CSIS 100 Final Exam

CSIS 100 Final Exam Liberty University

Set 1

  1. The Federal Commerce Commission is responsible for enforcing consumer protection laws that prevent fraud, deception, and unfair business practices.
  2. As a Google user, your search history data can be accessed by the NSA and the FBI without obtaining court orders.
  3. _____ is is an inflammation of the nerve that connects the forearm to the palm of the wrist.
  4. Posting information to the Internet using anonymous email accounts or screen names makes it impossible to identify a libeler.
  5. It is illegal for companies to buy and sell personal data collected through marketing and sales efforts.
  6. A job that requires sitting at a desk and using a computer for many hours a day can lead to _______.
  7. Training and incentives are the keys to the successful acceptance and implementation of policies and procedures governing waste and error prevention.
  8. The use of computers in the workplace is a double-edged sword for workers. While they help to increase productivity and efficiency, they can also raise concerns about privacy and health issues.
  9. Consumers who have enrolled in mobile banking and downloaded the mobile application to their cell phones can check their credit card balances before making major purchases.
  10. A(n) _____ is an HTML code, not visible on a displayed Web page, that contains keywords representing the Website’s content, which search engines use to build indexes pointing to the Website.
  11. When compared to traditional commerce ________.
  12. is an approach used to capture user-provided information, such as information from warranties, surveys, user registrations, and contest-entry forms completed online.
  13. If you abandon an online shopping cart, the seller does not care what you were shopping for.
  14. Unlike B2C sites, some B2B sites
  15. In 1992, the Supreme Court ruled that online retailers must collect sales taxes even in states where they lack a physical presence.
  16. Smart cards are less protected from misuse that conventional credit, charge, and debit cards because the smart card information is not encrypted.
  17. A company’s risk assessment process can include numerous threats to the computers and networks. Which of the following can be considered an adverse event?
  18. You had used an online service to apply for a credit card. As part of the process, you submitted your personal information such as SSN, date of birth, employer information, etc. Soon after you started receiving bills for items you did not purchase. You have become a victim of
  19. A zombie computer would send requests to access to the target site again and again.
  20. There are bots that can sign up for thousands of email accounts.
  21. An attack that takes place before the security community and/or software developers become aware of and fix a security vulnerability is called the ‘zero-day attack.’
  22. If an attack is dangerous enough, it may warrant shutting down or disconnecting critical systems from the network.
  23. Your business has a web server that has suddenly become unresponsive. When you study the server’s logs there are a huge number of requests from what appear to be legitimate computers. The problem is likely because of disconnecting critical systems from the network.
  24. There are laws that require businesses to prove that their data is secure.
  25. When you receive a text message that there is a problem with your bank account and you are required you to click on a link to submit some information, you are likely seeing a vishing attack.
  26. Any Internet traffic that is not explicitly permitted into the internal network is denied entry through a firewall.
  27. An employee who is marked for a lay-off sent threatening emails to his boss, stating that he is going to delete sensitive data. This employee can be charged under the Computer Fraud and Abuse Act.
  28. Downloading games from unknown websites can be risky. The software may be a Trojan horse.
  29. Which of the following is the correct description of a firewall?
  30. Once a _____ is installed, the attacker can gain full access to the computer.
  31. Transmitting a program, code, or command that causes harm to a computer is a crime.
  32. Even legitimate organizations sometimes use email spam for promoting products.
  33. Suppose your computer network was compromised in a large scale virus attack last Thursday. Most of the data files got corrupted beyond repair. The last data backup was done the Sunday before the virus attack. This means your company has an adequate backup process in place.
  34. Which of the following shortcoming may be revealed during an IT security audit?
  35. Assume your organization is experiencing an intruder attack. You have an intrusion detection system (IDS) set up. Which of the following events occurs first?
  36. The eventual success of any system solely depends on how users work with it.
  37. A _____ is a description of the logical and physical structure of data and the relationships among the data for each user.
