INFM109 M01 Pre-Course Assessment

docx

School

University of Southern Indiana *

*We aren’t endorsed by this school

Course

109

Subject

Information Systems

Date

Oct 30, 2023

Type

docx

Pages

7

Uploaded by s862066

Report
M01 Pre-Course Assessment ? Jerome, a manager, must ensure that his department’s information systems are implemented in a way that _____. a. emphasizes the organization’s technology infrastructure more than its role structure, procedures, or personnel management b. helps his organization gain a competitive advantage, and thus generate more sales or achieve superior profit margins c. does not rely on predefined steps that system users can follow to achieve desired end results d. never alters the roles and responsibilities of the system’s end users, managers, developers, or maintenance coordinators ? Jerome uses several types of information systems to perform his daily duties. When he works together effectively with colleagues by using instant messaging or electronic conferencing software, he is using a workgroup information system. a. True b. False ? One of Jerome’s friends says, “I have noticed a lot of news stories about cybercrime lately. Why are computer incidents so prevalent?” Jerome explains that one reason is that _____. a. many businesses have implemented BYOD policies b. the computing environment is becoming less complex and less diverse c. computer troublemakers are more likely to work independently than in the past d. zero-day attacks have become more frequent than attacks exploiting known software vulnerabilities ? Tonya is mindful of ways to protect her personal privacy. Which of the following would Tonya avoid because it might pose a risk to her privacy? a. insisting that her doctor's office obtain written consent before sharing her records b. calling the major credit bureaus to ask for a free credit report annually c. requesting a single-use credit card number for an online purchase d. paying bills online through a bank's Web site while on a public Wi-Fi network
? Developing a safety-critical software system is more time consuming and expensive than developing a non-safety-critical but high-quality system because it requires extreme measures for identifying and removing defects; a great deal of effort to identify and mitigate risks; and _____. a. a division of responsibilities between software developers and systems engineers b. a totally different sequence of software development tasks c. a development team composed of highly trained and experienced professionals d. an end product that is easy to learn and use, performs well, and meets users' needs ? Tonya is excited because she just upgraded her personal laptop. The component of her new computer system that controls the hardware and acts as an interface with application software is called an application programming interface. a. True b. False ? When Tonya attends a business conference presentation about the software as a service (SaaS) distribution model, she learns that _____. a. SaaS applications are secure because they can only be accessed using organization-owned devices b. users of SaaS applications never have to download or install patches to keep them up to date c. SaaS application upgrades are usually more expensive than those for traditional software licenses d. SaaS subscribers must actively adjust their hardware and communications capacities as needed ? When Tonya enters an order for several cases of ice cream, the application she uses must request data about the prices and availability of the ice cream flavors from the supplier’s database. The function the database management system (DBMS) performs in this situation is to provide a user view. a. True b. False
? A colleague asks Tonya why their organization has made an arrangement to store their database on Amazon's servers and access it over the Internet rather than hosting it on their own servers. What reason does Tonya give for this decision? a. It provides greater flexibility in querying and manipulating data. b. It eliminates the need for data cleansing or data normalization. c. It allows the organization greater control over data security measures. d. It lowers hardware, software, and labor costs to the organization. ? Sam, a data scientist, knows that one of the five key characteristics associated with big data is its quality—its accuracy, completeness, and currency—which is referred to as _____. a. velocity b. veracity c. value d. variety ? Sam explains to a colleague that the primary difference between business intelligence (BI) and analytics is that _____. a. analytics employs algorithms to predict what will happen in the future b. analytics is not used directly to support decision making c. BI employs algorithms to predict what will happen in the future d. BI is not used directly to support decision making ? Carla reads an article on wireless communications and learns that 5G networks offer three advantages over 4G networks: increased bandwidth, lower latency, and support for many more devices simultaneously. a. True b. False ? Which component of the Internet is a device that keeps a record of the MAC address of all the devices connected to it and uses this information to determine to which port a frame of data should be directed? a. TCP/IP b. packet c. switch d. router ? Holly advocates for transitioning to cloud computing at her organization by discussing its benefits. She correctly states that _____. a. using a public cloud guarantees more consistent performance over time and less downtime than using on-premises solutions b. with cloud computing, her organization can request the type and capacity of resources they need, reducing costs
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
c. moving to the cloud eliminates any data security concerns, since the cloud service provider becomes responsible for compliance with regulations d. once her organization moves to the cloud, it will be easy to change cloud service providers frequently to find the best pricing and performance ? Which of the following approaches allows organizations to enjoy scalability and flexibility for applications with less sensitive security requirements while maintaining greater security in an on-premises computing environment for those with more consistent capacity needs? a. hybrid cloud computing b. virtual private cloud computing c. public cloud computing d. autonomic computing ? Holly needs to restock some medical supplies for the lab where she works. She visits a preferred supplier’s online product catalog, locates the needed items, and completes a request- for-quotation form. When she hears back from the supplier, she will begin the next sales stage, which is selection and negotiation. a. True b. False ? For e-commerce systems, the software it must run and the volume of e-commerce transactions that must be processed primarily determine the _____. a. router's connection speed and latency b. Web server's required storage capacity and computing power c. server operating system's analytics requirements d. organization's e-commerce strategy
? Which software solution enables an enterprise business strategy that creates a common repository of product information and processes to facilitate the collaborative creation, management, dissemination, and use of product and packaging definition information? a. product lifecycle management b. supply chain management c. customer relationship management d. computer-aided design
Which tool for data analysis can be leveraged by organizations with an ERP and a centralized database to identify unique patterns and correlations that can help guide business decisions? a. computer-aided engineering b. online transaction processing c. source data automation d. artificial intelligence A computer system that can recognize and act on patterns or trends that it detects in large sets of data by filtering the data through networked connections that have a value associated with them is called a(n) _____. a. intelligent agent b. genetic algorithm c. artificial neural network d. expert system What part of machine learning allows computers to understand, analyze, manipulate, and generate natural human speech, either spoken or written? a. natural language processing b. artificial neural networks c. reinforced learning d. brain computer interfaces How will a business using the strategic planning pyramid begin the direction-setting phase of strategic planning? a. by setting objectives b. by creating a vision/mission statement c. by identifying key initiatives d. by setting goals Why do many organizations consider project management to be a core competency? a. Information system-related projects are almost always completely successful. b. A project is a continuous endeavor undertaken over the life of an organization. c. Projects require management of just two parameters: cost and time. d. Better project management can help an organization achieve a competitive edge and deliver greater value to its customers. Which of the following statements about software as a service (SaaS) is true? a. SaaS must be licensed for each computer rather than for a number of users. b. Security is not a serious concern with SaaS since data is not shared with SaaS providers. c. One advantage of SaaS is the technical support typically offered. d. Upgrades to SaaS are not included in the standard contract and must be purchased individually. Agile development _____.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
a. forces teamwork and lots of interaction between users and stakeholders b. requires more time to put applications into production than other approaches c. does not include the production of project documentation d. can be implemented by systems analysts and users without special training

