers

importance of planning

competitiors

importance of planning

14
New cards

Companies that share data with other organizations in a manner that conforms to rigidly defined industry standards are using a type of ________.

workgroup information system

interorganizational information system

personal information system

enterprise information system

interorganizational information system

15
New cards

What does Doug, an IS manager, consult when he needs to identify competencies for his organization to invest in?

information system strategic plan

high-demand certifications list

procedural certifications list

enterprise information system

information system strategic plan

16
New cards

In terms of information systems, a collaboration tool that helps a team communicate, organize, plan, schedule, track, and delegate jobs would be an example of _________.

a personal information system

an organizational complement

a workgroup information system

an enterprise information system

a workgroup information system

17
New cards

To improve his score on a security self-assessment, Saul set up his laptop so that the first thing he must do when he turns it on is _____.

run a file backup procedure.

log in to his employer's VPN.

install new software updates.

enter a strong security password.

enter a strong security password.

18
New cards

Assessing damage following a computer incident, investigating the unauthorized disclosure of corporate confidential data, and confirming or evaluating the impact of industrial espionage are tasks most appropriate

for _____.

computer forensicsthe CIA security triadmanaged security service providersa security dashboard

computer forensics

19
New cards

A data breach at your business resulted in the loss of some customer

data. Several angry customers have filed charges. What is a

recommended course of action to prepare for future events?

meet with your lawyers to prepare to counter-sue the customers

activate the forensics analysis team and prepare documentation

release a media statement denying the customer allegations and asserting

that all customer data is safe

settle with the customers, however much it may cost

activate the forensics analysis team and prepare documentation

20
New cards

Samantha owns a small business that handles a lot of sensitive customer

data and would be devastated by a data breach. Her IS department,

which consists of one part-time consultant named Nikki, is overwhelmed

by the number of alerts and false alarms constantly issued by her

security-monitoring systems and expresses concerns about their data

security. What should Samantha do about this?

research different security software options

ask Nikki to disable the alerts and alarms

change her passwords more often

consider a managed security service provider

consider a managed security service provider

21
New cards

Assume your organization is experiencing an intruder attack. You have an intrusion detection system (IDS) set up. Which of the following events occurs first?

The network router sends traffic to the firewall as well as to the IDS.

Messages from the IDS are routed to the network security team.

The network security team decides to block traffic from that IP address.

The IDS warns the firewall of suspicious traffic.

The network router sends traffic to the firewall as well as to the IDS.

22
New cards

You work for a company that is growing. Originally, all the users in all

departments had access to all the data in the database. It is considered a

security risk. What is an appropriate action to reduce the risk?

Assign roles and privileges to users so that only job-relevant data is

accessible to the user.

Tweak the firewall parameters so that outgoing traffic can be better

controlled.

Install and provide stronger anti-virus software on the users' computers.

Install a two-step login procedure, where the user has to key in additional

information for logging in.

Assign roles and privileges to users so that only job-relevant data is accessible to the user.

23
New cards

You wish to use your personal laptop computer at work, but the IT

department folks will not allow this. The likely reason is that ______.

your productivity could not be accurately measured.

you will use your laptop for non-work-related activities.

your non-work-related use of the laptop could increase vulnerability.

your activities could not be monitored.

your non-work-related use of the laptop could increase vulnerability.

24
New cards

Kenneth is assisting with step 7 of his organization's security risk

assessment. He and his team compare the risks of potential security

breaches against the estimated costs of preventing them from happening.

Why is this an important step?

Data availability requires implementing products, services, policies, and procedures to ensure that data are accessible.

No amount of resources can guarantee a perfect security system, so one must balance risks with prevention costs.

Taking action to prevent cyberattacks, such as installing protective software, makes them much less likely to occur.

Periodic security audits are needed to ensure that individuals are following established policies.

No amount of resources can guarantee a perfect security system, so one must balance risks with prevention costs.