  38. Operational feasibility takes into account the need to meet certain system performance requirements that are considered important to system users and stakeholders.
  39. Phil has been working on a new version of his company’s best-selling sales management software and now he’d like to ask several co-workers and a handful of the existing version’s top users to perform an acceptance test. Phil is preparing for
  40. In the context of data-flow diagrams (DFDs), the _____ includes arrows that show the direction of data movement.
  41. Which of the following statements is true of user acceptance testing (UAT)?
  42. Suppose your business is using software that was written using FORTRAN 77. They wish to modify it to accommodate new requirements. It is a sound advice to suggest that they consider switching to a new application using newer technologies (e.g. Microsoft ASP.Net), rather than modify the current software.
  43. System testing is often done by independent testers who are not involved in developing program code.
  44. A marketing manager who does not have deep knowledge of information systems or data science, will NOT be able to use BI tools
  45. The graphical representation that summarizes the steps a consumer takes in making the decision to buy your product and become a customer is called
  46. Creative data scientists – a key component of BI efforts in an organization – are people who are primarily focused on coming up with novel ways of analyzing data.
  47. encourages nontechnical end users to make decisions based on facts and analyses rather than intuition.
  48. The data for BI (business intelligence) comes from many sources.
  49. One of the goals of business intelligence is to _________.
  50. From which vendor is the BI product Business Objects available?
  51. Power Pivot and Power Query are components of Microsoft’s Power BI tool.
  52. Virtual reality simulations require special interface devices that transmit the sights, sounds, and sensations of the simulated world to the user.
  53. An expert system, using the explanation facility, can indicate all the facts and rules that were used in reaching a conclusion.
  54. Best Value Hardware Stores, a national chain, has established strict policies about the conditions under which a customer can return merchandise. These policies are an example of:
  55. You joined an agriculture business as an Assistant Marketing Manager and you are full of ideas on how to improve sales. When you voiced your thoughts to your boss, she mentions “do not reinvent the wheel”. It means
  56. A _____ is a group of people with common interests who come together to create, store, and share knowledge of a specific topic.
  57. is a mathematical theory for developing strategies that maximize gains and minimize losses while adhering to a given set of rules and constraints.
  58. _____ can process many pieces of data at the same time and learn to recognize patterns.
  59. Many organizations actively attempt to convert explicit knowledge to tacit knowledge.
  60. If an organization considers its IS organization as a cost center or service provider, then its strategic planning would be inward focused.
  61. Which of the following does not influence IT organizational strategies?
  62. Suppose the ‘User interface design’ phase of the project has a high probability of not meeting the quality requirements; however, it has significant potential impact on the overall project. It is advisable to find and assign a risk owner for this part of the project.
  63. The use of so-called SMART goals has long been advocated by management consultants. What does the M in SMART stand for?
  64. Which of the five forces in Michael Porter’s model refers to entry barriers and the relative threat of new competitors?
  65. is a set of activities that includes defining an achievable completion date that is acceptable to the project stakeholders, developing a workable project schedule, and ensuring the timely completion of the project.
  66. A senior manager from the business unit most affected by a project and who ensures the project will indeed meet the needs of his or her organization is known as the project sponsor.
  67. A CEO must be heavily inv olved in setting high-level business objectives and defining strategies.
  68. A(n) _____ is central to individuals and organizations of all sizes and ensures that information can be shared across all business functions and all levels of management to support the running and managing of a business.
  69. Product lifecycle management (PLM) typically includes customer relationship management (CRM) software
  70. The information about invoices to customers is tracked by ____ system.
  71. A designer would use computer aided manufacturing (CAM) to create, analyze, and modify the design of a component.
  72. Legacy systems typically run on the latest hardware.
  73. Which of these is an advantage of the hosted software model?
  74. Using the hosted software model implies that a small business firm needs to employ a full-time IT person to maintain key business applications.
  75. Large organizations were the first to take on the challenge of implementing enterprise resource planning (ERP).

