answers graded A+
Four information system types based on their sphere of influence include interorganizational,
personal, enterprise, and _______ - correct answer ✔✔workgroup
Managers of the business functions most affected by a new information system have a key
responsibility to ensure that - correct answer ✔✔the people, processes, and human structure
components are fully addressed
_______________ is a model used to introduce new systems into the workplace in a manner
that lowers stress, encourages teamwork, and increases the probability of a successful
implementation. - correct answer ✔✔leavitts diamond
The contemporary view of information systems is that they are often so intimately involved in
an organization's value chain that they are part of the process itself. True or False? - correct
answer ✔✔true
Which of the following is not a benefit associated with creating a strategic plan? - correct
answer ✔✔guarantees that only the most current technology solutions will be employed
Four drivers that set the information strategy and determine information system investments
include corporate strategy, technology innovations, innovative thinking, and - correct answer
✔✔business unit strategy
Three ways IS organization can be perceived by the rest of the organization that influence IS
strategy are - correct answer ✔✔cost center, business partner, and game changer
, Which of the following are non-technical skills not commonly associated with an effective
Information system worker? - correct answer ✔✔ability to work in a static, boring environment
where there is little change
Two potential benefits of obtaining a certification in an IS subject area are: - correct answer
✔✔new career possibilities and a potential increase in salary
The growth of the Internet of Things is helping to curb the number of cyberattacks. True or
False? - correct answer ✔✔false
The perpetrator most likely to be the cause of a cyberattack is the _______________. - correct
answer ✔✔careless insider
an _____________is the technique used to gain unauthorized access to a device or a network -
correct answer ✔✔attack vector
A blended threat, phishing, and virus are all examples of a(n) - correct answer ✔✔attack vector
A form of cyberattack that is estimated to occur every 10 seconds against an individual in the
U.S. is _______________ - correct answer ✔✔ransomware
One of the consequences of a successful cyberattack that can lead to monetary penalties for
organizations that fail to comply with data protection regulations is _______________ - correct
answer ✔✔legal consequences
A federal law that focuses on unlawful access to stored communications to obtain, alter, or
prevent authorized access to a wire or electronic communication while it is in electronic
storage. - correct answer ✔✔Stored Wire and Electronic Communications and Transactional
Records Access Statute