How does user comprehension of information change when using a mobile device quizlet?

Show
    Recommended textbook solutions

    How does user comprehension of information change when using a mobile device quizlet?

    Book of Proof

    2nd EditionRichard Hammack

    340 solutions

    How does user comprehension of information change when using a mobile device quizlet?

    Excursions in Modern Mathematics

    8th EditionPeter Tannenbaum

    983 solutions

    How does user comprehension of information change when using a mobile device quizlet?

    Book of Proof

    2nd EditionRichard Hammack

    340 solutions

    How does user comprehension of information change when using a mobile device quizlet?

    A Transition to Advanced Mathematics

    7th EditionDouglas Smith, Maurice Eggen, Richard St. Andre

    620 solutions

    Recommended textbook solutions

    How does user comprehension of information change when using a mobile device quizlet?

    Consumer Behavior: Buying, Having, Being

    13th EditionMichael R Solomon

    449 solutions

    How does user comprehension of information change when using a mobile device quizlet?

    Politics in States and Communities

    15th EditionSusan A. MacManus, Thomas R. Dye

    177 solutions

    How does user comprehension of information change when using a mobile device quizlet?

    Consumer Behavior: Buying, Having, and Being, Global Edition

    12th EditionMichael R Solomon

    245 solutions

    How does user comprehension of information change when using a mobile device quizlet?

    Politics in States and Communities

    15th EditionSusan A. MacManus, Thomas R. Dye

    177 solutions

    Ensure timely and appropriate generation, collection , dissemination, storage, and disposition of project information

    1. Planning communication management: determining the information and communication needs of stakeholders (Who needs what information? When will they need it? How will the information be given to them?)
    Output: communications management plan and project documents updates

    2. Managing Communications: creating distributing, storing, retrieving, and disposing of communications based on the communications management plan
    Outputs: project communications, project document updates, project management plan updates and organizational process assets updates

    3. Controlling Communications: monitoring and controlling project communications to ensure that stakeholder communication needs are met
    Outputs: work performance information, change requests, project document updates and organizational process assets updates

    Upgrade to remove ads

    Only ₩37,125/year

    • Flashcards

    • Learn

    • Test

    • Match

    • Flashcards

    • Learn

    • Test

    • Match

    Units 1-8, plus Quizzes

    Terms in this set (188)

    Unit 1

    1. Business Information Systems: An Overview
    2. The Different Functions of Business Information Systems
    3. Concerns About Information Systems

    Decimal Counting System

    Using 10 digits to represent quantities

    digital system

    A system consisting of only two digits, zero and one, to represent quantities.
    - Digital systems are not used only to represent information that contains numbers, or quantities. They can also represent any information as combinations of zeroes and ones, or, more accurately, the two states that represent zeroes and ones.
    - Digital information consists of zeroes and ones representing two states

    Analog System

    Systems based on a continuous signal that varies in strength or quantity

    Data

    Facts about people, other subjects, and events

    Problem

    Any undesirable situation

    Electromagnetic signals

    Are used for analog and digital signals
    - Electricity, magnetism, and light

    Information

    The product of processing data so that it can be used in a particular context by human beings

    Data Manipulation

    The process of performing calculations and other data transformations related to business transactions.

    System

    An array of components that work together to achieve a common goal, or multiple goals, by accepting input, processing it, and producing output in an organized manner.

    Sub-system

    components inside the system boundary

    closed system

    A system in which no data is allowed to enter or leave; does not interact with any other system

    open system

    Interfaces and interacts with other systems

    database

    a collection of organized data that allows access, retrieval, and use of data

    Information Map

    description of data and information flow within an organization

    Information Technology (IT)

    A term that refers to all technologies that collectively facilitate construction and maintenance of information systems.

    Systems thinking

    Basic reasoning behind equipping organizations with enterprise software applications

    Enterprise software applications

    Systems that serve many parts of the organization by minimizing the need for human data entry and ensuring timely, useful information for the organization's entire supply chain, including taking customer orders, receiving raw materials, manufacturing and shipping, and billing and collection.

    Document management systems

    provide functions to locate and retrieve such documents from various types of locations

    Synergy

    2+2=5 rule; occurs when combined resources produce output that exceeds the sum of the outputs of the same resources employed separately.

