You are on page 1of 76

Information Systems Today, 4e (Valacich/Schneider) Chapter 7 Securing Information Systems 1) Which of the following is NOT a threat to information systems

security? A) Accidents and natural disasters B) Employees and consultants C) in!s to outside "usiness contacts #) All of the a"o$e are threats to information systems security% &) 'nauthori(ed access can "e achie$ed "y) A) physically stealing computers% B) stealing storage media% C) opening files on a computer that has not "een set up to limit access% #) all of the a"o$e% *) A ++++++++ is a distorted image displaying a com"ination of letters and,or num"ers a user has to input in a form% A) Turing test B) CA-TC.A C) /OTC.A #) passcode 0) ++++++++ are a type of $irus that target networ!s and ta!e ad$antage of operating system security holes to replicate endlessly% A) Worms B) Trolls C) Tro1ans #) 2eplicators 3) ++++++++ attac!s occur when electronic intruders deli"erately attempt to pre$ent legitimate users from using that ser$ice% A) 4nformation modification B) #enial of ser$ice C) Brute5force #) 6anipulation

1 Copyright 7 &818 -earson Education9 4nc% -u"lishing as -rentice .all

:) To e;ecute denial of ser$ice attac!s9 intruders often use ++++++++ computers% A) (om"ie B) monster C) ro"ot #) android <) ++++++++ consist of destructi$e code that can erase a hard dri$e9 sei(e control of a computer9 or otherwise do damage% A) =iruses B) Worms C) >pyware #) ?om"ies @) ++++++++ is any software that co$ertly gathers information a"out a user though an 4nternet connection without the userAs !nowledge% A) =iruses B) Worms C) >pyware #) Adware B) ++++++++ collects information a"out a person in order to customi(e We" "rowser "anner ad$ertisements% A) =iruses B) Worms C) >pyware #) Adware 18) A ++++++++ is an instance where a legitimate email is inad$ertently identified as spam and "loc!ed% A) spam "loc!er B) false alarm C) false negati$e #) false positi$e

&

11) ++++++++ is electronic 1un! mail or 1un! newsgroup postings9 usually for the purpose of ad$ertising some product and,or ser$ice% A) >pim B) >pam C) >pyware #) Adware 1&) >ome spam consists of ++++++++9 as!ing you to donate money to none;istent causes or warning you of $iruses and other 4nternet dangers that do not e;ist% A) hoa;es B) tric!s C) pran!s #) threats 1*) >ome spam e5mail includes ++++++++9 which are attempts to tric! financial account and credit card holders into gi$ing away their authori(ation information% A) frea!ing B) tric!ing C) phishing #) luring 10) >poofing or ++++++++ is an attempt to tric! the users into pro$iding financial account9 social security9 or other personal information $ia email% A) spimming B) tric!ing C) phishing #) luring 13) >pam o$er ++++++++ is referred to as spim% A) instant messaging B) s!ype C) $ideo telephony #) "logs

* Copyright 7 &818 -earson Education9 4nc% -u"lishing as -rentice .all

1:) ACn)++++++++ uses images that cannot "e read "y computers to pre$ent automated unauthori(ed access attempts% A) CA-TC.A B) image map C) dou"le authentication #) typed image 1<) ACn) ++++++++ is a message passed to a We" "rowser on a userAs computer "y a We" ser$er9 that is then stored in a te;t file "y the "rowserD that message is sent "ac! to the ser$er each time the userAs "rowser reEuests a page from that ser$er% A) identifier B) coo!ie C) message #) te;t file 1@) ACn) ++++++++ is used "y a We" page to store information a"out a user on the userAs computer9 so as to pro$ide the user with personali(ed information on the ne;t $isit% A) identifier B) coo!ie C) message #) te;t file 1B) Any good approach to securing information systems "egins first with a thorough ++++++++ of all aspects of those systems% A) cleaning B) disinfection C) Euarantining #) audit &8) All of the following are possi"le threats to information systems security EFCE-T) A) Employee !eeping passwords on a slip of paper% B) -roper "ac!ground chec!s are not done with new hires% C) Organi(ations do not install effecti$e firewalls% #) Organi(ations change passwords from the default passwords%

&1) ++++++++ is ta!ing acti$e countermeasures to protect your system9 such as installing firewalls% A) 2is! acceptance B) 2is! transfer C) 2is! audit #) 2is! reduction &&) ++++++++ is implementing no countermeasures and simply a"sor"ing any damage% A) 2is! acceptance B) 2is! transfer C) 2is! audit #) 2is! reduction &*) ++++++++ is ha$ing some one else a"sor" the ris!9 such as in$esting in insurance or "y outsourcing certain functions to another organi(ation% A) 2is! acceptance B) 2is! transfer C) 2is! audit #) 2is! reduction &0) 2is! analysis is a process in which you) A) assess the $alue of the assets "eing protected% B) determine the li!elihood of the assets "eing compromised% C) compare the pro"a"le costs of the assets "eing compromised with the estimated costs of whate$er protection you might ha$e to ta!e% #) All of the a"o$e% &3) Which of the following is NOT a way to react to identified ris!s? A) 2is! reduction B) 2is! acceptance C) 2is! transference #) 2is! em"racement &:) -hysical access is usually limited "y ma!ing it dependent on) A) something you !now% B) something you are% C) something you ha$e% #) all of the a"o$e%
3 Copyright 7 &818 -earson Education9 4nc% -u"lishing as -rentice .all

&<) ++++++++ is a type of security that grants or denies access to a resource Ce%g%9 facility9 computer systems) through the analysis of fingerprints9 retinal patterns in the eye9 or other "odily characteristics% A) Bioinformatics B) Biometrics C) Bio5identification #) Bio5measurement &@) ++++++++ uses identification "y fingerprints9 retinal patterns in the eye9 "ody weight9 and so on% A) Bioinformatics B) Biometrics C) Bio5identification #) Bio5measurement &B) Which of the following are NOT mentioned in the te;t as "eing used in "iometric identification? A) Gingerprints B) Eye distances C) Body weight #) 2etinal patterns *8) ++++++++ is a type of software for securing information systems "y only allowing specific users access to specific computers9 applications9 or data% A) Access control software B) Computer security software C) Application restriction software #) #ata protection software *1) ++++++++ is a computer attac! in which an attac!er accesses a computer networ!9 intercepts data9 uses networ! ser$ices9 and,or sends attac! instructions without entering the office or organi(ation that owns the networ!% A) >nea!ing B) >poofing C) >houlder surfing #) #ri$e5"y hac!ing

*&) A ++++++++ uses radio wa$es that can "e accessed from hundreds of feet away9 potentially allowing attac!ers to access the networ! relati$ely easily% A) local area networ! B) wide area networ! C) personal area networ! #) wireless local area networ! **) A ++++++++ is a networ! connection that is constructed dynamically within an e;isting networ!Hoften called a secure tunnelHin order to securely connect remote users or nodes to an organi(ationIs networ!% A) $irtually protected networ! B) $irtual pri$ate networ! C) $ery protected networ! #) protected networ! $erification *0) A $irtual pri$ate networ! uses ++++++++ to encapsulate9 encrypt9 and transmit data o$er the 4nternet infrastructure9 ena"ling "usiness partners to e;change information in a secured9 pri$ate manner "etween organi(ational networ!s% A) encapsulation B) encryption C) tunneling #) enclosing *3) A =-N uses ++++++++ to send secure Jpri$ateJ data o$er the Jpu"licJ 4nternet% A) networ!ing B) networ! protection C) tunnelling #) pri$ati(ation *:) ++++++++ is hardware or software designed to !eep unauthori(ed users out of networ! systems% A) A wall B) Networ! protection software C) A firewall #) A networ! filter

< Copyright 7 &818 -earson Education9 4nc% -u"lishing as -rentice .all

*<) Girewalls can "e implemented in) A) hardware% B) software% C) data% #) "oth A and B *@) ++++++++ is the pre$ention of unauthori(ed access to a computer networ! "y a firewall at the data pac!et le$elD data pac!ets are accepted or re1ected "ased on predefined rules% A) -ac!et filtering B) Application le$el control C) Circuit5le$el control #) -ro;y ser$er *B) ++++++++ is the pre$ention of unauthori(ed access to a pri$ate networ! "y a firewall that detects when a certain type of connection or circuit has "een made "etween specified users or systems on either side of the firewall% A) -ac!et filtering B) Application le$el control C) Circuit5le$el control #) -ro;y ser$er 08) ++++++++ is the pre$ention of unauthori(ed access to selected applications "y some form of security% A) -ac!et filtering B) Application le$el control C) Circuit5le$el control #) -ro;y ser$er 01) ACn) ++++++++ is a firewall that ser$es as9 or creates the appearance of9 an alternati$e ser$er that intercepts all messages entering and lea$ing the networ!9 effecti$ely hiding the true networ! addresses% A) pac!et filter B) application le$el control C) circuit5le$el control #) pro;y ser$er

0&) ++++++++ is the process of hiding computersA true networ! addresses "y replacing the computersA 4- addresses with a firewallAs addressD thus9 potential attac!ers only KseeL the networ! address of the firewall% A) -ac!et filtering B) Application le$el control C) Circuit5le$el control #) Networ! address translation 0*) Which of the following is NOT an approach used "y firewalls? A) -ac!et filtering B) Application le$el control C) Circuit5le$el control #) 4nternet le$el control 00) A firewall ++++++++ is the manner in which a firewall is implemented such as hardware only9 software only9 or a com"ination of hardware and software% A) topology B) topography C) architecture #) layout 03) Corporate firewalls are typically configured) A) in one standard way% B) only to limit 4nternet access for employees% C) in many different ways% #) None of the a"o$e% 0:) ++++++++ is the process of encoding messages "efore they enter the networ! or airwa$es9 then decoding them at the recei$ing end of the transfer9 so that only the intended recipients can read or hear them% A) Authentication B) Authori(ation C) Encryption #) Encapsulation