Set 2

  1. _____ is a mathematical theory for developing strategies that maximize gains and minimize losses while adhering to a given set of rules and constraints.
  2. _____ knowledge is hard to measure and document and typically is not objective or formalized.
  3. A genetic algorithm can be used to search the vast resources of the Internet to find information on any topic.
  4. Kelly has just been hired as a server at a seafood restaurant. Since this is her first job as a server, her manager has instructed her to follow Mark, an experienced server, for an entire shift to learn how to do the job. Kelly is: _______.
  5. _____ has the potential to superimpose digital data over real photos so that GPS maps can be combined with real pictures of stores and streets to help people locate their position.
  6. ​ You work for a manufacturing business. Your employer uses a model for selecting the supplier for the raw materials. They wish to become more responsive so that changes in the internal decision model can be quickly implemented in the systems. What is an appropriate recommendation?
  7. A _____ is a group of people with common interests who come together to create, store, and share knowledge of a specific topic.
  8. A perceptive system allows a machine to approximate the way a person sees, hears, and feels objects.
  9. ​ Educational institutions’ Websites are the most commonly targeted sites by phishers
  10. ​ A company’s risk assessment process can include numerous threats to the computers and networks. Which of the following can be considered an adverse event?
  11. ​ The purpose of Advanced Persistent Threat (APT) usually is to ____.
  12. ​ You see a deceptive pop-up that says your computer is infected and that you must visit a compromised web site where you pay them to clean your computer. You have just become a victim of ransomware.
  13. ​ Suppose your computer network was compromised in a large scale virus attack last Thursday. Most of the data files got corrupted beyond repair. The last data backup was done the Sunday before the virus attack. This means your company has an adequate backup process in place.
  14. ​ Any Internet traffic that is not explicitly permitted into the internal network is denied entry through a firewall.
  15. ​ Which of the following is the correct description of a firewall?
  16. ​ A hacktivist is someone who _______.
  17. A botnet is a ____.
  18. ​ Which of these organizations offers guidelines on developing security policies?
  19. ​ You have been hired as the new Information Security consultant at XYZ Inc. Which of these employee behaviors would be a top security concern?
  20. Someone who violates computer or Internet security maliciously or for illegal personal gain is known as a(n) _______.
  21. ​ As the complexity of a network increases, the possibility of security breaches decreases.
  22. ​ Which of the following is a vendor of popular anti-virus software?
  23. ​ You work at a call center of a large bank where you answer credit card services related questions from customers. Lately, you have noticed an increased number of customers enquiring if you had initiated a call. There can be a scam in progress.
  24. A zombie computer would send requests to access to the target site again and again.
  25. ​ There has been a data breach at your business and the business has lost some customer data. It has led to angry customers who have filed charges. What is a recommended course of action to prepare for future events?
  26. ​ Most organizations do not hesitate to conceal information about a data loss event if there is a fear of bad publicity and loss of customers.
  27. ​ The computer is running, but not responding to your keyboard inputs. You find that the network activities are running very slowly. You have probably been hit by a rootkit.
  28. Phil has been working on a new version of his company’s best-selling sales management software and now he’d like to ask several co-workers and a handful of the existing version’s top users to perform an acceptance test. Phil is preparing for _________.
  29. _____ is the process of analyzing systems to make sure they are operating as intended.
  30. Even if unit testing is successful, developers cannot assume they can combine individual components into a working system without any problems.
  31. Laura is carefully estimating the time required for each phase of a proposed system development project to see if her company can meet the client’s desired time for completion. Laura is checking on ___________.
  32. You are part of the team to implement new software at XYZ Inc. The employees at XYZ Inc. trust the results of the old software programs, but are cautious about accepting the outcomes of the proposed new software programs. What software implementation strategy would you recommend in this situation?
  33. _____ involves using a new or modified system under all kinds of operating conditions.
  34. ​ In the context of data-flow diagrams (DFDs), a(n) _____ shows either the source or destination of the data.
  35. ​ Joint application development (JAD) sessions with a cross section of users and stakeholders in a project are an effective way to define system requirements.
  36. Amy is doing some online research for a term paper. She’d like to access some information on a particular website, but the website is asking her to put in her email address before allowing her to view the information. She wonders what the website owner will do with that information, but there is never any way for her to know how data collected via a website will be used.​
