Thursday, February 6, 2020

BZ400 Week 6 Threaded Discussion...MIS

How does Transaction Processing Information Systems differ from Management Information Systems? Please insert page numbers in the body of your discussion and a list of References at the end.

 


BZ400 Week 5 Threaded Discussion......computer Ethics

Computer Ethics

Explain the term, ethical behavior. Please provide a real life example of ethical behavior that you have observed either in a personal or professional setting.

BZ400 Week 3 Threaded Discussion....

Discuss a secure Infrastructure in the context of Information Systems, and explain what makes an information system secure and indicate page numbers in the body of your discussion and a list of References at the end.

 


 

BZ400 Lesson 8 Exam SCORE 100 PERCENT......MIS

Question 1
Your company uses a fingerprint recognition system instead of an access card. This helps the company prevent unauthorized physical access. Which of the following technologies is used for authentication here?
Question options:

Biometrics

Passwords

Smart cards

Access-control software
Question 2
Violating data belonging to banks or other financial institutions is a crime in the United States. Which of the following legislations prohibit such violations?
Question options:

The Computer Fraud and Abuse Act

The Foreign Intelligence Surveillance Act

The Banking Rights and Privacy Act

The Patriot Act
Question 3
Which of the following is one of the main federal laws in the United States against computer crimes?
Question options:

Satellite Act of 1962

United States Information and Educational Exchange Act

Trade Expansions Act of 1962

Electronic Communications Privacy Act of 1986
Question 4
Which of the following can typically be filed for a copyright?
Question options:

Music by the Beatles

Google Nexus phone

Amazon's one-click buying

iPhone
Question 5
An organization takes active countermeasures to protect its systems, such as installing firewalls. This approach is known as risk:
Question options:

reduction.

acceptance.

transference.

rescheduling.
Question 6
Which of the following types of plans describes how a business resumes operation after a disaster?
Question options:

Emergency operation plan

Business continuity plan

Internal operations plan

Collocation facilities plan
Question 7
Which of the following US laws amended the Computer Fraud and Abuse Act to allow investigators access to voice-related communications?
Question options:

The Espionage Act

The Patriot Act

The Non-detention Act

The Video Privacy Protection Act
Question 8
A hacker takes an individual's Social Security number, credit card number, and other personal information for the purpose of using the victim's credit rating to run up debts that are never repaid. This practice is called:
Question options:

cyberbullying.

bot herding.

cyberstalking.

identity theft.
Question 9
Controls that are used to assess whether anything went wrong, such as unauthorized access attempts, are called __________ controls.
Question options:

detective

corrective

adaptive

preventive
Question 10
__________ by terrorists refers to the use of the vast amount of information available on the Internet regarding virtually any topic for planning, recruitment, and numerous other endeavors.
Question options:

Information sharing

Data mining

Information dissemination

Location monitoring
Question 11
Albitrex Systems is an Asian software consulting firm which develops solutions for companies in the United States and Europe. The company is heavily dependent on the Internet for transporting data. The company wants to ensure that only authorized users access the data and that the data cannot be intercepted and compromised. Which of the following would be most helpful to the company in achieving this goal?
Question options:

Tunneling

Hot backing up

Open transmitting

Spam filtering
Question 12
Employees steal time on company computers to do personal business. This can be considered as an example of:
Question options:

cyberstalking.

hacking.

unauthorized access.

Web vandalism.
Question 13
An organization builds a fully equipped backup facility, having everything from office chairs to a one-to-one replication of the most current data. This facility is called a:
Question options:

botnet.

firewall.

hot backup site.

buying center.
Question 14
Ciscon Telecom is a mobile operator in the European Union. The company provides personalized services to its customers, and its databases contain valuable information about its customers. The loss of customer information that is used to decide services would be extremely harmful to the organization. Which of the following strategies used by Ciscon is an example of risk transference?
Question options:

The company insures any possible data loss for a large sum.

It enforces a strict employee data policy and prohibits employees from unauthorized access.

The company forms a special team of top executives to monitor and correct the information policies.

