CSIS 100 Final

Details

Course Code:

School:

Liberty University

CSIS 100 Final Exam Liberty University

Set 1

  1. _____ is a mathematical theory for developing strategies that maximize gains and minimize losses while adhering to a given set of rules and constraints.
  2. _____ knowledge is hard to measure and document and typically is not objective or formalized.
  3. A genetic algorithm can be used to search the vast resources of the Internet to find information on any topic.
  4. Kelly has just been hired as a server at a seafood restaurant. Since this is her first job as a server, her manager has instructed her to follow Mark, an experienced server, for an entire shift to learn how to do the job. Kelly is: _______.
  5. _____ has the potential to superimpose digital data over real photos so that GPS maps can be combined with real pictures of stores and streets to help people locate their position.
  6. ​ You work for a manufacturing business. Your employer uses a model for selecting the supplier for the raw materials. They wish to become more responsive so that changes in the internal decision model can be quickly implemented in the systems. What is an appropriate recommendation?
  7. A _____ is a group of people with common interests who come together to create, store, and share knowledge of a specific topic.
  8. A perceptive system allows a machine to approximate the way a person sees, hears, and feels objects.
  9. ​ Educational institutions’ Websites are the most commonly targeted sites by phishers
  10. ​ A company’s risk assessment process can include numerous threats to the computers and networks. Which of the following can be considered an adverse event?
  11. ​ The purpose of Advanced Persistent Threat (APT) usually is to ____.
  12. ​ You see a deceptive pop-up that says your computer is infected and that you must visit a compromised web site where you pay them to clean your computer. You have just become a victim of ransomware.
  13. ​ Suppose your computer network was compromised in a large scale virus attack last Thursday. Most of the data files got corrupted beyond repair. The last data backup was done the Sunday before the virus attack. This means your company has an adequate backup process in place.
  14. ​ Any Internet traffic that is not explicitly permitted into the internal network is denied entry through a firewall.
  15. ​ Which of the following is the correct description of a firewall?
  16. ​ A hacktivist is someone who _______.
  17. A botnet is a ____.
  18. ​ Which of these organizations offers guidelines on developing security policies?
  19. ​ You have been hired as the new Information Security consultant at XYZ Inc. Which of these employee behaviors would be a top security concern?
  20. Someone who violates computer or Internet security maliciously or for illegal personal gain is known as a(n) _______.
  21. ​ As the complexity of a network increases, the possibility of security breaches decreases.
  22. ​ Which of the following is a vendor of popular anti-virus software?
  23. ​ You work at a call center of a large bank where you answer credit card services related questions from customers. Lately, you have noticed an increased number of customers enquiring if you had initiated a call. There can be a scam in progress.
  24. A zombie computer would send requests to access to the target site again and again.
  25. ​ There has been a data breach at your business and the business has lost some customer data. It has led to angry customers who have filed charges. What is a recommended course of action to prepare for future events?
  26. ​ Most organizations do not hesitate to conceal information about a data loss event if there is a fear of bad publicity and loss of customers.
  27. ​ The computer is running, but not responding to your keyboard inputs. You find that the network activities are running very slowly. You have probably been hit by a rootkit.
  28. Phil has been working on a new version of his company’s best-selling sales management software and now he’d like to ask several co-workers and a handful of the existing version’s top users to perform an acceptance test. Phil is preparing for _________.
  29. _____ is the process of analyzing systems to make sure they are operating as intended.
  30. Even if unit testing is successful, developers cannot assume they can combine individual components into a working system without any problems.
  31. Laura is carefully estimating the time required for each phase of a proposed system development project to see if her company can meet the client’s desired time for completion. Laura is checking on ___________.
  32. You are part of the team to implement new software at XYZ Inc. The employees at XYZ Inc. trust the results of the old software programs, but are cautious about accepting the outcomes of the proposed new software programs. What software implementation strategy would you recommend in this situation?
  33. _____ involves using a new or modified system under all kinds of operating conditions.
  34. ​ In the context of data-flow diagrams (DFDs), a(n) _____ shows either the source or destination of the data.
  35. ​ Joint application development (JAD) sessions with a cross section of users and stakeholders in a project are an effective way to define system requirements.
