Info
Warning
Danger

Study Resources (Accounting)

9.3   Essay Questions 1) Define business intelligence and BI systems. 2) Name and describe the three primary activities in the BI process. 3) Describe the functions of data warehouses and the need for them. 4) What are the common problems with using operational data? 5) Describe the features of a data mart. .
7 Views
View Answer
31) In asymmetric encryption, each site has a ________ for encoding messages. A) botnet B) private key C) public key D) cookie 32) With ________, the sender and receiver transmit a message using different keys. A) asymmetric encryption B) block cipher C) symmetric encryption D) stream cipher 33) Secure Socket Layer is also known as ________. A) application layer B) transport layer.
10 Views
View Answer
11) An information system is a collection of components, including a computer, that stores and retrieves data and produces information. 12) A process may use multiple information systems, and an information system may touch many different processes. 13) Information systems are typically acquired off-the-shelf in time of need. 14) Like business processes, information.
9 Views
View Answer
51) ________ involve the people and procedure components of information systems. A) Firewalls B) Technical safeguards C) Human safeguards D) Payloads 52) Which of the following statements is true about human safeguards for employees? A) Security screening in an organization is a one-time process and applies only to new employees. B) User accounts should be defined to.
6 Views
View Answer
9.2   Multiple-Choice Questions 1) ________ is defined as information containing patterns, relationships, and trends of various forms of data. A) Process mining B) Business process management C) Business intelligence D) Spatial intelligence 2) Which of the following is true of source data for a BI system? A) It refers to the organization's metadata. B) It refers to.
29 Views
View Answer
31) A business that selects a differentiation strategy would necessarily structure itself around least-cost activities. 32) A business with a differentiation strategy will add cost to an activity as long as the activity has a positive margin. 33) The difference between the value that an activity generates and the cost of the.
7 Views
View Answer
11) When a hacker floods a Web server with millions of bogus service requests so that it cannot service legitimate requests, it is called a denial-of-service attack. 12) Natural disasters present the largest risk for infrastructure loss. 13) In the context of information security, safeguards increase work efficiency by making common.
12 Views
View Answer
41) Hadoop is an open-source program supported by the Apache Foundation4 that implements MapReduce on potentially thousands of computers. 42) Knowledge management was done only after the advent of social media. 43) Knowledge management is the process of creating value from intellectual capital and sharing it with those who need it. 44).
8 Views
View Answer
31) Encryption is an example of a technical safeguard. 32) In symmetric encryption, two different keys are used to encode and decode a message. 33) Symmetric encryption is simpler and much faster than asymmetric encryption. 34) Secure Socket Layer (SSL) is a protocol that is restricted to asymmetric encryption. 35) Viruses and worms.
10 Views
View Answer
13.2   Multiple-Choice Questions 1) Which of the following statements is true of the impact of globalization on value chains and business processes? A) International companies are now required to conduct sales and marketing efforts entirely in the parent country. B) Companies prefer to perform all their processes in-house, as it is more cost-effective.
15 Views
View Answer
13.3   Essay Questions 1) Briefly explain the two major ways in which thinking about competitive strategies has changed in the emerging global economy. 2) List the issues that need to be addressed when localizing a computer program. 3) How are international processes likely to be developed to overcome the challenges presented by the.
13 Views
View Answer
11) The purpose of the ________ group is to protect data and information assets by establishing data standards and data management practices and policies. A) data administration B) data warehousing C) data mining D) data communication 12) A ________ works with users to determine system requirements, designs and develops job descriptions and procedures, and helps.
8 Views
View Answer
9.1   True/False Questions 1) Business intelligence (BI) systems have only four of the five components of an information system: hardware, software, data, and people. 2) The software component of a BI system is called a BI application. 3) The three primary activities in the BI process are to acquire data, perform analysis, and.
19 Views
View Answer
21) Nonword passwords are also vulnerable to brute force attacks. 22) Even short passwords with no special characters can make strong passwords. 23) It is safer to use the same password for all the Web sites. 24) The senior management must establish a company-wide security policy that states the organization's posture regarding the.
