Book Title
Business Driven Information Systems 5th Edition

COP 83827

July 20, 2017
Some of the social challenges with networking occur with newsgroups or blogs where
like-minded people can exchange messages. Problems can arise when sensitive social
issues become the topic of discussion such as politics or religion.
Human-generated unstructured data includes text messages, social media data, and
Drones support materials management.
A hashtag is a keyword or phrase used to identify a topic and is preceded by a hash or
pound sign (#). For example, the hashtag #sandiegofire helped coordinate emergency
responses to a fire.
Clean computing, a subset of sustainable MIS, refers to the environmentally responsible
use, manufacture, and disposal of technology products and computer equipment.
The financial industry uses business intelligence to predict hardware failures.
Product delivery is a customer-facing business process.
Static information includes data that changes based on user actions.
Customer service and support (CSS) is a part of operational CRM that automates
service requests, complaints, product returns, and information requests.
Information compliance is the act of conforming, acquiescing, or yielding information.
The four primary traits of the value of information include type, timeliness, quality, and
A cold site can destroy large amounts of vital data, often causing incidents, unplanned
interruption of a service.
Timely information must be up-to-the-second to be accurate.
Capacity represents the maximum throughput a system can deliver, for example the
capacity of a hard drive represents the size or volume.
Multifactor authentication requires more than two means of authentication such as what
the user knows (password), what the user has (security token), and what the user is
(biometric verification).
A local area network (LAN) connects a group of computers in close proximity, such as
in an office building, school, or home. LANs allow sharing of files, printers, games, and
other resources. A LAN also often connects to other LANs, and to wide area networks.
An acceptable use policy (AUP) requires a user to agree to follow it in order to be
provided access to corporate email, information systems, and the Internet.
Process modeling illustrates the movement of information between external entities and
the processes and data stores within the system.
Drones support logistics.
Hypertext markup language (HTML) links documents, allowing users to move from
one to another simply by clicking on a hot spot or link.
Utility software provides additional functionality to the operating system.
The network providers include LAN, WAN, and MAN.
Secondary storage consists of equipment designed to store large volumes of data for
long-term storage.
In the past, departments made decisions independent of each other.
Social media analytics analyzes unstructured data associated with websites to identify
consumer behavior and website navigation.
The central processing unit (CPU) (or microprocessor) is the actual hardware that
interprets and executes the program (software) instructions and coordinates how all the
other hardware devices work together.
A user can opt out of receiving emails by choosing to deny permission to incoming
A single user license restricts the use of the software to one user at a time.
An information cube is the common term for the representation of multidimensional
Search engine optimization are keywords that advertisers choose to pay for and appear
as sponsored links on the Google results pages.
A hacker weapon called a splog (spam blog) is a fake blog created solely to raise the
search engine rank of affiliated websites.
Worldwide Interoperability for Microwave Access (WiMAX) is a communications
technology aimed at providing high-speed wireless data over metropolitan area
A sustaining technology is a new way of doing things that initially does not meet the
needs of existing customers.
Information property is an ethical issue that focuses on who owns information about
individuals and how information can be sold and exchanged.
Ewaste reuses or refurbishes ewaste and creates a new product.
FedEx created a first-mover advantage by developing its customer self-service
software, which allows people to request parcel pickups, print mailing slips, and track
parcels online.
Estimated time of arrival (ETA) is the time of day of an expected arrival at a certain
destination and is typically used for navigation applications.
What uses a zombie farm, often by an organized crime association, to launch a massive
phishing attack?
A. zombie
B. zombie farm
C. pharming attack
D. time bomb
What is one of the major problems with email?
A. intellectual property
B. nonrepudiation
C. user's expectation of privacy
D. None of these are correct.
Which programming language looks similar to human languages?
A. first generation machine language
B. second generation machine language
C. third generation machine language
D.fourth generation machine language
What is predictive analytics?
A. A world where interconnected, Internet-enabled devices or "things" can collect and
share data without human intervention
B. Extracts information from data and uses it to predict future trends and identify
behavioral patterns
C. Refers to devices that connect directly to other devices
D. Opportunities to change the way people purchase books
What is a session in which employees meet, sometimes for several days, to define or
review the business requirements for the system?
A.joint application development
B. requirements management
C. process modeling
D. data flow diagram
Automating a business process that contains _______ or _______ will magnify or
amplify these problems if they are not corrected first.
A. bottlenecks; regulations
B. redundancies; regulations
C. bottlenecks; redundancies
D. redundancies; swim lanes
What is equipment used to see, hear, or otherwise accept the results of information
