This document contains a series of questions and feedback from an exam on information systems topics. It discusses firewalls, databases, authentication methods, competitive advantages, software quality triangles, trademarks, and other concepts. The feedback indicates some multiple choice questions were missed and to review for the next test.
Organizational challenges of international partnerships
1. 1/9
Question 1 4 / 4 points
LO5: What is a packet?
Question 2 4 / 4 points
LO6: What technology is typically used to prevent unwanted
traffic from entering or exiting an
organizations network?
The correct answer is not displayed for Written Response type
questions.
Attempt 1
Attempt Feedback
You did well on most of the essays but there were a number of
the multiple choice questions that
trip you up. Please review and prepare for posttest 2. You got
this, you're almost there.
8 bytes of data
The fundamental unit of data transmitted over the Internet
A network device that connects multiple devices together and
filters packets based on
their destination within the connected devices.
2. Binary information that can be converted to computational
instructions
Firewall is the technology that is commonly used to prevent
unauthorized traffic from entering
or exiting an organization's network. Firewalls often establish a
barrier between a trusted
internal network and untrusted external network, such as the
internet. Firewalls often work
through monitoring and logging to record events that occur on
or across a network. Firewall
logging ensures that the defined filters or rules are adequate and
functioning as expected. By
monitoring traffic stream through a firewall's filtering scheme,
it is possible to identify the
types of traffic that the firewall should block.
2/4/2020
2/9
View Feedback
Question 3 4 / 4 points
LO7: What does it mean or look like for an organization to
implement a competitive advantage?
3. The correct answer is not displayed for Written Response type
questions.
Question 4 4 / 4 points
LO10: When developing software, there is a tension known as
the quality triangle. What are the
three components of the quality triangle.
Question 5 4 / 4 points
LO12: A trademark protect all of the following, except:
Question 6 4 / 4 points
LO8: Your current employer, ACME Brick wants to distinguish
themselves from other brick
suppliers by becoming ISO 9001 certified. To do so, your
employer will need to do all of the
When organizations implement competitive advantage, they
establish conditions and
environments that give them an edge over their rivals in the
industry. According to Potter,
there are two major ways in which organizations can attain
competitive advantage: cost
leadership and differentiation strategies. Firms can implement
information systems to
actualize these competitive approaches.
Programming, Time and Quality
4. Skill, Opportunity and Quality
Time, Quality and Cost
Function, Repeatability and Quality
product
logo
phrase
shape
javascript://
2/4/2020
3/9
following except:
Question 7 4 / 4 points
LO4: A&M-Commerce is developing a relational database with
tables for the following
information.
Student courses
Housing preferences
Affiliation to student organizations
In order to relate this data, what must be present in each of
these tables?
5. Question 8 4 / 4 points
___Text___
Question 9 4 / 4 points
LO6: The process of logging into an information system using a
user ID and password, followed
by a finger print or eye scan is known as:
Show me where it says that (reference the process
documentation).
Prove that this is what happened (exhibit evidence in
documented records)
Tell me what you do (describe the business process).
Regulate and report (display all federal regulations have been
met and reported)
A foreign key like Social Security Number
A primary key like Student ID
A current address
A student's full name
When designing a database, you have been asked to create a
data type to store first
names. is the datatype you would choose.
Multi-Factor Authentication
6. Information Security Access Test
Encryption
2/4/2020
4/9
Question 10 3 / 4 points
LO10: As a faculty member for the Lone Star Education
Services (private education organization
with less than 100 employees that focuses on online learning),
you've been placed on a
committee tasked with evaluating Learning Management
Systems. Each system presented has
similar features that encompass the majority of the stated needs
of your organization, with the
turnkey solution checking the most boxes, however the price for
the turnkey Learning
Management System software is upwards of $100,000 per year.
Two additional options are
presented to the committee. An open-source software that does
not cost to license but has a
more limited feature set or you could develop the software in-
house. In general, what would be
the best recommendation based on the information provided?
Option 1 - Turnkey solution,
Option 2 - Open Source with modifications, Option 3 - Develop
In-house. Explain your answer.
The correct answer is not displayed for Written Response type
questions.
7. View Feedback
Question 11 4 / 4 points
LO11: A company residing in South Korea has recently
partnered with the gaming development
company where you are employed. This partnership provides
many new advantages, from new
talent to a larger workgroup. What potential challenges should
each company consider?
The correct answer is not displayed for Written Response type
questions.
Question 12 0 / 4 points
Access Control
Option 2 (open source with modifications) would be more
prudent than developing an in-
house or opting for a Turnkey solution, which is costly for a
small organization with only 100
employees. By embracing the outsourced with modifications,
the organization can
concentrate, the organization can concentrate its resources on
its core business competencies
while capitalizing on the expertise of other firms that are more
effective and efficient, or more
knowledgeable on the specialized tasks. Further, the open
source with modification options
8. can provide the organization with access to current technologies
at low costs without the risks
of obsolescence. In so doing, the organization can cut costs by
gaining capabilities without
incurring overhead costs.
There are various potential challenges that each business is
likely to encounter when engaging
in partnerships with foreign firms. For instance, the task of
monitoring and regulating
businesses may be challenging. Such challenges may include
concerns over intellectual
property violations, taxation systems, security concerns, as well
as privacy of each business
entity. Such problems are often rampant in global business
contexts in which laws and ethics
that govern businesses often conflict rather than compliment
each other.
javascript://
2/4/2020
5/9
LO6: When protecting information we want to limit exposure to
the information by restricting
9. access. This practice is know as:
Question 13 4 / 4 points
Select each stage relevant to the digital divide according to
Jakob Nielsen
Question 14 2 / 4 points
LO12: Facebook is able to harvest a great deal of personal data,
preferences, demographics and
interests from their users for marketing purposes. What are
some ethical concerns with their
data harvesting and how does this impact an organization like
Facebook?
