Final Exam Diagnostic Quiz
Multiple Choice Identify the letter of the choice that best completes the statement or answers the question.
____ 1. The first step in the problem-solving process is ____.
a. |
intelligence |
c. |
choice |
b. |
implementation |
d. |
design |
____ 2. The relevant information, data, rules, cases, and relationships used by the expert system are stored in the ____.
a. |
database |
c. |
data repository |
b. |
model base |
d. |
knowledge base |
____ 3. Andrew and Aaron were tired of waiting for their expense book software to be developed by the IS department, so they received guidance from the IS department and created their own. This is an example of ____.
a. |
rapid application development |
b. |
end-user systems development |
c. |
traditional systems development life cycle |
d. |
prototyping |
____ 4. The final stage of the systems development process includes systems ___.
a. |
review |
c. |
implementation |
b. |
maintenance |
d. |
design |
____ 5. Systems ____ involves checking, changing, and enhancing the system to make it more useful in achieving user and organizational goals.
a. |
maintenance |
c. |
analysis |
b. |
review |
d. |
investigation |
____ 6. Frequently, criminals can talk a critical computer password out of an individual, a practice called ____.
a. |
social engineering |
c. |
biometrics |
b. |
dumpster diving |
d. |
filtering |
____ 7. A ____ can include both hardware and software that act as a barrier between an organization’s information systems and the outside world.
a. |
firewall |
c. |
password sniffer |
b. |
Trojan horse |
d. |
logic bomb |
____ 8. A ____ is a variable value that is applied using an algorithm to a string or block of unencrypted text to produce encrypted text or to decrypt encrypted text.
a. |
window |
c. |
flag |
b. |
code |
d. |
key |
Questions 9-12 concern the Big Producers mini-case
Big Producers is a manufacturing company headquartered in southeastern Michigan. Stella Nightingale is a human resources director for the firm; she is in charge of hiring and developing all employees for this 14,000-strong company. Stella’s strong points are her people skills (of course) and her ability to create teams of people who can work together to achieve Big’s mission. As an executive of Big Producers, Stella not only has access to the big picture but has this in mind at all times, while simultaneously directing an organization of 26 people who are concerned with recruiting, hiring, training, career development, counseling, and retirement planning. She’s worked for Big for seven years, having started in compensation after graduating from Oakland University in 1999.
Last month Big -- as part of its diversification strategy -- acquired Medium Distributors, who for many years handled Big’s inbound and outbound logistics. Medium has over 1000 employees all over North America, serving dozens of firms, including some of Big’s competitors. Stella has the problem of integrating these employees into her existing HR information system, one that Big has been using for almost ten years.
____ 9. Integrating these employees will require a change to Stella’s information systems. Stella’s level of confidence in making this happen sucessfully is ___
a. |
Low, because she’s not sure how to express herself to the systems analyst in order to get the requirements correct |
c. |
High, because she is intimately aware of how the HR information system works technically |
b. |
Low, because any system change involves risk. |
d. |
High, because she doesn’t see the change as a change in her process, only an enlargement of the data base |
____ 10. Given the kinds of work that is done at Big Producers, Stella’s best option for installation of the improved system including the integration of Medium Distributor’s employee records is ___
a. |
Parallel, because the system might not work correctly, causing serious harm to Big Producers |
c. |
Pilot, because new employee records is a good way to test out the enhanced system’s capabilities |
b. |
Plunge, because this is basically a data conversion and entry situation that can extend over a period of time |
d. |
Phase-in, because data conversion is only one function, a good one to try first. |
____ 11. A year after the successful integration of Medium’s employees’ records into Big’s HR information system, Stella has been asked by the CEO of Big if the employees brought into Big have had problems or are doing OK. Stella doesn’t actually know what “doing OK” specifically means, but figures that the information she needs is in her HR information system, including promotions, disciplinary notes, and annual evaluations. She approaches her IT people and asks for help in answering this question. The IT people build her a(n) ___.
a. |
Expert system to retrieve the appropriate items of information for her perusal. |
c. |
MIS application to retrieve the appropriate items of information for her perusal |
b. |
Display system just to print out all the records of all 1000 former Medium employees and their performance |
d. |
Decision Support System to calculate an index of “OK-doing” based on established and accepted ideas of performance |
____ 12. Stella is really not interested in technology, though, and assigns the task of keeping the technology up to date and useful to Sam Small, who begins the work by developing a plan for keeping the HR information system current. Sam wants to manage this technology well, so the next step would be to
a. |
Research the available technologies and methods of managing using information systems. |
c. |
Take a course in technological leadership, without which nobody could hope to complete the task assigned |
b. |
Attempt to commercialize the existing HR system in order to offset the costs of the existing system. |
d. |
Procuring the best, most cost-effective system available, either in-house or through an outsourcer. |
Questions 13-15 involve the Metropolitan Tourism mini-case
Metrotown is a large metropolitan area (about 2.5 million people) located in a beautiful part of the country with a four-season tourism base. Metropolitan Tourism (MT) has recently been formed by Metrotown Chamber of Commerce (CoC) to develop and advance the tourism industry, poised to become the largest employment sector in town.
