Mid-Semester Exam: Af 302 - Information Systems
Mid-Semester Exam: Af 302 - Information Systems
MID-SEMESTER EXAM
1. Enterprises can acquire the latest business apps and digital services as they are needed and
without large upfront investments by switching from owning IT resources to ________.
a. cloud computing
b. private data centers
c. data synchronization
d. machine-to-machine technology
2. The field of ________ involves managing and analyzing massive sets of data for purposes
such as target marketing, trend analysis, and the creation of individually tailored products
and services.
a. Data science
b. Cloud computing
c. Machine-to-machine technology
d. Business models
3. All of the following are examples of the influence of social, mobile, and cloud technologies
except ________.
a. Connections and feedback via social networks have changed the balance of
influence.
b. Customers expect to use location-aware services, apps, alerts, social networks,
and the latest digital capabilities at work and outside work.
c. Customer loyalty and revenue growth depend on a business’ ability to offer
unique customer experiences that wow customers more than competitors can.
d. Consumers are less likely to trust tweets from ordinary people than
recommendations made by celebrity endorsements.
4. Which if the following is not an example of the Internet of Things is being used by
businesses?
2
5. ________ is the control of enterprise data through formal policies and procedures to
help ensure that data can be trusted and are accessible.
a) Data governance
b) Master data management
c) Business strategy
d) Data standardization
6. Which of the following is not one of the reasons for information deficiencies?
a. Data silos
b. Lost or bypassed data
c. Distributed systems
d. Nonstandardized data formats
9. The supply of oranges used by Coca-Cola has a three-month growing season, but orange
juice production is year-round. Therefore, producing orange juice with a consistent taste
year-round is complex. How does Coca-Cola deal with this complexity and keep their
orange juice taste consistent?
a. An orange juice decision model was developed that combines detailed data on
the 600+ flavors that make up an orange.
b. A decentralized data model was developed to respond to consumer
preferences.
c. Legacy systems were replaced with data silos to manage big data.
d. A data governance program was implemented to ensure that juice preferences
are achieved.
3
10. Which of the following data management technologies store data that are generated by
business apps and operations?
a) Data marts
b) Data warehouses
c) Databases
d) Transaction-processing systems (TPS).
12. An accurate and consistent view of data throughout the enterprise is needed so one can
make informed, actionable decisions that support the business strategy. A function
performed by a DBMS to integrate, match, or link data from disparate sources is data
_____________.
a) filtering
b) profiling
c) synchronization
d) maintenance
13. Basic functions of business networks are all of the following except _______.
a. Search
b. Mobility
c. Collaboration
d. Routers
14. Network ________ are devices that transmit ________from their source to their
destination based on IP addresses.
15. In terms of digital transmissions, _______ transfers data in small blocks based on the
destination IP address.
a) Chunking
b) Circuit switching
c) Packet switching
4
d) IP Streaming
16. To insure QoS of a network, an alternative to “prioritizing traffic” is to __________,
which means holding back traffic from non-time sensitive apps so that apps like voice
and video run more effectively.
a) Throttle traffic
b) Block traffic
c) Re-direct traffic
d) Filter traffic
17. The main cause of data breaches is ________, which is so successful because of
________ when management does not do enough to defend against cyberthreats.
18. Which of the following represents a cybersecurity concern about employees using their
own smartphones for work purposes?
a. Employees will spend too much time playing games or using entertainment and
recreation apps, thus reducing productivity.
b. Managers will be unable to monitor the time spent on personal calls made
during work hours.
c. Many personal smartphones do not have anti-malware or data encryption apps,
creating a security problem with respect to any confidential business data
stored on the device.
d. Consumer-quality equipment are more likely to break or malfunction than
enterprise quality devices.
19. One of ________ specialties is finding websites with poor security, and then stealing and
posting information from them online.
a. LulzSec’s.
b. .RSA’s
c. Fraudsters’
d. Botmasters’
20. Government and corporate officials concerned about security threats do not bring their
own cell phones or laptops when traveling overseas. Instead, they bring loaner devices
and follow strict security procedures including not connecting to their domestic network
while out of the country. These procedures are referred to as _________.