    Hardware

    A computer and its peripheral equipment: input, output, and storage devices; hardware also includes data communication equipment

    Software

    Sets of instructions that tell the computer how to take data in, how to process it, how to display information, and how to store data and information

    Telecommunications People

    Information systems professionals and users who analyze organizational information needs, design and construct information systems, write computer programs, operate the hardware, and maintain software

    Procedures

    Rules for achieving optimal and secure operations in data processing; procedures include priorities in dispensing software applications and security measures

    Information System

    A computer-based set of hardware, software, and telecommunications components supported by people and procedures to process data and turn it into useful information

    Human-computer synergy

    A human-computer process that takes advantage of a computer's ability to quickly process vast amounts of data that can then be analyzed by a human

    Consumer privacy

    The handling and protection of sensitive personal information that individuals provide in the course of everyday transactions

    Supply Chain Management System

    A system that enables the coordination of purchasing, manufacturing, shipping, and billing operations, often supported by an enterprise resource planning system (ERP)

    Enterprise Resource Planning System

    An information system that supports different activities for different departments, assisting executives with planning and running the different interdependent functions

    Business Intelligence System

    A system that uses information gleaned from large amounts of data to reveal patterns, trends, and other useful information that can help improve the organization's performance

    Four stages of processing

    input: Entering data into the IS
    data processing: Changing and manipulating data in the IS
    output: Getting information out of the IS
    storage: Storing data and information

    transaction

    A business deal or action; exchange of money, goods, or services

    Transaction Processing System (TPS)

    supports the monitoring, collection, storage, and processing of data from the organization's basic business transactions, each of which generates data

    Five basic components of the computer system

    1. Input devices: Introduce data into the IS
    2. Computer: processes the data through the IS
    3. Output devices: display information
    4. Storage devices: display information
    5. Networking devices/Communication lines: transfer data and information over various distances

    Unit 1 Quiz

    ...

    A new company needs to automate its standard business processes. What does the company need to implement to make this happen?

    An information system
    - An information system is a collection of hardware and software used to perform certain business functions.

    An IT team works with a business analyst to develop a business intelligence system. This situation is a good example of _____.

    Human-computer synergy
    - When both computers and people come together to solve a business process, such as a computer crunching data to display information in a way that an analyst can take action on, it is referred to as human-computer synergy.

    What is the purpose of a transaction processing system?

    To record data collected
    - A transaction processing system is used to collect any and all business data into files and databases for use by the organization.

    John, a new CIO for a business, knows that it is best if all the core business systems interface seamlessly, using a common data structure. What type of system should he purchase?

    An Enterprise Resource Planning System
    - An Enterprise Resource Planning System provides support for the core business systems on a common platform with common data storage.

    What is the core information system component for a business intelligence system?

    Data warehouse
    - A business intelligence system is a collection of data stored on data warehouses. It is used by analytical engines to present trends and other interpretations of information.

    A business department that deals with hiring, training, and management of personnel would use which of the following systems to perform its major functions of record-keeping and employee evaluation?

    - The Human Resource (HR) system is responsible for employee record keeping, including employee evaluations.

    A business maintains large amounts of very sensitive data on its clients. What IT role is charged with planning and implementing information safekeeping measures for this type of company?

    Chief Security Officer
    - The role of the Chief Security Officer, who usually reports to the CIO, is to manage the safekeeping and security of data, protecting it from both internal and external threats.

    What should IT professionals follow in order to ensure that the systems being developed meet high ethical standards and good practices?

    Codes of conduct

    Which of the following is an undesirable effect of new technology?

    Can give easy access to another person's personal information
    - As companies gather more and more personal data, there is more of a chance that this personal data can be used against a person's wishes, invading his or her personal privacy.

    Which term refers to all of the ways that data is turned into information?

    Data manipulation
    - Data manipulation is a process of organizing data into information that can then be interpreted and used to draw conclusions.

