BCIS 3610 Exam 1 Review

studied byStudied by 3 people
5.0(1)
Get a hint
Hint

Billie Jean doesn't need to consider her information system strategic plan when she chooses projects to assign to the contractors she is supervising.

1 / 107

flashcard set

Earn XP

Description and Tags

UNT

108 Terms

1

Billie Jean doesn't need to consider her information system strategic plan when she chooses projects to assign to the contractors she is supervising.

False

New cards
2

New technology innovations rarely influence an organization's information system strategic plan since it is so strongly determined by corporate strategy.

False

New cards
3

A slight majority (52%) of 700 CIOs surveyed reported that their IS organization is viewed as a (BLANK).

business partner or peer

New cards
4

A high-level IS manager has his firm utilize sophisticated information systems to digitally design its products so that design defects can be detected and removed early in the process, reducing development cost. What business strategy does this represent?

cost leadership

New cards
5

In a manufacturing organization, the supply chain is a key value chain whose primary activities include all of the following EXCEPT:

finance and accounting

New cards
6

Tim relies on his solid analytical and decision-making skills when converting a program design he receives from Minnie, the systems analyst, to a working program written in one of the languages used at his firm. Who is Tim?

a programmer

New cards
7

Which of the following is NOT a task typically associated with the systems analyst role?

collaborating with others to build a software product from scratch

New cards
8

When entering a customer order, Josie ensures that the desired end result is achieved and any problems are reported to the correct person by following a(n) (BLANK).

procedure

New cards
9

When an IS organization is viewed as a business partner/business peer:

the strategic planning process is based on understanding the collective business plans for the next year and determining what those mean for the IS organization.

New cards
10

Francis will need to adjust his information system strategic plan when (BLANK).

his firm's corporate strategy changes

New cards
11

If an IS organization is viewed as a cost center/service provider, its strategic planning process is typically directed inward and focused on determining how to do what it is currently doing but doing it cheaper, faster, and better.

True

New cards
12

A senior IS manager decides to invest in an information system that will reduce subcontractor labor costs for her organization by facilitating relocation of tools and materials to more optimal locations while rearranging workflows. What business strategy does this represent?

cost leadership

New cards
13

In a large IS organization, the professional who is responsible for maintaining the security and integrity of the organization's systems and data is the (BLANK).

information systems security analyst

New cards
14

(BLANK) encompasses all the activities required to get the right product into the right consumer's hands in the right quantity at the right time and at the right cost, from acquisition of raw materials through customer delivery.

Supply chain management

New cards
15

Amazon's decision to explore the possible use of delivery drones to gain a real competitive advantage over competitors who rely on less efficient ground transportation is an example of (BLANK).

strategic planning

New cards
16

Because Marcus works within an IS organization viewed as a cost center and service provider by the rest of his organization, one of his major goals is to (BLANK).

consolidate IS resources and eliminate redundant functions

New cards
17

One benefit of strategic planning is that it enables the most effective use of the organization's resources by (BLANK).

focusing them on agreed-on key priorities

New cards
18

Default usernames and passwords should always be changed.

True

New cards
19

Assume your organization is experiencing an intruder attack. You have an intrusion detection system (IDS) set up. Which of the following events occurs first?

The network router sends traffic to the firewall as well as to the IDS.

New cards
20

Brandon, a security specialist, explains that IS security managers must use their judgment to ensure that the cost of security risk control does not exceed the system's benefits or the risks involved. Brandon is discussing the concept of _____.

reasonable assurance

New cards
21

If an attack is dangerous enough, it may warrant shutting down or disconnecting critical systems from the network.

True

New cards
22

Which of the following is considered the most likely source of cyberattacks, based on a poll of global executives, information security managers, and IT leaders?

careless insiders

New cards
23

The attack vector that relies on email messaging to deceive the victim into revealing personal data is known as _____.

phishing

New cards
24

Downloading games from unknown websites can be risky. The software may be a Trojan horse.

