Create an account
You have been hired as a security consultant for a legal firm. Which of the following
constitutes the greatest threat, in terms of security, to the firm?
Based on your reading of the CardSystem's security breach and the text, what category
of malware was used on CardSystem's network?
In this method of encryption, a single encryption key is sent to the receiver so both
sender and receiver share the same key.
Symmetric key encryption
Currently, the protocols used for secure information transfer over the Internet are:
SSL, TLS, and S-HTTP.
Most antivirus software is effective against:
only those viruses already known when the software is written.
________ use scanning software to look for known problems such as bad passwords,
the removal of important files, security attacks in progress, and system administration
Intrusion detection systems
In this technique, network communications are analyzed to see whether packets are part
of an ongoing dialogue between a sender and a receiver:
The text's discussion of the security enhancements of Monsanto Co and Clarion Health
Partners illustrates which of the following drawbacks to using passwords for
Poor password systems are a costly and insecure procedure.
A firewall allows the organization to:
enforce a security policy on traffic between its network and the Internet.
An MIS audit must be conducted by someone who:
Has a thorough understanding of the entire system to be audited
Methods to make computer systems recover more quickly after mishaps is called:
Recovery oriented computing.
An analysis of the firm's most critical systems and the impact a system's outage would
have on the business is included in a(n):
business impact analysis.
Analysis of an information system that rates the likelihood of a security incident
occurring and its cost is included in a(n):
Electronic evidence on computer storage media that is not visible to the average user is
The Gramm-Leach-Bliley Act:
Requires financial institutions to ensure the security of customer data.
Policies, procedures, and tools for managing the retention, destruction, and storage of
electronic records is called:
How do software vendors correct flaws in their software after it has been distributed?
Tricking employees to reveal their passwords by pretending to be a legitimate member of
Redirecting users to a fraudulent Web site even when the user has typed in the
correct address in the Web browser
Which of the following is NOT an example of a computer used as a target of crime?
Illegally accessing stored electronic communication.
In your reading of the text's discussion of the experiences of Jersey Joe, Akamai, and
Protx Ltd, what is the greatest protection against bot attacks?
Having individuals use adequate anti-virus protection
The approach taken by Akamai Technologies when it discovered its servers were under
attack illustrates that:
Enforcing security is a complex endeavor that involves multiple approaches.
How do hackers create a botnet?
Infecting corporate servers with "zombie" Trojan horses that allow undetected access
through a back door.
In 2004, ICQ users were enticed by a sales message from a supposed anti-virus vendor.
On the vendor's site, a small program called Mitglieder was downloaded to the user's
machine. The program enabled outsiders to infiltrate the user's machine. What type of
malware is this an example of?
Using numerous computers to inundate and overwhelm the network from numerous
launch points is called a:
Sobig.F and Netsky.P are:
"Worm" type viruses that arrive attached to e-mail and spread from computer to
An independent computer program that copies itself from one computer to another over a
network is called a:
Computers linked to the Internet are more vulnerable if they are linked through:
a cable modem and a DSL line
Security challenges posed by the communications between layers in a client/server
Tapping, sniffing, message alteration
All of the methods, policies, and organizational procedures that ensure the safety of the
organization's assets, the accuracy and reliability of its accounting records, and
operational adherence to management standards refers to:
Large amounts of data stored in electronic form are _____________ than the same data
in manual form.
Vulnerable to many more kinds of threats
Automated data are more susceptible to destruction, fraud, error, and misuse because
information systems concentrate data in computer files that:
Have the potential to be accessed by large numbers of people and by groups outside of
Policies, procedures, and technical measures used to prevent unauthorized access,
alternation, theft, or physical damage to information systems refers to:
What is the most far-reaching effect of identity theft?
Lowering of revenues and profits due to public mistrust of e-commerce safety.
The fact that phishing is growing at an explosive rate indicates what?
The increasing use of the Internet for e-commerce is a factor in drafrom larger numbers of criminals.
