UNT
Billie Jean doesn't need to consider her information system strategic plan when she chooses projects to assign to the contractors she is supervising.
False
New technology innovations rarely influence an organization's information system strategic plan since it is so strongly determined by corporate strategy.
False
A slight majority (52%) of 700 CIOs surveyed reported that their IS organization is viewed as a (BLANK).
business partner or peer
A high-level IS manager has his firm utilize sophisticated information systems to digitally design its products so that design defects can be detected and removed early in the process, reducing development cost. What business strategy does this represent?
cost leadership
In a manufacturing organization, the supply chain is a key value chain whose primary activities include all of the following EXCEPT:
finance and accounting
Tim relies on his solid analytical and decision-making skills when converting a program design he receives from Minnie, the systems analyst, to a working program written in one of the languages used at his firm. Who is Tim?
a programmer
Which of the following is NOT a task typically associated with the systems analyst role?
collaborating with others to build a software product from scratch
When entering a customer order, Josie ensures that the desired end result is achieved and any problems are reported to the correct person by following a(n) (BLANK).
procedure
When an IS organization is viewed as a business partner/business peer:
the strategic planning process is based on understanding the collective business plans for the next year and determining what those mean for the IS organization.
Francis will need to adjust his information system strategic plan when (BLANK).
his firm's corporate strategy changes
If an IS organization is viewed as a cost center/service provider, its strategic planning process is typically directed inward and focused on determining how to do what it is currently doing but doing it cheaper, faster, and better.
True
A senior IS manager decides to invest in an information system that will reduce subcontractor labor costs for her organization by facilitating relocation of tools and materials to more optimal locations while rearranging workflows. What business strategy does this represent?
cost leadership
In a large IS organization, the professional who is responsible for maintaining the security and integrity of the organization's systems and data is the (BLANK).
information systems security analyst
(BLANK) encompasses all the activities required to get the right product into the right consumer's hands in the right quantity at the right time and at the right cost, from acquisition of raw materials through customer delivery.
Supply chain management
Amazon's decision to explore the possible use of delivery drones to gain a real competitive advantage over competitors who rely on less efficient ground transportation is an example of (BLANK).
strategic planning
Because Marcus works within an IS organization viewed as a cost center and service provider by the rest of his organization, one of his major goals is to (BLANK).
consolidate IS resources and eliminate redundant functions
One benefit of strategic planning is that it enables the most effective use of the organization's resources by (BLANK).
focusing them on agreed-on key priorities
Default usernames and passwords should always be changed.
True
Assume your organization is experiencing an intruder attack. You have an intrusion detection system (IDS) set up. Which of the following events occurs first?
The network router sends traffic to the firewall as well as to the IDS.
Brandon, a security specialist, explains that IS security managers must use their judgment to ensure that the cost of security risk control does not exceed the system's benefits or the risks involved. Brandon is discussing the concept of _____.
reasonable assurance
If an attack is dangerous enough, it may warrant shutting down or disconnecting critical systems from the network.
True
Which of the following is considered the most likely source of cyberattacks, based on a poll of global executives, information security managers, and IT leaders?
careless insiders
The attack vector that relies on email messaging to deceive the victim into revealing personal data is known as _____.
phishing
Downloading games from unknown websites can be risky. The software may be a Trojan horse.
True
In computing, an attack on an information system that takes advantage of a particular system vulnerability is called a(n) _______.
exploit
Your ex-colleague was apprehended and charged with a crime based on the Fraud and Related Activity in Connection with Access Devices Statute. He was caught using unauthorized or stolen _________.
credit cards
You work at a call center of a large bank, where you answer credit card services-related questions from customers. Lately, you have noticed an increased number of customers enquiring whether your organization initiated a call about their account. There might be a vishing scam in progress.
True
Legal consequences following a successful cyberattack on a well-known organization often include _____.
lawsuits initiated by consumers who incurred damages
Transmitting a program, code, or command that causes harm to a computer is a crime.
True
Someone who attempts to destroy the infrastructure components of governments is known as a ______________.
cyberterrorist
When you receive a text message that there is a problem with your bank account and you are required you to click on a link to submit some information, you are likely facing a vishing attack.
False
An attack that takes place before the security community and/or software developers become aware of and fix a security vulnerability is called a zero-day attack.