The correct answer is not displayed for Written Response type
questions.
View Feedback
Integrity
Confidentiality
Limited Data
Abailability
empowerment
ethnic
usability
economic
10. There are various potential ethical concerns related to
Facebook's data harvesting practices.
One such ethical concern is confidentiality. The harvesting of
personal data may spark
confidentiality issues, especially when they are disclosed to
unauthorized parties. Additionally,
data harvesting may spark privacy concerns, especially when
such data are used to track and
monitor the private activities of individuals and groups.
Furthermore, issues such as espionage
and wrong use of data may arise. For instance, some malicious
people may use such data to
commit fraud and crimes, such as impersonating individuals
after gaining access to their
financial and personal information.
javascript://
2/4/2020
6/9
Question 15 0 / 4 points
LO2: Your coworker, Fred, describes an issue he is facing with
his computer. He states that the
computer will start but as soon as he plugs in an external drive
11. it crashes. He notes that he
installed a new internet browser after he performed a Windows
system update the week before.
Fred blames the crashes on the new internet browsing
application. Select the most accurate
statement below.
Question 16 0 / 4 points
LO2: Which of the following is not a feature of enterprise
resource planning (ERP)?
Question 17 0 / 4 points
LO8: Business process reengineering employs the following
idea;
The application is most likely not the cause of the problem
because the operating
system is responsible for managing the external device and the
application described
does not directly interface with the drive when the crash occurs.
The internet browser application is most likely the problem
because of the timing of the
install and nature of the crashes.
Neither the application or the Windows update installed are
likely to have anything to
do with the crash.
Operating Systems such as Windows provide no direct
communication with external
drives, therefore the application is most likely the culprit of
Fred's recent crashes.
12. There is only one data source
ERP systems are well suited for small businesses, enabling them
to see immediate cost
savings.
ERP systems are typically costly to implement for large
organizations and may take
multiple years to implement
ERP systems include functionality that covers all of the
essential components of a
business
current processes must be performed on a slimmer scale,
utilizing fewer employees and
reducing overhead
2/4/2020
7/9
Question 18 4 / 4 points
LO9: Who is primarily responsible for keeping information
system projects on time and on
budget?
Question 19 4 / 4 points
Identify which of the following are operating systems and which
would be considered software.
__2__
13. __2__
__2__
__1__
__1__
1.
2.
Question 20 0 / 4 points
LO9: Explain the role of a database administrator or DBA in an
organization?
technology must be integrated in each business process to fully
leverage the value of an
information system
organizations should blow up their existing processes and
develop new processes that
take advantage of new technology concepts
business tasks should be evaluated and modified slightly for
increased efficiency
Chief Information Officer (CIO)
Database Administrator (DBA)
Project Manager
ERP Manager
14. Microsoft Word
Clash of Clans
Photoshop
Apple OS X
Microsoft Windows
Operating System
Software
The primary role of the database administrator is to ensure that
organizational data is
available, protected from loss and corruption, and easily
accessible as needed. The key roles
2/4/2020
8/9
The correct answer is not displayed for Written Response type
questions.
View Feedback
Question 21 0 / 4 points
LO 7: A decision support system (DSS) works best with helping
make what sort of decisions?
15. Question 22 4 / 4 points
LO1: Applying Moore's Law to the following situation, what
assumption can we make. (Moore's
law has been dissipating in recent years but for the sake of this
question, assume that it fully
applies.)
Our IT department has determined that they will need an
additional 5 servers with max
processing power at current technology capabilities. At current
prices the IT department
determines the cost will be about $100,000. We only have
$50,000 in our budget but we are
not in a rush. When are we likely to be able to purchase these
machines and why?
The correct answer is not displayed for Written Response type
questions.
Question 23 4 / 4 points
LO5: What event lead to the first implementation of an
Internet?
may include database system installation and maintenance, data
backup and recovery, data
development and testing, securing database system, as well as
authentication.
Very quick and repetitive decisions (Decisions that need to be
made immediately based
on a known set of inputs)
16. None of the above
Semi-structured decisions (Most of the factors are known but
human interaction is still
needed)
Complex decisions (Decisions in which machine learning is
necessary to reduce human
error)
Moore's law operates in the assumption that the number of
transistors on a microchip doubles
every two years, although the cost of computers is halved.
According to Moore's law, the
speed and capability of computers is projected to increase every
two years, and people will
pay less for them. This growth is exponential. Currently, the
servers cost $100,000. However,
the price, based on Moore's law is projected to half after two
years. As such, the organization
is likely to afford to buy it at $50,000 after two years, which
will be in 2022.
javascript://
2/4/2020
9/9
Question 24 4 / 4 points
17. LO1: Which of the following is a role that people play in an
information system?
Question 25 2 / 4 points
LO3: How can data be transformed into something useful like
actionable information? Provide
an example.
The correct answer is not displayed for Written Response type
questions.
Attempt Score:71 / 100 - 71 %
Overall Grade (highest attempt):71 / 100 - 71 %
Done
IBM's mainframe logic center produced more data than they
were capable of storing in
one physical location.
Bill Gates invents an operating system that makes personal
computing a reality.
Apple produces an affordable personal computer known as
Macintosh.
The need to share research by the US governments Advanced
Research Projects Agency
after Russia's surprise launch of Sputnik.
CIO
Database Manager
18. Programmer
All of the above
The process of converting raw data into actionable information
begins by recognizing different
forms of analytics and gathering the data. Thereafter, the
organization should measure what
matters, put data into context, and determine its benefits to
business.