B Copyright 7 &818 -earson Education9 4nc% -u"lishing as -rentice .all

0<) Encryption software allows users to ensure) A) authentication% B) pri$acy,confidentiality% C) nonrepudiation% #) All of the a"o$e% 0@) ++++++++ is the process of confirming the identity of a user who is attempting to access a system or We" site% A) Authentication B) -ri$acy,confidentiality C) Nonrepudiation #) 4ntegrity 0B) Ensuring that no one can read the message e;cept the intended recipient is called) A) authentication% B) pri$acy,confidentiality% C) nonrepudiation% #) integrity% 38) Assuring the recipient that the recei$ed message has not "een altered in any way from the original that was sent is called) A) authentication% B) pri$acy,confidentiality% C) nonrepudiation% #) integrity% 31) A mechanism using a digital signature to pro$e that a message did9 in fact9 originate from the claimed sender is called) A) authentication% B) pri$acy,confidentiality% C) nonrepudiation% #) integrity%

18

3&) ACn) ++++++++ system is an encryption system where "oth the sender and recipient use the same !ey for encoding Cscram"ling) and decoding the message% A) symmetric !ey B) asymmetric !ey C) pu"lic !ey #) certificate authority 3*) ++++++++ technology is a data encryption techniEue that uses two !eysHa pri$ate !ey and a pu"lic !eyHto encrypt and decode messages% A) >ymmetric !ey B) Asymmetric !ey C) -u"lic !ey #) Certificate authority 30) A ++++++++ is a trusted middleman "etween computers that $erifies that a We" sites is a trusted site and is used when implementing pu"lic5!ey encryption on a large scale% A) $erification ser$ice B) pu"lic !ey generator C) certificate pro$ider #) certificate authority 33) A ++++++++ system reEuires the same !ey to "e used "y the sender and the recipient% A) symmetric secret !ey B) pri$ate !ey generator C) shared !ey #) pu"lic !ey 3:) ++++++++9 de$eloped "y Netscape9 is a popular pu"lic5!ey encryption method used on the 4nternet% A) >ecure soc!ets layer B) -retty good pri$acy C) 2>A #) Clipper chip

11 Copyright 7 &818 -earson Education9 4nc% -u"lishing as -rentice .all

3<) ++++++++ is a technology intended to generate un"rea!a"le codes% A) >ecure soc!ets layer B) -retty good pri$acy C) 2>A #) Clipper chip 3@) ++++++++ is a set of acti$ities for detecting and pre$enting unwanted harmful computer software% A) =irus pre$ention B) >ecurity testing C) Computer monitoring #) 4nternet security monitoring 3B) ++++++++ is software used to !eep trac! of computer acti$ity so that auditors can spot suspicious acti$ity and ta!e action if necessary% A) Audit control software B) >ecurity test software C) Computer monitoring software #) 4nternet security software :8) Other technological safeguards to protect against security "reaches include all EFCE-T) A) "ac!ups% B) closed5circuit tele$ision% C) uninterrupti"le power supply% #) All of the a"o$e can help to protect against security "reaches% :1) All of the following are potential threats to 4> facilities EFCE-T) A) terrorism% B) hurricanes% C) power outages% #) firewalls% :&) .uman5"ased safeguards include) A) federal and state laws% B) effecti$e management% C) ethical "eha$ior% #) All of the a"o$e%

1&

:*) Organi(ations and indi$iduals should perform regular ++++++++ of important files to e;ternal storage media% A) storage audits B) '-> C) $irus scans #) "ac!ups :0) An information systems security plan in$ol$es) A) assessing ris!s% B) planning ways to reduce ris!s% C) plan implementation and ongoing monitoring% #) All of the a"o$e%

Chapter 8 Enhancing Business Intelligence Using Information Systems 1) 2outine9 day5to5day "usiness processes and interaction with customers occur at the ++++++++ le$el of a firm% A) managerial B) operational C) e;ecuti$e #) functional &) Organi(ations ha$e turned to ++++++++ to gather and analy(e information from internal and e;ternal sources in order to ma!e "etter decisions% A) consultants B) "usiness intelligence C) the 4nternet #) corporate partnerships *) ++++++++ is the output from the process of gathering and analy(ing internal and e;ternal information to ma!e "etter "usiness decisions and gaining and sustaining competiti$e ad$antage% A) Mnowledge B) Business intelligence C) Wisdom #) A data warehouse

1* Copyright 7 &818 -earson Education9 4nc% -u"lishing as -rentice .all

0) K6issingL information needed to effecti$ely monitor and control "usiness processes resides in) A) spreadsheets B) reports C) the 4nternet #) all of the a"o$e% 3) Business intelligence helps organi(ations swiftly respond to e;ternal threats and) A) competition% B) internal threats% C) pro"lems% #) opportunities% :) >uccessful organi(ations are utili(ing a ++++++++ process to continuously plan9 monitor and analy(e "usiness processes% A) "usiness intelligence B) continuous updating C) "usiness reengineering #) continuous planning <) 4nformation systems at the operational le$el of an organi(ation are designed to) A) automate repetiti$e acti$ities% B) impro$e the efficiency of "usiness processes% C) impro$e the efficiency of the consumer interface% #) All of the a"o$e% @) An e;ample of aCn) ++++++++ information system is an in$entory management system for a shoe store that !eeps trac! of in$entory and issues an order for additional in$entory when le$els drop "elow a specified le$el% A) managerial B) operational C) e;ecuti$e #) functional

10

B) At the managerial le$el9 ++++++++ managers focus on monitoring and controlling operational5le$el acti$ities and pro$iding information to higher le$els of the organi(ation% A) functional B) operational C) e;ecuti$e #) personnel 18) 6anagers at the managerial le$el typically focus on pro"lems) A) across the organi(ation% B) within a specific "usiness function9 such as mar!eting or finance% C) within a time frame% #) across se$eral departments% 11) 6anagerial5le$el decision ma!ing is referred to as ++++++++ decision ma!ing9 "ecause solutions and pro"lems are not clear5cut and often reEuire 1udgment and precision% A) day5to5day B) unstructured C) structured #) semistructured 1&) A production manager at 2ee"o! uses information a"out sales forecasts for se$eral product lines pro$ided "y aCn) ++++++++ information system to create multiple production schedules% A) e;ecuti$e5le$el B) organi(ational5le$el C) managerial5le$el #) operational5le$el 1*) 6anagers at the e;ecuti$e le$el of the organi(ation focus on) A) pro"lems within a specific "usiness function% B) effecti$ely utili(ing and deploying organi(ational resources% C) long5term strategic issues facing the organi(ation% #) impro$ing the efficiency of "usiness processes%

13 Copyright 7 &818 -earson Education9 4nc% -u"lishing as -rentice .all

10) ++++++++ decisions deal with comple; pro"lems with "road and long5term ramifications for the organi(ation% A) E;ecuti$e5le$el B) 6anagerial5le$el C) Gunctional5le$el #) Operational5le$el 13) -ro"lems at the e;ecuti$e le$el of the organi(ation are) A) relati$ely comple; and nonroutine% B) highly structured and recurring% C) relati$ely comple; and recurring% #) repetiti$e and insignificant% 1:) The goal of ++++++++ systems is to automate repetiti$e information5processing acti$ities within organi(ations% A) management information B) transaction processing C) e;ecuti$e information #) decision support 1<) ++++++++9 paper or electronic9 descri"e a specific "usiness transaction and ser$e as a stimulus to a transaction processing system from some e;ternal source% A) >ource documents B) Online information C) 2eports #) Ban! CheEues 1@) Acti$ities supported "y transaction processing systems do NOT include) A) payroll processing% B) in$entory management% C) sales forecasting% #) accounts paya"le and recei$a"le%

1:

1B) An interacti$e class registration system that immediately notifies the user of his or her success to register in a class is an e;ample of ++++++++ processing of transactions% A) "atch B) scheduled C) online #) operational &8) >ome e;amples of the outputs created "y a transaction processing system include) A) counts and summary reports% B) scheduled and ad hoc reports% C) trends and summary reports% #) recommendations and ad$ice% &1) #ata entry into a transaction processing system can "e) A) manual% B) semiautomated% C) fully automated% #) All of the a"o$e% &&) An e;ample of a "atch transaction system is) A) a grocery store chec!out processing system% B) a payroll processing system% C) an airline reser$ation processing system% #) an e$ent tic!et reser$ation processing system% &*) An e;ample of a ++++++++ T-> is a data capture de$ice which is used at the chec!out counter of a grocery store% A) manual B) "atch C) semiautomated #) fully automated

1< Copyright 7 &818 -earson Education9 4nc% -u"lishing as -rentice .all

&0) A "usiness intelligence application can lin! data from a T-> such as a grocery chec!out system with other data such as ++++++ to impro$e "usiness decision ma!ing% A) store location B) in$entory le$els C) competitor information #) All of the a"o$e% &3) Which of the following are NOT created at pre5specified inter$als? A) Mey54ndicator 2eports B) #rill5down 2eports C) E;ception 2eports #) Nuarterly >ales 2eports &:) ++++++++ Euery tools pro$ide an easy5to5use interface9 allowing managers to run Eueries and reports themsel$es% A) Mey54ndicator B) #rill5down C) E;ception #) Ad .oc &<) ++++++++ refers to the process of Euic!ly conducting comple;9 multidimensional analyses of data stored in a data"ase% A) Ad hoc processing B) #rill5down processing C) E;ception processing #) Online analytical processing &@) ++++++++ is used "y organi(ations to disco$er KhiddenL predicti$e relationships in massi$e amounts of data to "etter understand their customers9 products9 mar!ets9 or any other phase of their "usiness% A) #ata warehousing B) #ata mining C) OO#B #) Business rules

1@

&B) ++++++++9 a preparatory step to running data5mining algorithms9 is used to speed up the analysis% A) Normali(ation B) >licing an dicing C) Online analytical processing #) Association disco$ery *8) ++++++++ is the process of Euic!ly conducting comple;9 multidimensional analyses of data9 typically using graphical software tools that pro$ide comple; analysis of stored data are) A) O TB) O AC) O >T #) O 4*1) An association rule typically includes a num"er indicating ++++++++ Ce%g%9 to show how often the com"ination of coffee and sugar occurs in all transactions analy(ed)% A) support B) the confidence le$el C) the com"ination ratio #) freEuency *&) An association rule typically includes a num"er indicating ++++++++ Ce%g%9 the percentage of the transactions containing coffee that also contain sugar)% A) support B) the confidence le$el C) the com"ination ratio #) freEuency **) The chief component of an online analytical processing system is the ++++++++ that understands how data is organi(ed in the data"ase and has special functions for analy(ing the data% A) O A- Cu"e B) #ata mining C) #imensions #) O A- ser$er

