CIS pt.2

Online auctions allow you to check your account balances, make electronic payments, view your transaction history, and more
fasle
____, as it relates to the Internet, encompasses what information about individuals is available, how it is used, and by whom.
privacy
The lack of feedback is one disadvantage of Web-based training and distance learning.
false
A collaborative Web page that is designed to be edited and republished by a variety of individuals is known as a(n) ____.
wiki
One objective of the ____ project was to create a computer network that would allow researchers located in different places to communicate with each other.
ARPANET
Before using a dial-up access number to connect to the Internet, verify that it is a local telephone number; if it is not, you will incur long-distance charges.
true
Performance-based exams cannot be administered and taken online.
false
Web sites provide access to specic types of useful information, such as maps and driving directions.
reference
Twittering allows up to 256 characters
false, 140
Web services companies are the enterprises that own or operate the paths or “roadways” along which Internet data travels, such as the Internet backbone and the communications networks connected to it.
false
The Internet Society provides leadership in addressing issues that may impact the future of the Internet and oversees the groups responsible for Internet infrastructure standards.
true
Case-Based Critical Thinking Questions

Case 8-2
Brenda is a college student who enjoys downloading music, movies, and television shows from the Internet. She also uses the Internet for other entertainment, such as sports.

Because she is an avid baseball fan, Brenda has subscribed to the ____ feed of her local team so that news about her team is delivered to her as it becomes available.

RSS
Application service providers (ASPs) supply the information that is available through the Internet.
false
A ____ limits the search to a particular search characteristic, such as the page title, URL, page text, top-level domain, or Web site.
field search
A good strategy to use when basic searching is not producing the desired results is field searching
true
____ coordinates activities related to the Internet’s naming system, such as IP address allocation and domain name management.
ICANN (Internet Corporation for Assigned Names and Numbers)
Common online investing services include the ability to set up a(n) ____ that displays the status of the stocks you specify.
online portfolio
Conventional dial-up connects to the Internet at a maximum of ____.
56 Kbps
Case-Based Critical Thinking Questions

Case 8-2
Brenda is a college student who enjoys downloading music, movies, and television shows from the Internet. She also uses the Internet for other entertainment, such as sports.

Brenda also orders movies and television through the Internet via a(n) ____ provider, which allows users to download video for a fee.

VOD
One advantage of a dial-up connection is ____.
security
____ was originally developed to carry a large number of high-speed video transmissions at one time, such as to deliver cable TV service.
coaxial cable
Support for TCP/IP is built into operating systems, and TCP addresses are commonly used to identify the various devices on computer networks.
false
TCP/IP is the protocol used for transferring data over the Internet.
true
A(n) ring network uses a central cable to which all network devices connect.
false
An emerging type of mobile phone is the cellular/satellite ____ phone that can be used with cellular service when it is available and then switches to satellite service when cellular service is not available.
dual-mode
A personal area network (PAN) is a small network of two or more personal devices for one individual, such as a personal computer, smartphone, headset, tablet, portable speaker, smart watch, and/or printer.
true
Electronic medical monitors take the vital signs of an individual (such as weight, blood-sugar readings, or blood pressure) or prompt an individual to answer questions.
true
Physicians can use telemedicine to perform remote diagnosis of patients.
true
Client-server networks are frequently referred to as peer-to-peer networks.
false
The ____ network consists of 24 Department of Defense satellites that are used for location and navigation purposes.
global positioning system (GPS)
____ is typically used with LANs that have a star topology and can be used in conjunction with twisted-pair, coaxial, or fiber-optic cabling.
Ethernet
A GPS receiver measures the distance between the receiver and ____ GPS satellites simultaneously to determine the receiver’s exact geographic location.
four
____ is relatively uncommon in data transmissions because most devices that are mainly one-directional, such as a printer, can still transmit error messages and other data back to the computer.
Simplex transmission
The trend toward online collaboration is usually called workgroup computing.
true
Some wireless ____ are created by large organizations to provide free or low-cost Internet access to area residents.
MANs
In ____, data is sent when it is ready but all data must be delivered at the time that it is needed
isochronous transmission
With a(n) partial mesh ​topology, some devices are connected to all other devices, but some are connected only to those devices with which they exchange the most data.
true
____ networks use a central device to connect each device directly to the network.
Star
Because geosynchronous satellites are so close above the surface of the earth, there is no delay while signals travel from earth, to the satellite, and back to earth again.
False
Companies that provide mobile phone services are commonly called wireless providers
True
____ refers to the complete malfunction of a computer system.
system failure
Common types of possessed objects are smart cards, RFID-encoded badges, magnetic cards, ____, and smartphones that are swiped through or placed close to a reader to be read.
USB security tokens
By ____, you instruct companies with whom you do business not to share your personal information with third parties.
opting out
____ are designed to withstand much more physical abuse than conventional devices.
Ruggedized devices
One of the most obvious types of hardware loss is hardware theft
true
A fraud or scam carried out through the Internet is a form of ____.
dot con
System failure can occur because of a hardware problem, a software problem, or computer sabotage.
true
Some worms are specifically written to take advantage of newly discovered ____ in operating systems and e-mail programs before the security patch to correct that vulnerability is available.
security holes
The hard drives of devices to be disposed of should be destroyed before they are sold or recycled.
false
Creating a ____ means making a duplicate copy of important files so you can restore those files if needed.
backup
For extended power outages, generators are needed.
true
Using the ____ browsing mode offered by some browsers can prevent personal information from being left on a public computer.
private
A hard drive that uses FDE is often referred to as a(n) ____.
self-encrypting hard drive
Samuel loves to shop online because it allows him to easily compare prices at different retailers and read reviews from other buyers before buying a product. However, Samuel is also concerned about protecting his personal information.

