Find study materials for any course. Check these out:
Browse by school
Make your own
To login with Google, please enable popups
To login with Google, please enable popups
Don’t have an account?
To signup with Google, please enable popups
To signup with Google, please enable popups
Sign up withor
________ is a data presentation standard first specified by the World Wide Web Consortium,an international consortium of companies whose purpose is to develop open standards for theWeb.
________ help create the mass e-mail marketing campaigns wherein each consumer receives
an individualized e-mail based on their prior purchase history.
________ focuses on studying customer behavior and perceptions in order to provide thebusiness intelligence necessary to identify new opportunities and to provide superior customerservice.
Organizations that effectively utilize ________ can more easily customize marketingcampaigns from the segment level to even the individual customer.
Which of the following statements best describes the productivity paradox for technology
While it is easy to quantify the costs associated with developing an information system, it is often difficult to quantify tangible productivity gains from its use.
BelAir Tech replaced its outdated information system with a newer version. As a result, itsemployees reported a significant increase in work speed. Which of the following is most similarto BelAir's situation?
At Sterling Inc, the average number of application forms processed in an hour rose from 4 to
6 as a result of the new system.
B&Z Inc. implemented a new information system two months ago but there have been no
concrete increases in productivity as a result of the system. A similar system has been in place at
the company headquarters for the past two years, and this system has resulted in significant,
quantifiable benefits. Which of the following reasons is the most likely explanation for the lack
It can take years from the first implementation of this new system before the magnitude of
benefits is felt by the organization
Business case arguments based on ________ focus on beliefs about organizational strategy, competitive advantage, industry forces, customer perceptions, market share, and so on.
Business case arguments based on data, quantitative analysis, and/or indisputable factors areknown as arguments based on ________.
If we do not implement this system, our competitors could gain a significant advantage over
Which of the following is an example of a recurring cost associated with an information
A method for deciding among different IS investments or when considering alternativedesigns for a given system is ________.
identify, plan, and select a development project from all possible projects that could be
Requirements collection takes place during the ________ phase of the systems developmentlife cycle.
________ is the process of gathering and organizing information from users, managers,
customers, business processes, and documents to understand how a proposed information system
________ represent(s) the movement of data through an organization or within an
Processing logic is often expressed in ________, which is independent of the actualprogramming language being used.
A ________ is a business document containing some predefined data, often including someareas where additional data can be filled in.
Software programming and testing takes place during the ________ stage of the systems
Jason has just made some changes to the information system at BelAir Tech and wants to
check if the system is working correctly. He wants to conduct a beta test of the system. Which of
the following should he do to achieve this?
A group of inexperienced computer operators cause the loss of valuable information. This
information loss can be classified as one caused due to ________.
Which of the following is one of the main federal laws in the United States against computercrimes?
Some computer criminals attempt to break into systems or deface Web sites to promotepolitical or ideological goals. They are called ________.
Today, people who break into computer systems with the intention of doing damage orcommitting a crime are usually called ________.
WikiLeaks is a famous not-for-profit whistle-blowing Web site. MasterCard and Visa
stopped payments to WikiLeaks after a series of leaks by the site. An anonymous group attacked
the Web sites of both MasterCard and Visa reacting to this. These attackers, who tried to protect
WikiLeaks, can be called ________.
Employees steal time on company computers to do personal business. This can be consideredan example of ________.
A(n) ________ is a destructive program that disrupts the normal functioning of computersystems.
In May 2000, a malware email with "I LOVE YOU"in the subject field, spread to numerous
computers in the world. The program replicated itself to everyone in the user's Outlook address
book and then destroyed local files. This love email forced several organizations to shut down
their e-mail systems. The malware discussed here is an example of a ________.
Anderson receives a malware file through email. On January 1st, the malware alters the name
of his local files and displays funny names.
A(n) ________ is a variation of a virus that is targeted at networks and takes advantage of
security holes in operating systems and other software to replicate endlessly across the Internet.
This causes servers to crash and denies service to Internet users.
The official Web site of the Iranian government was made unreachable by foreign activists
seeking to help the opposition parties during the 2009 Iranian election protests. Web sites
belonging to many Iranian news agencies were also made unreachable by the activists. This
cyber protest is an example of a(n) ________ attack.
________ refers to any software that covertly gathers information about a user through anInternet connection without the user's knowledge.
Which of the following terms represents junk newsgroup postings used for the purpose ofadvertising for some product or service?
Robert receives a mail which says he has won an online lottery worth $50 Billion. Robert
was wondering how he could win it without even buying the lottery. It was a spam mail intended
to obtain the bank account details and the credit card number of Robert. Such attempts to trick
financial account and credit card holders are called ________.
attempts to trick financial account and credit card holders into giving away their authorization
Which of the following is a message passed to a Web browser on a user's computer by a Web
When using Yahoo Messenger, you get an unsolicited advertisement from a company. Thisadvertisement contained a link to connect to the merchant's Web site. Which of the following isthe best way of classifying this advertisement?
A hacker takes an individual's social security number, credit card number, and other personal
information for the purpose of using the victim's credit rating to borrow money, buy
merchandise, and otherwise run up debts that are never repaid. This practice is called ________.
Arbitron consultants, a leading software consulting firm in the United States, decide tolaunch ERP an ERP Solution....
Cyber criminals gain information on a victim by monitoring online activities, accessingdatabases, and so on and make false accusations that damage the reputation of the victim onblogs, Web sites, chat rooms, or e-commerce sites. Such acts are called ________.
Which of the following refers to the practice of deliberately causing emotional distress in the
A mass cyber attack occurred in a country when it took severe actions against a group of
citizens who protested the country's policies. The attack involved a denial-of-service in which
selected sites were bombarded with traffic to force them offline. This is an example of _________.
________ refers to the use of the vast amount of information available on the Internet
regarding virtually any topic for planning, recruitment, and numerous other endeavors.
Which of the following is a significant disadvantage to using acts of cyberterrorism as a
________ refers to precautions taken to keep all aspects of information systems safe from
destruction, manipulation, or unauthorized use or access
Which of the following is a process in which you assess the value of the assets being
protected, determine their likelihood of being compromised, and compare the probable costs of
their being compromised with the estimated costs of whatever protection you might have to take?
An organization takes active countermeasures to protect its systems, such as installingfirewalls. This approach is ________.
An organization is using physical access restrictions to safeguard information systems when
it uses ________.
Your company uses a fingerprint recognition system instead of an access card. This helps the
company prevent unauthorized physical access. Which of the following technologies is used for
Which of the following is a part of a computer system designed to detect intrusion and
prevent unauthorized access to or from a private network
Implementing encryption on a large scale, such as on a busy Web site, requires a third party,
called a(n) ________.
________ software is used to keep track of computer activity so that inspectors can spot
suspicious activity and take a
Which of the following terms refers to a computer, data, or network site that is designed to
be enticing to crackers so as to detect, deflect, or counteract illegal activ
Organizations periodically have an external entity review the controls so as to uncover any
potential problems in the controls. This process is called ________.
Which of the following laws makes it mandatory for organizations to demonstrate that there
are controls in place to prevent misuse or fraud, controls to detect any potential problems, and
effective measures to correct any problems?
Sign up for free and study better.
Get started today!