5
d. Strict Security standards
21. Nike’s website had been built using Java technology, which created attractive webpages.
However, the site was practically invisible to tools called ________ that search engines
use to crawl webpage content.
a. browsers
b. scripts
c. spiders
d. swellpaths
22. Changing the design and content of a website to improve its ranking in SERPs is called
______.
a) Semantic search
b) Organic search
c) SEO
d) SEM
23. ________ rely on sophisticated computer programs called spiders or crawlers that surf
webpages, links, and other online content that are then stored in the search engine’s
page repository.
24. Forrester Research estimates that ________ is the largest segment of the digital
marketing category.
a) Pay-per-click advertising
b) Search marketing
c) Social media optimization
d) Mobile search
25. ________ systems base their recommendations on factors such as age and income; and
________ filtering systems typically rely on information about a person’s behavior, such
as purchases and product ratings.
a. Demographic; collaborative
b. Similarity; comparison
c. Knowledge; expert
d. Content; collaborative
6
_______________________________________________________________
Question 2 Short Answer Questions [25 marks]
A. Explain Porters’ five forces model and give an example of each force. [5 Marks]
B. What is a data silo and why do organizations still have information deficiency
problems? (5 Marks]
C. What is the function of master data management (MDM)? Also explain the four V’s of
data analytics. [5 Marks]
D. What is Net neutrality? What factors should be considered when selecting a mobile
network? [5 Marks]
E. What are the four steps in the defense-in-depth IT security model? [5 Marks]
7
_______________________________________________________________
Question 3 Data Management [25 marks]
8
an 8-K report with the SEC warning shareholders that revenue would be adversely
affected by the data breach. In January 2006, with the public announcement of the extent
of the fines, American Point’s stock price plunged.
The Solution
When a company violates SEC, federal, or state laws, the solution to its problem is going
to be dictated to it. The solution to American Point’s risk exposure was mandated by the
FTC. The company had to implement new procedures to ensure that it provides consumer
reports only to legitimate businesses for lawful purposes. In addition, the FTC ordered
American Point to establish and maintain a comprehensive information security program
and to obtain audits by an independent third-party security professional biyearly until
2026. To reassure stakeholders, American Point hired Carol DiBattiste, the former deputy
administrator of the Transportation Security Administration, as chief privacy officer
(CPO).
The Results
American Point reformed its business practices and data security measures, which were
too lax relative to its risk exposure. The company had to stop putting risky business
practices that focused on short-term revenues ahead of long-term profitability. This
business decision is a necessary and ethical trade-off. American Point’s data breach
brought businesses’ security policies to national attention. It signaled the need for
improved corporate governance. Although there is no generally accepted definition,
corporate governance refers to the rules and processes ensuring that the enterprise
adheres to accepted ethical standards, best practices, and laws. Companies that collect
sensitive consumer information have a responsibility to keep it secure. Together with
high-profile frauds and malware, data breaches have triggered an increase in laws and
government involvement to hold companies and their management accountable for lapses
in governance. Yet, since American Point’s record-setting data breach, many other
infosec incidents and data thefts of greater magnitude have occurred.
Sources: Compiled from ftc.gov, Gross (2005), Kaplan (2008), Mimoso (2006), and
Scalet (2005).
Required:
a) What was the root cause of the data breach in the above case? [5 marks]
b) Explain how could this data breach have been prevented? [5 marks]
d) Discuss the issue of data breach n relation to the Pacific Context [5 marks]
e) Discuss data life cycle and data principles as applied in data management system.
9
[5 marks]
10
11
E) Why are cybercriminals so successful and why is cybercrime expanding rapidly?
Discuss some possible solutions. [5 marks]
THE END
12
13
Question 1 Multiple Choice - General [25 marks]
Circle the BEST answer for each of the following multiple-choice items.
(PLEASE ATTACH THIS WITH YOUR ANSWER BOOKLET)
1. A B C D
2. A B C D
3. A B C D
4. A B C D
5. A B C D
6. A B C D
7. A B C D
8. A B C D
9. A B C D
10. A B C D
11. A B C D
12. A B C D
13. A B C D
14. A B C D
15. A B C D
16. A B C D
17. A B C D
18. A B C D
19. A B C D
20. A B C D
21. A B C D
22. A B C D
23. A B C D
24. A B C D
25. A B C D
14