MIS final multiple choice Questions And Answers
farmeron collects data across many farms, so the company can make broad conclusions about what works best. these methods and techniques are called () - ANSWER best practices seminole gaming had a problem with its () strategy, so it used BI to identify the best strategy - ANSWER mailing which of the following is NOT a problem with tweaking existing systems? - ANSWER riskiness BI encompasses () - ANSWER all of the above the scrum approach is a type of () technique - ANSWER agile development anniston orthopedics used a () conversion strategy since they first implemented the "practice" side of the office and then the "chart" medical side - ANSWER phased in which stage of the IDC do you validate the model - ANSWER design according to the book, which sport is currently using analytics software to reduce injuries in players - ANSWER rugby which of the following is NOT a primary factor to consider vendor selection - ANSWER cost () planning is developing long range goals and policies for growth and resource allocation - ANSWER strategic BI applications include () or multi dimensional analysis - ANSWER OLAP () problems are typically addressed for knowledge workers - ANSWER structured which of the following is not an objective of the IT strategic plan - ANSWER to modify the organizations objectives and resources to match its changing markets and opportunities () is an advantage of prototyping - ANSWER helps clarify user requirements GIS is a type of () - ANSWER data visualization technology the answer to the question "where will the application originate" for 90% of GMs IT was originally - ANSWER outsource an IT managers salary is an () - ANSWER fixed cost () analysis focuses on a desired output in the systems thinking model - ANSWER goal seeking virgin america implemented a () conversion for their new reservation system - ANSWER direct () is the most common cost/benefit analysis used to justify IT expenditures - ANSWER business case approach which of the following is NOT strength of GE healthcares new agile based scrum initiative - ANSWER predicting deliverable dates which of the following is FALSE of NYSE euronexts adoption of atlassian software - ANSWER its employees were all largely supportive since it helped them do their jobs better deciding whether to open a warehouse in new york city or chicago is a () - ANSWER unstructured customizing a prewritten application involves () computer code - ANSWER some the color () in the management cockpit represents market performance - ANSWER red which of the following is TRUE when thinking about unstructured problems - ANSWER they are a measure in terms of CSFs ASPs and SaaS are a consideration in the following question: - ANSWER where will the application run? according to the "eu court says data transfer pact with us violates privacy" wall street journal article, which of the following is FALSE - ANSWER the decision creates new legal risks for companies, where companies like google will see the greatest impact which of the following is not an accuracy issue - ANSWER how secure are the data against access by unauthorized people privacy rights apply primarily to () - ANSWER all of the above which of the following is true - ANSWER it is easier to be a hacker nowadays which of the following is false of data aggregators - ANSWER they can only legally collect public data which of the following companies was not aggressively opposed to being cloned by the german brothers - ANSWER groupon which of the following is the most valuable information security control - ANSWER user education and training which of the following is NOT an issue associated with the international aspects of privacy - ANSWER the united nations isnt an effective regulator of privacy laws if you outsource your IT security to fireeye like target, this is considered risk () - ANSWER transference your thumbprint is something the user () - ANSWER is which of the following is true of the pinterest case - ANSWER it illustrates the difficulty in policing copyrighted material i believe my social security number belongs to me and nobody should have the right to sell (or steal) it for any reason. this is a () issue - ANSWER property according to the () approach, wiki leaks is unethical - ANSWER rights which of the following is NOT one of the most dangerous employees to information security - ANSWER salespeople () is a targeted attack on an individual - ANSWER spear phishing in public keys encryption, there are () keys - ANSWER 2 wikileaks has the greatest impact on () - ANSWER governments () is a technique designed to allow the perpetrator to enter restricted areas that are controlled with locks or card entry - ANSWER tailgating which of the following is not an unintentional threat to information systems - ANSWER phishing attack according to the "notified about a data breach?" wall street journal article, which of the following is true - ANSWER notification laws vary significantly in terms of information covered and the procedures that companies must take to issue notifications if youve contracted with IBM to host a backup site for you in case of an emergency youve implemented a () site - ANSWER warm phishing is an example of () - ANSWER software attack hactivism s an example of () - ANSWER sabotage determining whether or not corporate computers can be used for private purposes is a () issue - ANSWER property () is the law that prevents businesses from conducting business with any copyright infringing website - ANSWER SOPA which of the following is true in regard to workplace monitoring - ANSWER employers install monitoring and filtering software to enhance security and increase employee productivity auditing () the computer means inputs, outputs, and processing are checked - ANSWER through a () is characterized by an attacker sending so many information requests to a target computer system that the target cannot handle them successfully and typically crashes - ANSWER DoS attack which of the following is true of google glass case - ANSWER even google has to offer reasonable expectation of privacy to sell its products you have a small business that has had problems with malware on your employees computers. like most small business owners, you decide preventing this problem from reoccurring is not a priority. you are adopting a risk () strategy - ANSWER acceptance which of the following is a disadvantage of the german remote sensing data center - ANSWER security data marts are implemented () data warehouses - ANSWER more quickly than which of the following is the correct order of the data hierarchy, from smallest to largest - ANSWER database, file, record, field, byte, bit big data helps with marketing by () - ANSWER personalizing messages hardware costs have been () over time and software costs have been () over time - ANSWER decreasing, increasing which of the following is the correct order of memory capacity, from smallest to largest - ANSWER KB, MB, GB, TB, PB, EB, ZB data are normalized when they depend only on () - ANSWER the primary key which of the following is the correct order of the class of computers, from the most to least powerful - ANSWER supercomputer, mainframe, midrange, microcomputers, wearable which of the following is not a disadvantage of new york citys public data policy -
Geschreven voor
- Instelling
- MIS
- Vak
- MIS
Documentinformatie
- Geüpload op
- 9 maart 2023
- Aantal pagina's
- 11
- Geschreven in
- 2022/2023
- Type
- Tentamen (uitwerkingen)
- Bevat
- Vragen en antwoorden
Onderwerpen
- mis final multiple choice
- mis final
- mis
-
mis final multiple choice questions and answers
-
knowledge is the recommendation given to the user by the expert system answer transfer
-
are particularly