MSIS-2103 Final Exam- Okstate

Flashcard Icon

Flashcard

Learn Mode Icon

Learn Mode

Match Icon

Match

Coming Soon!
Library Icon

Library

View Library
Match Icon

Create

Create More Decks
Flashcard Icon Flashcards
Flashcard Icon Flashcards
Library Icon Library
Match Icon Match (Coming Soon)

Computer Science - Software Engineering

View Results
Full Screen Icon

user_hodr Created by 7 mon ago

Cards in this deck(100)
What overall strategy is used to train artificial neural network programs?
Blur Image
An artificial neural network is programmed to learn _____ from each iteration during the training phase.
Blur Image
Thomas and Emily are discussing the effect of AI on future employment. Emily correctly points out that _____ the introduction of new technology has always resulted in the creation of more jobs than were lost.
Blur Image
According to experts, what organizational practice will allow the growth of AI to create new jobs?
Blur Image
Top career options in AI include becoming _____, who analyzes large data sets to follow patterns and find trends.
Blur Image
Reinforcement learning _____ emulates the trial-and-error method through which humans learn.
Blur Image
Technology that interacts with a human's neural structure and translates the information into activity is known as _____ the brain computer interface.
Blur Image
What is SCARA?
Blur Image
Robots that work with humans on manufacturing lines, handling work that is hard on a person and could cause repetitive injuries, are known as _____.
Blur Image
_____ can process many pieces of data at the same time and learn to recognize patterns.
Blur Image
A genetic algorithm is an approach to solving problems based on the _____ theory of evolution.
Blur Image
In an expert system, the _____ is the component that delivers the expert advice.
Blur Image
In the context of purchasing systems, when a(n) _____ arrives from a supplier, it is matched to the original order and the receiving report, and a check is generated if all data is complete and consistent.
Blur Image
_____ includes the planning, executing, and controlling of all activities involved in raw material sourcing and procurement, converting raw materials to finished products, and the warehousing and delivery of finished product to customers.
Blur Image
Manufacturing enterprise resource planning (ERP) systems follow a systemic process for developing a production plan that starts with _____ to develop an estimate of future customer demand.
Blur Image
In a manufacturing enterprise resource planning (ERP) system, demand management _____ refines a production plan by determining the amount of weekly or daily production needed to meet the demand for individual products.
Blur Image
A customer relationship management (CRM) system helps a company in managing _____ distribution and accounting.
Blur Image
One benefit for a small business using the hosted software model for its enterprise software is that it can succeed without _____ employing full-time IT professionals.
Blur Image
Percy is attracted by the advantages of enterprise software but his small business cannot afford to make a major up-front investment in new applications at this time. Percy could try hosted enterprise software, which offers _____ a pay-as-you-go approach.
Blur Image
How might a start-up company that has been using a paper-based document control approach benefit from switching to a cloud-based PLM system?
Blur Image
The average ERP implementation _____ costs in the millions and lasts over a year.
Blur Image
Millie's company is implementing an ERP, and her direct reports are complaining loudly of their frustrations with the new system. What should Millie request from upper management to alleviate this?
Blur Image
Rheneas wants to ensure his management team is aware of the common causes for failed enterprise system implementations before they begin their own. He points out to the team that _____ the failure rate for ERP implementations worldwide is 21 percent.
Blur Image
Innitrobe is ramping up to begin an ERP implementation. To promote its success, Innitrobe seeks project oversight and verification and validation of system performance from _____ an experienced, independent resource.
Blur Image
How much time do many project managers recommend be allocated for training staff to facilitate a successful enterprise system implementation?
Blur Image
For an organization with an enterprise system, processing transactions _____ creates a storehouse of data invaluable to decision making.
Blur Image
What component at the core of the ERP system allows all business functions to access current and consistent data for operational decision making?
Blur Image
Claudette is a developer working for a software company that uses JIRA, a PLM product. Claudette knows that using JIRA benefits her organization because _____ upper management can it to monitor project progress in order to make informed decisions.
Blur Image
Peter Sam's product development team studies a dashboard that shows the top product requests from customers in parallel with the product roadmap for the year in an effort to identify any gaps in their product offerings. What type of tool are they using?
Blur Image
Artificial intelligence _____ lacks outside context on the importance of unique patterns revealed by data.
Blur Image
