Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
50 Cards in this Set
- Front
- Back
Social media is static in nature, and its process flow can be designed initially by the organizations. [Social Media] |
False |
|
Crowdsourcing is the investment in social relations with the expectation of returns in the marketplace. [Social Media] |
False |
|
The three roles of organizational units in social media information system (SMIS) are users, testers, and developers. [Social Media] |
False |
|
If a SM site wants to increase its publicity, it will want to relate to as many tiers of communities as it can. It needs to create a viral hook, which is an inducement - such as a prize or other reward, for passing communications along through the tiers. [Social Media] |
True |
|
The data acquisition activity of the BI process is the process of delivering business intellignece to the knowledge workers. [Business Intelligence] |
False |
|
A data mart is a data collection that addresses a particular functional area of the business. [Business Intelligence] |
True |
|
Total sales, average sales, and average cost are examples of dimensions while purchase date, customer type, and customer location are examples of measures used in an OLAP report. [Business Intelligence] |
False |
|
In supervised data mining technique, a hypothesis is developed after the analysis. [Business Intelligence] |
False |
|
Both structured processes and dynamic processes are formally defined processes. [Processes] |
False |
|
Process efficiency is a measure of the ratio of process outputs to inputs. [Processes] |
True |
|
The problems of duplicated data, disjointed systems, limited information, and inefficiencies are solved by spreading the data across multiple databases. [Processes] |
False |
|
Enterprise application integration is a suite of applications, a database, and a set of inherent processes for consolidating business operations into a single, consistent, computing platform. [Processes] |
False |
|
Usurpation occurs when computer criminals invade a computer system and replace legitimate programs with their own unauthorized ones. [Security] |
True |
|
Authentication is the process of transforming clear text into coded, unintelligible text for secure storage or communication. [Security] |
False |
|
Companies should establish security policies and procedures for the termination of employees. [Security] |
True |
|
SQL injection attack occurs when users enter an SQL statement into a form in which they are supposed to enter a name or other data. [Security] |
True |
|
The chief information officer (CIO) often heads the technology group, and is responsible for evaluating new technologies, new ideas, and new capabilities. [IS Management] |
False |
|
The steering committee serves an important communication function between the executive group and the users of the information systems (IS). [IS Management] |
False |
|
The acquisition and operation of hardware infrastructure cannot be outsourced. [IS Management] |
False |
|
Information systems (IS) users have a responsibility to follow security and backup procedures. [IS Management] |
True |
|
All business processes must include one or more information systems. [IS Development] |
False |
|
In Business Process Modeling Notation (BPMN), diamonds represent decisions and usually contain a question that is answered with yes or no. [IS Development] |
True |
|
The goal of information security is to protect information by finding an appropriate trade-off between the risk of loss and the cost of implementing safeguards. [Security] |
True |
|
Agile development is the traditional process used to develop information systems and applications. [IS Development] |
False |
|
Systems are created to help organizations and people achieve their strategies, so the more the requirements change, the closer they come to facilitating strategies. This is a principle of SDLC. [IS Development] |
False |
|
Which below is false about social media? [Social Media] |
Impede the creation of social networks or social relations among people with common interest. |
|
According to the textbook, the ________ is determined by the number of relationships in a social network, by the strength of those relationships, and by the resources controlled by those related. [Social Media] |
Value of social capital |
|
Which of the following usually happens in a malicious denial-of-service attack? [Security] |
A hacker floods a Web Server with millions of bogus service requests |
|
The term _______ means the more people use a site, the more value it has, and the more people will visit. [Social Media] |
Use increases value |
|
________ requires the user to request business intelligence (BI) results. [Business Intelligence] |
Pull Publishing |
|
With reference to the picture below on RFM Analysis, which customer has not ordered in recent times but when it did order its orders were of the highest frequency and monetary value. [Business Intelligence] |
St. Louis Soccer Club |
|
A ________ is a data mining technique in the form of a hierarchical arrangement of criteria that predicts a classification or a value. [Business Intelligence] |
Decision Tree |
|
________ is the process of obtaining, cleaning, organizing, relating, and cataloging source data. [Business Intelligence] |
Data acquisition |
|
Joseph wishes to increase the operational efficiency of his new startup. In order to achieve this, what should Joseph do? [Processes] |
Use integrated data stored in his firm's central database to analyze its day-to-day activities |
|
Below are benefits of using enterprise application integration (EAI) except: [Processes] |
Utilizes a centralized EAI database |
|
________ is the activity of altering existing and designing new business processes to take advantage of new information systems. [Processes] |
Business process reengineering |
|
_______ are predesigned procedures (standardized business processes) for using software products. [Processes] |
Inherent processes |
|
Which of the following is considered a threat caused by human error? [Security] |
An employee inadvertently installing an old database on top of the current one |
|
________ occurs when someone deceives by pretending to be someone else. [Security] |
Pretexting |
|
Which of the following is a high priority critical security function that should be addressed by the senior management of an organization? [Security] |
Establishing the company-wide security policy |
|
Secure Sockets Layer is also known as _______. [Security] |
Transport Layer Security |
|
In the information system (IS) department, the _______ group manages the process of creating new information systems as well as maintaining existing information systems. [IS Management] |
Development |
|
Which of the following is an example of outsourcing an entire business function? [IS Management] |
Outsourcing the function of arranging employee travel |
|
According to Brooks' Law, adding more people to a late project will _______. [IS Development] |
Create diseconomies of scale |
|
In the systems development life cycle (SDLC), the work done during ________ phase is either to fix the system so that it works correctly or to adapt it to changes in requirements. [IS Development] |
Maintenance |
|
Below are phases of the systems development life cycle (SDLC) except for: [IS Development] |
Plan system security |
|
In information security, which of the following is true about managing risk? [Security] |
Organizations should implement safeguards that balance the trade-off between risk and cost |
|
What is false about BI applications? [Business Intelligence] |
Placing business intelligence (BI) applications on operational servers can dramatically increase system performance |
|
Which is false about RFM analysis? [Business Intelligence] |
RFM analysis considers how recently (R) a customer ordered, how fast (F) the order was delivered, and how much margin (M) the company made on the order |
|
Supply chain management is an example of a(n) _________. [Processes] |
Inter-enterprise information system |