  37. Although Roberta had signed a form preventing her doctor from sharing her personal medical records with the company she worked for, she later discovered that the doctor’s office had, in fact, shared her data with her health insurance provider and her employer, which caused her to be terminated.​ Because the doctor’s practice violated its own privacy policy, she was able to file a lawsuit under the ________.
  38. Software developers have created filtering software that blocks children from viewing inappropriate or harmful Internet sites at home or school, but to date developers have been unsuccessful in creating a similar software for use in the workplace.​
  39. A job that requires sitting at a desk for many hours a day can significantly reduce the risk of type 2 diabetes.
  40. IS professionals believe that their field offers few opportunities for unethical behavior.
  41. As a  Google user, your search history data can be accessed by the NSA and the FBI without obtaining court orders.
  42. The term “ethics” refers to an individual’s personal beliefs about right and wrong, whereas the term “morals” describes standards or codes of behavior expected of an individual by a group, such as a nation, organization, or profession.​
  43. Deepak’s team is in charge of conducting a review of their company’s waste/mistake prevention policies and procedures.  Part of this review should also evaluate how upcoming changes in information systems will affect business activities.
  44. PayPal enables any person or business with an e-mail address to securely, easily, and quickly send and receive payments online.
  45. In 1992, the Supreme Court ruled that online retailers must collect sales taxes even in states where they lack a physical presence.
  46. Because of ____ commerce sites, anyone can become a merchant online ​.
  47. Based on a Supreme Court ruling, an Internet-based merchant needs to charge sales tax only when _____.
  48. In spite of the recent economic downturn, Website operators have shunned the idea of bartering for goods and services.
  49. Which of the following forms of e-commerce has created an opportunity for many people to make a living out of selling items on auction Websites?
  50. The length of sales process for a typical business-to-business (B2B) e-commerce is shorter than that for a typical consumer-to-consumer (C2C) e-commerce.
  51. _____ is a standard that spells out measures and security procedures to safeguard a card issuer, a cardholder, and a merchant.
  52. ​ Which of the following is IBM’s BI product?
  53. ​ A marketing manager who does not have deep knowledge of information systems or data science, will NOT be able to use BI tools
  54. Creative data scientists  – a key component of BI efforts in an organization – are people who are primarily focused on coming up with novel ways of analyzing data.
  55. ​ You are to advise XYZ so that their BI efforts are fruitful. Which among the following is the most crucial advice of all?
  56. ​ Online analytical processing is another name for enterprise application.
  57. ​ Which of the following is NOT a characteristic of a data scientist?
  58. Mastery over which subject is NOT required for being a data scientist?​
  59. Excel’s scenario manager can be used to solve optimization-type problems​.
  60. A key feature of an enterprise system is that _________.
  61. The main difference between batch processing and online transaction processing is in the timely update of data.
  62. A designer would use computer aided manufacturing (CAM) to create, analyze, and modify the design of a component.
  63. Enterprise resource planning (ERP) systems work directly with manufacturing machines on the production floor.
  64. Purchasing uses information from the _____ to place purchase orders for raw materials with qualified suppliers.
  65. According to the classification of enterprise resource planning (ERP) vendors, _____ vendors target medium-sized firms with annual revenues in the $50 million to $1 billion range operating out of one or more locations.
  66. In an organization, a transaction processing system (TPS) supports routine operations associated with its business processes.
  67. The information about invoices to customers is tracked by  ____ system.
  68. ​ The business unit most affected by the project and the one whose budget will cover the project costs is known as the _____.
  69. Which Internet business has “Do the right thing; don’t be evil.” as one of its values?​
  70. ​ Which of the following steps is the first step in goals-based strategic planning?
  71. ​ A useful model to describe how teams develop is the forming-storming-norming-performing-___________ model.
  72. ​ For the “determine data needs” activity of a project, the optimistic estimated duration is 10 days, the pessimistic estimated duration is 20 days, the most likely time is 15 days. What is the expected duration of completing this activity?
  73. ​ An increase in customer satisfaction is considered a tangible benefit.
  74. A building, office equipment, computer hardware, and network equipment are examples of _____​.
  75. ​ Quality management is the set of activities designed to make the most effective use of the people involved with a project.