  36. Amy is doing some online research for a term paper. She’d like to access some information on a particular website, but the website is asking her to put in her email address before allowing her to view the information. She wonders what the website owner will do with that information, but there is never any way for her to know how data collected via a website will be used.​
  37. Although Roberta had signed a form preventing her doctor from sharing her personal medical records with the company she worked for, she later discovered that the doctor’s office had, in fact, shared her data with her health insurance provider and her employer, which caused her to be terminated.​ Because the doctor’s practice violated its own privacy policy, she was able to file a lawsuit under the ________.
  38. Software developers have created filtering software that blocks children from viewing inappropriate or harmful Internet sites at home or school, but to date developers have been unsuccessful in creating a similar software for use in the workplace.​
  39. A job that requires sitting at a desk for many hours a day can significantly reduce the risk of type 2 diabetes.
  40. IS professionals believe that their field offers few opportunities for unethical behavior.
  41. As a  Google user, your search history data can be accessed by the NSA and the FBI without obtaining court orders.
  42. The term “ethics” refers to an individual’s personal beliefs about right and wrong, whereas the term “morals” describes standards or codes of behavior expected of an individual by a group, such as a nation, organization, or profession.​
  43. Deepak’s team is in charge of conducting a review of their company’s waste/mistake prevention policies and procedures.  Part of this review should also evaluate how upcoming changes in information systems will affect business activities.
  44. PayPal enables any person or business with an e-mail address to securely, easily, and quickly send and receive payments online.
  45. In 1992, the Supreme Court ruled that online retailers must collect sales taxes even in states where they lack a physical presence.
  46. Because of ____ commerce sites, anyone can become a merchant online ​.
  47. Based on a Supreme Court ruling, an Internet-based merchant needs to charge sales tax only when _____.
  48. In spite of the recent economic downturn, Website operators have shunned the idea of bartering for goods and services.
  49. Which of the following forms of e-commerce has created an opportunity for many people to make a living out of selling items on auction Websites?
  50. The length of sales process for a typical business-to-business (B2B) e-commerce is shorter than that for a typical consumer-to-consumer (C2C) e-commerce.
  51. _____ is a standard that spells out measures and security procedures to safeguard a card issuer, a cardholder, and a merchant.
  52. ​ Which of the following is IBM’s BI product?
  53. ​ A marketing manager who does not have deep knowledge of information systems or data science, will NOT be able to use BI tools
  54. Creative data scientists  – a key component of BI efforts in an organization – are people who are primarily focused on coming up with novel ways of analyzing data.
  55. ​ You are to advise XYZ so that their BI efforts are fruitful. Which among the following is the most crucial advice of all?
  56. ​ Online analytical processing is another name for enterprise application.
  57. ​ Which of the following is NOT a characteristic of a data scientist?
  58. Mastery over which subject is NOT required for being a data scientist?​
  59. Excel’s scenario manager can be used to solve optimization-type problems​.
  60. A key feature of an enterprise system is that _________.
  61. The main difference between batch processing and online transaction processing is in the timely update of data.
  62. A designer would use computer aided manufacturing (CAM) to create, analyze, and modify the design of a component.
  63. Enterprise resource planning (ERP) systems work directly with manufacturing machines on the production floor.
  64. Purchasing uses information from the _____ to place purchase orders for raw materials with qualified suppliers.
  65. According to the classification of enterprise resource planning (ERP) vendors, _____ vendors target medium-sized firms with annual revenues in the $50 million to $1 billion range operating out of one or more locations.
  66. In an organization, a transaction processing system (TPS) supports routine operations associated with its business processes.
  67. The information about invoices to customers is tracked by  ____ system.
  68. ​ The business unit most affected by the project and the one whose budget will cover the project costs is known as the _____.
  69. Which Internet business has “Do the right thing; don’t be evil.” as one of its values?​
  70. ​ Which of the following steps is the first step in goals-based strategic planning?
  71. ​ A useful model to describe how teams develop is the forming-storming-norming-performing-___________ model.
  72. ​ For the “determine data needs” activity of a project, the optimistic estimated duration is 10 days, the pessimistic estimated duration is 20 days, the most likely time is 15 days. What is the expected duration of completing this activity?
  73. ​ An increase in customer satisfaction is considered a tangible benefit.
  74. A building, office equipment, computer hardware, and network equipment are examples of _____​.
  75. ​ Quality management is the set of activities designed to make the most effective use of the people involved with a project.