Which type of network would be most appropriate for a business that comprised three
employees and a manager located in the same office space, whose primary need is to
The need in some cases for employees to have access to sexually explicit material on the
Internet, such as medical researchers, suggests that:
Companies need to base their Internet use policies on the needs of the organization
Based on your reading of the examples in the chapter, what would be the best use of
RFID for a business?
Supply chain management
In a RFID system, a(n) ____________________ is electronically programmed with
information that can uniquely identify an item, such as an electronic code.
EV-DO provides wireless access to the Internet over a cellular network at an average
300 - 500 Kbps.
One or more access points positioned on a ceiling, wall, or other strategic spot in a public
place to provide maximum wireless coverage for a specific area are referred to as:
The Wi-Fi 802.11b standard can transmit up to:
Can transmit up to 11 Mbps in the unlicensed 2.4-GHz band and has an effective
distance of 30 to 50 meters.
Bluetooth can be used to link up to __________________ devices within a 10-meter area
using low-power, radio-based communication.
Which cellular network has enough transmission capacity for video, graphics, and other
rich media in addition to voice?
For corporations, one of the drawbacks to the worldwide explosion of e-mail use is:
Too much bandwidth used by e-mails
Which technology uses the Internet protocol to deliver voice information in digital form
A network that links a business with its customers, suppliers, and other business partners
To keep internal data secure, a company employing an extranet must be sure to put a(n)
_________________ in place.
What technology allows people to have content pulled from Web sites and fed
automatically to their computers?
Together, a protocol prefix, a domain name, a directory path, and a document name, are
Uniform resource locator
Which of the following services enables logging on to one computer system and working
Which of the following services enables discussion groups on electronic bulletin boards?
In the domain name "http://myspace.blogging.com", what are the root, top-level, second-level, and third-level domains, respectively?
".", com, blogging, myspace
A bus network:
Links a number of computers by a single circuit with all messages broadcast to the
A peer-to-peer network architecture:
Gives equal power to all computers on the network and is used primarily in small
A network that covers a large geographic area is most commonly referred to as a(n):
Wide area network.
Connects computers and peripheral devices located close to each other, often in the
Which type of network treats all processors equally, and allows peripheral devices to be
shared without going to a separate server?
Which type of network is used to connect digital devices within a half-mile or 500-meter
the difference between the highest and lowest frequencies that can be accommodated
on a single channel.
_____________ work by using radio waves to communicate with radio antennas placed
within adjacent geographic areas
The difference between the highest and lowest frequencies that can be accommodated on
a single channel is called its:
What type of transmission technology is used in relay stations for terrestrial microwave
Which type of network can transmit all types of traffic-voice, data, and video-over fiber
cables and provide the massive bandwidth for new types of services and software?
Multiplexing can be defined as a:
technology that enables a single communications channel to carry data transmissions
from multiple sources simultaneously.
BP Amoco uses __________________ for real-time data transfer of oil field exploration
data gathered from searches of the ocean floor.
Which technology will enable communications service providers to add transmission
capacity to an existing fiber-optic network without having to lay more fiber-optic cable?
A communications medium that uses one or more copper wires surrounded by thick
In a telecommunications network architecture, a protocol is:
A standard set of rules and procedures for control of communications in a network.
c. A communications service for microcomputer users.
The four layers of the TCP/IP reference model are:
Application layer, transport layer, Internet layer, network interface layer
The method of slicing digital messages into parcels, transmitting them along different
communication paths, and reassembling them at their destinations is called:
The Internet is based on the following three key technologies
Client/server computing, packet switching, and the development of widely used
communications standards for linking networks and computers.
The most important communication standard today for linking disparate computers and
Transmission Control Protocol/Internet Protocol (TCP/IP).
A device that acts as a connection point between computers and can filter and forward
data to a specified destination is called a:
A computer on a network that performs important network functions for client
computers, such as serving up Web pages, storing data, and storing the network
operating system, is called a:
What is the first step you should take in managing data for a firm?