True
Which of the following is the correct description of a firewall?
a software and hardware combination that limits incoming and outgoing Internet traffic
Your business has a web server that has suddenly become unresponsive. When you study the server's logs there are a huge number of requests from what appear to be legitimate computers. The problem is likely because of _____.
a distributed denial-of-service attack
While conducting a security self-assessment of his personal laptop use, Vann realizes that he is putting himself at risk by _____.
putting off installing available software updates that he has been notified about
A botnet is a ____.
network of computers that send out access requests to servers repeatedly
A social networking service loses a lot of business from ad buyers and marketers after the media reveal that it has published misleading statistics about the average viewing time of video ads on its platform. Building a strong ethics program would have prevented this loss of sales by _____.
avoiding unfavorable publicity
Because Marigold wants to join CompTIA (the Computer Technology Industry Association), she agrees to adhere to this organization's professional code of ethics. This means that she _____.
has promised to behave in a way that CompTIA has defined as desirable
The GDPR obligates organizations that operate in the European Union to obtain the consent of the people they collect information about.
True
Which statement about the Foreign Intelligence Surveillance Act (FISA) is true?
FISA created a court that meets in secret to hear applications for surveillance orders in the U.S.
In the United States, legislation that protects people from data privacy abuses by corporations _____.
is almost nonexistent
The American Recovery and Reinvestment Act Title XIII helped establish the National Fraud Alert system to help prevent identity theft.
False
Which of the following legislation is directed at Web sites catering to children and requires Web site owners to obtain parental consent before they collect any personal information from children under 13 years old?
Children's Online Privacy Protection Act
Anne and Jordan have two preteen sons and they're concerned about what their kids might see and share on the Internet. They should probably invest in _______.
filtering software
What feature of the creation of safety-critical software often draws developers into ethical dilemmas?
increased time and expense
In recent years, laws have been added or amended to expand the scope of government surveillance in reaction to _____.
technological developments and potential terrorists threats
A code of professional ethics can be used to assess one's own performance or, more formally, to decide when an organization should either reward or reprimand its members for their actions. This is because a code of ethics _____.
provides an evaluation benchmark
Which statement about the Foreign Intelligence Surveillance Act (FISA) is true?
FISA created a court that meets in secret to hear applications for surveillance orders in the U.S.
The term ethics refers to the set of principles about what is right and wrong that individuals use to make choices, whereas the term law refers to a system of rules that tells us what we can and cannot do.
True
The process of building software for safety-critical systems _____.
takes much longer than that for high-quality systems
One example of a common and significant ethical dilemma related to safety-critical systems is deciding _____.
how much software testing is sufficient
Which intermediary in the process of speaking on the Internet often receives defamation or copyright infringement claims from government authorities or copyright holders who demand that material be taken down?
Web host server
Anonymous remailers both help protect freedom of speech by keeping communications anonymous and prevent people from using email for illegal or unethical purposes.
False
In which step of the ethical decision-making process is it essential to communicate well with all stakeholders and have someone they trust and respect explain why things are changing and how this will benefit them?
implement the decision
Fair information practices is a term for _____.
a set of guidelines that govern the collection and use of personal data
Which type of end user license requires that a single copy of the software reside on a file server?
network/multiuser
Much of the popular open-source software available is protected by the GNU General Public License. Which of the following is NOT permitted by this type of license?
selling a modified version of the program
IS professionals at PKO Bank Polski S.A. use an approach where they logically divide the resources of a physical server to reduce hardware-related costs, cut unscheduled downtime for applications, and reduce the time spent on problem solving. What strategy do they use?
server virtualization
Compared with the traditional licensing model in which users purchase and install software, SaaS _____.
offers less expensive upgrades and new releases
An embedded system is a computer system that is implanted in and dedicated to the control of another device.
True
Software as a Service (SaaS) allows businesses to subscribe to Web-delivered business application software by paying a monthly service charge or a per-use fee.
True
A single computer can be used by a single user or by multiple, simultaneous users.
True
Utility programs are used to perform system maintenance, such as repairing errors on a hard drive, improving system security, and optimizing sluggish system processes.
True
Each programming language has a set of rules, called the program code of the language.
False
Proprietary software is mass-produced by software vendors to address needs that are common across businesses, organizations, or individuals.
False
Which software design approach includes discrete modules that are built in such a way that each service a module provides can exchange information with any other service without human interaction or the need to change the underlying program?
service-oriented architecture
Completing an instruction involves two phases (instruction and execution), each of which is broken down into three steps.