    Unit 2

    1. Strategic Uses of Information Systems
    2. Evaluating Information Systems
    3. The Five Forces of Industry Competitive Advantage

    Porter's Five Forces

    Competitive rivalry; Buyer bargaining power; Threat of substitutes; Supplier bargaining power; Threat of new entrants

    Affiliate programs

    An arrangement in which a website provides sales for another website through a link to the seller's site and for which the affiliate is paid

    Strategic Information System

    Any information system that can help an organization achieve a long-term competitive advantage

    Late mover

    A company that adopts new technology after the competition has done so

    Early mover

    A company that adopts new technology before the competition does

    Switching costs

    Expenses that are incurred when a customer stops buying a product or service from one business and starts buying it from another

    Unit 2 Quiz

    ...

    Which of the following initiatives would enable a business to gain a competitive edge?
    Retention of autonomy
    Differentiation of products or services
    Use of different suppliers
    Layoff of non-essential personnel

    Differentiation of products or services
    - There are several ways to gain a competitive advantage. One of them is to differentiate your products and services from those of your competitor, causing yours to be seen as the better deal or quality.

    A large online retailer that originally specialized in selling books online is now selling other items to its customers. What key technology for this type of business allows it to expand so readily?
    Business-to-consumer system
    Financial management system
    Transactional processing
    Open source software

    Business-to-consumer system
    - An online retailer must become an expert at meeting the needs of its customer and so must perfect business-to-consumer systems.

    In order to become more competitive, a company has decided to reduce the price it charges for goods made. What information system would provide the needed data to do this?
    Budgeting
    Transactional
    Cost accounting
    eCommerce

    Cost accounting
    - A cost accounting system keeps track of all the various costs associated with the manufacture of goods, including raw product, manufacturing costs, shipping, storage, and sales.

    What makes information systems strategic in nature?
    They improve the day-to-day operations of the business
    They greatly improve the speed of processing data
    They enable the company to stay on course in terms of its mission
    They enable fundamental changes to happen in a business

    They enable fundamental changes to happen in a business
    - A strategic information system aligns with the strategic goals of the company to fundamentally change processes or direction within the company.

    What must a company do with its strategic information system in order to remain competitive?
    Continually modify and enhance it
    Replace it often with the newest technology on the market
    Support eCommerce activities
    Obtain a patent to protect it

    Continually modify and enhance it
    - A company must continually modify and enhance its systems, always trying to outperform its competitors with better, more desirable services and products.

    An existing start-up business is losing precious market share to its competitors, who have easily implemented the newest technology. What is one reason the first business cannot follow its competitors?
    Cost of the security measures required
    Cost of converting from legacy systems
    Cost of the cloud computing required
    Cost of meeting government regulations

    Cost of converting from legacy systems
    - An existing company would most likely have legacy systems that would need to be converted to a new technology. This is an added burden of cost and time that a start-up company does not have.

    The US has monopoly laws to prevent one company from completely dominating the market with its advanced technology. What type of issue does market domination pose?
    Security
    Societal
    Sales
    Safety

    Societal
    - This is a societal issue. When one company dominates a technology niche, it can charge what it wants for products and use harsh practices to keep competitors at bay. This does not support a free market.

    A company is attempting to implement a new system by isolating the project team members, having them make all the strategic decisions while management focuses on running the business. What problem does this pose for the project?
    Sloppy development and testing practices
    Inaccurate estimates of needed resources
    Commercial pressures
    Weak executive commitment

    Weak executive commitment
    - The key to this question is that the team is making strategic decisions. This is the executive team's responsibility. Without the executive team's commitment, shown by its involvement in decision making, this project will probably not be implemented successfully.

    An IT executive must determine where to use technology to help a company whose customers have become less loyal. What information system would meet this challenge?
    An eCommerce site to gather customer feedback and offer discounts
    A supply chain management system to improve the manufacturing process
    A Human Resource management system to provide better training
    A financial system to provide analysts with advanced reporting

    An eCommerce site to gather customer feedback and offer discounts
    - The problem is most likely that the buyer is finding an alternative product with a competitor. The way to address this is to determine why the consumer is choosing the other product. An eCommerce site would allow the business to speak directly with its customers to determine the problem while offering discounts as an incentive to stay.

    Obtaining a patent on items best addresses which of Porter's five forces?
    Power of suppliers
    Rivalry among existing competitors
    Potential new entrants
    Power of buyers

    Potential new entrants
    - Obtaining a patent on goods or services is one effective way of keeping competitors from taking market share by cloning items, thus stopping potential new entrants.