25
New cards

Which of the following is considered the most likely source of cyberattacks, based on a poll of global executives, information security

managers, and IT leaders?

careless insiders

lone wolf attackers

MSSPs

cyberterrorists

careless insiders

26
New cards

Your business has a web server that has suddenly become unresponsive. When you study the server's logs there are a huge number of requests from what appear to be legitimate computers. The problem is likely because of _____.

a CAPTCHA issue

a logic bomb

a distributed denial-of-service attack

too many Spam emails

a distributed denial-of-service attack

27
New cards

Ethical business practices _____.

often raise an organization's priority with suppliers and other business partners

create a negative discrepancy between employee and organizational values

increase employee turnover when workers feel their actions are overly restricted

are usually more expensive for a business over the long term than unethical ones

often raise an organization's priority with suppliers and other business partners

28
New cards

How do fair information practices in the United States and the European

Union differ?

Unlike the EU, the U.S. has no single, overarching national data privacypolicy.Unlike the U.S., the EU has implemented numerous data privacy laws.Unlike the EU, the U.S. addresses potential abuses by private industry but notby the government.Unlike the U.S., the EU divides their data privacy laws into three ares:financial, health related, and child specific.

Unlike the EU, the U.S. has no single, overarching national data privacy policy.

29
New cards

Using the values held by his organization, Don has defined an ethical

approach for dealing with the needs of his team members and their

customers that he has implemented within his department. His team

members know what is expected of them, and their customers know what to

expect from the organization. The primary benefit of this approach for Don's

department is _____.

fostering good business practices

avoiding publicity

protection from legal action

consistent operation

consistent operation

30
New cards

Anne and Jordan have two preteen sons and they're concerned about what their kids might see and share on the Internet. They should probably invest in _______.

filtering software

privacy screening

security passwords

Internet licensing

filtering software

31
New cards

It is not against the law for Ethel to possess an automatic weapon, but she believes possessing one is the wrong thing to do. For Ethel, possessing an automatic weapon is _____.

illegal and unethical

legal but unethical

legal and ethical

illegal but ethical

legal but unethical

32
New cards

In the United States, legislation that protects people from data privacy abuses by corporations _____.

requires firms to respond within one month to data requests from individuals

was passed only recently

is almost nonexistent

is quite similar to the EU's General Data Protection Regulation

is almost nonexistent

33
New cards

Because Marigold wants to join CompTIA (the Computer Technology Industry Association), she agrees to adhere to this organization's professional code of ethics. This means that she _____.

is prioritizing CompTIA's principles of right and wrong over her own

believes CompTIA has provided answers to every ethical dilemma she might face

has promised to behave in a way that CompTIA has defined as desirable

wants to rely on CompTIA's guidelines primarily to avoid violating the law

has promised to behave in a way that CompTIA has defined as desirable

34
New cards

Felicity, who works at a bank, opens multiple credit card accounts for

customers without their authorization in order to improve her customer sales,

and thus her apparent job performance. This behavior is explicitly forbidden

by bank policies and the instructions her manager gave her. Which

statement is true in this situation?

This situation demonstrates how bad organizational ethics can lead to bad

business results.

The principle called respondeat superior, meaning "let the master answer,"

does not apply.

The bank can be held responsible for Felicity's behavior despite its ethical

policies.

The bank cannot be held responsible for Felicity's actions since they were

contrary to bank policies.

The bank can be held responsible for Felicity's behavior despite its ethical policies.

35
New cards

Which of the following is a defining feature of a safety-critical software system?

performs quickly and efficiently

minimum system downtime

defects could result in human injury

meets users' needs completely

defects could result in human injury

36
New cards

JoAnn is a developer hired to help code the software that will control a

nuclear power plant reactor. Compared with her previous project, which

involved software for sophisticated video games for PCs and home game

consoles, JoAnn's current project will most likely _____.

have a much larger budget and a much shorter development schedule

have a much smaller budget and a much longer development schedule

have a much larger budget and a much longer development schedule

have a much smaller budget and a much shorter development schedule

have a much larger budget and a much longer development schedule

37
New cards

A _____ is a conditional statement that links conditions to actions or outcomes.