In order to lessen the chances of his main e-mail address getting spam, he uses a ____ e-mail address when shopping online.

throw-away
Unintentional encryption can result in huge data losses during or after a natural disaster or a terrorist attack.
false
A government database is a collection of data about people that is collected and maintained by private industry.
false
Some software tools are designed for recovery, instead of prevention; that is, they are designed to locate lost or stolen hardware. One example is device tracking software.
true
A(n) Trojan horse is a type of malware that masquerades as something else—usually an application program.
true
To comply with truth-in-advertising laws, a(n) unsubscribe ​e-mail address included in an unsolicited e-mail must be a working address.
true
____ are used to control access to facilities, devices, computer networks, company databases, Web site accounts, and other assets.
Access control systems
A(n) ____ is a collection of elements (people, hardware, software, and data) and procedures that interact to generate information needed by the users in an organization.
information system
When computer systems perform in ways that would be considered intelligent if observed in human beings, it is referred to as ____.
artificial intelligence (AI)
A(n) data mart typically stores data for an entire enterprise.
false
A ____ is responsible for maintaining a large, multiuser system.
system administrator
A paperless office can be implemented today through a variety of technologies and processing techniques.
false
Mary is entering her senior year of college. She has a meeting on Friday with her advisor to discuss her career plans.

Mary is also interested in identifying the business needs of a system and ensuring the systems meet those needs. Her advisor will probably tell her to look into becoming a ____.

business analyst
The ____ contains a list of technical specifications for equipment, software, and services needed for a new system, as determined during the system design phase, and requests that vendors propose products that meet those specifications.
request for proposal (RFP)
Mother Goose Computing, Inc. provides computational biology consulting services. They are currently updating several of their systems.

For the biochemistry division, Mother Goose is planning to implement the new system first in their New York location. If it works properly, they will extend it to their Boston and Chicago locations. This is called a ____ conversion.

