Management Information Systems

0.0(0)
studied byStudied by 0 people
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/99

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

100 Terms

1
New cards

workgroup

Four information system types based on their sphere of influence include interorganizational, personal, enterprise, and

2
New cards

the people, processes, and human structure components are fully addressed

Managers of the business functions most affected by a new information system have a key responsibility to ensure that

3
New cards

Leavitt's Diamond

_______________ is a model used to introduce new systems into the workplace in a manner that lowers stress, encourages teamwork, and increases the probability of a successful implementation.

4
New cards

True

(T/F) The contemporary view of information systems is that they are often so intimately involved in an organization's value chain that they are part of the process itself. True or False?

5
New cards

guarantees that only the most current technology solutions will be employed

Which of the following is not a benefit associated with creating a strategic plan?

6
New cards

business unit strategy

Four drivers that set the information strategy and determine information system investments include corporate strategy, technology innovations, innovative thinking, and

7
New cards

cost center, business partner, and game changer

Three ways IS organization can be perceived by the rest of the organization that influence IS strategy are

8
New cards

ability to work in a static, boring environment where there is little change

Which of the following are non-technical skills not commonly associated with an effective Information system worker?

9
New cards

new career possibilities and a potential increase in salary

Two potential benefits of obtaining a certification in an IS subject area are:

10
New cards

False

The growth of the Internet of Things is helping to curb the number of cyberattacks. True or False?

11
New cards

careless insider

The perpetrator most likely to be the cause of a cyberattack is the _______________.

12
New cards

attack vector

A(n) ______________ is the technique used to gain unauthorized access to a device or a network.

13
New cards

attack vector

A blended threat, phishing, and virus are all examples of a(n)

14
New cards

ransomware

A form of cyberattack that is estimated to occur every 10 seconds against an individual in the U.S. is _______________.

15
New cards

legal consequences

One of the consequences of a successful cyberattack that can lead to monetary penalties for organizations that fail to comply with data protection regulations is _______________.

16
New cards

Stored Wire and Electronic Communications and Transactional Records Access Statute

A federal law that focuses on unlawful access to stored communications to obtain, alter, or prevent authorized access to a wire or electronic communication while it is in electronic storage.

17
New cards

organizational, network, application, and end user

Organizations must take strong measures to ensure secure, private, and reliable computing experiences for their employees, customers, and business partners.

18
New cards

True

Each user should conduct a security self-assessment test. True or False

19
New cards

eight

There are _______________ steps that must be taken to perform a thorough security risk assessment.

20
New cards

follow-up

Five actions an organization must take in the event of a successful cyberattack include incident notification, protection of evidence and activity logs, incident containment, eradication, and incident

21
New cards

managed security

An organization that monitors, manages, and maintains computer and network security for other organizations is called a ________ ____________ service provider.

22
New cards

law

Computer forensics is a discipline that combines elements of ______ and computer science.

23
New cards

False

(T/F) Acting in an ethical manner and acting in a legal manner will always lead to the same actions. True or False?

24
New cards

The employees' tendency to act in a manner that seems ethical to them will be suppressed and instead they will act in a manner that will protect them from punishment.

_______________ is not a benefit of promoting a work environment in which employees are encouraged to act ethically.

25
New cards

develop a problem statement

The _______________ step in the ethical decision-making process is considered the most critical.

26
New cards

True

(T/F) The primary intent of a code of ethics is to define desired behavior. True or False?

27
New cards

a code can provide an answer to every ethical dilemma

The fact that _______________ is not a benefit that can be expected from following a professional code of ethics.

28
New cards

although numerous laws have been implemented over time, no single overarching national data privacy policy has been developed in the United States

A key difference between the U.S. and EU fair information practices is that _______________.

29
New cards

health

Three subject areas where federal statutes have been implemented to protect the personal data of U.S. citizens include financial data, children's personal data, and _________ information.

30
New cards

True

(T/F) One means of ensuring that you are interacting with a secure Web site is to look for a Web address beginning with https. True or False?

31
New cards

True

(T/F) There is a concern by some people who belong to a particular ethnic, religious, or social group that surveillance data collected by the government could be used to identify and target them and their associates. True or False?

32
New cards

True

(T/F) The NSA is required to obtain permission from the Foreign Intelligence Surveillance Court (FISC) to access the telephone metadata records of U.S. citizens, which are now held by telecommunication companies rather than by the government. True or False?