THEN-IF statement

case

simulation

rule

rule

38
New cards

The _____ stores all relevant information, data, rules, cases, and relationships that an expert system uses.

knowledge base

data warehouse

user interface

inference engine

knowledge base

39
New cards

How does an artificial neural network make a decision and produce its final result?

It matches the current data to past cases and attempts to reuse or modify previous decisions.

It quantitatively evaluates several possible choices using a fitness function.

It identifies rules linking conditions from the data to actions or outcomes.

It compares the values associated with the networked connections through which data is filtered.

It compares the values associated with the networked connections through which data is filtered.

40
New cards

Which of the following statements about unsupervised learning is accurate?

Unsupervised learning requires an unlabeled training data set.

In unsupervised learning, tests have formal, predetermined correct answers.

In unsupervised learning, each piece of data must be associated with a name.

Unsupervised learning is like a child learning a game after being informed of the rules.

Unsupervised learning requires an unlabeled training data set.

41
New cards

What overall strategy is used to train artificial neural network programs?

unsupervised learning

forward chaining

supervised learning

backward chaining

supervised learning

42
New cards

An artificial neural network uses the feedback it receives to _____.

select the option with the lowest weight

assign the most "points" to the choice with the least feedback

generate new data

weight its connections

weight its connections

43
New cards

_____ systems can superimpose images and data over a person's view of the real world.

Augmented reality

Forward chaining

Immersive virtual reality

Neural network

Augmented reality

44
New cards

Since the early 1800s, automation has often aroused workers' fears about _____.

job loss

minimum wages

workplace hazards

unions

job loss

45
New cards

Thomas and Emily are discussing the effect of AI on future employment. Emily correctly points out that _____.

until the introduction of AI, workers welcomed automation as a way to increase safety

historically, technology has seldom created labor that is chapter or faster than human labor

technology often replaces high-paying jobs but creates more low-paying jobs

the introduction of new technology has always resulted in the creation of more jobs than were lost

the introduction of new technology has always resulted in the creation of more jobs than were lost

46
New cards

A key difference between virtual reality and augmented reality is that augmented reality _____.

is not yet used in the medical field

can make objects seem to appear in your current surroundings

allows you to "walk through" different scenes from your current location

is much a newer technology

can make objects seem to appear in your current surroundings

47
New cards

The constraint that all foreign keys must have either null values or the value of a primary key in another table is referred to as

_____________________.

foreign key value rulereferential integrity rulenull value rulemob ruleentity integrity rule

referential integrity rule

48
New cards

What is each row in a relational database table called?

relation

entity

anomaly

attribute

tuple

tuple

49
New cards

Functional dependencies are similar to ________ keys.

secondary

foreign

primary

useful

foreign

50
New cards

The relational data model portrays data as being stored in ________________.

tables

objects

heirarchies

files

tables

51
New cards

Which of the following attributes in the Cash Receipts table would most likely be a foreign key? For our non-accounting friends, the Cash Receipts table represents payments received from customers.

customer name

customer check number

customer number

cash receipt date

cash receipt number

customer number

52
New cards

A ________ relationship exists when three entities are associated.

binary

tertiary

ternary

unary

ternary

53
New cards

________ refers to the maximum number of times an instance of one entity can be associated with an instance in the related entity.

Business rules

Cardinality

Data dictionary

Modality

Cardinality

54
New cards

A ________ relationship exists when two entities are associated.

solitary

unary

ternary

binary

binary

55
New cards

Two vertical lines represent the ________ cardinality symbol.

mandatory single

optional many

mandatory many

optional single

mandatory single

56
New cards

Microsoft Access uses ________ to conduct queries.