direct (WRONG)
In an expert system, the ____ is a software program that applies the rules to the data stored in the knowledge base in order to reach decisions
inference engine
A computer operations manager designs and builds the end-user interfaces and tools used with cloud services.
false
The objective of ____ is to gather useful data about the system being studied.
data collection
A(n) GIS program helps design buildings, bridges, and other structures; design new products; design mechanical and electrical systems; and so forth.
false
An information system that combines geographic information with other types of data (such as information about customers, sales, and so forth) in order to provide a better understanding of the relationships among the data, is called a geographic information system (GIS).
true
____ refer to the variety of systems in place to record the details of a company’s financial transactions (such as payments and purchases).
accounting systems
A(n) systems analyst codes system software, fine-tunes operating system performance, and performs other system software-related tasks.
false
Two specific types of ____ are e-commerce systems and point-of-sale (POS) systems.
order entry systems
A(n) ____ is used to describe the characteristics of all data used in a system.
data dictionary
Some benefits can be computed relatively easily by calculating the amount of labor the new system will save, the reduction in paperwork it will allow, and so on. These gains are called ____ because they represent quantifiable dollar amounts.
tangible benefits
System development can take place in-house or it can be outsourced to external companies
true
____ refers to the use of computers to help manage manufacturing operations and control the machinery used in those processes.
computer-aided manufacturing (CAM)
An emerging sport robotic application is the exoskeleton suit.
false
____ are useful for identifying procedures and summarizing the decision making process for one step of a system.
decision tables
The data dictionary resulting from the system analysis phase includes any instruments (such as questionnaires or interview questions) used in the data gathering stage, as well as the resulting diagrams, tables, trees, models, and other tools used to summarize and analyze the gathered data.
false
____ is a conceptual blueprint that defines the structure and operations of an enterprise (a business, organization, government agency, or other entity).
enterprise architecture
Two specific types of ____ are e-commerce systems and point-of-sale (POS) systems.
order entry systems
When computer systems perform in ways that would be considered intelligent if observed in human beings, it is referred to as ____.
artificial intelligence (AI)
Robots of the future are expected to have a less humanoid form than the household robots currently on the market.
false
Typically, information systems are used to support business intelligence (BI).
true
The information systems (IS) department is also called the information technology (IT) department.
true
is the process of gathering, storing, accessing, and analyzing data about a company in order to make better business decisions.
business intelligence
When information from an ERP or other type of internal system is exchanged between different applications (either within an organization or between organizations), it is called
EAI
In addition to the normal business transaction processing systems, there are also specialty transaction processing systems used by law enforcement, the military, financial institutions, and other organizations.
true
The ____ contains a list of technical specifications for equipment, software, and services needed for a new system, as determined during the system design phase, and requests that vendors propose products that meet those specifications.
incorrect – not request for quotation (RFQ)
An emerging type of system is the digital ecosystem, which is the collection of people, products, services, and business processes related to a digital element.
true
is the phase of system development in which the current system and identified problems are studied in depth and the needs of system users are assessed.
system analysis
____ is a useful sales and marketing tool to help companies match customers with products they would be likely to purchase.
customer profiling
Data mining used in conjunction with Web site data is referred to as Web mining
true
The purpose of computer-aided manufacturing (CAM) is to reduce the time designers spend developing products.
false
A company’s ____ oversees routing transaction processing and information systems activities, as well as other computer-related areas.
chief information officer (CIO)
An information system that combines geographic information with other types of data (such as information about customers, sales, and so forth) in order to provide a better understanding of the relationships among the data, is called a geographic information system (GIS).
true
The data dictionary resulting from the system analysis phase includes any instruments (such as questionnaires or interview questions) used in the data gathering stage, as well as the resulting diagrams, tables, trees, models, and other tools used to summarize and analyze the gathered data.
false
Mary is entering her senior year of college. She has a meeting on Friday with her advisor to discuss her career plans.

Mary might want to consider becoming a ____, as she would eventually like to manage networks for an organization and determine what changes, if any, are needed.

network systems and data communications analyst
With a ____, both systems are operated in tandem until it is determined that the new system is working correctly, and then the old system is deactivated.
parallel conversion
A computer operations manager designs and builds the end-user interfaces and tools used with cloud services.
false
Pharming ​attacks often increase after the occurrence of large data breaches that expose names and e-mail addresses of individuals, along with the businesses that these individuals patronize.
false
The goal of SCM is to reduce operating and inventory costs while meeting delivery objectives and increasing profits; that is, to be able to deliver the right product to the right place, at the right time, and at the right price.
true
The objective of ____ is to gather useful data about the system being studied.
data collection
Two of the most common design and manufacturing systems are known as CAM and CAD.
true
TPS transactions are typically processed using batch processing
false
For monitoring the physical locations of employees, video cameras are often used, but another possibility is the use of ____.
proximity cards
____ is a useful sales and marketing tool to help companies match customers with products they would be likely to purchase.
customer profiling
IBF Consultants, LLC provides consulting services in privacy and theft deterrence solutions.