9 Views
View Answer
41) In market-basket terminology, the ratio of confidence to the base probability of buying an item is called ________. A) confidence B) support C) granularity D) lift 42) A ________ is a hierarchical arrangement of criteria that predict a classification or a value. A)  value chain B)  cluster analysis C)  decision tree D)  neural.
7 Views
View Answer
10.3   Essay Questions 1) Describe the composition of a development team for an information system. 2) Define business process, roles, resources, and data flows. 3) Explain why process management is necessary for an organization. 4) Name the four stages of the business process management cycle and summarize the activities in each. 5) What are the.
8 Views
View Answer
11) With the exception of system analyst, all the major job positions in the IS industry require business knowledge. 12) In the context of responsibilities involved in job positions in the IS industry, a business analyst works with business leaders to develop systems that implement business strategy and goals. 13) In the.
14 Views
View Answer
11) Which of the following best describes the bullwhip effect? A) the value of a telecommunications network is proportional to the square of the number of users connected to the system B) the performance improvement to be gained from using some faster mode of execution is limited by the fraction of the.
12 Views
View Answer
11.3   Essay Questions 1) List the major functions of the IS department. 2) Describe the CIO's typical reporting relationships. 3) Describe the typical responsibilities of a CTO. 4) Name the four groups found in a typical IS department and explain the major responsibilities of each. 5) Explain the major IS planning functions. .
7 Views
View Answer
11.1   True/False Questions 1) One of the major functions of the information systems department is to develop, operate, and maintain applications. 2) The structure of the IS department remains constant across organizations. 3) In all companies, the chief information officer reports directly to the chief financial officer. 4) In IS departments, the technology office.
27 Views
View Answer
21) It is the chief information officer's responsibility to establish and communicate IS priorities to the executive group, while the responsibility for enforcement rests with the chief executive officer. 22) A steering committee is a group of senior managers from the major business functions that works with the chief information officer.
9 Views
View Answer
12.1   True/False Questions 1) As problems caused by human errors are accidental and not malicious, they are not considered as security threats to the information system. 2) A computer crime is committed if an employee inadvertently installs an old database on top of the current one. 3) Unauthorized data disclosures are possible due.
22 Views
View Answer
11) ________ occurs when a person breaks into a network to steal data such as customer lists, product inventory data, employee data, and other proprietary and confidential data. A) Pretexting B) Phishing C) Hacking D) Spoofing 12) Which of the following is most likely to be a result of hacking? A) certain Web sites being censored.
10 Views
View Answer
11.2   Multiple-Choice Questions 1) Developing, operating, and maintaining an organization's computing infrastructure is a major function of the ________ department. A) human resources B) information systems C) marketing D) manufacturing 2) Which of the following statements is true of an IS department? A) If the IS primarily supports accounting and finance activities, the CFO is appointed as.
5 Views
View Answer
10) What is the objective of performing a market-basket analysis? 11) What are MapReduce and Hadoop? 12) What is knowledge management and what are its primary benefits? 13) What are expert systems? What are their primary disadvantages? 14) Explain the difference between static and dynamic reports. 15) Describe the management functions of a business.
9 Views
View Answer
6) Describe a steering committee and explain the CIO's role with regard to it. 7) What is outsourcing? Explain the management advantages of outsourcing. 8) How does outsourcing help reduce costs? 9) How does outsourcing facilitate risk reduction? 10) Describe the different outsourcing alternatives for hardware, software, data, and procedures. .
10 Views
View Answer
41) If a backup of the database contents is made, the database is completely protected. 42) Documenting position sensitivity enables security personnel to prioritize their activities in accordance with the possible risk and loss. 43) Employee termination is a potential security threat for an organization. 44) The existence of accounts that are no.