1B Copyright 7 &818 -earson Education9 4nc% -u"lishing as -rentice .all

*0) ++++++++ is a data structure allowing for multiple dimensions to "e added to a traditional two5dimensional ta"le% A) O A- Cu"e B) #ata mining C) #imensions #) O A- ser$er *3) Analy(ing data on su"sets of dimensions Csuch as "y product type or region only for the second Euarter of &88B) is called) A) data mining B) association disco$ery C) drilling down #) slicing and dicing *:) ++++++++ complements O A- in that it pro$ides capa"ilities for disco$ering JhiddenJ predicti$e relationships in the data% A) An O A- cu"e B) An O A- ser$er C) #rilling down #) #ata mining *<) ++++++++ is an important preparatory step to running data5mining algorithms% A) Association disco$ery B) >eEuence disco$ery C) Clustering #) #ata reduction *@) ++++++++ is used when certain groups CJclassesJ) are !nown "eforehand and records are segmented into these classes% A) Association disco$ery B) >eEuence disco$ery C) Clustering #) Classification

&8

*B) ++++++++ is a data mining techniEue used to disco$er associations o$er time% A) Association disco$ery B) >eEuence disco$ery C) Clustering #) Classification 08) ++++++++ is the process of grouping related records together on the "asis of ha$ing similar $alues for attri"utes% A) Association disco$ery B) >eEuence disco$ery C) Clustering #) Classification 01) ++++++++ is a data mining techniEue used to find correlations among a set of data% A) Association disco$ery B) >eEuence disco$ery C) Clustering #) Classification 0&) 4n O A-9 ++++++++ Csometimes called facts) are the $alues or num"ers the user wants to analy(e9 such as the sum of sales or the num"er of orders placed% A) dimensions B) slicing C) dicing #) measures 0*) 4n O A-9 ++++++++ pro$ide a way to summari(e the data9 such as region or time% A) dimensions B) slicing C) dicing #) measures

&1 Copyright 7 &818 -earson Education9 4nc% -u"lishing as -rentice .all

00) The goal of a management information system is to) A) automate repetiti$e information5processing acti$ities% B) support day5to5day acti$ities% C) pro$ide reports which will "e used as input to a T->% #) support the decision ma!ing associated within a functional area of the organi(ation% 03) ++++++++ and ++++++++ tools are primarily used to e;tract information from e;isting data% A) #ata miningD ad5hoc B) GorecastingD e;ecuti$e support C) 4nformationD "usiness intelligence #) 4nformationD !nowledge disco$ery 0:) E;amples of the types of acti$ities supported "y management information systems include) A) financial management and forecasting% B) long5range and strategic planning% C) payroll processing% #) product purchasing9 recei$ing and shipping% 0<) 4nputs to a management information system are data produced "y aCn) ++++++++ system9 other internal data and ad hoc reEuests for special reports or summaries% A) e;pert B) transaction processing C) e;ecuti$e information #) decision support 0@) The processing aspect of a management information system focuses on) A) data sorting and summaries% B) data summaries and graphical interpretations% C) data summaries and simulations% #) data aggregation and summaries%

&&

0B) ++++++++ systems consist of technology and the people needed to consolidate information and to support managers at the highest le$el of the organi(ation% A) 6anagement information B) Transaction processing C) E;ecuti$e information #) #ecision support 38) An e;ecuti$e information system does NOT support) A) long5range and strategic planning% B) crisis management% C) staffing and la"or relations% #) manufacturing planning and scheduling% 31) An e;ecuti$e information system consists of) A) software and hardware% B) data and procedures% C) people% #) All of the a"o$e% 3&) ower5le$el ++++++++ generate much of the hard data pro$ided "y an E4>% A) 64>s and #>>s B) T->s and #>>s C) 64>s and T->s #) #>>s9 64>s and T->s 3*) A challenge of the e;ecuti$e information system is to pro$ide timely ++++++++ information to e;ecuti$e decision ma!ers% A) soft B) day5to5day C) hard #) None of the a"o$e% 30) The processing aspect of an e;ecuti$e information system focuses on) A) data sorting and summaries% B) data summaries and graphical interpretations% C) data summaries and simulations% #) data aggregation and summaries%

&* Copyright 7 &818 -earson Education9 4nc% -u"lishing as -rentice .all

33) >ome e;amples of "oundary5spanning systems are) A) decision support systems9 e;pert systems and office automation systems% B) transaction processing systems9 management information systems and e;ecuti$e information systems% C) decision support systems9 e;pert systems and e;ecuti$e information systems% #) transaction processing systems9 management information systems and office automation systems% 3:) ++++++++ systems are special5purpose information systems designed to support the decision ma!ing related to a particular recurring pro"lem in the organi(ation% A) E;pert B) Office automation C) #ecision support #) Gunctional area information 3<) #>>s are typically used "y managerial5le$el employees to help them sol$e ++++++++ pro"lems9 such as sales and resource forecasting% A) simple B) comple; C) semistructured #) structured 3@) A #>> is created to "e aCn) ++++++++ decision aid% A) passi$e B) interacti$e C) analytic #) professional 3B) #ecision support systems ena"le managers to e;amine alternati$e solutions to a pro"lem $ia ++++++++ analyses% A) what5if B) simulation C) O A#) interacti$e

&0

:8) An e;ample of a decision analysis tool which is widely used with a #>> is) A) 6icrosoft E;cel% B) 6icrosoft -ower-oint% C) 6icrosoft Word% #) 6icrosoft Gront-age% :1) What5if analysis allows the manager to ma!e ++++++++ changes to the data associated with a pro"lem and o"ser$e how these changes influence the results% A) real B) comple; C) scheduled #) hypothetical :&) The outputs of a #>> include) A) summary reports and trend analysis% B) e;ception and scheduled reports% C) recommendations or ad$ice% #) te;tual and graphical reports% :*) Common #>> models in accounting do NOT include) A) cost analysis% B) auditing% C) payroll and deductions% #) "udgeting% :0) ++++++++ systems are used to mimic human e;pertise "y manipulating !nowledge rather than simply information% A) 4ntelligent B) Office automation C) #ecision support #) Gunctional area information :3) Gunctional area information systems are ++++++++ le$el information systems that are designed to support a discrete area of an organi(ation% A) managerial B) e;ecuti$e C) cross5organi(ational #) operational

&3 Copyright 7 &818 -earson Education9 4nc% -u"lishing as -rentice .all

::) -eople in the ++++++++ function focus on the acti$ities that promote the organi(ation and its products in a way that attracts and retains customers% A) finance B) mar!eting C) accounting #) production :<) Typical information systems in mar!eting do NOT include) A) mar!et research and analysis% B) pricing and sales analysis% C) product location analysis% #) customer ser$ice trac!ing% :@) ACn) ++++++++ is a way of encoding !nowledge after collecting information from a user% A) fact B) rule C) information #) statement :B) 2ules in an e;pert system are typically e;pressed using aCn) ++++++++ format% A) if5then B) what5if C) for5ne;t #) None of the a"o$e% <8) E;amples of the types of acti$ities that can "e supported "y e;pert systems include) A) medical diagnosis and computer user help des!% B) payroll processing and in$entory management% C) ad$ertising and product pricing% #) financial management and forecasting% <1) ++++++++ consists of matching facts and rules9 determining the seEuence of Euestions and drawing a conclusion% A) #eduction B) 4nferencing C) -lanning #) None of the a"o$e%
&:

<&) The output from an e;pert system includes) A) aggregated data B) a trend analysis% C) a report% #) recommendations% <*) To "e competiti$e9 organi(ations need) A) to "ring together people who ha$e the appropriate set of !nowledge and s!ills into teams% B) to ensure that people in teams ha$e the !nowledge and s!ills to sol$e pro"lems Euic!ly and easy% C) to form teams with the right com"inations of people% #) All of the a"o$e% <0) >ome of the technologies that are most suita"le for "eing used "y mem"ers of $irtual teams include) A) pagers% B) E5mails% C) $ideoconferencing and groupware% #) fa; machines% <3) ++++++++ is the second generation of $ideo communication that allows the users to see a li$e picture of the personCs) they are tal!ing to with the phone calls% A) >tand5alone $ideoconferencing B) /roupware C) Electronic meeting system #) #es!top $ideoconferencing <:) ++++++++ is an e;ample of a groupware product that ena"les people to wor! together more effecti$ely% A) 6icrosoft Gront-age B) otus Notes C) EF>O> #) 4nfogate

&< Copyright 7 &818 -earson Education9 4nc% -u"lishing as -rentice .all

<<) >ome typical uses for an electronic meeting system do NOT include) A) mar!eting focus groups% B) Euality impro$ement% C) emergency management% #) strategic planning sessions% <@) The "enefits of groupware include all of the following EFCE-T) A) it allows larger groups to participate% B) it automatically records mem"er ideas and comments9 and allows foe anonymity% C) it allows easy access to e;ternal electronic data and files that can "e easily distri"uted to participants% #) document preparation% <B) /roupware supports) A) same time9 same place meetings% B) same time9 different place meetings% C) different time9 different place meetings% #) All of the a"o$e% @8) =irtual teams typically conduct) A) same time9 same place meetings% B) same time9 different place meetings% C) different time9 different place meetings% #) All of the a"o$e% @1) We"5"ased implementations are supporting ++++++++ meetings in which group mem"ers access the E6> software from their computers in their offices or from home% A) distri"uted B) asynchronous C) multi5functional #) traditional

&@

@&) Are of the following are "enefits to !nowledge management systems EFCE-T) A) enhanced inno$ation and creati$ity% B) enhanced employee retention% C) impro$ed organi(ational performance% #) getting employee "uy5in% @*) Are of the following are challenges to !nowledge management systems EFCE-T) A) getting employee "uy5in% B) focusing too much on technology% C) forgetting the goal% #) enhanced employee retention% @0) Mnowledge management is) A) the processes that an organi(ation uses to gain the greatest $alue from its !nowledge assets% B) the e;ecuti$e team in an organi(ation in charge of data% C) the e;ecuti$e team in charge of the !nowledge wor!ers% #) the e;ecuti$e team who creates data% @3) Mnowledge that can "e documented9 archi$ed9 and codified is called) A) e;plicit !nowledge% B) tacit !nowledge% C) "est practices% #) implicit !nowledge% @:) Mnowledge that reflects processes and procedures that are located in a personAs mind is called) A) e;plicit !nowledge% B) tacit !nowledge% C) "est practices% #) implicit !nowledge% @<) ++++++++ are commonly used to present summary information used "y managers and e;ecuti$es to ma!e decisions% A) O A- cu"es B) #igital dash"oards C) Mnowledge management systems #) Transaction processing systems
&B Copyright 7 &818 -earson Education9 4nc% -u"lishing as -rentice .all