RFID

TPS

QBE

ETL

QBE

57
New cards

A circle with a "chicken leg" to the entity represents the ________ cardinality symbol.

mandatory many

optional many

optional single

mandatory single

optional many

58
New cards

A ________ relationship exists when an association is maintained within a single entity.

ternary

binary

unary

solitary

unary

59
New cards

How the user conceptually organizes and understands the data is referred to as the ________________.

logical view

data organization view

data model view

physical view

logical view

60
New cards

Which of the following is an individual user's view of the database?

internal-level schema

conceptual-level schema

logical-level schema

external-level schema

external-level schema

61
New cards

Which of the following is the software that runs the database system?

DQL

DBMS

DDL

DML

DBMS

62
New cards

The constraint that all primary keys must have nonnull data values is referred to as the ____________________.

entity integrity rule

normalization rule

referential integrity rule

relational data model rule

personal integrity rule

entity integrity rule

63
New cards

________ is the most popular query language used for interacting with a database.

RFID

ETL

TPS

SQL

SQL

64
New cards

Which of the following attributes would most likely be a primary key?

supplier number

supplier phone number

supplier name

supplier account balance

supplier zip code

supplier number

65
New cards

Which of the following would managers most likely use to retreive information about sales during the month of October?

DML

DSL

DHL

DQL

DDP

DDL

DQL

66
New cards

What is Zim'z favorite type of visualization?

bar chart

map

heat map

pie chart

scatterplot

tree map

map

67
New cards

Instead of a pie chart, Zim says that most of the time you can draw this type of chart instead

bar chart

scatterplot

tree map

heat map

bar chart

68
New cards

What is the difference between a dashboard and a story in Tableau.

there is no real difference; both terms can be unsed interchanably.

A story is for sharing an explcit message; a dashboard gives an impartial window into the organization.

A dashboard is made up of linking several stories together.

A dashboard is for sharing an explcit message; a story gives an impartial window into the organization.

A story is for sharing an explcit message; a dashboard gives an impartial window into the organization

69
New cards

What is Zim'z LEAST favorite type of visualization?

bar chart

tree map

heat map

scatterplot

pie chart

map

pie chart

70
New cards

This type of visualization is good for looking for relationships between data

bar chart

tree map

heat map

scatterplot

scatterplot

71
New cards

What type of data is associated with this symbol? # with a circle around it

Numeric

String

Geographic

Date

Geographic

<p>Geographic</p>
72
New cards

What type of operation do we do to make a tall, narrow dataset?

join

select

split

pivot

pivot

73
New cards

What type of data is associated with this symbol? #

String

Date

Geographic

Numeric

Numeric

<p>Numeric</p>
74
New cards

I made a very big deal about this in the audio. When do you need to be careful when creating a new variable?

When creating additive terms (i.e. adding variables together)

When creating interactions (i.e. multiplying variables together)

When creating delta terms (i.e. subtracting variables)

When creating ratios (i.e. dividing variables)

When creating ratios (i.e. dividing variables)

75
New cards

In Tableau, when you place a dimension on the rows shelf, it

comes into the view as itself.

adds a trend line to the viz.

comes into the view as an aggregate.

takes on as many different colors as it has unique values.

comes into the view as itself.

76
New cards

In the first PowerPoint, who is the guy that created four statistically equivalent datasets, but all four had radically different properties when examined visually?

Mintzberg

Zimmer

Deming

Anscombe

Anscombe

77
New cards

In the PowerPoints, I gave several examples demonstrating how powerful color can be in a visualization. What caveat did I present about using color?

Avoid using a red to green color scale because color blindness

Only use 5 colors when presenting continuous data

Always use at least two different colors when incorporating color into a visualization

Use a color ramp (where the color fades from one to another) when presenting discrete data

Avoid using a red to green color scale because color blindness

78
New cards

Which of the following is a visualization best practice?

avoid System 1 thinking

leverage System 1 thinking

leverage System 2 thinking

avoid System 2 thinking

leverage System 1 thinking

79
New cards

According to what Zim talks about in the PowerPoint audio, ________________ is the most common type of visualizations you'll see in Tableau

Heat maps

Histograms

Bar charts

Line graphs

Scatterplots

Bar charts

80
New cards

A green pills means the data is ________________.

a dimension.

continuous

discrete

categorical

continuous

81
New cards

What is a limitation of a filled map?