Identify the data needed to run the business
Detecting and correcting data in a database or file that are incorrect, incomplete,
improperly formatted, or redundant is called:
Which common database challenge is illustrated by the text's discussion of downloading
The confusion created by __________________ makes it difficult for companies to
create customer relationship management, supply chain management, or enterprise
systems that integrate data from different sources.
An alternative to using application server software for interfacing between a Web server
and back-end databases is:
As described in the chapter text, which of the following strategies best describes Banco
de Credito Peru's tactics in overcoming the competitive forces it was facing?
Strengthen customer and supplier intimacy
As described in the chapter text, which competitive force was Banco de Credito Peru
Threat of new entrants
OLAP Is a tool for enabling:
users to obtain online answers to ad hoc questions in a rapid amount of time.
The tool that enables users to view the same data in different ways using multiple
Tools for consolidating, analyzing, and providing access to vast amounts of data to help
users make better business decisions are known as:
A data mart usually can be constructed more rapidly and at lower cost than a data
A data mart typically focuses on a single subject area or line of business.
Which of the following database types is useful for storing java applets as well as typical
DBMS's typically include report-generating tools in order to:
display data in an easier-to-read format.
An automated or manual file that stores information about data elements and data
characteristics such assecurity is the:
The data dictionary serves as an important data management tool by:
creating an inventory of data contained in the database.
The specialized language programmers use to add and change data in the database is
data manipulation language.
The join operation:
Combines relational tables to provide the user with more information than is
The select operation:
creates a subset consisting of all records in the file that meets stated criteria.
In a relational database, the three basic operations used to develop useful sets of data are:
select, project, and join.
The process of streamlining data to minimize redundancy and awkward many-to-many
relationships is called:
A table that links two tables that have a many-to-many relationship is called a:
A one-to-many relationship between two entities is symbolized in a diagram by a:
line that ends with a crow's foot topped by a short mark.
A one-to-one relationship between two entities is symbolized in a diagram by a:
line that ends in two short marks.
A schematic of the entire database that describes the relationships in a database is called
A field identified in a record as holding the unique identifier for that record is called the:
A field identified in a table as holding the unique identifier of the table's records is called
The most basic business database is comprised of:
five tables: a table for customers, a table for employees, a table for suppliers, a table
for parts, and a table for sales.
What are the relationships that the relational database is named for?
Relationships between entities
The type of logical database model that treats data as if they were stored in two-
dimensional tables is the:
Which of the following best illustrates the relationship between entities and attributes?
The entity CUSTOMER with the attribute PURCHASE
Which of the four generic strategies against competitive forces did 7-11 need to
implement in order to manage the disadvantages it faced?
You have been hired by Inspiration Inc, to help improve their profit margin. Inspiration
Inc. is a business communications consultancy that services many clients in different
industries throughout the U.S. The end products of the company are customized
recommendations for the best use of a client's existing resources for improving
internal communications, typically delivered via documentation in different media.
The company has approximately 100 consultants all of whom are located in their
central headquarters in Chicago. What system do you recommend to improve the
company's business processes and increase their profit margin?
Extranet, to enable quick collaboration over the Internet , minimize the time
spent communicating with the client, and minimize the amount of paperwork
You have been hired by a non-profit agency to implement a system to handle their
donations. Event fund-raisers need to be able to quickly access a donor's information
and history. The marketing department needs to be able to create customized mailing
lists, in order to send different messages to different types of donors. What system(s) will best meet these needs?
TPS with MIS
What is one of the biggest drawbacks in having separate information systems for
separate business functions
Redundancy of information
You work for a highly successful advertiser that is just about to expand nationally. Of
utmost importance will be finding a way to store and disseminate their client's
constantly updating branding and style guides, which include multiple image files
and text documents, to all of their branches. What system will best serve these needs?
An extranet with KMS capabilities
You manage the Information Systems department at a small startup Internet advertiser.