True

New cards
25

In computing, an attack on an information system that takes advantage of a particular system vulnerability is called a(n) _______.

exploit

New cards
26

Your ex-colleague was apprehended and charged with a crime based on the Fraud and Related Activity in Connection with Access Devices Statute. He was caught using unauthorized or stolen _________.

credit cards

New cards
27

You work at a call center of a large bank, where you answer credit card services-related questions from customers. Lately, you have noticed an increased number of customers enquiring whether your organization initiated a call about their account. There might be a vishing scam in progress.

True

New cards
28

Legal consequences following a successful cyberattack on a well-known organization often include _____.

lawsuits initiated by consumers who incurred damages

New cards
29

Transmitting a program, code, or command that causes harm to a computer is a crime.

True

New cards
30

Someone who attempts to destroy the infrastructure components of governments is known as a ______________.

cyberterrorist

New cards
31

When you receive a text message that there is a problem with your bank account and you are required you to click on a link to submit some information, you are likely facing a vishing attack.

False

New cards
32

An attack that takes place before the security community and/or software developers become aware of and fix a security vulnerability is called a zero-day attack.

True

New cards
33

Which of the following is the correct description of a firewall?

a software and hardware combination that limits incoming and outgoing Internet traffic

New cards
34

Your business has a web server that has suddenly become unresponsive. When you study the server's logs there are a huge number of requests from what appear to be legitimate computers. The problem is likely because of _____.

a distributed denial-of-service attack

New cards
35

While conducting a security self-assessment of his personal laptop use, Vann realizes that he is putting himself at risk by _____.

putting off installing available software updates that he has been notified about

New cards
36

A botnet is a ____.

network of computers that send out access requests to servers repeatedly

New cards
37

A social networking service loses a lot of business from ad buyers and marketers after the media reveal that it has published misleading statistics about the average viewing time of video ads on its platform. Building a strong ethics program would have prevented this loss of sales by _____.

avoiding unfavorable publicity

New cards
38

Because Marigold wants to join CompTIA (the Computer Technology Industry Association), she agrees to adhere to this organization's professional code of ethics. This means that she _____.

has promised to behave in a way that CompTIA has defined as desirable

New cards
39

The GDPR obligates organizations that operate in the European Union to obtain the consent of the people they collect information about.

True

New cards
40

Which statement about the Foreign Intelligence Surveillance Act (FISA) is true?

FISA created a court that meets in secret to hear applications for surveillance orders in the U.S.

New cards
41

In the United States, legislation that protects people from data privacy abuses by corporations _____.

is almost nonexistent

New cards
42

The American Recovery and Reinvestment Act Title XIII helped establish the National Fraud Alert system to help prevent identity theft.

False

New cards
43

Which of the following legislation is directed at Web sites catering to children and requires Web site owners to obtain parental consent before they collect any personal information from children under 13 years old?

Children's Online Privacy Protection Act

New cards
44

Anne and Jordan have two preteen sons and they're concerned about what their kids might see and share on the Internet. They should probably invest in _______.

filtering software

New cards
45

What feature of the creation of safety-critical software often draws developers into ethical dilemmas?

increased time and expense

New cards
46

In recent years, laws have been added or amended to expand the scope of government surveillance in reaction to _____.

technological developments and potential terrorists threats

New cards
47

A code of professional ethics can be used to assess one's own performance or, more formally, to decide when an organization should either reward or reprimand its members for their actions. This is because a code of ethics _____.

provides an evaluation benchmark

New cards
48

Which statement about the Foreign Intelligence Surveillance Act (FISA) is true?

FISA created a court that meets in secret to hear applications for surveillance orders in the U.S.

New cards
49

The term ethics refers to the set of principles about what is right and wrong that individuals use to make choices, whereas the term law refers to a system of rules that tells us what we can and cannot do.

True

New cards
50

The process of building software for safety-critical systems _____.

takes much longer than that for high-quality systems

New cards
51

One example of a common and significant ethical dilemma related to safety-critical systems is deciding _____.

how much software testing is sufficient

New cards
52

Which intermediary in the process of speaking on the Internet often receives defamation or copyright infringement claims from government authorities or copyright holders who demand that material be taken down?