Set 2

  1. The development and application of innovative information systems improve the operations of an organization; however, they do not lead to any competitive advantage.
  2. How are policies enforced in information systems?
  3. Which of the following is a critical component of an information system?
  4. Which of the following is a common source of misunderstanding between IT and other departments?
  5. Which of the following statements is true of information systems that support collaborative human activities?
  6. Differentiating the product or service for a particular market niche is called product differentiation strategy.
  7. The threat of substitutes is high when alternative products are available.
  8. Network effects refer to the
  9. Melloc is one of many suppliers selling milk to retail customers. Since there are many sellers, price is a major determinant of market success. Which of the following statements about Melloc is true?
  10. Which of the following is true of creative destruction?
  11. Which of the following has raised questions regarding the ethical implications of companies collecting and analyzing enormous amounts of customer data?
  12. refers to ICT architecture in which users access software applications and information systems remotely over the Internet, rather than locally on an individual PC or from servers in the organization’s data center.
  13. Which of the following is a feature of the devices that form the physical basis of information and systems?
  14. A database is an example of system software.
  15. Speech input devices have overtaken all other input devices.
  16. ensures that every foreign key entry actually exists as a primary key entry in its main table.
  17. Which of the following database architectures works well for one‐to‐many relationships, but is not effective with many‐to‐many relationships?
  18. A system’s ability to handle rapidly increasing demand is called
  19. Which of the following is a characteristic of structured information?
  20. What is the main drawback of using unstructured information?
  21. Which of the following is a part of a company’s supply chain management?
  22. Which of the following illustrates a practice that can dramatically reduce supply chain costs?
  23. The bullwhip effect can be reduced if
  24. Which of the following is a characteristic of best‐of‐breed suites?
  25. In an ERP suite that includes modules specialized for higher education, which of the following would be used to track donations, pledges, and gifts, and manage contacts and donor relationships?
  26. The website of Vogue, a hair and beauty salon chain, allows visitors to upload their photographs and try virtual hairstyles and virtual makeovers. In this example, the primary web goal of the salon is to
  27. A(n) ________ focuses on informing visitors and empowering them with aggregated information about products from different suppliers.
  28. Which of the following elements of website usability describes how quickly a user performs tasks after learning a website’s basic design measures?
  29. Which of the following is a drawback of the hierarchical website architecture?
  30. Not all devices connected to the Internet have a unique IP address.
  31. Mashup is an approach to aggregating content from multiple internal and external sources on customizable web pages.
  32. Companies use intelligent agents to extract useful business intelligence from private, inaccessible websites.
  33. Business intelligence is said to be used at the ________ if companies use it to bring meaningful, performance‐related information to all employees.
  34. In web metrics, which of the following best describes depth of visit?
  35. Which of the following is a function of predictive analytics?
  36. Which of the following is true of group dynamics in virtual teams?
  37. is the microblogging website with the largest number of users in the world.
  38. Which of the following mail protocols is commonly used to handle outgoing mail from users?
  39. Text messages multiply the power of informal networks by allowing users to broadcast information not yet available through traditional means.
  40. The online world tends to flatten out hierarchies and equalize status.
  41. A person in an e‐learning program who knows just what should be included in the course and possesses the content expertise is known as a
  42. A(n) ________ is a person who brings together the knowledge and skills about what strategies work best for e‐learning.
  43. Structural capital describes the number and quality of all the relationships an organization’s employees maintain, not just with one another but with clients, customers, suppliers, and prospective employees.
  44. Which of the following assets is a part of human capital?
  45. Which of the following is an accurate definition of communities of practice?
  46. Single sign‐on is implemented by organizations for the purpose of
  47. Which of the following methods is often used for phishing purposes?
  48. Digital rights management offers IP holders the benefit of
  49. Which of the following is an accurate definition of digital rights management?
  50. For which of the following purposes are botnets most likely to be used?
  51. A phased implementation is an expensive process that launches a new system while the old one is still running.
  52. Escapade Inc., a travel agency in Sydney, is using a highly expensive implementation process for a short period of time. It launches the new system while the old one is still running and employees have to do their jobs twice, once on each system. Which of the following is the company using?
  53. Info Labs Inc., a marketing communications company, launches a project at a fixed cost of $180,000. What is the amount of savings earned from the project per month if it returns the investment in 3 years?
  54. Johanna Taylor, a creative developer at Leo Technologies Inc., is developing a website for the company. To address the usability needs of website visitors, she ensures that visitors would be able to easily locate what they need on the website. She avoids flashy graphics and chooses a font with high readability. Joanna is most likely in the ________ stage of the SDLP.
  55. Jonathan has joined a new software company in Manhattan and has been assigned the task of developing an internal communications system. He begins the task by assessing how the system will help in efficiently coordinating the projects that the company handles and in determining the feasibility of the system. In the given scenario, Jonathan is in the ________ step of the systems development life cycle.
  56. an information system is typically the best choice for a business when the available systems support common business functions, such as financial or human resource management.
  57. Prepackaged software is a good option for business functions that do not need to offer competitive advantage.
  58. Tom Daniels, an employee of a telecommunications company, is developing software that would enable customers to activate value‐added services in a matter of seconds. Which of the following requirements is Tom developing if he is working to improve the visual appeal of the interface and to enhance the ease of learning the software?
  59. Which of the following is an advantage of a parallel implementation of an information system?
  60. Which of the following is a type of testing for information systems where developers use the same input and compare the new system’s output to the output generated by the system it is replacing?
  61. Which of the following collects data from each project and aggregates it, building a larger picture of the overall health of the organization’s project portfolio?
  62. The ________ phase in a project involves documenting lessons learned from the project, so that the experience is useful to other project teams and adds to the organization’s knowledge base.
  63. Lack of customization and high stakeholder involvement are amongst some of the most cited reasons for project failure.
  64. A ________ lists tasks on the work breakdown structure, along with each task’s projected start and finish dates, in graphical format.
  65. A kick‐off meeting involves
  66. Which of the following is an accurate definition of a project?
  67. Which of the following sets of processes is carried out first in project management?
  68. Business continuity refers to the willingness of an organization to pull the plug on a project in which huge sums and resources need to be invested.
  69. Which of the following tools helps keep a project on track to meet its deadlines by listing tasks on a work breakdown schedule?
  70. Which of the following is an accurate definition of “black swans”?