@@) A ++++++++ is a system for creating9 storing analy(ing and managing geo5 spatial information% A) digital dash"oard B) geographic information system C) !nowledge management system #) transaction processing system @B) All of the following analyses can "e performed with geographic information systems EFCE-T) A) customer dot mapping% B) trend analysis% C) trade area analysis% #) thematic mapping%

Chapter Building !rgani"ational #artnerships Using Enterprise Information Systems 1) Applications running on different computing platforms are not desira"le "ecause) A) they are difficult to integrate% B) data cannot "e readily shared "etween systems% C) the same pieces of data may "e stored in se$eral $ersions throughout the organi(ation% #) All of the a"o$e% &) ++++++++ information systems are information systems that allow companies to integrate information across operations on a company5wide "asis% A) 6anagement B) E;ecuti$e C) Enterprise5wide #) Gunctional area

*8

*) The emergence of the 4nternet and We" has resulted in ++++++++9 opening up new opportunities and methods for conducting "usiness% A) the glo"ali(ation of customer and supplier networ!s B) the integration of customer and supplier networ!s C) delineating the customer and supplier networ!s #) the integration of all "usiness processes within an organi(ation 0) Enterprise systems can help companies find inno$ati$e ways to conduct "usiness9 which lead to se$eral ad$antages% These ad$antages do NOT include) A) an increase in the accuracy of on5time shipments% B) a decrease in the num"er of anticipated surprises% C) tremendous inefficiencies within an organi(ation% #) an increase in customer satisfaction% 3) One of the most important factors when deciding to implement enterprise solutions in$ol$es) A) selecting applications that meet the reEuirements of the "usiness% B) implementing applications that meet the reEuirements of the customers and suppliers% C) selecting and implementing applications that meet the reEuirements of the "usiness9 as well as its customers and suppliers% #) selecting the customers and suppliers to wor! with% :) An information system can "e used to support a "illing process which would lead to) A) reduced use of paper% B) less handling of paper% C) reduced material and la"or costs% #) All of the a"o$e% <) At ++++++++ of the "usiness process in an organi(ation9 $alue is added in the form of wor! performed "y people associated with that process and new9 useful information is generated% A) some stages B) successi$e stages C) each stage #) $arious stages

*1 Copyright 7 &818 -earson Education9 4nc% -u"lishing as -rentice .all

@) E;ternally focused systems coordinate "usiness acti$ities with) A) customers% B) suppliers% C) "usiness partners% #) All of the a"o$e% B) The !ey purpose of aCn) ++++++++ system is to streamline the flow of information from one companyAs operations to anotherAs% A) intraorgani(ational B) operational C) management information #) interorgani(ational 18) >haring ++++++++ "etween organi(ations helps companies to adapt more Euic!ly to changing mar!et conditions% A) information B) operations C) management #) pac!ages 11) ++++++++ can "e accomplished "y integrating multiple "usiness processes in ways that ena"le firms to meet a wide range of uniEue customer needs% A) Competiti$e ad$antage B) Economies of scale C) -rocess reengineering #) >trategic information planning 1&) A ++++++++ refers to the flow of information through a set of "usiness acti$ities9 in which information flows through functional areas that facilitate the internal acti$ities of the "usiness% A) flow diagram B) data warehouse C) $alue chain #) companyAs in$entory

*&

1*) ++++++++ acti$ities are functional areas within an organi(ation that process inputs and produce outputs% A) Core B) 6ain C) >econdary #) >upport 10) ++++++++ in$ol$es the "usiness acti$ities associated with recei$ing and stoc!ing raw materials9 parts and products% A) 4n"ound logistics B) Operations and manufacturing C) Out"ound logistics #) 6ar!eting and sales 13) >upport acti$ities include infrastructure9 human resources9 ++++++++ and procurement% A) operations and management B) mar!eting and sales C) customer ser$ice #) technology de$elopment 1:) ++++++++ pro$ides the necessary components to facilitate a "usiness process% A) Technology de$elopment B) 4nfrastructure C) .uman resources #) -rocurement 1<) ++++++++ is classified as a support acti$ity since the primary acti$ities cannot "e accomplished without the employees to perform them% A) Technology de$elopment B) 4nfrastructure C) .uman resources #) -rocurement

** Copyright 7 &818 -earson Education9 4nc% -u"lishing as -rentice .all

1@) The ++++++++ "usiness acti$ity can le$erage information systems "y accumulating purchase orders from the different functional areas within the corporation% A) technology de$elopment B) procurement C) operations and manufacturing #) mar!eting and sales 1B) A $alue system is formed when) A) a company creates additional $alue "y integrating internal applications with suppliers9 "usiness partners and customers% B) companies connect their internal $alue chains% C) information flows from one companyAs $alue chain to another companyAs $alue chain% #) All of the a"o$e% &8) An upstream information flow consists of information that) A) is produced "y a company and sent along to another organi(ation% B) is recei$ed from another organi(ation% C) is produced "y one department and sent along to other departments% #) is passed on to the companyAs distri"utors and customers% &1) The ++++++++ information flow consists of information that is recei$ed from another organi(ation% A) upstream B) downstream C) $alue system #) internally5focused &&) ++++++++ systems are highly useful for standardi(ed9 repetiti$e tas!s such as ma!ing entries in a chec! register% A) -ac!aged B) >tand5alone C) E;pert #) Custom

*0

&*) 4f pac!aged applications cannot meet the reEuirements of the "usiness9 the managers must conduct a ++++++++ analysis to ensure that ta!ing the custom application approach will pro$e worthwhile to the company% A) what5if B) cost5"enefit C) earned $alue #) None of the a"o$e% &0) ++++++++ applications are systems that focus on the specific needs of indi$idual departments and are not designed to communicate with other systems of the organi(ation% A) -ac!aged B) Custom C) >tand5alone #) 4nternally5focused &3) ++++++++ systems are older systems that are close to or at the end of their useful life% A) -ac!aged B) egacy C) Con$ersion #) 4nternally5focused &:) 4n most organi(ations9 each department implements applications to assist it with its daily "usiness acti$ities9 and as a result9 these applications tend to "e) A) similar in each department% B) infrastructure5specific% C) run on the same platforms% #) e;ternally focused% &<) 4f the in"ound logistics and operations use different systems9 information cannot readily flow "etween these two departments% This leads to) A) a highly inefficient process for operations personnel9 who must ha$e access to two systems in order to get "oth the order entry and in$entory information% B) inaccurate and outdated data since in$entory information may "e stored in "oth systems% C) unnecessary costs associated with entering9 storing and updating data redundantly% #) All of the a"o$e%
*3 Copyright 7 &818 -earson Education9 4nc% -u"lishing as -rentice .all

&@) The process of con$ersion transfers information stored on legacy systems to a new9 integrated computer platform9 which typically comes in the form of) A) Enterprise 2esource -lanning% B) >upply Chain 6anagement% C) Customer 2elationship 6anagement% #) Total Nuality 6anagement% &B) Customer 2elationship 6anagement applications concentrate on the ++++++++ integrating the $alue chains of a company and its distri"utors% A) upstream information flows B) legacy systems C) e;ternally focused systems #) downstream information flows *8) 4f the $anilla $ersion of an E2- system does not support a certain "usiness process9 the software may reEuire ++++++++ to accommodate it% A) customi(ations B) integrations C) differentiations #) modifications *1) Companies must ta!e special care when dealing with customi(ation issues "ecause) A) customi(ations can "e costly% B) maintaining and upgrading customi(ations can "e trou"lesome% C) new $anilla $ersions must "e continually upgraded to accommodate the customi(ation% #) All of the a"o$e% *&) 4ndustry standard "usiness processes are called) A) wor!flow management% B) functional process impro$ement% C) "est practices% #) customer relationship management%

*:

**) Altering the way in which "usiness processes are conducted is !nown as) A) Business -rocess 6anagement% B) >upply Chain 6anagement% C) Customer 2elationship 6anagement% #) Enterprise 2esource -lanning% *0) A radical redesign of an organi(ation is sometimes necessary to) A) lower costs and increase Euality% B) de$elop an organi(ational $ision% C) create "est practices% #) focus on incremental changes% *3) #ata warehouses are data"ases that store information) A) related to a specific department% B) reEuired for a specific "usiness acti$ity% C) related to the $arious "usiness acti$ities of an organi(ation% #) that is outdated% *:) 4n contrast to ++++++++9 E2- applications ma!e accessing information easier "y pro$iding a central information repository% A) legacy systems B) custom applications C) pac!aged applications #) data warehouses *<) 62- stands for) A) 6ost 2apid -erformance% B) 6ultiple 2esource -lanning% C) 6aterial 2eEuirements -lanning% #) 6aterial 2esource -lanning% *@) E2- applications that access the data warehouses are designed to ha$e) A) a different loo! and feel9 depending of the uniEue needs of a particular department% B) the same loo! and feel9 regardless of the uniEue needs of a particular department% C) a $arying loo! and feel9 depending on the needs of the organi(ation% #) different user interfaces to access different pieces of information%

*< Copyright 7 &818 -earson Education9 4nc% -u"lishing as -rentice .all

*B) 6icrosoft Word and 6icrosoft E;cel ha$e similar ++++++++ and simply differ in the features and functionality that each application offers% A) operations screens B) user interfaces C) capa"ilities #) None of the a"o$e% 08) Among the most pre$ailing issues facing management when selecting an E2application are) A) control% B) "usiness reEuirements% C) "est practices% #) All of the a"o$e% 01) Companies typically either opt for ++++++++ control or allow particular "usiness units to go$ern themsel$es% A) distri"uted B) decentrali(ed C) centrali(ed #) shared 0&) One of the areas related to control in$ol$es the consistency of) A) "usiness acti$ities% B) policies and procedures% C) transactions in$ol$ed in each department% #) legacy systems used in each department% 0*) E2- core components include all of the following EFCE-T) A) financial management% B) operations management% C) human resources management% #) supply chain management%