It installs a corporate firewall to protect unauthorized access to information.
Question 15
Which of the following laws makes it mandatory for organizations to demonstrate that there are controls in place to prevent misuse or fraud, controls to detect any potential problems, and effective measures to correct any problems?
Question options:

Trade Expansions Act of 1962

Sarbanes-Oxley Act

Electronic Communications Privacy Act of 1986

Central Intelligence Agency Act
Question 16
Which of the following can typically be filed for a patent?
Question options:

Literature

Software

Music

Material inventions
Question 17
With __________, employees may be identified by fingerprints, retinal patterns in the eye, facial features, or other bodily characteristics before being granted access to use a computer or to enter a facility.
Question options:

passwords

biometrics

CAPTCHAs

access-control software
Question 18
Ronald downloads a movie from the Internet onto his company's computer. During this process, his system gets affected by a virus. The virus spreads rapidly in the company's network and causes the server to crash. This type of virus is most likely:
Question options:

spam.

adware.

phishing mail.

a worm.
Question 19
A mass cyber attack occurred in a country when it took severe actions against a group of citizens who protested against the country's religious policies. The attack involved a denial-of-service in which selected sites were bombarded with traffic to force them offline. This is an example of:
Question options:

cyberterrorism.

cyberbullying.

hot backing up.

logic bombing.
Question 20
While adding information to the employee information database, Neil's computer crashed and the entire database on his computer was erased along with it. Which of the following types of virus would have caused Neil's computer to crash?
Question options:

Worm

Spyware

Adware

Logic bomb




BZ400 Lesson 3 Exam SCORE 100 PERCENT

Question 1
A __________ provides a way for different components of software to interact and exchange data or functionality using common Web communication protocols.
Question options:

Web API

tag cloud

Web X3D

static website
Question 2
Social presence tools are also known as __________ tools.
Question options:

social bookmarking

microblogging

videoconferencing

instant chatting
Question 3
__________ sites create social online communities where individuals with a broad and diverse set of interests meet and collaborate.
Question options:

Social cataloging

Social networking

Social bookmarking

Crowdsourcing
Question 4
The term __________ marketing was coined by Harvard business professor Jeffrey Rayport to describe how good marketing techniques can be driven by word-of-mouth or person-to-person communication.
Question options:

affiliate

buzz

stealth

viral
Question 5
The network effect refers to the notion that the value of a network is dependent on the:
Question options:

knowledge of the users.

number of other users.

commitment of the users.

speed of the network.
Question 6
Social bookmarking allows users to share Internet bookmarks and to create categorization systems. These categorization systems are referred to as:
Question options:

geospatial metadata.

tag clouds.

podcasts.

folksonomies.
Question 7
Which of the following statements is true about a content management system?
Question options:

The creation of the goods or services is dependent on the incremental contributions of the participants.

It is the creation of goods or services by self-organizing communities.

It allows the assignment of different roles for different users.

Anyone can help in producing or improving the final outcome of the goods and services.
Question 8
Cloud-based collaboration tools:
Question options:

require users to frequently upgrade their software.

reduce the risk of exposing sensitive corporate data.

have well-documented procedures for system complexities.

allow for easy transferability of documents from one person to another.
Question 9
The __________ Web, originally envisioned by Tim Berners-Lee, one of the founders of the Internet, is a set of design principles that will allow computers to be able to better index websites, topics, and subjects.
Question options:

affiliate

collaborative

folksonomy

semantic
Question 10
__________ takes the concept of companies having used self-employed consultants to work on individual projects or provide content a step further by enabling people to work in more flexible ways on a variety of Internet-related projects.
Question options:

E-auction

E-lancing

E-filing

E-tailing
Question 11
Which of the following statements is true about a discussion forum?
Question options:

It started out as a novice's way of expressing himself using very simple Web pages.

It is dedicated to a specific topic, and users can start new threads.

It is the process of creating an online text diary made up of chronological entries that comment on everything.

It is a widely used synchronous groupware tool.
Question 12
An electronic __________ is essentially a collection of personal computers networked together with sophisticated software tools to help group members solve problems and make decisions through interactive electronic idea generation, evaluation, and voting.
Question options:

data interchange

meeting system

fund transfer

folksonomy
Question 13
__________ attempts to increase the relevance of search results by including content from blogs and microblogging services.
Question options:

Metasearch

OpenSearch

Social search

Enterprise search
Question 14
Which of the following statements is true about peer production?
Question options:

It is also known as enterprise content systems.

The creator is responsible for publishing new information.

Only editors have the right to develop new content.

Anyone can help in producing or improving the final outcome.
Question 15
Which of the following facilitates real-time written conversations?
Question options:

Status updates

Blogs

Discussion forums

Instant messaging
Question 16
Which of the following benefits of groupware enables many people to speak and listen at the same time?
Question options:

Parallelism

Anonymity

Group memory

Process structuring
Question 17
__________ is a phenomenon where companies use everyday people as a cheap labor force.
Question options:

Crowdsourcing

Nearshoring

Narrowcasting

Phishing
Question 18
__________ refers to manually adding metadata to media or other content.
Question options:

Tagging

Podcasting

Phishing

Crowdsourcing
Question 19
Which of the following is a consequence of the use of social software?
Question options:

People have increased purchasing power.

People are using environmentally-friendly products.

People are sharing more personal information online.