MT has begun collecting information to build a large database about tourism in the Metrotown area. This database will be available on an intranet run out of the Metrotown Chamber of Commerce. They’ve acquired information from local hotels and tourist attractions concerning visitors and their visits over the past five years to CoC member organizations. They’ve also got information about those hotels and tourist attractions (also CoC members), too, including sales records that are confidential. To retain this information safely, MT has spent $1000 on a good password system so that only authorized MT employees can get the information through the intranet.
Read the Metropolitan Tourism (MT) case and answer the following questions:
____ 13. Within hours of linking the database to the Metrotown CoC web server, the CoC website is subject to attack, which denies service to any users. MT does a quick assessment and doesn’t find anything wrong with the databases and resumes service with no apparent problems. Resuming service is ___
a. |
A reasonable idea, because there doesn’t seem to be anything wrong with the databases |
c. |
A reasonable idea because without the website, MT cannot get anything done and would be paralyzed |
b. |
A foolish idea; the website needs to be shut down and a deeper assessment performed |
d. |
Reasonable only if simultaneously a deeper assessment is performed and an audit trail created |
____ 14. How much should MT be prepared to spend on recovery if they’ve spent $1000 on a “good password system” (select one range)?
a. |
$900-1999 |
c. |
$8,000 to 1,000,000 |
b. |
$2,000 to $7,999 |
d. |
Over $1,000,000 |
____ 15. Regarding the information available to MT’s intranet-accessible database, which of the following ethical problems might MT face?
a. |
Unauthorized use of customer information (they didn’t agree to have purchase information used later for any purpose) |
c. |
Snooping on employees’ web transaction, information that rightfully belong to them and not to MT |
b. |
Invasion of privacy of the firms involved by providing MT employees with information about hotels and attractions |
d. |
There is no evidence that MT has thought about the ethical implications of the data that they are using |
Final Exam Diagnostic Quiz Answer Section
1. ANS: A
Implementation is the fourth step, after the traditional 3-step decision making process; design and choice are the second and third steps.
2. ANS: D
The database stored tabled information, but not rules, cases and relationships. A data repository is part of a data warehouse and in this case is equivalent to a database. A model base might contain rules and cases and relationships, but not data; it's important in a DSS.
3. ANS: B
Rapid application development is a way to work rapidly with the IT people doing the technical work. The traditional SDLC has no implementation role for the users. Prototyping strongly involves users, but not as system creators.
4. ANS: A
Although the system review is the first step of the SDLC, it is also the last, because the process is cyclical. Maintenance occurs during the period of use after implementation. Design is an early step prior to implementation.
5. ANS: A
These activities are all part of maintenance. Review doesn't involve any change, simply documentation of the state and status of use. Systems analysis, which includes the system investigation, is one of the first stages of the SDLC, but it also does not involve any changes to a system.
6. ANS: A
Social engineering means using the social system to bring out changes, in this case, disclosure of personal passwords. Dumpster diving means looking through people's refuse for personal information. Biometrics and filtering are normal ways of identifying individuals unrelated to nefarious activities.
7. ANS: A
All answers except (a) are ways of bridging these barriers or causing damage or facilitating an attack on a computer system.
8. ANS: D
A key is the means of encrypting and subsequently decrypting a coded text. The other terms are "distractors" in this question, having nothing or little to do with the question.
9. ANS: D
As an executive in HR with 10 years or more experience, Stella should know precisely what she wants the system to do. In fact, all that is happening is that 1000 records have to be entered correctly; this doesn’t require a change to how these records or any records are processed. Yes, there is always risk in any change, but this risk isn’t out of proportion to any other risk. She probably doesn’t know how the system functions technically, especially since she wasn’t there when the system was implemented.
10. ANS: B
There’s no reason to create an expensive parallel system; this is not mission critical and information can be converted and entered over a relatively short period of time without changing the processes involved. New employee records is not an identifiable group activity, nor is data conversion a typical function of an HR system.
11. ANS: C
Assuming that Stella is actually competent, we can imagine that she has at least a vague idea of what “doing OK” means, but there are no established ideas about this, so she can’t have a DSS constructed. An expert system isn’t used just for retrieval, but that’s pretty much what an MIS application does. Printing out 1000 records is madness for an executive to do.
12. ANS: A
A technological leader will engage in reasonable and solid technology management. There is no possibility of procuring even an appropriate, never mind the best system, without understanding what the options are. Most systems cannot really be easily commercialized; instead cost efficiencies should be built into existing system: if they’re not cost effective, they shouldn’t have been created in the first place. Although taking a course in technological leadership is useful, it’s not necessary.
13. ANS: B
MT doesn’t know what happened and a quick assessment cannot ever tell what has been altered or destroyed. The website must be shut down, because data could be being corrupted or moved out and a lot of it is confidential. Creating an audit trail after the fact is useless.
14. ANS: C
Applying the exponential rule, deterrence should cost 1/8 to 1/1000 as much as recovery. This means that they should be willing to spend something between $8000 (likely) to $1,000,000 (very unlikely).
15. ANS: D
There aren’t any direct ethical concerns. We have to hope that MT has developed procedures to keep information confidential as well as has acquired or developed information systems and interfaces that work to do this. Customers give up their right to information about purchases implicitly when they make a purchase and we can assume easily that firms that are members of the CoC willingly have shared the information. Employees never own information on the work they do, even if it’s accessing an Internet-based intranet.