processing requests?
A. input device
B. output device
C. magnetic tape
D. magnetic medium
What is a warm site?
A. a separate and fully equipped facility where the company can move immediately
after a disaster and resume business
B. a separate facility that does not have any computer equipment but is a place where
employees can move after a disaster
C.a separate facility with computer equipment that requires installation and
D. a detailed process for recovering information or a system in the event of a
catastrophic disaster
What is wireless?
A. means the technology can travel with the user; for instance, users can download
software, email messages, and web pages onto a laptop or other mobile device
B.refers to any type of operation accomplished without the use of a hard-wired
C. a wireless PAN technology that transmits signals over short distances among cell
phones, computers, and other devices
D. provides communication for devices owned by a single user that work over a short
What verifies that the units or pieces of code function correctly when integrated?
A. alpha testing
B. development testing
C. integration testing
D.system testing
What reroutes requests for legitimate websites to false websites?
A. pharming
B. phishing
C. phishing expedition
D. spear phishing
What is another term for information cleansing?
A. information mining
B.information scrubbing
C. information scrapping
D. information marts
When analyzing Porter's three generic strategies for entering a market, if you have a
focused strategy, what market should you target?
A. a niche market
B. a broad market
C. neither niche or broad markets
D. both niche and broad markets
What is a masquerading attack that combines spam with spoofing?
A. pharming
B. phishing
C. phishing expedition
D. spear phishing
What is a well-planned strategy that ensures the search and navigation functions are
easy to use and user-friendly on a website?
A. blog
B. taxonomy
C. email
D. podcast
The ________ MIS infrastructure identifies ways that a company can grow in terms of
computing resources while simultaneously becoming less dependent on hardware and
energy consumption.
B. information
C. virtualized
D. agile
What are the rules that help ensure the quality of information?
A. information integrity
B.integrity constraints
C. relational integrity constraints
D. business-critical integrity constraints
What is geocache?
A. a device that measures the acceleration (the rate of change of velocity) of an item
and is used to track truck speeds or taxi cab speeds
B.a GPS technology adventure game that posts the longitude and latitude location for
an item on the Internet for users to find
C. a north/south measurement of position
D. an east/west measurement of position
If you were thinking about a home theater system, which of the following represents the
A. the DVD player, DVD movie, speakers, TV, and electricity
B. playing the movie, including the audio through the speakers and the video on the TV
C. a message stating that the disk is dirty and cannot be played
D. spinning the disk to play, pause, rewind, or fast forward
Which of the following represents the types of data commonly found in the finance
A. monetary data
B. technology data
C. production data
D. employee data
What are dynamic, nonroutine, long-term business processes such as financial planning,
expansion strategies, and stakeholder interactions?
A. Operational business processes.
B. Managerial business processes.
C. Strategic business processes.
D. Success business processes.
What is a value chain analysis?
A. evaluates an organization's strengths, weaknesses, opportunities, and threats to
identify significant influences that work for or against business strategies
B. analyzes the competitive forces within the environment in which a company operates
to assess the potential for profitability in an industry
C.views a firm as a series of business processes, each of which adds value to the
product or service
D. generic business strategies that are neither organization nor industry specific and can
be applied to any business, product, or service
Which activities belong in the operations management department?
A. records, measures, and reports monetary transactions
B. manages the process of converting or transforming resources into goods or services
C. supports the sales by planning, pricing, and promoting goods or services is
D. maintains policies, plans, and procedures for the effective management of employees
What is one of the guidelines an organization can follow when creating an information
privacy policy?
A. adoption and implementation of an anti-spam policy
B.notice and disclosure
C. choice and quality
D. None of these are correct.
What is a process that buildslayer by layer in an additive processa three-dimensional
solid object from a digital model?
A.3D Printing
B. robotics
C. drones
What is the safe disposal of MIS assets at the end of their life cycle called?
A.sustainable MIS disposal
B. sustainable device disposal
C. sustainable software disposal
D. sustainable enterprise disposal
Most people request real-time information without understanding that continual
________ is one of its biggest pitfalls.
A. improvements
C. clustering
D. cleansing
Which of the following is the correct list of the six different types of hackers listed in
your text?
A. black-hat, cracker, cyberterrorist, hactivist, script kiddies, and white-hat hackers
B. black-top, cookie, script kids, environment, Web 3.0, and white-top hackers
C. black-hat, script kiddies, script bats, spider crawlers, Ad spiders, and white-hat
D. None of these are correct.
Which of the following are examples of transactional information?
A.airline ticket, sales receipts, and packing slips
B. trends and sales statistics
C. product sales results, grocery receipts, and growth projections
D. airline tickets and sales growth spreadsheets

Subscribe Now

Sign up to view full document

View Document