Logotype

los exam one particular essay

02/17/2020
919
Accurate

T/F

All businesses should have a business continuity prepare.

Sizzling site

The most costly backup technique is:

True

T/F

With correct organization ” THIS alignment, the IT office directly supports the business goals of the business.

Phony

T/F Almost all companies have got excellent business ” IT alignment.

Increasing, progressively

In today’s organization environment, competition is ___ and consumers are becoming ___ powerful.

True

T/F

The availability of a large amount of items, custom-made to each customer is called mass customization.

All these

Information devices:

A) Help organizations seem sensible of a complicated business environment

B) Give competitive benefit

C) Support organizations interact to business pressures

D) Most of these

A business process

Related activities that create a product or service or services are called:

BPR

The radical redesign of organization practices to lessen costs and increase top quality is called:

BPM

___ is a fewer radical, significantly less disruptive method to redesigning business processes.

True

T/F

Communications controls safeguarded the motion of data across a network.

Phony

T/F

Whitelisting is somewhat more restrictive than blacklisting.

True

T/F

Security is the technique of converting a pioneering message right into a form that cannot be browse by any person except the intended receiver.

Authentic

T/F

Browsers generally provide a visible confirmation of any secure interconnection.

The case

T/F

Any information system can be proper.

High, low

Threat of entry of new opponents is ___ when it is easy to enter an industry and ___ when significant barriers to entry can be found.

Procurement

Which of the following is definitely not a main activity?

False

T/F

Support activities put value directly to a industry’s products and services.

True

T/F

Collection of a particular strategy involves trade-offs.

False

T/F

Companies must stick to only 1 strategy for success.

Authentic

T/F

Competitive cleverness is legal, where industrial espionage is definitely illegal.

False

T/F

You will find comparatively couple of ways in which you can have your personality stolen.

Phishing

___ attacks make use of deception to acquire sensitive info by masking as official e-mails.

Distributed denial-of-service attack

The living dead and botnets are connected with:

True

T/F

SCADA devices provide link the physical and electric worlds.

True

T/F

SCADA attacks might cause severe injury to a place’s physical facilities, such as their power grid.

False

T/F

In the event someone works unethically, then that person should be acting unlawfully.

Responsibility

___ implies that you accept the consequences of your actions.

False

T/F

THIS decreases the amount of employees who can report to an individual manager.

True

T/F

It implies that managers have a fraction of the time to make decisions.

True

T/F

The competitive advantage of replacing individuals with computers is usually increasing speedily.

The case

T/F

IT can equally improve and minimize our standard of living.

Phony

T/F

Robots are being used in a decreasing number of everyday tasks.

False

T/F

Documentation must go before authentication.

Something you are

The fingerprint can be an example of:

Auditing around the computer

Confirming processing simply by checking pertaining to known results using certain inputs is usually:

Auditing with the pc

Using live data is usually associated most closely with:

Weakness

A(n) ___ is the probability that a system will be damaged by a risk.

Lowering

Today, the abilities needed to be a hacker will be:

Bogus

T/F

Information technology affects individuals and organizations, but has small impact on our planet.

Stationary

Which of the following is not a characteristic of modern-day business environment?

Know-how

___ consists of information that has been processed to convey expertise since it applies to an enterprise problem.

False

T/F

Method and types of procedures are important however, not critical to the effective use of computer based information devices.

The case

T/F

The public’s right to understand is better than our directly to privacy.

False

T/F

The opt-out version is tighter than the explicit opt-in model.

False

T/F

MIS and HR employees pose little menace to information security within a firm.

Social Anatomist

In a(n) ___ attack, the criminal tricks an employee into giving away confidential details.

The case

T/F

A student majoring in LOS can stick to more technological track or maybe a more business-oriented track.

False

T/F

Business-oriented MIS dominant typically discover jobs as programmer/analysts.

True

T/F

Business analysts become “interpreters between the user community and technological specialists.

Risk Examination

Organizations perform ___ to make sure that their protection programs will be cost effective:

Risk transference

Buying insurance would be a kind of:

The case

T/F

One of the main reasons for being an informed user is that you will have more effective communications with your THAT department.

True

T/F

IT offers excellent job opportunities.

True

T/F

One of the dangerous (in terms of their unethical breach of privacy) aspects of Sites such as WikiLeaks is that their very own activities cannot be regulated or criminalized mainly because they do not fall under the legislation of anybody nation.

The Sarbanes-Oxley Act

Main scandals for Enron, WorldCom, and Tyco led to the passage that law in 2002?

False

T/F

Marking your friends’ pictures on Facebook will not compromise all their privacy so long as you obtain their permission.

Liability

The legal principle that gives persons the right to recover damages done to them simply by other persons, organizations, or perhaps systems is called:

Phony

T/F

Using software on your smart phones that transmitted your location to others is a benign act.