*@

00) 4n todayAs highly competiti$e mar!ets9 ++++++++ hold the "alance of power "ecause9 if they "ecome dissatisfied with the le$els of ser$ice they are recei$ing9 there are many alternati$es readily a$aila"le to them% A) suppliers B) customers C) "usiness partners #) competitors 03) Applications focusing on downstream information flows ha$e two main o"1ecti$esto attract potential customers and) A) create customer loyalty% B) de$elop and maintain customer satisfaction% C) achie$e competiti$e ad$antage% #) None of the a"o$e% 0:) ++++++++ is a corporate5le$el strategy concentrating on the downstream information flows% A) Business -rocess 6anagement B) >upply Chain 6anagement C) Customer 2elationship 6anagement #) Enterprise 2esource -lanning 0<) Companies need to ha$e aCn) ++++++++ system that captures information from retail stores9 We" sites9 call centers and $arious other ways that organi(ations can communicate downstream within their $alue chain% A) distri"uted B) impro$ed C) integrated #) internally5focused 0@) C26 applications are commonly integrated with E2- to le$erage ++++++++ information to ser$e customers% A) internal B) e;ternal C) internal or e;ternal #) internal and e;ternal

*B Copyright 7 &818 -earson Education9 4nc% -u"lishing as -rentice .all

0B) The National Nuality 2esearch Center estimates that a one percent increase in customer satisfaction can lead to aCn) ++++++++ increase in a companyAs mar!et capitali(ation% A) twofold B) considera"le C) threefold #) insignificant 38) A successful C26 strategy must include) A) policy and "usiness process changes% B) customer ser$ice changes% C) employee training changes% #) All of the a"o$e% 31) A comprehensi$e C26 system includes) A) operational C26% B) analytical C26% C) colla"orati$e C26% #) All of the a"o$e% 3&) Operational C26 is commonly referred to as ++++++++ system% A) front5office B) "ac!5office C) internal #) e;ternal 3*) Analytical C26 is commonly referred to as ++++++++ system% A) front5office B) "ac!5office C) internal #) e;ternal 30) An operational C26 system includes) A) >GA% B) E66% C) C>>% #) All of the a"o$e%

08

33) ++++++++ applications pro$ide support for the day5to5day sales acti$ities of an organi(ation% A) Customer 2elationship 6anagement B) >ales Gorce Automation C) >upply Chain 6anagement #) Enterprise 2esource -lanning 3:) >uccessful C>> systems ena"le) A) faster response times% B) increased first5contact resolution rates% C) impro$ed producti$ity for ser$ice and support personnel% #) All of the a"o$e% 3<) An Enterprise 6ar!eting 6anagement system pro$ides a comprehensi$e $iew of the) A) competitors% B) industry trends% C) en$ironmental factors% #) All of the a"o$e% 3@) ++++++++ refers to systems for pro$iding effecti$e and efficient communication with the customer from the entire organi(ation% A) Operational C26 B) Analytical C26 C) Colla"orati$e C26 #) E;ecutional C26 3B) At the heart of the ++++++++ is the C4C% A) operational C26 B) analytical C26 C) colla"orati$e C26 #) e;ecutional C26

01 Copyright 7 &818 -earson Education9 4nc% -u"lishing as -rentice .all

:8) The term ++++++++ is commonly used to refer to the producers of supplies that a company uses% A) supply networ! B) $alue system C) supply chain #) $alue chain :1) A more descripti$e term to descri"e the flow of materials from suppliers to a company is ++++++++ "ecause multiple suppliers are in$ol$ed in the process of ser$icing a single organi(ation% A) supply networ! B) $alue system C) supply chain #) $alue chain :&) -ro"lems such as e;cessi$e in$entories9 inaccurate manufacturing capacity plans and missed production schedules can run rampant when) A) more and more suppliers are in$ol$ed in a supply networ!% B) there is a one5to5one relationship "etween the supplier and a company% C) firms within a supply networ! do not colla"orate effecti$ely% #) multiple suppliers ser$ice a single organi(ation% :*) Applications focusing on ++++++++ information flows ha$e two main o"1ecti$esto accelerate product de$elopment and to reduce costs associated with procuring raw materials9 components and ser$ices from suppliers% A) internally5focused B) downstream C) upstream #) integrated :0) i!e E2- and C26 applications9 >C6 pac!ages are deli$ered in the form of ++++++++9 which companies select and implement according to their "usiness reEuirements% A) components B) solutions C) modules #) systems

0&

:3) >upply chain planning includes all of the following EFCE-T) A) demand planning and forecasting% B) distri"ution planning% C) production scheduling% #) supply chain e;ecution% ::) >A-As colla"orati$e fulfillment module does NOT include the following functions) A) committing to deli$ery dates in real time% B) fulfilling orders from channels on time with order management9 transportation planning and $ehicle scheduling% C) sharing information and integrating processes up and down the supply chain% #) supporting the entire logistics process9 including pic!ing9 pac!ing9 shipping and international acti$ities% :<) The supply chain ++++++++ module in >C6 pac!ages allows a company to monitor e$ery stage of the supply chain process9 from price Euotation to the moment the customer recei$es the products and issue alerts when pro"lem arise% A) colla"oration B) e$ent management C) e;change #) performance management :@) The supply chain ++++++++ module in >C6 pac!ages reports !ey measurements in the supply chain% A) colla"oration B) e$ent management C) e;change #) performance management :B) ++++++++ refers to the mo$ement of goods from the supplier to production% A) -roduct flow B) 4nformation flow C) #ata flow #) Ginancial flow

0* Copyright 7 &818 -earson Education9 4nc% -u"lishing as -rentice .all

<8) ++++++++ refers to the mo$ement of information along the supply chain% A) -roduct flow B) 4nformation flow C) #ata flow #) Ginancial flow <1) >upply chain ++++++++ is the e;tent to which a companyAs supply chain is focusing on ma;imi(ing customer ser$ice% A) effecti$eness B) efficiency C) integration #) None of the a"o$e% <&) Enterprise portals can "e defined as ++++++++ through which a "usiness partner accesses secured9 proprietary information from an organi(ation% A) intranets B) access points C) "ac! doors #) tunnels <*) ++++++++ automate the "usiness processes in$ol$ed in selling or distri"uting products from a single supplier to multiple "uyers% A) #istri"ution portals B) -rocurement portals C) Enterprise portals #) 2esource portals <0) ++++++++ are designed to automate the "usiness processes that occur "efore9 during9 and after sales ha$e "een transacted "etween a supplier and multiple customers A) 2esource portals B) -rocurement portals C) #istri"ution portals #) Enterprise portals

00

<3) ++++++++ are designed to automate the "usiness processes that occur "efore9 during and after sales ha$e "een transacted "etween a "uyer and multiple suppliers% A) -rocurement portals B) 2esource portals C) Enterprise portals #) #istri"ution portals <:) Another term for an electronic mar!etplace is) A) trading e;change% B) trading floor% C) electronic e;change% #) multimedia mar!etplace% <<) ++++++++ are operated "y third5party $endors9 meaning that they are "uilt and maintained "y a particular company% A) Electronic e;changes B) Trading e;changes C) 6ultimedia mar!etplaces #) 2esource mar!etplaces <@) ++++++++ allows We" page designers to create customi(ed tags that specify how the document should "e formatted% A) .T6 B) FB2 C) F6 #) W*C <B) ++++++++ is an F6 5"ased specification for pu"lishing financial information% A) .T6 B) FB2 C) E#4 #) W*C

03 Copyright 7 &818 -earson Education9 4nc% -u"lishing as -rentice .all

@8) ++++++++ technology uses electromagnetic or electrostatic coupling to transmit signals% A) 2GE# B) FB2G C) FB2 #) 2G4# @1) ++++++++ 2G4# tags are small and relati$ely ine;pensi$e9 and typically ha$e a range up to a few feet% A) Acti$e B) -assi$e C) >imple #) Basic @&) The implementations of enterprise systems are often ++++++++ originally en$isioned% A) more costly and more time consuming than B) as costly and time consuming as C) not as effecti$e as #) less e;pensi$e than @*) A recent sur$ey suggested that ++++++++ percent of companies that underta!e enterprise system implementations do not fully reali(e the results they had hoped% A) 18 to &8 B) *8 to 08 C) 08 to :8 #) :8 to @8 @0) One of the recommendations related to enterprise system implementations includes ta!ing a ++++++++ approach to implementations% A) organi(ational B) multidisciplinary C) internally5focused #) thorough

0:

@3) The primary reason that enterprise system implementations fail is "elie$ed to "e a direct result of lac! of ++++++++ management support% A) top5le$el B) managerial le$el C) organi(ational le$el #) operational le$el @:) ++++++++ is often the most o$erloo!ed9 underestimated and poorly "udgeted e;pense in$ol$ed in planning enterprise system implementations% A) Customi(ation B) Training C) E;ecuti$e sponsorship #) .elp from outside e;perts @<) Enterprise systems affect the entire organi(ation and9 thus9 companies should include personnel from ++++++++ in the implementation pro1ect% A) different le$els in the same department B) the same le$el in different departments C) the e;ecuti$e le$el #) different le$els and departments

Chapter $% &e'eloping and (c)uiring Information Systems 1) 4> spending in most organi(ations is controlled "y) A) specific "usiness functions% B) mar!eting% C) human resources% #) accounting% &) >ystems analysis and design in$ol$es) A) designing% B) "uilding% C) maintenance% #) All of the a"o$e%

0< Copyright 7 &818 -earson Education9 4nc% -u"lishing as -rentice .all

*) Organi(ations should hire systems analyst who) A) ha$e technical e;pertise% B) ha$e management e;pertise% C) ha$e technical and management e;pertise% #) ha$e financial e;pertise% 0) The programmersA discipline of common methods and techniEues is called) A) systems analysis% B) software engineering% C) transforming information systems% #) systems de$elopment% 3) The information systems de$elopment approach is) A) open% B) structured% C) not hierarchical% #) undisciplined% :) >ystems analysts must "ecome adept at ++++++++ pro"lems into multiple small programs% A) coding B) ma!ing C) decomposing #) turning <) The !ey to 4T pro1ect success is) A) e$eryone in$ol$ed with the pro1ect performing their 1o"s% B) programmers understanding the reEuirements% C) users understanding what they want% #) a close and mutually respectful wor!ing relationship "etween the users and the analysts% @) ># C is short for) A) systems de$elopment learning cycle% B) systems deployment learning cycle% C) systems de$elopment life cycle% #) systems deployment life cycle%