People are using encyclopedias as sources of unbiased information.
Question 20
Which of the following is a collaboration management tool that is used to facilitate virtual or collocated meetings?
Question options:

Intranets

Blogs

Video conferencing

Internet forums



BZ400 Lesson 2 Exam SCORE 95 PERCENT

Question 1
In the __________ stage of business-to-consumer electronic commerce, dissemination of promotional and marketing material, like providing electronic brochures, takes place.
Question options:

e-transaction

e-subscription

e-information

e-integration
Question 2
With respect to typical revenue models for electronic commerce businesses, Symantec and Norton are using a(n) __________ revenue model.
Question options:

licensing

brokerage

subscription

affiliate marketing
Question 3
A way to ensure that a company's site is on the first page users see when looking for a specific term is using __________ advertising.
Question options:

search

viral

buzz

stealth
Question 4
E-filing is an example of a __________ tool.
Question options:

government-to-government

consumer-to-consumer

government-to-citizen

consumer-to-business
Question 5
Which of the following is a disadvantage of e-tailing?
Question options:

It requires additional time for products to be delivered.

It is limited by physical store and shelf space restrictions.

It complicates the process of comparison shopping.

It restricts companies to effectively compete on price.
Question 6
In grid computing, the slowest computer creates a bottleneck and slows down the entire grid. A(n) __________ grid, consisting of a large number of computers, can help overcome these problems.
Question options:

dedicated

trusted

edged

clustered
Question 7
Which of the following statements is true about the platform as a service model?
Question options:

The customer is provided with the basic capabilities of processing, storage, and networking.

Only the basic capabilities of processing, storage, and networking are provided.

The customer has no knowledge or control over the underlying infrastructure and has only limited ability to control or configure application-specific settings.

The customer can run his or her own applications that are typically designed using tools provided by the service provider.
Question 8
The suffix ".org" is reserved for:
Question options:

educational institutions.

non-profit organizations.

commercial organizations.

governmental entities.
Question 9
The protocol used by the Internet is called the:
Question options:

Dynamic Host Configuration Protocol (DHCP).

Transmission Control Protocol (TCP).

Address Resolution Protocol (ARP).

Trivial File Transfer Protocol (TFTP).
Question 10
Which of the following is likely to have the suffix ".edu" after the domain name in its URL?
Question options:

Harvard Business School

The Federal Reserve

UNICEF

Yahoo!
Question 11
EZBiz, the brainchild of three college friends, is a startup venture which plans to produce and market sports gear. They are currently trying to decide between a bricks-and-clicks strategy and a click-only strategy. Which of the following, if true, would most undermine the decision to adopt a click-only strategy?
Question options:

The public is wary of sharing confidential information after a recent spate of credit card scandals.

Several companies who have switched from brick-and-mortar strategy to a click-only are experiencing severe channel conflicts.

The company has limited access to funds and is looking to keep its costs low.

A competitor is facing severe backlash after inadvertently releasing sensitive data into the public domain.
Question 12
With regard to the World Wide Web, Web pages are stored on Web:
Question options:

consortiums.

rings.

servers.

consoles.
Question 13
Under the __________ computing model, organizations "rent" resources such as processing, data storage, or networking from an external provider on an as-needed basis and pay only for the services used.
Question options:

grid

distributed

cluster

utility
Question 14
Which of the following statements is true about electronic commerce?
Question options:

Business-to-business is by far the largest form of electronic commerce in terms of revenues.

All forms of electronic commerce involve business firms.

Electronic commerce is limited to transactions between businesses and consumers.

Electronic commerce between businesses and their employees is impossible.
Question 15
Provoking bidders to leave a legitimate auction to buy the same item at a lower price outside the auction space, where return policies and buyer protection do not apply, is called:
Question options:

bid luring.

bid shielding.

bid skimming.

rafter bidding.
Question 16
Manufacturers of hardware and software often apply the concept of planned obsolescence, meaning that the:
Question options:

product is designed to avoid obsolescence.

product is designed in such a way as to extend its life span.

product is designed to last only for a certain life span.

companies have already decided when to launch their next product.
Question 17
Which of the following statements is true about servers?
Question options:

They are optimized for visualization and rendering of three-dimensional models.

They are used to provide services to users within large organizations or to Web users.

They are used primarily to assist in solving massive scientific problems.

They are primarily used as the main, central computing system for major corporations.
Question 18
Which of the following occurred in the 1946-1958 generation of computing?
Question options:

The internetworking era ended.

The mainframe era began.

The mainframe era ended and the personal computer era began.