What tool would likely be the best choice for a heavy machinery manufacturer seeking to improve the accuracy of its product demand forecasting?
Blur Image
Which of the following allows users to analyze customer data to identify ways to increase revenue, ways to decrease costs, and the company's 'best customers' and how to locate more of them?
Blur Image
_____ creates a complete set of technical specifications that can be used to construct an information system.
Blur Image
Your new software project manager is comfortable working on projects without fully specifying the requirements up front. He recommends a team-based approach to development. He is very likely to be a proponent of the _____ approach to software development.
Blur Image
Which of the following statements is true of user acceptance testing (UAT)?
Blur Image
Buying off-the-shelf software _____ is less risky than building software.
Blur Image
What is one advantage that SaaS confers because it is deployed and managed from a central location?
Blur Image
Before signing a contract with a SaaS vendor, an organization must ensure that the vendor has acceptable answers to questions about the storage and protection of the data shared with them because _____ security and privacy must be addressed by all organizations.
Blur Image
If an organization elects to undergo system development, _____ it can choose to hire an outside company for this project.
Blur Image
Thomas is preparing to implement a new software package that his project team has selected and purchased. Thomas should _____ help his coworkers identify and make any needed changes to their current processes using a DFD.
Blur Image
Mavis and her project team are evaluating candidates for a new off-the-shelf software package for their company. Mavis calls some professional acquaintances who use these candidate packages in order to _____ elicit feedback regarding the software performance and the quality of technical support available.
Blur Image
The disadvantages of the Waterfall approach to software development relate primarily to _____ end users.
Blur Image
Within the Scrum framework for Agile software development, the prioritized list of project requirements collected from stakeholders prior to a sprint planning session is called a _____ product backlog.
Blur Image
Agile development requires _____ cooperation and frequent meetings.
Blur Image
An important role of the product owner in the Scrum framework for Agile development is to _____ describe what should be built and why.
Blur Image
_____ determines whether the expected benefits associated with a project outweigh the expected costs sufficiently to make the project financially attractive.
Blur Image
Which of the following is considered an 'expense' among typical IS project-related costs?
Blur Image
_____ is a set of activities that includes defining an achievable completion date that is acceptable to the project stakeholders, developing a workable project schedule, and ensuring the timely completion of the project.
Blur Image
A useful model that describes how teams develop is the forming-storming-norming-performing-_____ model.
Blur Image
Suppose Task C has two predecessor tasks: Task A and Task B. Task A ends on May 8 and Task B ends on May 13. When can Task C begin?
Blur Image
Which statement about objectives and goals matches the way these terms are used in your text?
Blur Image
Mavis is a customer service manager. Suppose one of the business objectives at Mavis's firm is to improve customer service by offering a consistently high level of service that exceeds customers' expectations. Which of the following statements about this situation is FALSE?
Blur Image
The definition of which tasks are and which tasks are not included in a project is called the project's _____ scope.
Blur Image
Which project variable is defined as the degree to which the project meets the needs of its users?
Blur Image
The major understandings and assumptions for an organization, which are often neither stated nor documented as goals or formal policies, are known as _____ organizational culture.
Blur Image
Jeannine is aware that her company's IS needs a serious upgrade, and others in her department respect her opinion about this. Which is likely the most appropriate strategy for convincing Jeannine to adopt a new IS?
Blur Image
For members of what the diffusion of innovation theory calls the early majority, the recommended strategy for promoting a new technology is to _____ provide them with evidence of the system's effectiveness and success stories.
Blur Image
An IS manager has identified several of what the diffusion of innovation theory would term 'laggards' in his department. It is likely that the most successful approach to persuading them to adopt a new information system would be to _____ have their peers demonstrate how this change has helped them and bring pressure to bear from other adopters.
Blur Image
In terms of information systems, a collaboration tool that helps a team communicate, organize, plan, schedule, track, and delegate jobs would be an example of _________ a workgroup information system.
Blur Image
Compared with the traditional licensing model in which users purchase and install software, SaaS _____ offers less expensive upgrades and new releases.
Blur Image