0@

B) The fi$e phases of the ># C in order from first to last are) A) planning and selection9 analysis9 design9 implementation and maintenance% B) analysis9 planning and selection9 design9 implementation and maintenance% C) planning and selection9 design9 analysis9 implementation and maintenance% #) analysis9 design9 planning and selection9 implementation and maintenance% 18) The first phase of the ># C includes) A) identification and analysis% B) design of system% C) systems analysis% #) planning and selection% 11) The goal of systems planning and selection is) A) to identify a pro1ect from all possi"le pro1ects that could "e performed% B) to identify and purchase a pro1ect from all possi"le pro1ects that could "e performed% C) to identify and select a pro1ect from all possi"le pro1ects that could "e performed% #) None of the a"o$e% 1&) >ome organi(ations ha$e a formal ++++++++ process where"y a senior manager9 a "usiness group9 an 4> manager9 and other committee mem"ers identify and assess all possi"le systems de$elopment pro1ects that an organi(ation could underta!e% A) information systems planning B) steering committee C) information systems purchasing #) implementation committee 1*) -ro1ects identified "y top management tend to ha$e a) A) strategic organi(ational focus% B) financial focus% C) production focus% #) di$erse focus%

0B Copyright 7 &818 -earson Education9 4nc% -u"lishing as -rentice .all

10) -ro1ects identified "y steering committees tend to ha$e a) A) financial focus% B) .2 focus% C) cross5functional focus% #) narrow focus% 13) -ro1ects identified "y "usiness units tend to ha$e a) A) financial focus% B) tactical focus% C) production focus% #) .2 focus% 1:) ++++++++ are criteria used "y organi(ations to e$aluate whether to accept or re1ect a pro1ect% A) >trategic alignments and ris!s B) -otential "enefits and pro1ect si(e C) -otential costs and resource a$aila"ility #) All of the a"o$e% 1<) The purpose of the analysis phase is for) A) users to formali(e the procedures and methods used in performing tas!s% B) designers to gain a thorough understanding of an organi(ationAs current way of doing things% C) designers to layout design procedures% #) management to determine which features are desired% 1@) The collection and structuring of ++++++++ is argua"ly the most important acti$ity in systems de$elopment% A) system reEuirements B) system design C) system implementation #) system identification

38

1B) ++++++++ is the process of gathering and organi(ing information form users9 managers9 "usiness processes9 and documents to understand how a proposed information system should function% A) #esign analysis B) 2eEuirements collection C) >ystem identification #) None of the a"o$e% &8) >ystems analysts use ++++++++ for collecting system reEuirements% A) only inter$iews and o"ser$ations B) only inter$iews9 Euestionnaires9 and o"ser$ations C) only inter$iews9 Euestionnaires9 document analysis9 and o"ser$ations #) inter$iews9 Euestionnaires9 document analysis9 o"ser$ations9 and pro"lem decomposition &1) ++++++++ is,are important to disco$er issues9 policies and rules as well as concrete e;amples of the use of data and information in the organi(ation% A) 4nter$iews B) #ocument analysis C) O"ser$ations #) Nuestionnaires &&) C>G is short for) A) Crucial >uccess Gunction% B) Crucial >uccess Gactor% C) Critical >uccess Gunction% #) Critical >uccess Gactor% &*) 4n determining the C>Gs of an organi(ation9 the analyst must determine) A) managementAs C>Gs% B) organi(ational and indi$idual C>Gs% C) organi(ational9 departmental and indi$idual C>Gs% #) organi(ational9 managerial and departmental C>Gs%

31 Copyright 7 &818 -earson Education9 4nc% -u"lishing as -rentice .all

&0) ++++++++ is a special type of group meeting in which all or most of the users meet with the analyst at the same time% A) >ystems analysis B) 4nter$iews C) C>G #) PA# &3) ++++++++ are facts that descri"e people9 o"1ects or e$ents% A) ogic B) Nouns C) #ata #) >alient &:) Analysts use ++++++++ to collect and descri"e the data to users9 so as to confirm that all needed data are !nown and presented to uses as useful information% A) PA# B) data modeling tools C) C>G #) All of the a"o$e% &<) A type of data model that shows the relationships "etween entities is aCn)) A) logical diagram% B) E2#% C) data flow diagram% #) 4>#% &@) ++++++++ representCs) the mo$ement of data through an organi(ation or within an information system% A) -rocessing logic B) >ystem design C) >ystem logic #) #ata flows &B) ++++++++ representCs) the way in which data are transformed% A) -rocessing logic B) >ystem design C) >ystem logic #) #ata flows

3&

*8) The steps and procedures which transform raw data inputs into new or modified information are,is the) A) processing operation% B) processing and logic operations% C) data"ase management system% #) files% *1) Analysts must identify the following !ey elements "efore they de$elop designs for an information system) A) data flows9 data9 and processing logic% B) data9 data flows9 and E2#s% C) data flows9 data9 E2#s9 and processing logic% #) data9 data flows9 reEuirements9 and processing logic% *&) #uring the ++++++++ phase the details of the chosen approach are de$eloped% A) processing logic B) system design C) system logic #) data flows **) The elements that must "e designed when "uilding a system include) A) forms9 reports and data"ases% B) interfaces and dialogues% C) processing and logic% #) All of the a"o$e% *0) A ++++++++ is a "usiness document containing some predefined data and often some spaces for additional information% A) form B) report C) dialogue #) file *3) A ++++++++ is a "usiness document containing only predefined data% A) form B) report C) dialogue #) file

3* Copyright 7 &818 -earson Education9 4nc% -u"lishing as -rentice .all

*:) 4nterfaces that ena"le the user to select pictures9 icons9 and menus to send instructions to the computer are referred to as) A) data"ase systems% B) /'4s% C) information system software% #) files% *<) After the conceptual model has "een completed using an entity5relation diagram9 it can "e easily translated into a physical data model in a) A) form% B) report% C) data"ase management system% #) file% *@) One way of representing the logic and steps needed to perform calculations is to use) A) flow charts% B) hierarchy charts% C) -5charts% #) pseudocode% *B) >ome of the acti$ities which ta!e place during this phase include) system con$ersion9 software programming and testing9 documentation9 training and support% A) >ystem implementation B) >ystem design C) -rogramming #) >ystem logic 08) ++++++++ is the processes of transforming the system design into a wor!ing computer system% A) -rocessing logic B) >ystem design C) -rogramming #) >ystem logic

30

01) ++++++++ is testing correctness of indi$idual models and the integration of multiple modules% A) Alpha testing B) Beta testing C) #e$elopmental testing #) >ystems testing 0&) ++++++++ is testing the o$erall system to see whether it meets design reEuirements% A) Alpha testing B) Beta testing C) #e$elopmental testing #) >ystems testing 0*) ++++++++ is testing of the capa"ilities of the system in the user en$ironment with actual data% A) Alpha testing B) Beta testing C) #e$elopmental testing #) >ystems testing 00) 4n addition to ha$ing good communication s!ills and "eing good at pro"lem sol$ing9 support personnel must also) A) understand the "usiness processes% B) ha$e programming s!ills% C) "e e;pert users of the system% #) "e a de$eloper% 03) The process of decommissioning the current system and installing the new system in the organi(ation is called) A) systems con$erting% B) systems con$ersion% C) systems contracting% #) systems analysis%

33 Copyright 7 &818 -earson Education9 4nc% -u"lishing as -rentice .all

0:) The four types of software con$ersion strategies include) A) parallel9 direct9 phased9 and pilot% B) identification9 analysis9 implementation9 and maintenance% C) reference9 discontinued9 installation9 single location% #) reuse9 discontinued9 implementation9 single location% 0<) After an information system is installed it is in the) A) analysis phase% B) de$elopment phase% C) testing phase% #) maintenance phase% 0@) Who is usually responsi"le for collecting maintenance reEuests from systems users after the new system has "een installed? A) A mem"er of the de$elopment team B) .elp des! personnel C) 4nformation center personnel #) All of the a"o$e% 0B) 4t is during the ++++++++ that the largest part of the system de$elopment occurs% A) analysis phase B) de$elopment phase C) testing phase #) maintenance phase 38) The four types of system maintenance referenced in the "oo! are) A) de$elopmental9 correcti$e9 perfecti$e and pre$entati$e% B) correcti$e9 adapti$e9 perfecti$e and pre$entati$e% C) de$elopmental9 correcti$e9 adapti$e and pre$entati$e% #) de$elopmental9 adapti$e9 perfecti$e and pre$entati$e% 31) ++++++++ maintenance is ma!ing changes to an information system to repair flaws in the design9 coding or implementation% A) Correcti$e B) Adapti$e C) -erfecti$e #) -re$entati$e

3:

3&) ++++++++ maintenance is ma!ing changes to an information system to reduce the chance of future system failure% A) Correcti$e B) Adapti$e C) -erfecti$e #) -re$entati$e 3*) ++++++++ maintenance is ma!ing changes to an information system to e$ol$e its functionality to accommodate changing "usiness needs or to migrate it to a different operating en$ironment% A) Correcti$e B) Adapti$e C) -erfecti$e #) -re$entati$e 30) 6a!ing enhancements to impro$e processing performance or interface usa"ility9 or adding desired "ut not necessarily reEuired systems features is) A) correcti$e maintenance% B) adapti$e maintenance% C) perfecti$e maintenance% #) pre$entati$e maintenance% 33) This type of systems de$elopment methodology uses a trial and error approach for disco$ering how a system could operate% A) -rototyping B) 2A# C) PA# #) O"1ect5oriented analysis and design 3:) 'sing this type of de$elopment methodology the people "uilding the system and the users of the system !eep cycling "etween user design and construction until the system is complete% A) -rototyping B) 2A# C) PA# #) O"1ect5oriented analysis and design

