• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/50

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

50 Cards in this Set

  • Front
  • Back

Social media is static in nature, and its process flow can be designed initially by the organizations. [Social Media]

False

Crowdsourcing is the investment in social relations with the expectation of returns in the marketplace. [Social Media]

False

The three roles of organizational units in social media information system (SMIS) are users, testers, and developers. [Social Media]

False

If a SM site wants to increase its publicity, it will want to relate to as many tiers of communities as it can. It needs to create a viral hook, which is an inducement - such as a prize or other reward, for passing communications along through the tiers. [Social Media]

True

The data acquisition activity of the BI process is the process of delivering business intellignece to the knowledge workers. [Business Intelligence]

False

A data mart is a data collection that addresses a particular functional area of the business. [Business Intelligence]

True

Total sales, average sales, and average cost are examples of dimensions while purchase date, customer type, and customer location are examples of measures used in an OLAP report. [Business Intelligence]

False

In supervised data mining technique, a hypothesis is developed after the analysis. [Business Intelligence]

False

Both structured processes and dynamic processes are formally defined processes. [Processes]

False

Process efficiency is a measure of the ratio of process outputs to inputs. [Processes]

True

The problems of duplicated data, disjointed systems, limited information, and inefficiencies are solved by spreading the data across multiple databases. [Processes]

False

Enterprise application integration is a suite of applications, a database, and a set of inherent processes for consolidating business operations into a single, consistent, computing platform. [Processes]

False

Usurpation occurs when computer criminals invade a computer system and replace legitimate programs with their own unauthorized ones. [Security]

True

Authentication is the process of transforming clear text into coded, unintelligible text for secure storage or communication. [Security]

False

Companies should establish security policies and procedures for the termination of employees. [Security]

True

SQL injection attack occurs when users enter an SQL statement into a form in which they are supposed to enter a name or other data. [Security]

True

The chief information officer (CIO) often heads the technology group, and is responsible for evaluating new technologies, new ideas, and new capabilities. [IS Management]

False

The steering committee serves an important communication function between the executive group and the users of the information systems (IS). [IS Management]

False

The acquisition and operation of hardware infrastructure cannot be outsourced. [IS Management]

False

Information systems (IS) users have a responsibility to follow security and backup procedures. [IS Management]

True

All business processes must include one or more information systems. [IS Development]

False

In Business Process Modeling Notation (BPMN), diamonds represent decisions and usually contain a question that is answered with yes or no. [IS Development]

True

The goal of information security is to protect information by finding an appropriate trade-off between the risk of loss and the cost of implementing safeguards. [Security]

True

Agile development is the traditional process used to develop information systems and applications. [IS Development]

False

Systems are created to help organizations and people achieve their strategies, so the more the requirements change, the closer they come to facilitating strategies. This is a principle of SDLC. [IS Development]

False

Which below is false about social media? [Social Media]

Impede the creation of social networks or social relations among people with common interest.

According to the textbook, the ________ is determined by the number of relationships in a social network, by the strength of those relationships, and by the resources controlled by those related. [Social Media]

Value of social capital

Which of the following usually happens in a malicious denial-of-service attack? [Security]

A hacker floods a Web Server with millions of bogus service requests

The term _______ means the more people use a site, the more value it has, and the more people will visit. [Social Media]

Use increases value

________ requires the user to request business intelligence (BI) results. [Business Intelligence]

Pull Publishing

With reference to the picture below on RFM Analysis, which customer has not ordered in recent times but when it did order its orders were of the highest frequency and monetary value. [Business Intelligence]

St. Louis Soccer Club

A ________ is a data mining technique in the form of a hierarchical arrangement of criteria that predicts a classification or a value. [Business Intelligence]

Decision Tree

________ is the process of obtaining, cleaning, organizing, relating, and cataloging source data. [Business Intelligence]

Data acquisition

Joseph wishes to increase the operational efficiency of his new startup. In order to achieve this, what should Joseph do? [Processes]

Use integrated data stored in his firm's central database to analyze its day-to-day activities

Below are benefits of using enterprise application integration (EAI) except: [Processes]

Utilizes a centralized EAI database

________ is the activity of altering existing and designing new business processes to take advantage of new information systems. [Processes]

Business process reengineering

_______ are predesigned procedures (standardized business processes) for using software products. [Processes]

Inherent processes

Which of the following is considered a threat caused by human error? [Security]

An employee inadvertently installing an old database on top of the current one

________ occurs when someone deceives by pretending to be someone else. [Security]

Pretexting

Which of the following is a high priority critical security function that should be addressed by the senior management of an organization? [Security]

Establishing the company-wide security policy

Secure Sockets Layer is also known as _______. [Security]

Transport Layer Security

In the information system (IS) department, the _______ group manages the process of creating new information systems as well as maintaining existing information systems. [IS Management]

Development

Which of the following is an example of outsourcing an entire business function? [IS Management]

Outsourcing the function of arranging employee travel

According to Brooks' Law, adding more people to a late project will _______. [IS Development]

Create diseconomies of scale

In the systems development life cycle (SDLC), the work done during ________ phase is either to fix the system so that it works correctly or to adapt it to changes in requirements. [IS Development]

Maintenance

Below are phases of the systems development life cycle (SDLC) except for: [IS Development]

Plan system security

In information security, which of the following is true about managing risk? [Security]

Organizations should implement safeguards that balance the trade-off between risk and cost

What is false about BI applications? [Business Intelligence]

Placing business intelligence (BI) applications on operational servers can dramatically increase system performance

Which is false about RFM analysis? [Business Intelligence]

RFM analysis considers how recently (R) a customer ordered, how fast (F) the order was delivered, and how much margin (M) the company made on the order

Supply chain management is an example of a(n) _________. [Processes]

Inter-enterprise information system