False

T/F

If the employer clearly states in the employee guide that work emails should be intended for official business only and then proceeds to see all the emails you mail and acquire, he or she is guilty of a legal violation.

Freedom of talk, national reliability

Two significant conflicting concerns related to level of privacy are ___ and ___.

Writing proprietary info with friends and fellow workers.

Terry Children’s was falsely accused of all of the next except:

A) Creating account details that approved him special access to the machine.

B) Collecting pages of user brands and account details so he could use their particular network get access information.

C) Downloading town data to a personal protected storage device.

D) Sharing exclusive data with friends and colleagues.

Fake

T/F

Ethics bargains strictly with legal interpretations of precisely what is right and wrong.

True

T/F

Ethics is a branch of philosophy that deals with what is considered to be right and incorrect.

Phony

T/F

Backup and recovery procedures are advised only to protect against hardware/software failures.

Vulnerability, threat, exposure

An info system’s ____ is the possibility that the program or useful resource will be compromised by a ____ that will cause its ____ to further problems.

Much larger and cheaper storage

Which usually of the following factors that will make information assets more vulnerable to attack can be most quickly remedied?

A) Interconnected/dependent organization environments

B) Larger and cheaper storage

C) Organized cyber criminal offense

D) Reduce skill level of hackers

E) Lack of administration control

F) Not one ” all of the elements are exogenous

Selecting a weakened password

Which in turn of the next can be categorized as unintended threats to information devices caused by individual errors?

Social engineering

An unintentional attack in which the perpetrator uses social abilities to trick or change a legitimate staff into rendering confidential firm information is referred to as:

copyright, piracy

Producing and distributing information products to which you may not own the ___ is referred to as ____.

remote attacks needing user actions, remote disorders requiring not any user action

Whereas phishing attacks will be ____, denial of assistance attacks are ____.

Hackers applying key loggers.

Computer applications like CAPTCHA are used to counter

transference, acceptance

Ordering health insurance is usually an example of risk ____, whereas going without can be an example of risk _____.

Risk minimization.

Implementing handles to prevent dangers from occurring and designing a recovery strategy should the hazards occur happen to be two broad functions of

authentication, authorization

Gain access to controls consist of ____, which will confirms consumer identity, and ____, which in turn determines user access amounts.

Passphrases

_____ may be used to create solid passwords which have been easy to keep in mind.

False

T/F

Ethics discounts strictly with legal understanding of what is right and wrong.

True

T/F

Ethics is a subset of philosophy that deals with precisely what is considered to be correct and wrong.

Each of the above

Moral issues may be categorized into which of the following types?

A) Privateness

B) Reliability

C) Property

D) Convenience

E) All the above

utilitarian approach

The _________ way of ethics keeps that an honest action is the structure provides the most good or perhaps does the least harm:

An action can be unethical but still always be legal

The relationship between ethics and legitimacy can finest be explained in which of the following statements?

Accountability

_______________ is definitely the tenet of ethics that refers to determining who is in charge of actions which were taken.

False

T/F

Legislation basically will not support a great employer’s directly to read electronic mail and other electric documents.

False

T/F

Privacy regulations will be basically the same from region to country around the world.

opt-in version

Which type of privacy policy limits an organization by collecting personal information until the customer specifically authorizes it?

EU laws

When comparing info protection regulations internationally, which usually laws happen to be stricter?

increasing, human

The hazards to info security will be _____, as well as the greatest threat is _____.

False

T/F

The beginning of the Net has reduced the risks to details security.

True

T/F

For those who have copied an application package (computer program) from a friend without having to pay for it, you are doing software piracy.

Fake

T/F

Low level workers pose the highest threat to information protection.

IS employees

Which in turn of the next employees commonly poses the most important threat to information reliability?

Careless internet searching

Which with the following is definitely not a sociable engineering technique

A) None of them of the choices are interpersonal engineering approaches

B) Tailgating

C) Shoulder Surfing

D) Careless net surfing

E) All of the choices are social engineering approaches

True

T/F

You must regularly delete any spyware and adware that might be residing on your computer, as it may be harmful.

denial-of service strike

Which type of remote application attack does not require consumer action?

Spamware

Kind of of strange software uses your computer to send emails that look like they came from one to all the persons in your diary?

Computer viruses are introduced into the electrical company’s systems causing a shutdown in the power plant.

Which will of the subsequent would be one of a SCADA attack?

True

Risk management identifies, handles, and decreases the impact of threats for the organization’s details security.

Risk research

Which in case the following is not a common risk mitigation strategy?

Access

A password system on a computer network is an example of which kind of information security control?

Multifactor authentication systems are more reliable plus more expensive than single-factor.

Which of the pursuing statements holds true?

A) Multifactor authentication systems are less trusted and less pricey than single-factor.

B) Multifactor authentication devices are more reliable and less costly than single-factor.

C) Multifactor authentication systems are more trustworthy and more pricey than single-factor.

D) Multifactor and single-factor authentications have a similar degree of trustworthiness.