    Unit 3

    1. Business Functions
    2. Business Functions and Supply Chains
    3. Customer Relationship Management System
    4. Enterprise Resource Planning System

    Human Resource Management (HRM) system

    A system that houses all employee data from recruiting, hiring, evaluation, payroll, and leaving the company

    Enterprise Resource Planning (ERP) system

    An information system that supports different activities for different departments, assisting executives with planning and running different interdependent functions

    Customer Relationship Management

    A set of applications designed to gather and analyze information about customers

    Cash Management System

    An information system that helps reduce the interest and fees that organizations have to pay when borrowing money and increases the yield that organizations can receive on unused funds

    Computer-aided design (CAD)

    Special software used by engineers and designers to facilitate their work by helping with the creation, modification, and optimization of their designs

    Supply Chain

    All of the activities performed from the purchase of raw material to the shipping of manufactured goods and collection of the goods for their sale

    Supply Chain Management (SCM)

    The coordination of purchasing, manufacturing, shipping, and billing operations, often supported by an enterprise resource planning system

    Material Requirement Planning (MRP)

    Inventory control that includes a calculation of future needs

    Targeted Marketing

    A strategy of promoting products and services to the people who are most likely to purchase them

    Unit 3 Quiz

    ...

    A business needs to focus on marketing more effectively to the consumers who purchase its product. What information system would best fit this need?
    Supply Chain Management
    Distribution Center Management
    Customer Relationship Management
    Human Resource Management

    Customer Relationship Management
    - A customer relationship management system will help a business collect information about its customers, including what they buy and with what else. These and other kinds of information can help them tailor their marketing to meet the needs of specific customers, thus using their marketing dollars more wisely.

    Which of the following systems would most likely be used by the employees in the engineering department of a business?
    Computer-Aided Design, Simulation
    Salesforce, Purchasing
    Evaluation, Payroll
    Simulation, Cost Accounting

    Computer-Aided Design, Simulation
    - The engineering department, which is charged with making sure products are designed for quality, safety, and efficiency, would use Computer Aided Design (CAD) with simulation software.

    What type of information system does the distribution process in a business use to ensure on-time delivery of goods to retailers?
    Price management software
    Scheduling software
    Ticketing software
    Inventory control software

    Scheduling software
    - While all of the above types of software may be used in a distribution center, it is the scheduling software that will ensure on-time delivery.

    In which part of a supply chain management system would a business consultant look to research substandard price labels being applied?
    Distributor
    Supplier
    Retailer
    Customer

    Retailer
    - Usually price tags are applied at either the manufacturer site or at the retail store. The distributor is not a part of the supply chain.

    What activity is supported by a supply chain system at the start of the supply chain?
    Orders from the manufacture to the supplier
    Product design and costing
    Assembly and packaging
    Receiving and inventory control

    Orders from the manufacture to the supplier
    - Product design and costing are not supported by supply chain applications. Therefore, the first activity would include orders from the manufacturer to the supplier.

    Which of the following activities is included in a customer relationship management system?
    Inventory controls and product returns
    Market research and customer service
    New product design and engineering
    Work and delivery scheduling

    Market research and customer service
    - A Customer Relationship Management (CRM) system supports marketing research, targeted marketing, salesforce automation, and customer service.

    What type of marketing collects data on customers and creates specific ad campaigns to meet prospective clients' determined needs?
    Social
    Brand
    Promotional
    Target

    Target
    - Target marketing uses information collected by the company or purchased from other companies to find clients who will most likely purchase a company's goods.

    What system would a salesperson use to find information about a client's inventory position and suggested purchase amounts?
    Supply Chain Management (SCM) System
    Distribution Center Management (DCM) System
    Customer Relationship Management (CRM) System
    Human Resource Management (HRM) System

    Customer Relationship Management (CRM) System
    - A Customer Relationship Management (CRM) system would have this type of data. A salesperson would most likely use a laptop, PDA, smart phone, or tablet computer to access the data.

    An Enterprise Resource Planning (ERP) system collects many types of data from one system and provides it to another related system. Which of the following is a good example of this?
    Budget data to payroll processing
    Employee data to marketing management
    Sales data to inventory management
    Invoice data to manufacturing management

    Sales data to inventory management
    - While data is easily transferred from one system to another, it must be relevant to the receiving system. Sales data is very relevant to inventory management, as it allows analysts to monitor the inventory position along the supply chain, taking action when inventory is too low or too high at any point along the chain.