The interpersonal computing era ended and the internetworking era began.
Question 19
Within the context of different types of e-auction fraud, bid shielding is sometimes called:
Question options:

reverse bidding.

bid skimming.

shill bidding.

bid luring.
Question 20
__________ is used to transmit voice and video communication over the Internet.
Question options:

Edge computing

IP routing

Distributed computing

IP convergence




BZ400 Lesson 1 Exam SCORE 95 PERCENT

Question 1
Which of the following statements is true about data?
Question options:

It can be defined as a representation of reality.

It is the ability to make decisions or predictions based on information.

It has no meaning in and of itself.

It is the ability to understand information.
Question 2
Which of the following is an implication for firms that have a threat of new entrants in their market?
Question options:

Increased cost

Increased demand for services

Decreased market share

Reduced quality
Question 3
With respect to the types of information systems used in organizations, a word processor is an example of a(n) __________ system.
Question options:

office automation

geographic information

electronic commerce

supply chain management
Question 4
In order to take advantage of the high quality talent pool, Ernst & Young sets up operations in the Philippines and moves part of its tax services to its new facility. Identify this strategy.
Question options:

Outsourcing

Offshoring

Franchising

Importing
Question 5
With reference to assessing value for the IS infrastructure, architectural value is derived from:
Question options:

an investment's impact on enabling the infrastructure to better meet business processing requirements.

an investment's ability to extend the infrastructure's capabilities to meet business needs today and in the future.

assessing the extent to which an investment helps to meet requirements for control, security, and integrity as required by a governing body or a key customer.

the infrastructure's ability to enhance the profitability of the business.
Question 6
Which of the following IS personnel is responsible for managing disaster recovery within an organization?
Question options:

Programmer

Webmaster

IS security manager

IS auditor
Question 7
At the __________ level of an organization, information systems provide KPIs that are focused on balancing performance across the organization.
Question options:

executive

illusive

operational

tactical
Question 8
Information about one's identity and place of living is an example of __________ data.
Question options:

psychographic

behavioral

demographic

geographic
Question 9
Which of the following occurred when Alvin Toffler's "third wave" gained speed?
Question options:

Society moved from a predominantly agrarian culture to the urbanized machine age.

Individuals shifted from handicrafting items for sale to working in factories.

Occupations changed to accommodate the mechanized society.

Information became the currency of the realm.
Question 10
Which of the following statements is true about information systems (IS) and information technology (IT)?
Question options:

IT programs are more technical in nature than IS programs.

IT programs have a stronger managerial focus than IS programs.

Software and telecommunications are present in IS, but excluded from IT.

IS programs have a stronger data retrieval capacity than IT programs.
Question 11
Identify the purpose of an office automation system.
Question options:

To create, store, analyze, and manage spatial data

To support interaction between the firm and its customers

To support a wide range of predefined day-to-day activities of individuals and small groups

To provide access to databases in order to support quantitative decision making
Question 12
In an e-business innovation cycle, after an organization scans the environment for new emerging and enabling technologies, the next step is to:
Question options:

create jobs, groups, and processes that are all devoted to scanning the environment.

select the database and data storage advances.

address the current opportunity to grab customers and market share.

match the most promising new technologies with current economic opportunities.
Question 13
Within the context of international business strategies, a global strategy is associated with __________ of local responsiveness.
Question options:

low degree of global integration and high degree

high degree of global integration and low degree

high degree of global integration and high degree

low degree of global integration and lack
Question 14
In 1994, a company called __________ released the first mainstream Web browser thereby opening up the possibilities of the Internet for the general public.
Question options:

Microsoft

Oracle

Netscape

Google
Question 15
Home-replication strategy is also called the __________ strategy.
Question options:

global

transnational

multidomestic

export
Question 16
Which of the following types of information systems facilitates collaboration and knowledge sharing? Answer: A
Question options:

Social software

Electronic commerce system

Word processor

Intelligent system
Question 17
Organizations deploying innovative information systems must have the human capital necessary to deploy the new systems. These requirements can be categorized as __________ requirements.
Question options:

risk tolerance

customer

resource

process
Question 18
Managers at the tactical level of an organization focus on:
Question options:

complex problems with broad and long-term ramifications for the organization.

routine, day-to-day business processes, and interactions with customers.

long-term strategic questions facing the organization.

deploying organizational resources to achieve the strategic objectives of the organization.
Question 19
With respect to the types of information systems used in organizations, an Online Analytical Processing (OLAP) system is an example of a(n) __________ system.
Question options:

office automation

data mining and visualization

geographic information

electronic commerce
Question 20
Which of the following is a governmental challenge of operating in the digital world?
Question options:

Differences in power distance and uncertainty avoidance

Aging population in the United States

Videoconferences across different time zones

Import and export regulations




H400 Thesis Revised

Requirement: Write a double-spaced, one-page outline that includes the thesis, major points, supporting points of evidence, and conclusio...