TLS

____________ is an encryption standard used for secure transactions including credit card processing and online banking.

True

T/F

One of the big features of being an up to date user and consumer of computer is that that enables you to assume future innovations and their potential applications.

All of these

Global outsourcing allows an organization to:

A) Find the best person to get the job

B) Find more economical resources

C) Implement space and provisional, provisory flexibility

D) All of these

Both of the following are appropriate: the systems are very expensive to acquire, work, and maintain; and the systems happen to be critical for the organization’s procedures.

Managing information systems in a modern firm is demanding because:

False

Method and methods are important but is not critical for the effective usage of computer based information devices.

High speed calculations, quick access to data, and workplace set ups and processing of large numbers of data

The core capabilities of computer-based information systems include (check all that apply):

Useful area data systems

HUMAN RESOURCES information devices, POM data systems, CUSTOMER RELATIONSHIP MANAGEMENT information devices, and marketing information systems are usually classified as:

True

T/F

One impact from it will be to decrease the numbers of managers employed in agencies.

Business intelligence (bi) Applications

When information devices, such as deal processing systems, generate more details for managers to method, other information devices, such as ___, help them examine this information to make better-informed decisions.

Global outsourcing

Telepresence systems can assist make ___________ a more popular choice for small and channel enterprises.

Simulation surroundings

Which with the following is a useful, cost-effective, hands-on, very safe teaching device in the healthcare industry?

Phony

T/F

All business processes should be owned simply by one and only 1 functional place in any business.

Business process

A(n) _____ is actually a collection of related activities that produce a product or a support of value to a organization.

Increase production

Optimize operations

Increase client satisfaction

Reduce spend

The goals of business process reengineering are to (check all that apply):

Reduce waste.

Boost productivity.

Enhance operations.

Boost cycle period.

Increase customer satisfaction.

Reduce spend.

True

T/F

Business process administration includes strategies and equipment to support the look, analysis, rendering, management, and optimization of business procedures.

The case

T/F

Organizations rely upon IT to facilitate their transition to the globalization of their operations.

Technological demands

In today’s business environment, it can be rare for the company not to have a significant Web presence. This kind of trend may be attributed mainly to:

True

T/F

The web reduces the barriers of entry for new competitors within an established market.

Authentic

T/F

The Internet can easily both decrease and improve the bargaining benefits of suppliers, with respect to the specific conditions.

Increased the menace of substitute products and increased the risk of new traders.

In recent years, firms such as Walmart and Amazon online. com possess offered tube style sites for rent on the Web sites. This really is another sort of how new technology has (check all that apply):

Phony

T/F

Selecting and adhering to an individual competitive approach is sufficient to counter all Porter’s five forces and become successful in the long term.

Organization objectives

Business-IT alignment identifies the sync of a company’s IT procedures with its:

True

T/F

According to McKinsey & Company, the root reason behind companies’ inability to align their IT and the business desired goals is the deficiency of knowledge and communication.

True

T/F

Job Opportunities are strong in IS and they are projected to remain strong for the next 10 years.

True

T/F

Over time, the MIS function has evolved to a relationship between the LOS department as well as the end users?

All of these

Which in turn of the following is a great IT work within an organization?

Application and Databases.

What are 2 IT elements in CBIS?

Bogus

T/F

TPS is short for Transfer Digesting Systems?

Promotion research and site analysis

Potential professionals put it to use for which from the following features?

The case

T/F

An App (Application) is a computer program designed to support a specific task?

elevating their production.

IT impacts middle managers by _______________.

It might place employees on frequent call.

Which will of the next is a negative societal impact associated with the elevated use of i . t?

False

T/F

A Network is a connecting system which could only be wi-fi?

True

T/F

“Business Process is defined as a continuing collection of related activities that creates a product/service to an organization?

Most of these

Which of the following will be examples of Business Processes?

A) Processing charges of material.

B) Managing funds receipts.

C) Collecting florida sales tax.

D) Applying healthcare benefits.

E) None of these.

F) All of these

Phony

T/F

BPR is short for Business Method Recovery?

Political changes

Business environment pressures comes from which with the following?

False

T/F

Jones Friedman identifies four eras of globalization.

All those who have00 access to details and connection technologies and those who usually do not.

The term “digital divide identifies the difference between:

Michael Porter’s competitive causes model.

The very best known framework for inspecting competitiveness is?

True

T/F

Cost Command Strategy is one strategy to achieve a competitive advantage?

Customer-Orientation and Operational Successful Strategy.

Two strategies that a company can use to gain a competitive benefits are?

True

T/F

You will find six (6) characteristics of effective Business-IT Alignment.

False

T/F 85% of Business and IT professionals agree that their firms have enough alignment between IT and the business.

1

Need an Essay Writing Help?
We will write a custom essay sample on any topic specifically for you
Do Not Waste Your Time
Only $13.90 / page