    The easy interface of data across the various applications in an Enterprise Resource Planning (ERP) System is why many companies purchase and implement ERP systems. What is a possible risk in doing so?
    ERP packages are a significant expense to the business to implement
    ERP packages require a complete change of infrastructure
    ERP packages require many more employees along the supply chain
    ERP packages tend to make a company less competitive

    ERP packages are a significant expense to the business to implement
    - ERP packages are very complex and require a lot of tailoring to meet the needs of a given company. This can be expensive and time consuming.

    Unit 4

    1. Business Hardware
    2. Business Software

    Central processing unit (CPU)

    The circuitry of a computer microprocessor that fetches instructions and data from the primary memory and executes the instructions

    Internal memory

    The memory circuitry inside the computer that communicates directly with the CPU; consists of RAM and ROM

    Parallel processing

    The capacity for several CPUs in one computer to process different data at the same time

    Ergonomics

    The science of designing and modifying machines to better suit people's health and comfort

    Magnetic disk

    A disk or set of disks that share a spindle and are coated with an easily magnetized substance to record data in the form of tiny magnetic fields

    Systems software

    The software that executes routine tasks and includes operating systems, language translators, and communications software

    Object-oriented programming language

    A language that combines data and the procedures that process the data into a single unit called an "object," which can be invoked from different programs

    Groupware

    Any of several types of software that enable users of computers in remote locations to work together on the same project

    Open source software

    Software whose source code can be accessed by the general public

    Cloud computing

    Either an organization's or an individual's hardware or software with services provided over the Internet

    Unit 4 Quiz

    ...

    What computer component serves as the brains of the computer and executes all of the instructions?
    External Memory
    Central Processing Unit
    Internal Memory
    Microprocessor

    Central Processing Unit
    - The Central Processing Unit (CPU) accepts data and instructions from the internal memory, decodes and executes the instructions, and passes data back to the memory.

    What does a supercomputer have that makes it so powerful?
    Distributed computing
    Machine cycles
    Multiple processors
    Microprocessing

    Multiple processors
    - A supercomputer has multiple processors which perform in parallel, thus allowing this giant and expensive computer to process massive amounts of data quickly

    The banking industry developed an input device to greatly improve the processing of the millions of checks that needed to be entered. What is this device called?
    Touch Screen Recognition (TSR) reader
    Optical Mark Recognition (OMR) reader
    Optical Character Recognition (OCR) reader
    Magnetic-Ink Character Recognition (MICR) reader

    Magnetic-Ink Character Recognition (MICR) reader
    The banking industry added MICR strips to each check. The checks are scanned into the MICR reader, the data entry clerk enters the amount, and the information is saved.

    A company is being sued by several workers over repetitive motion damage in the use of their PCs. What should the purchasing agent for the company consider in the future to keep this type of legal action from occurring again?
    Backward compatibility
    Warranties
    Ergonomics
    Green power

    Ergonomics
    - The purchasing agent must consider the ergonomics of equipment to ensure that workers do not develop physical problems through constant use of the equipment.

    Application software is used to enable a user to complete specific tasks. Which of the following is considered a type of application software?
    Hyper-text Markup Language (HTML)
    Operating System Software
    Word Processor
    Firewall

    Word Processor
    - A word processor allows a user to enter text into a document. Operating Systems software allows the machine code to work. A firewall is a device that keeps unwanted cyber intruders from entering a network. HTML is a language used to develop applications.

    A project manager is looking to reduce the time it normally takes to develop code. What can this project manager use to accomplish this goal?
    Machine-code language
    Object-oriented programming
    Assembly language
    Systems software

    Object-oriented programming
    - Object-oriented programming allows a programmer to reuse pieces of already-developed code, thus requiring less time to develop a program and improving the ease of code maintenance.

    The development of applications for the internet has spawned many new languages. Which language is associated with the generation of applets?
    Visual Basic
    JavaScript
    C++
    HTML

    JavaScript
    - JavaScript is credited with producing applets that can be easily used by web developers to increase the speed of delivery of applications.