11 Views
View Answer
41) The organization should protect a user's computer and its files. 42) IS users are restricted from participating in requirements meetings for new applications that they will use and for major changes to applications that they currently use. 43) It is reasonable for IS users to expect to receive repetitive training and.
18 Views
View Answer
11) Problematic data are termed dirty data. 12) A value of 999—999—9999 for a U.S. phone number is an example of dirty data for BI purpose. 13) Granularity is a term that refers to the level of detail represented by the data. 14) It is possible to capture the customers' clicking behavior using.
9 Views
View Answer
12.3   Essay Questions 1) Define threat, vulnerability, safeguard, and target. 2) What are the three general sources of security threats? 3) What is meant by denial of service? 4) Describe the magnitude of security problems in the present day. 5) List various personal security safeguards. .
6 Views
View Answer
21) Competition from rivals is particularly high when industry growth is slow and when exit barriers are high. 22) The strength of the bargaining power of suppliers and customers depends on the switching costs and product differentiation. 23) A company that states a strategy of low cost leadership and a differentiation on.
8 Views
View Answer
31) Which of the following is an example of outsourcing an entire business function? A) acquiring licensed security software instead of developing it in-house B) making customizations to licensed software C) outsourcing the function of arranging employee travel D) outsourcing the payroll function 32) In 2005, Marrion International chose a human resources consulting agency to.
5 Views
View Answer
12.2   Multiple-Choice Questions 1) A ________ is a person or an organization that seeks to obtain or alter data or other IS assets illegally, without the owner's permission and often without the owner's knowledge. A) target B) vulnerability C) threat D) key escrow 2) Which of the following is considered a threat caused by human error? A).
14 Views
View Answer
11) Describe the loss of control associated with outsourcing. 12) Explain how the benefits of outsourcing are outweighed by its long-term costs. 13) Explain the risks associated with ending an outsourcing agreement. 14) List any four rights of users of information systems. 15) List any four responsibilities of users of information systems. .
16 Views
View Answer
21) Removing and disabling ________, which may contain sensitive security data, presents an excellent example of the trade-off between improved security and cost. A) bookmarks B) pop-ups C) cookies D) toolbars 22) Which of the following is a critical security function that the senior management should address in an organization? A) sharing the private key with.
7 Views
View Answer
41) A ________ is a type of virus that propagates using the Internet or other computer networks. A) worm B) sniffer C) Trojan horse D) phisher 42) ________ is similar to spyware but it watches user activity and produces pop-ups. A) A cookie B) Adware C) A payload D) Shareware 43) Which of the following is likely to be accepted.
6 Views
View Answer
21) Which of the following statements is true about the steering committee of an IS department? A) The steering committee is comprised exclusively of employees from the IS department in an organization. B) The steering committee's membership is determined by the IS department. C) The steering committee's schedule and agenda are typically set.
7 Views
View Answer
31) Which of the following observations about RFM and OLAP reports is true? A) RFM is more generic than OLAP. B) OLAP reports are more dynamic than RFM reports. C) RFM reports have measures and dimensions. D) RFM reports can drill down into the data. 32) ________ is the application of statistical techniques to find.
8 Views
View Answer
13.1   True/False Questions 1) The global economy has intensified rivalry by increasing product and vendor choices and by accelerating the flow of information about price, product, availability, and service. 2) Unlike business processes, information systems procedures need not reflect local cultural values and norms. 3) Distributed database processing refers to the processing of.
21 Views
View Answer
21) RFM analysis considers how recently (R) a customer ordered, how frequently (F) they ordered, and how much margin (M) the company made on the orders. 22) OLAP provides the ability to sum, count, average, and perform other simple arithmetic operations on groups of data. 23) The defining characteristic of OLAP reports.
7 Views
View Answer
31) Cluster analysis is used to identify groups of entities that have similar characteristics. 32) In supervised data mining, a model is developed after the analysis. 33) Regression analysis measures the effect of a set of variables on another variable. 34) Neural networks are a popular unsupervised data mining technique used to predict.
8 Views
View Answer