33
New cards

First Amendment

The right to freedom of expression is one of the most important rights for free people in the United States. The _______________ was adopted to guarantee this right and others.

34
New cards

It must request birth date and a confirming social security number.

Which of the following statements about any website that caters to children is not true?

35
New cards

The Children's Internet Protection

A_______________ Act was written to protect children from pornography on the Internet but was ruled unconstitutional.

36
New cards

False

(T/F) Safety-critical systems are easy to learn and use because they perform quickly and efficiently, they meet their users' needs, and they operate safely and reliably. True or False?

37
New cards

extreme measures must be taken to identify and remove defects starting at the very earliest stages of software development

The process of building software for safety-critical systems takes much longer and is much more expensive because _______________.

38
New cards

False

(T/F) The builders of safety-critical systems must determine when they have completed sufficient testing and sign off their approval to release the product. This is typically an easy and straight-forward decision. True or False?

39
New cards

bus

The primary hardware component of a computer responsible for routing data and instructions to and from the various components of a computer is the

40
New cards

Input/Output Devices

provide data and instructions to the computer and receive results from it.

41
New cards

grid computing relies on a community of computers acting together

A key difference between grid computing, multiprocessing, and parallel processing is that _______________.

42
New cards

single-user portable computer

A _______________ is a class of computer used by people on the move to run personal productivity software, access the Internet, read and prepare email and instant messages, play games, listen to music, access corporate applications and databases, and enter data at the point of contact.

43
New cards

Server, mainframe, and supercomputer

_______________ are three subclasses of computers associated with the multiple-user computer.

44
New cards

multiple-user computer

The class of computer used to support workgroups from a small department of two or three workers to large organizations with tens of thousands of employees and millions of customers is the

45
New cards

4

A data center designed to have an expected annual downtime of less than 30 minutes and able to handle a power outage of up to four days is a tier _______________ data center.

46
New cards

Combating global climate change

_______________ is not a specific goal of green computing.

47
New cards

system

The two basic types of software are application software and _____________ software.

48
New cards

False

The operating system plays no role in controlling access to system resources to provide a high level of security against unauthorized access to the users' data and programs as well as record who is using the system and for how long. True or False?

49
New cards

Increase in the number of software licenses that must be purchased

Which of the following is not associated with the implementation of server virtualization?

50
New cards

Service-oriented architecture

_______________ is a software design approach based on the use of discrete pieces of software (modules) to provide specific functions (such as displaying a customer's bill statement) as services to other applications.

51
New cards

enterprise

is a class of software used to meet organization-wide business needs and typically shares data with other enterprise applications used within the organization.

52
New cards

The initial cost of the off-the-shelf software is likely greater.

When comparing off-the-shelf software to proprietary software, which of the following statements is not true:

53
New cards

The SaaS subscriber must manage service levels and availability, so there may be a need to add hardware, software, or communications capacity as the number of users increases.

Which of the following is not a true statement about the software as a service model.

54
New cards

single-user

Spreadsheet, word processor, and graphics presentation software are used in the _____________ sphere of influence.

55
New cards

games

Programming languages are commonly used to perform data analysis and build application software, system software, embedded systems, Web sites, and

56
New cards

single-user

The three primary types of end user license agreements are individual/multiuser, network/multiuser, and

57
New cards

Open-source software

_______________ is a form of software that is distributed, typically for free, with the source code studied, changed, and improved solely by the original developers.

58
New cards

True

An organization may require high-quality data to avoid fines and penalties for non-conformance to regulatory requirements. True or False?

59
New cards

True

_______________ provide data and instructions to the computer and receive results from it.

60
New cards

record

A collection of attributes about a specific entity is a _______________.

61
New cards

entity

A(n) _____________ is a person, place, or thing (object) for which data is collected, stored, and maintained.

62
New cards

file and attribute

A _______________ is a collection of similar entities while a(n) _______________ is a characteristic of an entity.

63
New cards

database data normalization and data cleansing

Which of the following is not a function of the database management system _______________?

64
New cards

False

A database and a database management system are the same thing. True or False?

65
New cards

database schema

A collection of instructions and commands to define and describe data and relationship in a specific database is a _______________.