Web host server

New cards
53

Anonymous remailers both help protect freedom of speech by keeping communications anonymous and prevent people from using email for illegal or unethical purposes.

False

New cards
54

In which step of the ethical decision-making process is it essential to communicate well with all stakeholders and have someone they trust and respect explain why things are changing and how this will benefit them?

implement the decision

New cards
55

Fair information practices is a term for _____.

a set of guidelines that govern the collection and use of personal data

New cards
56

Which type of end user license requires that a single copy of the software reside on a file server?

network/multiuser

New cards
57

Much of the popular open-source software available is protected by the GNU General Public License. Which of the following is NOT permitted by this type of license?

selling a modified version of the program

New cards
58

IS professionals at PKO Bank Polski S.A. use an approach where they logically divide the resources of a physical server to reduce hardware-related costs, cut unscheduled downtime for applications, and reduce the time spent on problem solving. What strategy do they use?

server virtualization

New cards
59

Compared with the traditional licensing model in which users purchase and install software, SaaS _____.

offers less expensive upgrades and new releases

New cards
60

An embedded system is a computer system that is implanted in and dedicated to the control of another device.

True

New cards
61

Software as a Service (SaaS) allows businesses to subscribe to Web-delivered business application software by paying a monthly service charge or a per-use fee.

True

New cards
62

A single computer can be used by a single user or by multiple, simultaneous users.

True

New cards
63

Utility programs are used to perform system maintenance, such as repairing errors on a hard drive, improving system security, and optimizing sluggish system processes.

True

New cards
64

Each programming language has a set of rules, called the program code of the language.

False

New cards
65

Proprietary software is mass-produced by software vendors to address needs that are common across businesses, organizations, or individuals.

False

New cards
66

Which software design approach includes discrete modules that are built in such a way that each service a module provides can exchange information with any other service without human interaction or the need to change the underlying program?

service-oriented architecture

New cards
67

Completing an instruction involves two phases (instruction and execution), each of which is broken down into three steps.

False

New cards
68

A firm that models, simulates, and analyzes large amounts of data quickly by using computers to execute the same task on multiple processors simultaneously is employing _____.

parallel processing

New cards
69

An operating system with[Blank]capabilities allows a user to run more than one program concurrently.

multitasking

New cards
70

Helen is 72 years old and is a retired school teacher on a fixed income. She would like to buy a new computer so that she can communicate via email, follow friends and family on social media, and occasionally access recipes and gardening tips from the Web. An important thing to consider is that Helen has arthritis in her hands, making it difficult for her to work with small buttons and gadgets. So, of the following options, her best choice is probably a(n) ________.

nettop

New cards
71

An example of a common hardware function performed by the operating system is presenting information on a monitor.

True

New cards
72

Julian has chosen to use open-source software to help run his small business. He believes it is often more reliable and secure than commercial software because _____.

open-source software bugs are detected and fixed more quickly

New cards
73

One of the advantages of off-the-shelf software is that ________________.

the initial cost is lower because the software firm can spread the development costs over many customers

New cards
74

Tim is a software developer who codes using a higher-level language utilizing a compiler. Which is true of Tim's programs?

The compiler translates the programs into a machine language.

New cards
75

A successful IS manager recognizes that sustaining a competitive advantage (BLANK).

 

means evolving to account for changes in customer needs

New cards
76

What does Doug, an IS manager, consult when he needs to identify competencies for his organization to invest in?

 

information system strategic plan

New cards
77

The strategic plan of an information system (IS) must identify those technologies, vendors, competencies, people, systems, and projects in which an organization will invest to support the corporate and business unit strategies.

True

New cards
78

The upper-level managers at LaDonna's organization hold a traditional view of information systems, so LaDonna's major goals for her IS department include (BLANK).

 

ensuring effectiveness and efficiency of processes

New cards
79

One benefit of strategic planning is that it enables the most effective use of the organization's resources by (BLANK).

 

focusing them on agreed-on key priorities

New cards
80

Procedures are an important component of an IS implementation approach because (BLANK).