Browse Popular Homework Q&A

Q: At General Hospital, nurses are given performance evaluations to determine eligibility for merit pay…
Q: Maximum printable area A rectangular page in a text (withwidth x and length y) has an area of 98…
Q: Determine the number of moles in 5.45 x 1023 formula units of BaBr2. 1
Q: The rate of growth of the fish population was modeled by the equation G(t) =…
Q: Calculations (Show all your work completely and Calculate the mass of the solution for each trial…
Q: The most common method for production of steel is Group of answer choices Slip casting Continuous…
Q: Oriole Industries production division reported a net operating loss of $516000 in 2021. Included in…
Q: What is the difference between the Oregon Death with Dignity Act and Euthanasia?
Q: Sketch the following signals: (a) x₁(t) = t(u(t + 2) - u(t− 2)) (b) x₂(t) = x₁(t - 6k) Σ=-1 (c)…
Q: Construct a truth table for the statement:  ~(~(q v p))
Q: A clothing company determines that its marginal cost, in dollars per dress, is given by the function…
Q: 1. A study of the relation between the waistline and percent body fat in men yielded the data shown…
Q: A firm evaluates all its projects by applying the IRR rule. the current proposed project has a cash…
Q: The size of a certain insect population is given by P(t) = 100e 02t, wheret is measured in days. At…
Q: At STP, temperature and pressure have the values of O 273 K and 1 mmHg 273 K and 760 mmHg O 760 K…
Q: A silicon carbide rotor fractures at a stress level of  150 MPa. This material has a fracture…
Q: Let (an)nzo be a sequence defined by an=n2²+5
Q: Step 1 see the attached map   Each dot on this map represents a place where earthquakes commonly…
Q: You roll a 4 sided die 300 times. The following table lists the how many times each number came up…
Q: Draw isometric view
Q: An investment offers a total return of 13.8 percent over the coming year. You believe the total real…
Q: Find the average value fave of the function f on the given interval. f(x) = 3x2 + 8x,    [−1, 5]