66
New cards

data cleansing

The process of detecting and then correcting or deleting incomplete, incorrect, inaccurate, or irrelevant records that reside in a database is called _______________.

67
New cards

False

In the design of a database, it is not necessary to know how long the data must be stored. True or False?

68
New cards

False

The use of primary keys and foreign keys make it impossible to define relationships between the data in two tables of a relational database. True or False?

69
New cards

eliminate data redundancies and ensure data dependencies make sense

The purpose of data normalization is to _______________.

70
New cards

ACID

properties of SQL databases help ensure the integrity of data in the database.

71
New cards

The customer has complete responsibility for database security access and database backup.

Which of the following is not an advantage associated with database-as-a-service (DaaS)?

72
New cards

False

Data governance is a subset of data management. True or False?

73
New cards

True

One of the driving reasons behind the need for data management is to manage risk associated with the misstatement of financial data. True or False?

74
New cards

database administrator

The individual who is responsible for planning, designing, creating, operating, securing, monitoring, and maintaining databases is the

75
New cards

decide which database technology should be used

Which of the following is not a key responsibility of the data governance team?

76
New cards

Veracity

is a measure of the quality of big data.

77
New cards

variety

The fact that big data comes in many formats and may be structured or unstructured is an indicator of its

78
New cards

True

Choosing what data to store and where and how to store the data are two key challenges associated with big data. True or False?

79
New cards

Which format the data should be stored in

_______________ is not a key challenge associated with big data.

80
New cards

data warehouse

A _______________ is a large database that holds business information from many sources in the enterprise, covering all aspects of the company's processes, products, and customers.

81
New cards

extract

The goal of the ___________ step of the ETL process is to take the source data from all the various sources and convert it into a single format suitable for processing.

82
New cards

NoSQL

A _______________ database enables hundreds or even thousands of servers to operate on the data, providing faster response times for queries and updates.

83
New cards

NoSQL database and relational database

A _______________ differs from a _______________ in that it provides a means to store and retrieve data that is modelled using some means other than the simple two-dimensional tabular relations.

84
New cards

Map/Reduce program

The _______________ component of the Hadoop environment is composed of a Procedure that performs filtering and sorting and a method that performs a summary operation.

85
New cards

it provides access to data at rates much faster than storing data on some form of secondary storage

The primary advantage associated with the use of an in-memory database to process big data is that _______________.

86
New cards

BI is used to analyze historical data to tell what happened or is happening right now in your business while analytics employs algorithms to determine relationships among data to develop predictions of what will happen in the future

The primary difference between business intelligence and analytics is that _______________

87
New cards

data scientist

An individual who combines strong business acumen, a deep understanding of analytics, and a healthy appreciation of the limitations of their data, tools, and techniques to deliver real improvements in decision making is a(n) _______________.

88
New cards

optimization, descriptive analytics, and text and video analysis, simulation, and predictive analytics

The five broad categories of BI/analytics techniques include _______________.

89
New cards

regression analysis and visual analytics

Two specific BI/analytics techniques that are in the general category of descriptive analytics are _______________.

90
New cards

predictive analytics

Data mining and time series belong in the general category of _______________ of BI/analytics.

91
New cards

optimization

Genetic algorithm and linear programming belong in the _______________ general category of BI/analytics.

92
New cards

True

While there are three key components that must be in place for an organization to get real value from its BI and analytics efforts, the one that is first and foremost is the existence of a solid data management program. True or False?

93
New cards

False

Encouragement of self-service analytics almost assuredly will eliminate the risk of erroneous analysis and reporting and the problem of different analyses yielding inconsistent conclusions. True or False?

94
New cards

It places valuable data in the hands of end users.

Which of the following is not a disadvantage of self-service analytics?

95
New cards

star network

A network topology in which all network devices connect to one another through a single central device called the hub node is a_______________.

96
New cards

Personal area network

_______________ is a wireless network that connects information technology devices close to one person.

97
New cards

WAN

A network that connects large geographic regions is a _______________.

98
New cards

Lower latency, greater bandwidth, and ability to support more devices.

A 5G network will have the following advantages over a 4G network:

99
New cards

the risk of human error is reduced, overall network support and operations costs are reduced, and new applications can be made available sooner

Three advantages associated with a software-defined network include _______________.

100
New cards

IP

_______________ specifies how to address and route each packet to make sure it reaches the desired destination.