 

they can help avoid lengthy business disruptions following a natural disaster

New cards
81

Sandra, a software developer, must serve as a translator between business needs and technology-based solutions when she builds a software product according to a customer's specifications. To be a successful translator, she must demonstrate (BLANK).

 

good communication skills

New cards
82

For someone to be a good CIO, technical ability is the most important characteristic. 

False

New cards
83

After being passed over for a promotion, an accountant accesses his firm's database and deletes or alters key information in an effort to take revenge on his superiors. This is an example of a cyberattack initiated by _____.

 

a malicious employee

New cards
84

Jennifer is a programmer who develops malware and deploys it in the computer systems of her organization's competitors so that she can secretly steal data about new product plans and designs, thus gaining a competitive advantage for her organization. What type of cyberattack is Jennifer involved in?

cyberespionage

New cards
85

What is an attack vector?

 

the technique used to gain unauthorized access to a device or a network

New cards
86

Which of the following companies develops one of the most widely used antivirus software products?

Symantec

New cards
87

Which of the following is NOT a popular vendor of firewall software?

 

Red Hat

New cards
88

Those convicted of cyberterrorism are subject to a prison term of 6 months to 1 year.

False

New cards
89

You wish to use your personal laptop computer at work, but the IT department folks will not allow this. The likely reason is that ______.

 

your non-work-related use of the laptop could increase vulnerability

New cards
90

One example of an ethical dilemma related to safety-critical systems is whether to risk making the product more expensive, and potentially less appealing to customers, by _____.

 

including hardware mechanisms to back up or verify software functions

New cards
91

Some people believe that government electronic surveillance activities represent unreasonable searches and seizures, meaning that they violate the _____.

 

Fourth Amendment

New cards
92

If an activity is defined as legal then it is ethical.

False

New cards
93

Which of the following will prevent a product from being rated as a high-quality software system?

 

software defects

New cards
94

One example of a common and significant ethical dilemma related to safety-critical systems is deciding _____.

 

how much software testing is sufficient

New cards
95

The pages on a university's website are maintained by individual departments and organizational units. It is a useful policy to require that every change a user makes to his department pages be reviewed and approved.  

True

New cards
96

Felicity, who works at a bank, opens multiple credit card accounts for customers without their authorization in order to improve her customer sales, and thus her apparent job performance. This behavior is explicitly forbidden by bank policies and the instructions her manager gave her. Which statement is true in this situation?

 

The bank can be held responsible for Felicity's behavior despite its ethical policies.

New cards
97

Which of the following actions will likely endanger rather than protect someone's personal privacy?

 

filling out a change-of-address form with the U.S. Postal Service

New cards
98

The U.S. Congress has made several attempts to pass and maintain legislation that limits children's exposure to online pornography, but eventually each of these laws has been ruled out because they were unconstitutional.

False

New cards
99

U.S. federal law permits employers to prevent viewing of pornography in the workplace by employees. 

True

New cards
100

Which type of of data center offers the highest and most predictable level of performance through redundant hardware, power-related devices, and alternate power sources?

tier 4

New cards

Explore top notes

note Note
studied byStudied by 210 people
Updated ... ago
5.0 Stars(3)
note Note
studied byStudied by 2 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 5 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 7 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 5 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 7 people
Updated ... ago
5.0 Stars(2)
note Note
studied byStudied by 136 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 34 people
Updated ... ago
5.0 Stars(1)

Explore top flashcards

flashcards Flashcard24 terms
studied byStudied by 7 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard20 terms
studied byStudied by 22 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard93 terms
studied byStudied by 1 person
Updated ... ago
5.0 Stars(1)
flashcards Flashcard51 terms
studied byStudied by 9 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard39 terms
studied byStudied by 60 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard36 terms
studied byStudied by 1 person
Updated ... ago
5.0 Stars(1)
flashcards Flashcard49 terms
studied byStudied by 13 people
Updated ... ago
4.0 Stars(1)
flashcards Flashcard44 terms
studied byStudied by 8 people
Updated ... ago
5.0 Stars(1)