3< Copyright 7 &818 -earson Education9 4nc% -u"lishing as -rentice .all

3<) ++++++++ tools are used to structure and de$elop prototypes Euic!ly% A) -rototyping B) CA>E C) PA# #) O"1ect5oriented analysis and design 3@) 'sing this type of de$elopment methodology9 analysts identify common modules that com"ine the data and the operations to "e performed% A) -rototyping B) 2A# C) PA# #) O"1ect5oriented analysis and design 3B) This approach ena"les the reuse of common modules% A) -rototyping B) 2A# C) CA>E #) O"1ect5oriented analysis and design :8) A common reason for organi(ations "uilding their own 4> systems is) A) limited 4> staff% B) 4> staff has limited s!ills% C) 4> staff is o$erwor!ed% #) All of the a"o$e% :1) A common alternati$e to in5house systems de$elopment is) A) e;ternal acEuisition% B) outsourcing% C) end5user de$elopment% #) All of the a"o$e% :&) A common e$aluati$e tool when using ++++++++ is to as! the $endors to set up their system so that you and your colleagues can Jtest dri$eJ the system% A) e;ternal acEuisition B) outsourcing C) end5user de$elopment #) All of the a"o$e%

3@

:*) This type of acEuisition has "een descri"ed to "e similar to purchasing a car% A) E;ternal acEuisition B) Outsourcing C) End5user de$elopment #) All of the a"o$e% :0) ACn) ++++++++ is a report which tells your $endors what your reEuirements are and to in$ite them to pro$ide information a"out how they might "e a"le to meet your reEuirements% A) proposition B) 2GC) performa #) purchase order :3) This is used when you want to e$aluate a proposed system to determine how long it ta!es to perform a specific tas! that will "e reEuired in your particular application% A) -erformance test B) Benchmar!ing program C) Test dri$e #) E$aluation test ::) Which of the following is not a commonly used criteria for e$aluating software? A) 6emory reEuirements B) Training and documentation C) Access time #) 6aintenance and repair :<) ++++++++ is the practice of turning o$er responsi"ility of some or all of the organi(ationAs information system de$elopment and operations to an outside firm% A) E;ternal acEuisition B) Outsourcing C) End5user de$elopment #) All of the a"o$e%

3B Copyright 7 &818 -earson Education9 4nc% -u"lishing as -rentice .all

:@) Organi(ations may elect to outsource "ecause of) A) cost and Euality concerns% B) supplier pressures% C) downsi(ing% #) All of the a"o$e% :B) Organi(ations may elect to outsource "ecause of) A) tension "etween end users and the in5house 4> staff% B) political and,or organi(ational pro"lems% C) B-2 or simplifying #) All of the a"o$e% <8) The single most important factor of an ongoing outsourcing alliance is) A) ongoing management% B) costs% C) personal relationships% #) organi(ational culture% <1) 6ost organi(ations enter outsourcing relationships through) A) strictly legal contracts% B) personal relationships C) mutually "eneficial relationships with strategic partners% #) recommendations from other organi(ations% <&) The types of outsourcing relationships identified are) A) "asic9 preferred and strategic% B) incidental9 preferred and strategic% C) "asic9 incidental and strategic% #) "asic9 preferred and incidental% <*) Organi(ations should try to ha$e a few ++++++++ outsourcing relationships9 in which the "uyer and the supplier set preferences and prices to the "enefit of each other% A) "asic B) incidental C) preferred #) strategic

:8

<0) 4n many organi(ations9 the growing num"er of sophisticated information systems users allows the 4> managers the option of allowing) A) e;ternal acEuisition% B) outsourcing% C) end5user de$elopment% #) All of the a"o$e% <3) #epartments can speed up de$elopment of systems "y ha$ing ++++++++ perform the reEuired de$elopment tas!s% A) consultants B) programmers C) managers #) end5users <:) Currently9 ++++++++ costs constitute the ma1ority of o$erall systems costs% A) user B) hardware C) software #) management <<) Which of the following are not reduced "y ha$ing end5users perform the systems de$elopment? A) Costs B) #e$elopment time C) >low modification times #) Wor!load <@) One of the ma1or draw"ac!s to end5user de$elopment is) A) speed% B) lac! of continuity% C) Euality% #) end5user tools% <B) Which is considered a fourth5generation tool? A) -ersonal computer tools B) Nuery language generators C) /raphics generators #) All of the a"o$e%

:1 Copyright 7 &818 -earson Education9 4nc% -u"lishing as -rentice .all

@8) Which of the following are personal computing tools? A) >N B) #ata"ase management systems C) CA>E #) #>>

Chapter $$ *anaging Information Systems Ethics and Crime 1) Guturist author Al$in Toffler descri"es three Jwa$es of change%J The third9 and "iggest wa$e of change to occur is the) A) 4nformation Age% B) 4ndustrial 2e$olution% C) Agriculture and .andwor! Age% #) 6odern Age% &) #uring the Third Wa$e9 ++++++++ "ecame the common currency% A) food B) money C) the 4nternet #) information *) -eople feeling threatened "y and protesting against or destroying technology are called) A) luddites B) technophites C) neophites #) netophites 0) -rogress during the ++++++++ "rought a"out change in the mechani(ed society9 educational9 "usiness9 social9 and religious institutions% A) 4ndustrial 2e$olution B) 4nformation Age C) Agriculture and .andwor! Age #) >pace Age

:&

3) Mnowing how to use a computer can open up myriad sources of information to those who ha$e learned how to use the computer as a de$ice to gather9 store9 organi(e9 and otherwise process information% This is called) A) computer literacy% B) computer competency% C) computer a"ility% #) computer comprehension% :) ++++++++ is an attri"ute possessed "y someone who !nows how to use a computer% A) Computer literacy B) Computer competency C) Computer a"ility #) Computer comprehension <) ++++++++ is the a"ility to independently learn new technologies as they emerge and assess their impact on oneAs wor! and life% A) Computer literacy B) Computer competency C) Computer a"ility #) Computer fluency @) The "oo! descri"es populations in terms of those people who !now how to use a computer and those who do not% The people who do not !now how to use a computer are descri"ed as the) A) information ha$es% B) information ha$e5nots% C) information donAt ha$es% #) information needy% B) The ++++++++ is the "iggest wa$e of change according to Al$in Toffler% A) Agriculture and .andwor! B) 4ndustrial 2e$olution C) 4nformation Age #) >pace Age

:* Copyright 7 &818 -earson Education9 4nc% -u"lishing as -rentice .all

18) The digital di$ide is a term that refers to the) A) gap "etween those indi$iduals who ha$e access to digital telephone technology and those who do not% B) gap "etween those indi$iduals who ha$e access to digital tele$ision technology and those who do not% C) gap "etween those computer literate indi$iduals who ha$e access to digital information resources Ce%g%9 the 4nternet) and those who do not% #) gap "etween those indi$iduals who ha$e access to information resources and those who do not% 11) The digital di$ide in the 'nited >tates is) A) growing rapidly% B) growing slowly% C) shrin!ing slowly% #) shrin!ing rapidly% 1&) /i$en the strong lin!age "etween access to computers9 computer literacy9 and a personAs a"ility to compete in the 4nformation Age9 ++++++++ is one of the ma1or ethical challenges facing society today% A) 4nformation Age B) computer literacy C) computer fluency #) the digital di$ide 1*) 4n an attempt to shrin! the digital di$ide9 a glo"al pro1ect called ++++++++ is attempting to distri"ute $ery low5cost laptop computers to children in de$eloping countries around the world% A) One aptop -er Child CO -C) B) uddites C) ow5Cost aptops C C T) #) Bridging the #igital #i$ide 10) Central to information systems ethics are) A) information pri$acy and information property% B) information accuracy and culture control% C) information accessi"ility and culture control% #) information property and information technology%

:0

13) When one descri"es the issues and standards of conduct associated with the use of information systems9 one is discussing) A) computer ethics% B) computer crime% C) computer ci$ility% #) computer hac!ing% 1:) An issue central to the de"ate on computer ethics is) A) information pri$acy% B) information accuracy% C) information property% #) All of the a"o$e% 1<) ++++++++ is concerned with what information an indi$idual should ha$e to re$eal to others in the wor!place or through other transactions9 such as online shopping% A) 4nformation pri$acy B) 4nformation accuracy C) 4nformation property #) All of the a"o$e% 1@) 4nformation pri$acy is a term that descri"es what ++++++++ an indi$idual should ha$e to re$eal to others in the course of conducting transactions or accepting employment% A) credit records B) crime records C) information #) None of the a"o$e% 1B) ++++++++ is the stealing of another personAs >ocial >ecurity num"er9 credit card num"er9 and other personal information for the purpose of using the $ictimAs credit rating to "orrow money9 "uy merchandise9 and otherwise run up de"ts that are ne$er repaid% A) 4nformation theft B) 4dentity theft C) Computer theft #) 4nformation resource theft

:3 Copyright 7 &818 -earson Education9 4nc% -u"lishing as -rentice .all

&8) One of the fastest growing JinformationJ crimes in recent years has "een) A) information theft% B) identity theft% C) computer theft% #) information resource theft% &1) ++++++++ is concerned with what information an indi$idual should ha$e to re$eal to employers% A) Computer ethics B) 4nformation pri$acy C) 4dentity theft #) 4nformation theft &&) According to the Consumer -rotection Wor!ing /roup of the American Bar Association9 a sellerAs pri$acy policy should indicate at least the following) A) what information the seller is gathering from you% B) how the seller will use this information% C) whether and how you can Jopt outJ of these practices% #) All of the a"o$e% &*) Oou can maintain your pri$acy while shopping online "y) A) choosing monitored We" sites% B) remo$ing coo!ies from your computer% C) $isiting sites anonymously% #) All of the a"o$e% &0) ++++++++ is concerned with ensuring the authenticity and fidelity of information as well as with identifying who is responsi"le for informational errors that harm people% A) 4nformation accessi"ility B) 4nformation assurance C) 4nformation accuracy #) 4nformation asserti$eness &3) ++++++++ must "e concerned with the integrity of data% A) 4nformation system designers B) 4nformation system de$elopers C) #ata entry wor!ers #) E$eryone
::