You need to set up an inexpensive system that allows customers to see real-time
statistics such as views and click-throughs about their current banner ads. Which type
of system will most efficiently provide a solution?
What does Danaher Corporation's implementation of e-Kanban illustrate?
Implementing technical solutions is a continuous process, needing the
measurement of benefits against drawbacks.
What is the most important benefit of an enterprise application:
enabling business functions and departments to share information.
The advantage of a decentralized arrangement of the information services function, in
which each functional area of the business has its own information systems
systems are built that directly address that function's business needs.
Policies that determine which information technology will be used, when, and how are
IT standards services
Development and support services for a firms' business systems are provided by:
application software services.
The principal liaison between the information systems groups and the rest of the
organization is a/an:
The use of digital technology and the Internet to execute the major business processes in
the enterprise is called
You would recommend that a system interface use a portal when:
employees need to collaborate with suppliers and vendors
Different firms can work collaboratively on product design, marketing, and production
Which type of system would you use to determine the five suppliers with the worst
record in delivering goods on time?
Which type of system would you use to change a production schedule if a key supplier
was late in delivering goods?
Which type of system would you use to forecast the return on investment if you used
new suppliers with better delivery track records?
Which type of system would you use to determine what trends in your supplier's industry
will affect your firm the most in five years?
______________________ uses a set of integrated applications to address all aspects of
he customer relationship.
__________________________ is the process that integrates supplier, manufacturer,
distributor, and customer logistics processes.
A (an) _______________________ collects data from various key business processes
These systems are designed to support organization-wide process coordination and
These systems often deliver information to senior executives through a portal, which
uses a Web interface to present integrated personalized business content:
executive support systems.
Executive support systems are information systems that support the:
long-range planning activities of senior management.
These systems allow users to change assumptions, ask new questions, and include new
These systems are especially suited to situations in which the procedure for arriving at a
solution may not be fully predefined in advance:
Decisions that are unique, rapidly changing, and not easily specified in advance are best
suited to this type of system:
These systems are typically a major source of data for other systems:
transaction processing systems.
These systems are designed to summarize and report on the company's basic operations.
management information systems
Management-level systems are information systems that support the:
decision-making and administrative activities of middle managers.
Managers need __________ to monitor the status of internal operations and the firm's
relations with the external environment.
transaction processing systems
The principal purpose of __________________ is to answer routine questions and to
track the flow of transactions through the organization.
The term "management information systems" designates a specific category of
information systems serving:
middle management functions
A relocation control system that reports summaries on the total moving, house-hunting,
and home financing costs for employees in all company divisions would fall into the
A computerized system that performs and records the daily dealings necessary to conduct
business is classified as a(n):
Equipment scheduling and facilities maintenance are functions of:
Manufacturing and production systems.
A sales and marketing information system aids middle management employees in:
analyzing sales performance.
Promoting the organization's products or services is a responsibility of the:
sales and marketing function.
The three principal levels of hierarchies within a business organization are:
senior management, middle management, and operational management.
The five basic entities that make up any business are suppliers, customers, employees,
products and services, and:
invoices and payments.
How would you best categorize the types of systems Kia
implemented in their defect early warning system?
An MIS to create reports from existing TPSs and a DSS for high-level analysis and forecasts.
Kia's difficulties in getting a complete picture of defects in their cars illustrates:
the challenges posed by having multiple information systems that are not linked.
In the UPS case the company's culture places service to the customer among the company's
highest business objectives. Based on your reading of Chapter 1, why is "culture" an
important factor to consider when building information system solutions to business
the business culture provides the vision and inspiration for information system
Assume you work for a package delivery service in a major metropolitan area, and that the
business has been losing customers for several years. You have been asked to find a solution
to this problem, perhaps one which uses modern information technologies. What is the
correct way to proceed:
identify the problem, design alternative solutions, choose the best solution, and then
implement the solution.
The fact that online advertising revenues are growing at 30% a year, while offline traditional
advertising is growing at about 5% a year, suggests that:
the Internet is transforming the traditional advertising business model.