    There are many forms of popular operating systems, some created to work on specific pieces of hardware. What makes the Linux system different from all the others?
    It is used only on micro-computers
    It is a prototype without the usual OS functionality
    It is a proprietary operating system
    It is open source software

    It is open source software
    - Linux is open source software. It is free of charge and many developers can and do upgrade it. It is used on a wide variety of computer platforms. The risk is on the maintenance of something that is always in flux.

    Software-as-a-Service (SaaS) is a type of which category of computing?
    Source Computing
    End-user Computing
    Utility Computing
    Cloud Computing

    Cloud Computing
    - Cloud computing includes Software as a Service and Utility Computing. Software as a Service allows a firm to subscribe to a third-party software provider. Utility computing refers to a situation in which a company runs its software on a third-party's hardware.

    What benefit does platform-as-a-service (PaaS), a form of hardware cloud computing, offer to a company?
    It reduces the cost of data communication network connectivity
    It decreases the costs of vendor compliance management and reporting
    It improves the speed of development of application software
    It eliminates the cost of owning and running the company's own data center

    It eliminates the cost of owning and running the company's own data center
    - Platform-as-a-Service (PaaS) eliminates the need to purchase servers, storage components, and other data center hardware, thus reducing the capital cost of supporting the company's applications.

    UNIT 5

    1. Business Networks and Telecommunications
    2. Networking and Internet Services
    3. Networking Trends

    Telecommunications

    Communications over a long distance, as opposed to communication within a computer or between adjacent hardware pieces

    Videoconferencing

    A telecommunications system that allows people who are in different locations to meet via transmitted images

    Peer-to-peer (P2P) file sharing

    Software applications that enable two internet users to send data to and receive data from each other; the technology is highly objectionable to organizations that sell copyrighted materials because the software promotes violation of copyrights

    Network

    A combination of a communications device and a computer or several computers, or of two or more computers, so that the various devices can send and receive text or audiovisual information to one another

    Virtual Private Network

    Hardware and software installed to ensure that a network path that includes the internet enables employees of the same organization or employees of business partners to communicate confidentially

    VoIP (Voice over Internet Protocol)

    Technologies that enable voice communication by utilizing the internet instead of a telephone network

    Circuit Switching

    A communications process in which a dedicated channel is established for the duration of a transmission; the sending node signals the receiving node and the receiver acknowledges the signal and then receives the entire message

    Internet Service Provider

    An individual or organization that provides an internet connection and sometimes other related services to subscribers

    UNIT 5 QUIZ

    ...

    How have advances in telecommunications helped make business in the 21st century more efficient?
    By improving the security of business data
    By improving the throughput of the manufacturing line
    By providing a better distribution of data
    By reducing the time needed to on-board employees

    By providing a better distribution of data
    - Telecommunications have helped business in a number of ways. One is that they allow data to be retrieved instantly from wherever it is needed.

    What would a business be concerned about in terms of peer-to-peer sharing, an outgrowth of telecommunications?
    The proliferation of emails in place of written documents
    A tendency to use information from public sources
    A disruption in the flow of business data
    The legal ramifications of unauthorized downloads

    The legal ramifications of unauthorized downloads
    - The legal ramifications come into play when an employee downloads copyrighted or other protected material without the owner's consent.

    A network manager needs to allow members of the HR team to share data. Knowing that this is sensitive data, what type of network should the manager set up?
    Wide Area Network
    Value-added Network
    Local Area Network
    Metropolitan Area Network

    Local Area Network
    - While all of the above network types would work, the most secure one is the LAN. Only PCs hardwired into this network could share data, thus keeping others out.

    A company can create more information security by leasing lines in a network which only its authorized employees can access. What is this type of network called?
    Value-Added Network (VAN)
    Virtual Private Network (VPN)
    Personal Area Network (PAN)
    Wide Area Network (WAN)

    Virtual Private Network (VPN)
    - A virtual private network is created by leasing lines in a network and giving employees authorized ids/password to access the network. In this way, the company has the best of both worlds - a private network without building and maintenance costs.

    A business or an individual today needs to have access to the internet for many forms of communication and information. Which method of connection is adversely affected by an increased number of users?
    Fiber optics
    Asymmetric DSL
    Satellite
    Cable

    Cable
    - Of all the choices given, only cable degrades with increases in the number of users based on the bandwidth each takes.