A SaaS provider such as Oracle or SAP manages service levels and availability. This is advantageous because _____ it allows SaaS customers to increase the number of users without expanding their communications capacity.
Blur Image
Once a _____ is installed, the attacker can gain full access to the computer.
Blur Image
Which of the following activities does the USA Patriot Act define?
Blur Image
You have been hired as the new Information Security consultant at XYZ Inc. Which of these employee behaviors would be a top security concern?
Blur Image
Which of the following security incidents is least costly to fix?
Blur Image
Which of the following companies develops one of the most widely used antivirus software products?
Blur Image
Someone who attempts to destroy the infrastructure components of governments is known as a ______________.
Blur Image
The US-CERT newsletter has alerted you about a specific vulnerability in some software installed on your organization's computers. To detect any attempts at exploiting this vulnerability, you employ a(n) ____-based intrusion detection system.
Blur Image
You discover that one of your organization's computers has stopped working properly due to malware. Who is most likely responsible for the presence of malware on this machine?
Blur Image
What is an attack vector?
Blur Image
Imagine you are conducting a security self-assessment. Which of the following might indicate one of your account passwords is too weak?
Blur Image
The first two steps an organization must take to perform a security risk assessment are to identify _____, respectively.
Blur Image
Because some threats, such as insider fraud, are more likely to occur than others, step 3 of the risk assessment process is to _____ assess the frequency of events or the likelihood of each potential threat.
Blur Image
Operating virtual servers requires software to control the host processor and resources, allocate necessary resources to virtual machines, and prevent virtual machines from disrupting each other. What type of software performs these functions?
Blur Image
Server virtualization offers significant cost savings because _____ it increases the total operating capacity of each physical server.
Blur Image
IS professionals at PKO Bank Polski S.A. use an approach where they logically divide the resources of a physical server to reduce hardware-related costs, cut unscheduled downtime for applications, and reduce the time spent on problem solving. What strategy do they use?
Blur Image
_____ is a process for driving traffic to a Web site by using techniques that improve the site's ranking in search results.
Blur Image
Sensors inside IoT wearable devices typically collect information such as _____ location and heart rate.
Blur Image
Which type of IoT application enables automatic monitoring combined with remote control, trend analysis, and reporting by using individual devices that each gather a small amount of data?
Blur Image
Compology's dumpster-monitoring software uses data from garbage container sensors plus external data to determine when dumpsters need service and alert sanitation workers so they can take preemptive action. Which type of IoT application is this?
Blur Image
Security is a serious issue with IoT applications because _____ they can expose internal systems to hacking, viruses, and malware.
Blur Image
_____ is a special-purpose programming language for accessing and manipulating data stored in a relational database.
Blur Image
After entering data into a relational database, users can make all of the following basic data manipulations except:
Blur Image
To ensure reliability and integrity, SQL databases conform to four specific properties. Which of the following is NOT one of those four properties?
Blur Image
Mollie's company is having problems with their data integrity because multiple database users sometimes access and alter a record at the same time. A database management system could eliminate these problems by implementing _____.
Blur Image
The number of mobile Web sites worldwide has grown rapidly, in part because of _____ the development of new and useful applications.
Blur Image
Authentication technologies are used by many organizations to _____ confirm the identity of a user requesting access to information or assets.
Blur Image
What are the components of Leavitt's Diamond?
Blur Image
Which part of Leavitt's diamond is most important?
Blur Image
What are the 4 types of Information Systems?
Blur Image
What is a personal information system?
Blur Image
What is a workgroup information system?
Blur Image
What is an enterprise information system?
Blur Image
What is an interorganizational information system?
Blur Image
What is an advanced persistent threat?
Blur Image
What is a blended threat?
Blur Image
What is phishing?
Blur Image
What is a rootkit?
Blur Image
What is smshing?
Blur Image
What is social engineering?
Blur Image

Ask Our AI Tutor

Get Instant Help with Your Questions

Need help understanding a concept or solving a problem? Type your question below, and our AI tutor will provide a personalized answer in real-time!

How it works

  • Ask any academic question, and our AI tutor will respond instantly with explanations, solutions, or examples.
Flashcard Icon
  • Browse questions and discover topic-based flashcards
  • Practice with engaging flashcards designed for each subject
  • Strengthen memory with concise, effective learning tools