Set 2

  1. The development and application of innovative information systems improve the operations of an organization; however, they do not lead to any competitive advantage.
  2. How are policies enforced in information systems?
  3. Which of the following is a critical component of an information system?
  4. Which of the following is a common source of misunderstanding between IT and other departments?
  5. Which of the following statements is true of information systems that support collaborative human activities?
  6. Differentiating the product or service for a particular market niche is called product differentiation strategy.
  7. The threat of substitutes is high when alternative products are available.
  8. Network effects refer to the
  9. Melloc is one of many suppliers selling milk to retail customers. Since there are many sellers, price is a major determinant of market success. Which of the following statements about Melloc is true?
  10. Which of the following is true of creative destruction?
  11. Which of the following has raised questions regarding the ethical implications of companies collecting and analyzing enormous amounts of customer data?
  12. refers to ICT architecture in which users access software applications and information systems remotely over the Internet, rather than locally on an individual PC or from servers in the organization’s data center.
  13. Which of the following is a feature of the devices that form the physical basis of information and systems?
  14. A database is an example of system software.
  15. Speech input devices have overtaken all other input devices.
  16. ensures that every foreign key entry actually exists as a primary key entry in its main table.
  17. Which of the following database architectures works well for one‐to‐many relationships, but is not effective with many‐to‐many relationships?
  18. A system’s ability to handle rapidly increasing demand is called
  19. Which of the following is a characteristic of structured information?
  20. What is the main drawback of using unstructured information?
  21. Which of the following is a part of a company’s supply chain management?
  22. Which of the following illustrates a practice that can dramatically reduce supply chain costs?
  23. The bullwhip effect can be reduced if
  24. Which of the following is a characteristic of best‐of‐breed suites?
  25. In an ERP suite that includes modules specialized for higher education, which of the following would be used to track donations, pledges, and gifts, and manage contacts and donor relationships?
  26. The website of Vogue, a hair and beauty salon chain, allows visitors to upload their photographs and try virtual hairstyles and virtual makeovers. In this example, the primary web goal of the salon is to
  27. A(n) ________ focuses on informing visitors and empowering them with aggregated information about products from different suppliers.
  28. Which of the following elements of website usability describes how quickly a user performs tasks after learning a website’s basic design measures?
  29. Which of the following is a drawback of the hierarchical website architecture?
  30. Not all devices connected to the Internet have a unique IP address.
  31. Mashup is an approach to aggregating content from multiple internal and external sources on customizable web pages.
  32. Companies use intelligent agents to extract useful business intelligence from private, inaccessible websites.
  33. Business intelligence is said to be used at the ________ if companies use it to bring meaningful, performance‐related information to all employees.
  34. In web metrics, which of the following best describes depth of visit?
  35. Which of the following is a function of predictive analytics?
  36. Which of the following is true of group dynamics in virtual teams?
  37. is the microblogging website with the largest number of users in the world.
  38. Which of the following mail protocols is commonly used to handle outgoing mail from users?
  39. Text messages multiply the power of informal networks by allowing users to broadcast information not yet available through traditional means.
  40. The online world tends to flatten out hierarchies and equalize status.
  41. A person in an e‐learning program who knows just what should be included in the course and possesses the content expertise is known as a
  42. A(n) ________ is a person who brings together the knowledge and skills about what strategies work best for e‐learning.
  43. Structural capital describes the number and quality of all the relationships an organization’s employees maintain, not just with one another but with clients, customers, suppliers, and prospective employees.
  44. Which of the following assets is a part of human capital?
  45. Which of the following is an accurate definition of communities of practice?
  46. Single sign‐on is implemented by organizations for the purpose of
  47. Which of the following methods is often used for phishing purposes?
  48. Digital rights management offers IP holders the benefit of
  49. Which of the following is an accurate definition of digital rights management?
  50. For which of the following purposes are botnets most likely to be used?
  51. A phased implementation is an expensive process that launches a new system while the old one is still running.
  52. Escapade Inc., a travel agency in Sydney, is using a highly expensive implementation process for a short period of time. It launches the new system while the old one is still running and employees have to do their jobs twice, once on each system. Which of the following is the company using?
  53. Info Labs Inc., a marketing communications company, launches a project at a fixed cost of $180,000. What is the amount of savings earned from the project per month if it returns the investment in 3 years?
  54. Johanna Taylor, a creative developer at Leo Technologies Inc., is developing a website for the company. To address the usability needs of website visitors, she ensures that visitors would be able to easily locate what they need on the website. She avoids flashy graphics and chooses a font with high readability. Joanna is most likely in the ________ stage of the SDLP.
  55. Jonathan has joined a new software company in Manhattan and has been assigned the task of developing an internal communications system. He begins the task by assessing how the system will help in efficiently coordinating the projects that the company handles and in determining the feasibility of the system. In the given scenario, Jonathan is in the ________ step of the systems development life cycle.
  56. an information system is typically the best choice for a business when the available systems support common business functions, such as financial or human resource management.
  57. Prepackaged software is a good option for business functions that do not need to offer competitive advantage.
  58. Tom Daniels, an employee of a telecommunications company, is developing software that would enable customers to activate value‐added services in a matter of seconds. Which of the following requirements is Tom developing if he is working to improve the visual appeal of the interface and to enhance the ease of learning the software?
  59. Which of the following is an advantage of a parallel implementation of an information system?
  60. Which of the following is a type of testing for information systems where developers use the same input and compare the new system’s output to the output generated by the system it is replacing?
  61. Which of the following collects data from each project and aggregates it, building a larger picture of the overall health of the organization’s project portfolio?
  62. The ________ phase in a project involves documenting lessons learned from the project, so that the experience is useful to other project teams and adds to the organization’s knowledge base.
  63. Lack of customization and high stakeholder involvement are amongst some of the most cited reasons for project failure.
  64. A ________ lists tasks on the work breakdown structure, along with each task’s projected start and finish dates, in graphical format.
  65. A kick‐off meeting involves
  66. Which of the following is an accurate definition of a project?
  67. Which of the following sets of processes is carried out first in project management?
  68. Business continuity refers to the willingness of an organization to pull the plug on a project in which huge sums and resources need to be invested.
  69. Which of the following tools helps keep a project on track to meet its deadlines by listing tasks on a work breakdown schedule?
  70. Which of the following is an accurate definition of “black swans”?
$2.99
Add to Cart

has been added to your cart!

have been added to your cart!