False
A firm that models, simulates, and analyzes large amounts of data quickly by using computers to execute the same task on multiple processors simultaneously is employing _____.
parallel processing
An operating system with[Blank]capabilities allows a user to run more than one program concurrently.
multitasking
Helen is 72 years old and is a retired school teacher on a fixed income. She would like to buy a new computer so that she can communicate via email, follow friends and family on social media, and occasionally access recipes and gardening tips from the Web. An important thing to consider is that Helen has arthritis in her hands, making it difficult for her to work with small buttons and gadgets. So, of the following options, her best choice is probably a(n) ________.
nettop
An example of a common hardware function performed by the operating system is presenting information on a monitor.
True
Julian has chosen to use open-source software to help run his small business. He believes it is often more reliable and secure than commercial software because _____.
open-source software bugs are detected and fixed more quickly
One of the advantages of off-the-shelf software is that ________________.
the initial cost is lower because the software firm can spread the development costs over many customers
Tim is a software developer who codes using a higher-level language utilizing a compiler. Which is true of Tim's programs?
The compiler translates the programs into a machine language.
A successful IS manager recognizes that sustaining a competitive advantage (BLANK).
Â
means evolving to account for changes in customer needs
What does Doug, an IS manager, consult when he needs to identify competencies for his organization to invest in?
Â
information system strategic plan
The strategic plan of an information system (IS) must identify those technologies, vendors, competencies, people, systems, and projects in which an organization will invest to support the corporate and business unit strategies.
True
The upper-level managers at LaDonna's organization hold a traditional view of information systems, so LaDonna's major goals for her IS department include (BLANK).
Â
ensuring effectiveness and efficiency of processes
One benefit of strategic planning is that it enables the most effective use of the organization's resources by (BLANK).
Â
focusing them on agreed-on key priorities
Procedures are an important component of an IS implementation approach because (BLANK).
Â
they can help avoid lengthy business disruptions following a natural disaster
Sandra, a software developer, must serve as a translator between business needs and technology-based solutions when she builds a software product according to a customer's specifications. To be a successful translator, she must demonstrate (BLANK).
Â
good communication skills
For someone to be a good CIO, technical ability is the most important characteristic.Â
False
After being passed over for a promotion, an accountant accesses his firm's database and deletes or alters key information in an effort to take revenge on his superiors. This is an example of a cyberattack initiated by _____.
Â
a malicious employee
Jennifer is a programmer who develops malware and deploys it in the computer systems of her organization's competitors so that she can secretly steal data about new product plans and designs, thus gaining a competitive advantage for her organization. What type of cyberattack is Jennifer involved in?
cyberespionage
What is an attack vector?
Â
the technique used to gain unauthorized access to a device or a network
Which of the following companies develops one of the most widely used antivirus software products?
Symantec
Which of the following is NOT a popular vendor of firewall software?
Â
Red Hat
Those convicted of cyberterrorism are subject to a prison term of 6 months to 1 year.
False
You wish to use your personal laptop computer at work, but the IT department folks will not allow this. The likely reason is that ______.
Â
your non-work-related use of the laptop could increase vulnerability
One example of an ethical dilemma related to safety-critical systems is whether to risk making the product more expensive, and potentially less appealing to customers, by _____.
Â
including hardware mechanisms to back up or verify software functions
Some people believe that government electronic surveillance activities represent unreasonable searches and seizures, meaning that they violate the _____.
Â
Fourth Amendment
If an activity is defined as legal then it is ethical.
False
Which of the following will prevent a product from being rated as a high-quality software system?
Â
software defects
One example of a common and significant ethical dilemma related to safety-critical systems is deciding _____.
Â
how much software testing is sufficient
The pages on a university's website are maintained by individual departments and organizational units. It is a useful policy to require that every change a user makes to his department pages be reviewed and approved. Â
True
Felicity, who works at a bank, opens multiple credit card accounts for customers without their authorization in order to improve her customer sales, and thus her apparent job performance. This behavior is explicitly forbidden by bank policies and the instructions her manager gave her. Which statement is true in this situation?
Â
The bank can be held responsible for Felicity's behavior despite its ethical policies.
Which of the following actions will likely endanger rather than protect someone's personal privacy?
Â
filling out a change-of-address form with the U.S. Postal Service
The U.S. Congress has made several attempts to pass and maintain legislation that limits children's exposure to online pornography, but eventually each of these laws has been ruled out because they were unconstitutional.
False
U.S. federal law permits employers to prevent viewing of pornography in the workplace by employees.Â
True
Which type of of data center offers the highest and most predictable level of performance through redundant hardware, power-related devices, and alternate power sources?
tier 4