&:) The top tem dot5cons listed "y the Gederal Trade Commission include) A) real estate fraud% B) we" domain sales% C) 4nternet auctions% #) information acEuisition% &<) ++++++++ focuses on who owns information a"out indi$iduals and how information can "e sold and e;changed% A) -ersonal data B) 4nformation sensiti$ity C) 4nformation property #) 4nformation gathering &@) ++++++++ is unsolicited e5mail that promotes a product or ser$ice% A) Coo!ies B) >pyware C) >pam #) None of the a"o$e% &B) ++++++++ is any software that co$ertly gathers information a"out a user though an 4nternet connection without the userAs !nowledge% A) A $iruses B) A worms C) >pyware #) Adware *8) ++++++++ is electronic 1un! mail or 1un! newsgroup postings9 usually for the purpose of ad$ertising some product and,or ser$ice% A) >pim B) >pam C) >pyware #) Adware

:< Copyright 7 &818 -earson Education9 4nc% -u"lishing as -rentice .all

*1) ACn) ++++++++ is a message passed to a We" "rowser on a userAs computer "y a We" ser$er9 that is then stored in a te;t file "y the "rowserD that message is sent "ac! to the ser$er each time the userAs "rowser reEuests a page from that ser$er% A) identifier B) coo!ie C) message #) te;t file *&) ACn) ++++++++ is used "y a We" page to store information a"out a user on the userAs computer9 so as to pro$ide the user with personali(ed information on the ne;t $isit% A) identifier B) coo!ie C) message #) te;t file **) ++++++++ is a small te;t file on your computer that stores information a"out your We"5"rowsing acti$ity at a particular site% A) A coo!ie B) >pyware C) >pam #) >pim *0) ++++++++ is software that runs on your computer9 collecting information which is then transmitted to another party% A) Coo!ies B) >pyware C) >pam #) >pim *3) ++++++++ is a special type of technology that collects information a"out a person in order to customi(e We" "rowser "anner ad$ertisements% A) >pyware B) Adware C) Coo!ies #) >pam

:@

*:) ++++++++ the du"ious practice of registering a domain name9 then trying to sell the name to the person9 company9 or organi(ation most li!ely to want it% A) >pyware B) Cy"ersEuatting C) -hishing #) >pamming *<) ++++++++ is a term that descri"es what information a person or an organi(ation has the right to o"tain a"out others and how this information can "e accessed and used in the future% A) 4nformation accessi"ility B) 4nformation assurance C) 4nformation retrie$al #) 4nformation acEuisition *@) ++++++++ is a technological solution that allows pu"lishers to control their digital media to discourage9 limit9 or pre$ent illegal copying and distri"ution% A) #igital 2ights 6anagement B) #ata assurance C) Water mar!ing #) 4nformation securing *B) ++++++++ restrictions include which de$ices will play the media9 how many de$ices the media will play on9 and e$en how many times the media can "e played% A) #igital 2ights 6anagement B) #ata assurance C) Water mar!ing #) 4nformation securing 08) To pre$ent illegal sharing of #265free content9 media is often ++++++++ so that any illegal copy can "e traced to the original purchaser% A) #igital 2ights 6anagement C#26)ed B) data assuranced C) watermar!ed #) information secured

:B Copyright 7 &818 -earson Education9 4nc% -u"lishing as -rentice .all

01) E5mail pri$acy is) A) protected "y law% B) not protected "y law% C) a thing of the past% #) not something people are concerned with% 0&) 4n &8839 the GB4 a"andoned ++++++++ 9 which was software that allowed 4nternet traffic to "e monitored% A) T52e; B) Carni$ore C) #26 #) Blue >teel 0*) EC-A is an acronym that refers to the) A) Electronic Controls -ri$acy Act% B) Electronic Communications -ri$acy Act% C) E5Commerce Customer -rotection Association% #) Electric Computer -rotection Agency% 00) The EC-A offers stronger support for the pri$acy of ++++++++ communications than for the pri$acy of electronic mail communications% A) paper mail B) $oice mail C) facsimile #) None of the a"o$e% 03) 2elated to ethical computer use9 many "eha$iors may not "e illegal9 "ut ne$ertheless unethical% E;amples of this "eha$ior include all of the following EFCE-T) A) using computer time at wor! to read personal e5mail% B) organi(ations compiling personal information a"out shopping ha"its% C) the go$ernment regulating computer crimes% #) using technology to rearrange photographs%

<8

0:) Companies can do many things to more ethically use technologies% All of the following would "e good ways to achie$e this EFCE-T) A) de$ise guidelines for ethical use of technology% B) "e prudent and open a"out their e5mail monitoring% C) ha$e written rules regarding any monitoring that they do% #) compile information on We" preferences of customers for internal use only% 0<) The Computer Ethics 4nstituteAs responsi"le computer use guidelines prohi"it all of the following EFCE-T) A) using a computer to harm others% B) snooping in other peopleAs files% C) pro$iding assistance to others with the use of a computer% #) appropriating other peopleAs intellectual output% 0@) ++++++++ is defined as the act of using a computer to commit an illegal act% A) Computer "ad will B) Computer crime C) Computer misuse #) Computer a"use 0B) The guidelines for ethical use of computers pu"lished "y the Computer Ethics 4nstitute prohi"it) A) using a computer for shopping at wor! B) using a computer to harm others C) using a computer to $iew inappropriate we"sites #) None of the a"o$e% 38) 2esponsi"le computer use includes) A) not using a computer to harm others% B) not snooping in other personsA files% C) not using a computer to steal% #) All of the a"o$e% 31) 2esponsi"le computer use includes) A) thin!ing a"out the social conseEuences of your programs% B) appropriating other peopleAs intellectual output% C) interfering with other personsA computer wor!% #) None of the a"o$e%

<1 Copyright 7 &818 -earson Education9 4nc% -u"lishing as -rentice .all

3&) 6ost organi(ations ++++++++ report their incidents of computer crimes% A) under B) o$er C) do not #) accurately 3*) 'nauthori(ed access means that the person who has gained entry to a computer system has ++++++++ to use such computer access% A) authority B) permission C) rights #) no authority 30) The glo"al reach of computer networ!s has raised concerns o$er) A) copyrights% B) pri$acy% C) security% #) All of the a"o$e% 33) The Electronic Communications -ri$acy Act of 1B@: ma!es it a crime to ++++++++ any electronic communications ser$ice9 including telephone ser$ices% A) copy B) $iew C) "rea! into #) record 3:) A particular difficulty in com"ating cy"ercrime is that cy"ercriminals often attac! across) A) city "orders% B) county "orders% C) state "orders% #) international "orders% 3<) ++++++++ is the use of formal in$estigati$e techniEues to e$aluate digital information for 1udicial re$iew% A) #26 B) Carni$ore C) O -C #) Computer forensics

<&

3@) The term Jhac!erJ was first coined in the 1B:8s9 and it was originally used to descri"e 64T students who were e;pert computer users and programmers who roamed freely through computer systems out of) A) curiosity% B) malicious intent% C) "oredom% #) None of the a"o$e% 3B) E;amples listed in the "oo! of computer crimes include) A) using the computer to steal money% B) using a computer to perpetrate a deception for money% C) falsely ad$ertising merchandise for sale on a We" site auction% #) All of the a"o$e% :8) The ma1ority of unlawful intrusions into computer systems are made "y) A) outside computer hac!ers% B) employees% C) competitors% #) terrorists% :1) -ersons who plant destructi$e programs in computer systems and then threaten to acti$ate them if a ransom is not paid are called) A) computer hac!ers% B) cy"erterrorists% C) cy"er$andals% #) predators% :&) -ersons who plant $iruses are called) A) computer hac!ers% B) cy"erterrorists% C) $andals% #) predators% :*) Which of the following is not an e;ample of a computer crime as listed in the te;t"oo!? A) #ata diddling B) >alami slicing C) -iggy"ac!ing #) Cold calling

<* Copyright 7 &818 -earson Education9 4nc% -u"lishing as -rentice .all

:0) >alami slicing is a special type of) A) phrea!ing% B) spoofing% C) social networ!ing% #) data diddling% :3) Crimes committed against telephone company computers are an e;ample of) A) phrea!ing% B) spoofing% C) data diddling% #) carding% ::) ++++++++ reEuires no technical e;pertise9 "ut in$ol$es loo!ing for papers that contain useful information% A) -hrea!ing B) #umpster di$ing C) >ocial engineering #) #ata diddling :<) >poofing is a type of computer crime9 and it is a scam that is used to steal the ++++++++ of legitimate usersA computer accounts% A) passwords B) companyAs names C) peopleAs names #) None of the a"o$e% :@) ++++++++ is the term that descri"es the legal purchase of one copy of a software application9 followed "y the illegal copying and distri"ution of that same software application% A) >oftware piracy B) >oftware stealing C) >oftware "orrowing #) >oftware use :B) The slang term for stolen software is) A) hac!erware% B) ware(% C) $aporware% #) discountware%

<0

<8) >oftware piracy is aCn)) A) ethical issue% B) crime% C) economic pro"lem% #) All of the a"o$e% <1) The ++++++++ contained within a Tro1an horse are hidden such that the computer appears to function normally% A) pathogens B) instructions C) Tro1an horseAs authorAs name #) guide <&) ogic "om"s and time "om"s are $ariations of) A) worms% B) $iruses% C) Tro1an horses% #) dust "unnies% <*) ogic "om"s are set off "y) A) specific dates% B) specific times% C) specific user operations% #) None of the a"o$e% <0) To help protect your $alua"le computer files9 ma!e "ac!ups of your files in case you recei$e aCn) ++++++++ that erases files from your hard dri$e% A) $irus B) worm C) cric!et #) macrophage <3) ++++++++ "roadly refers to the use of a computer to communicate o"scene9 $ulgar9 or threatening content that causes a reasona"le person to endure distress% A) Cy"er"attles B) Cy"erterrorism C) >ocial engineering #) Cy"er harassment

<3 Copyright 7 &818 -earson Education9 4nc% -u"lishing as -rentice .all

<:) ++++++++ is the term used to descri"e the attempt "y a countryAs military to disrupt the communications system of another country% A) Cy"er"attles B) Cy"erterrorism C) >ocial engineering #) Cy"erwar <<) 4n a cy"erwar9 technologies might "e used to do all of the following EFCE-T) A) electronically "lind the other side% B) diminish the capa"ility of communications systems% C) interfere with troop and weapon positioning systems% #) Technologies may "e used for all of the a"o$e% <@) Cy"erterrorism is launched "y) A) go$ernments% B) indi$iduals% C) social engineering% #) computers%

<:

You might also like