Another client has very sensitive data and they are less concerned about recovering any stolen computer than ensuring that the data located on the computer is not compromised. Which technology would be useful in this case?

kill switch hard drives
Data mining used in conjunction with Web site data is referred to as Web mining.
true
Mother Goose Computing, Inc. provides computational biology consulting services. They are currently updating several of their systems.

For the protein folding division, Mother Goose is planning to implement the new system module by module. This is called a ____ conversion.

phased
A(n) ____ is an information system that provides decision makers with regular, routine, and timely information that is used to make decisions.
management information system (MIS)
DSSs are most often used by middle and executive managers for unstructured decisions, which often need to be based on unpredictable events or incomplete knowledge.
true
Most businesses and Web sites that collect personal information have a(n) ____ that discloses how the personal information you provide will be used.
privacy policy
____ focuses on specifying what the new system will look like and how it will work.
system design
____ refers to the complete malfunction of a computer system.
system failure
Digital badges consist of icons that represent academic achievements or acquired skills
true
An information system that combines geographic information with other types of data (such as information about customers, sales, and so forth) in order to provide a better understanding of the relationships among the data, is called a geographic information system (GIS).
true
Repeated threats or other malicious behavior that poses a credible threat of harm carried out online is referred to as phishing.
false
The purpose of computer-aided manufacturing (CAM) is to reduce the time designers spend developing products.
false
Smartphones are prone to attacks and are known to have OS flaws.
true
____ are designed to withstand much more physical abuse than conventional devices.
ruggedized devices
To supplement backup procedures, businesses and other organizations should have a(n) ____.
disaster recovery plan
Collecting in-depth information about an individual is known as ____.
electronic profiling
The various types of communications systems that are in place at many organizations include e-mail, messaging, videoconferencing, ____, and telecommuting.
collaborative (workgroup) computing
____ refers to driving around an area with a Wi-Fi-enabled device to find a Wi-Fi network in order to access and use it without authorization.
War driving
Antiglare screens are sometimes called ____.
privacy filters
Braille printers print embossed output in Braille format on paper.
true
An emotional health concern related to computer use is ____.
an Internet addiction
Corporate integrity, as it relates to accounting practices and proper disclosure, is topic of personal character that has come to the forefront recently.
false
Some human resources departments view college degrees from nonaccredited organizations as a form of digital manipulation.
false
The goal of ____ is to ensure that every child in the world has access to a rugged, low-cost, low-power connected laptop in order to provide them with access to new channels of learning, sharing, and self-expression.
OLPC
To prevent individuals from making unauthorized copies of feature films purchased on DVDs or downloaded via the Internet, many of these items contain copy protection or some other form of ____.
DRM
To prevent sore or stiff neck, ____.
place the monitor directly in front of you
The term ____ refers to the gap between those who have access to information and communications technology and those who do not.
digital divide
Ethical decisions need to be made whenever a business practice or product is legal or socially acceptable in one country but not in another. One example is ____.
copyright law
To date, the MPAA has not pursued civil litigation against movie pirates.
false
A(n) screen reader is a software program that reads aloud all text information available via the computer screen.
true
Repetitive stress injuries and other injuries related to the workplace environment are estimated to account for ____ of all serious workplace injuries.
one-third
In some countries, bootleg copies of music CDs and movie DVDs are sold openly.
true
Although some publications allow the use of “photo illustrations,” others have strict rules about digital manipulation— especially for news photojournalists
true
Adding to the problem of unethical ____ is that, unlike film cameras, digital cameras don’t have photo negatives that could be used to show what photographs actually looked like at the time they were taken.
digital manipulation
Case 16-1

Jack is a computer programmer who spends most of the day at his desk. Recently, he visited the doctor to get advice about his persistent eyestrain and aching back.

To combat his eyestrain, Jack’s doctor correctly advises him to ____.

NOT use a footrest
The growth in assistive technology is due in part to demands by disabled individuals and disability organizations for equal access to computers and Web content, as well as the ____ (ADA).
americans with disabilities act
Case 16-2
Jill is starting a fast food delivery company. She has designed a logo and plans to print flyers to advertise her services.

Jill has poor eyesight. When proofreading her book, she can use a ____ that will read aloud whatever she has typed.

screen reader
____ is the act of registering a domain name with the intent to profit from the goodwill of a trademark belonging to someone else.
cybersquatting