Only one measure can be used to fill the map.

It disproportionately draws the viewer's attention to larger countries (or states).

Small regions do not show up very well.

Limitation? Haven't you been listening to Zim? Maps are awesome because they have no limitations!

Only one measure can be used to fill the map.

82
New cards

In the picture below, what is the section of the screen that is highlighted called? Where the data is to the left.

Data Frame

Menus & Toolbars

Data Window

Shelves & Cards

Data Window

<p>Data Window</p>
83
New cards

What type of data is associated with this symbol? Looks like a calendar

Numeric

String

Date

Geographic

Date

<p>Date</p>
84
New cards

An inner join _______________ null values; an outer join __________________ null values once the query runs.

minimizes, minimizes

maximizes, maximizes

minimizes, maximizes

maximizes, minimizes

minimizes, maximizes

85
New cards

The most common type of join you'll see is the ______________ join.

right

inner

left

outer

inner

86
New cards

Typically I want this type of dataset

a tall narrow dataset

a short narrow dataset

a tall wide dataset

a short wide dataset

a tall narrow dataset

87
New cards

In the picture below, what is the section of the screen that is highlighted called? Top where columns and rows are.

Shelves & Cards

Menus & Toolbars

Drawing Pane

Data Window

Shelves & Cards

<p>Shelves &amp; Cards</p>
88
New cards

What type of data is associated with this symbol? Abc

Numeric

String

Date

Geographic

String

<p>String</p>
89
New cards

All of the following are problems with pie charts except

Pie charts are poor ways to present percentile data

It is hard to compare angles of a pie chart against each other

They are ineffective when there are more than 5 groups to present

They do not show the count (or frequency) of data very well.

Pie charts are poor ways to present percentile data

90
New cards

You can also call a discrete variable a ___________________.

continuous dimension

ordinal variable

dimension

measure

dimension

91
New cards

This type of chart is good for showing relative proportions or proportions of a whole

scatterplot

tree map

heat map

bar chart

tree map

92
New cards

Pie charts are...

...to be avoided

...a good way to present qualitative data

...a good way to present quantitative data

...are usually OK to use, but should never be used when trying to present percentile data

to be avoided

93
New cards

How can I quickly tell if something is a table calculation?

It says "TC" next to the variable

It has a delta symbol (a triangle) next to it in the pill

You click on the variable, opening the dialogue box and look for the line "aggregate measures" to have a check mark next to it

if you mouseover (place your cursor on it but DO NOT click) a box appears that says "Table Calculation"

It has a delta symbol (a triangle) next to it in the pill

94
New cards

What function did I talk about in the PowerPoints that would have been helpful to know when you were working on the Access project?

DATEPART

DATETIME

DATEFROMPARTS

GETDATE

DATEDIFF

DATEADD

DATEDIFF

95
New cards

Why do we use tools like Tableau?

to help us make better decisions

to impress our bosses with our technological skills

to be able to put it on our resume so as to get a better job

to turn lots of numbers into easy to read pictures

to help us make better decisions

96
New cards

A blue pills means the data is _____________.

a measure

continuous

ordinal

discrete

discrete

97
New cards

According to Tableau, you should use _______ colors (at most) in your visualization.

6

8

5

7

8

98
New cards

What is the first step in understanding your data?

examine it visually

calculate the means of all numeric data

calculate summary statistics on all your fields

clean up the odd or otherwise weird values

examine it visually

99
New cards

Which of the following statements is correct?

A label is tied to continuous data

An axis is tied to a measure

A label is tied to a measure

An axis is tied to a dimension

An axis is tied to a measure

100
New cards

Corporate strategy, business unit strategies, innovative thinking, and technology innovations are all _____.

drivers that set information system organizational strategy

spheres of influence for types of information systems

elements of the value chain

components of Leavitt's Diamond

drivers that set information system organizational strategy