Based on your reading of the Sonic case and other examples in the chapter, if you were asked
to formulate a plan for a regional drive-in restaurant chain's efforts to use information
technology to attract customers, what would be the best use of information technology from
the list below:
use IT to achieve customer intimacy.
What was the most important impact of Major League Baseball's Web site development
strengthened the relationship with customers and suppliers.
For the U.S., the most common and successful offshore outsourcing has been:
technical positions in information systems.
Financial managers work directly with ______________ to ensure investments in
information systems help achieve corporate goals.
Operations management as a discipline is directly relevant to three occupational categories:
industrial production managers, operations analysts, and administrative service
Sonic's use of point-of-sales terminals to track purchasing trends at different
outlets is an example of:
using information systems to achieve customer intimacy.
An information skill important for a marketing major would be
an understanding of product management enterprise systems.
An information skill important for an accounting major would be:
an understanding of system and network security issues.
An example of a business using information systems for survival is:
China Telecom's enterprise system designed to comply with international reporting
An example of a business using information systems to attain competitive advantage is:
Blockbuster's creation of a new online movie-rental system similar to that of Netflix.
An example of a business using information systems to create new products and services is:
MLB's Web sites for online "fantasy" games.
The failure of NASA's initial solution to preventing the space shuttle shedding foam
the continuous nature of problem solving.
In choosing the best solution for a business problem, one of the most important
existing resources and skills.
Flapjack Flats, a new pancake chain, is having difficulty finding pancake chefs. This is a
business problem that falls into the:
The owners of Speed-EZ, a new bike messenger service, are concerned about how they will
manage their messengers once they have left the office. This is a business problem that falls
Poor business processes and unsupportive culture are examples of which dimension of
Inadequate data management is an example of the ___________ dimension of business
Networking and telecommunications technolmanage them, constitute an organization's:
The hardware and software used to transfer data in an organization is called:
networking and telecommunications technology.
Data management technology consists of:
the software governing the organization of data on physical storage media.
The fundamental set of assumptions, values, and ways of doing things, that has been
accepted by most of a company's members is called its:
In a hierarchical organization, the upper levels consist of:
managerial, professional, and technical workers.
The field that deals with behavioral issues as well as technical issues surrounding the
development, use, and impact of information systems used by managers and employees in
the firm is called:
management information systems.
Electronic computers and related software programs are the technical foundation, the tools
and materials, of:
modern information systems.
transfers processed information to the people who will use it or to the activities for which it will be used.
The three activities in an information system that produce the information organizations use to control operations are:
input, processing, and output.
An information system can be defined technically as a set of interrelated components that
collect (or retrieve), process, store, and distribute information to support:
decision making and control in an organization
What term is used to refer to all of the computer-based information systems used by
organizations and their underlying technologies?
The move of retail banking to use ATMs after Citibank unveiled its first ATMs illustrates the information system business objective of:
Verizon's implementation of a Web-based digital dashboard to provide managers with real-
time information such as customer complaints is an example of:
Which of the following choices may lead to competitive advantage (1) new products,
services, and business models; (2) charging less for superior products; (3) responding to
customers in real-time?
1, 2, and 3
Dell Computer's use of information systems to improve efficiency and implement "mass
customization" techniques to maintain consistent profitability and an industry lead illustrates
which business objective?
The six important business objectives of information technology are new products, services,
and business models; customer and supplier intimacy; survival; competitive advantage,
operational excellence, and:
improved decision making.
Please allow access to your computer’s microphone to use Voice Recording.
Having trouble? Click here for help.
We can’t access your microphone!
Click the icon above to update your browser permissions and try again
Reload the page to try again!Reload
Press Cmd-0 to reset your zoom
Press Ctrl-0 to reset your zoom
It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.
Please upgrade Flash or install Chrome
to use Voice Recording.
For more help, see our troubleshooting page.
Your microphone is muted
For help fixing this issue, see this FAQ.
Star this term
You can study starred terms together