    Many people can be seen at coffee houses and bistros working away on their tablets or PCs. How are these individuals most likely connected to the internet?
    Over a wireless network
    Over a value-added network
    Over an optical carrier
    Over a leased line

    Over a wireless network
    - Customers at coffee houses are normally connected to the internet via a wireless connection provided by the retail establishment.

    Radio Frequency Identification (RFID) tags are being used in many business to improve the flow of goods. What do tags need in order to work correctly?

    A source of power
    - An RFID tag responds to transmission signals using a very small amount of power or uses power from the reader that queries it.

    Telecommuting is now possible because of advanced telecommunications. What is one societal benefit of telecommuting?
    Decrease in social service needs
    Decrease in layoffs
    Decrease in compensation claims
    Decrease in pollution

    Decrease in pollution
    - Society benefits from the decrease in commuter traffic, which leads to a decrease in pollution.

    Which of the following technologies, which relies solely on a connection to the web, might replace the current land line telephone in most consumer households?
    Voice over Internet Provider
    Smart Phone
    Personal Digital Assistant
    MP3 Player

    Voice over Internet Provider
    - The only device that relies only on access to the internet is a VoIP phone. PDAs and smart phones use cellular connections, as well.

    How do devices on the network communicate with one another to smoothly transfer data at a high level of quality?
    Using TCP/IP protocol
    Using RFID's
    Using VoIP protocol
    Using digital line subscription

    Using TCP/IP protocol
    - TCP/IP protocol is the messaging system all devices use to accept and send data along, ensuring completeness and quality.

    Unit 6

    1. Databases and Data Warehouses
    2. Relational Operations
    3. Technology of Data Warehouses

    Data warehouse

    A huge collection of historical data that can be processed to support management decision making

    Structured Query Language

    The data definition and manipulation language of choice for many developers of relational database management systems

    Relational operation

    An operation that creates a temporary table that is a subset of the original table or tables in a relational database

    Composite key

    In a data file, a combination of two fields that can serve as a unique key to locate specific records

    Join table

    In relational database manipulation, a table created by linking data from multiple tables

    Primary key

    In a file, a field that holds values that are unique to each record

    Relational Database Model

    A general structure of databases in which records are organized in tables and the relationships among tables are maintained through foreign keys

    Database Management System (DBMS)

    A computer program that allows the user to construct a database, populate it with data, and manipulate the data

    Data redundancy

    The existence of the same data in more than one place in a computer system

    Unit 6 Quiz

    ...

    What is the benefit of storing data in a database over a flat file structure?
    It makes data programs dependent
    It leads to faster daily loading
    It makes the data more secure
    It reduces data redundancy

    It reduces data redundancy
    - A database provides data integrity as the data is cleansed from transactional data.

    John, a database administrator, tries to ensure that each data field in the database is stored only once, eliminating data redundancy. Why is this a good practice?
    It improves data validity
    It increases security
    It increases processing time
    It decreases data recovery time

    It improves data validity
    - Having data in only one place in a database improves processing time and data validity.

    When a variety of fields are loaded together as an unit, what is the unit called?
    A character
    An entity
    A record
    A table

    A record
    - Characters make up fields, fields make up records, and records make up tables.

    What is the first step in designing a relational database?
    Determine the number of fields needed and tables desired
    Determine how the data will be loaded
    Determine the number of entities and how they relate
    Determine the primary, secondary, and composite keys required

    Determine the number of entities and how they relate
    - It is important to first determine what objects will make up the database (entities) and how they relate to one another. This will drive the design of the tables and keys needed.

    What is a downside of using databases that have been designed to house transactional data for querying?
    It takes longer to build the needed keys
    It takes longer to verify completeness
    It takes longer to load and update data
    It takes longer to retrieve the needed data

    It takes longer to retrieve the needed data
    - Databases that are set set up to house transactions are designed for fast loading. When analysis is desired, many temporary tables need to be built, which can take a long time and a lot of processing power.

    What does the join function do that is a unique relational operation?
    Creates composite keys
    Builds data marts
    Builds temporary tables
    Removes unwanted data

    Builds temporary tables
    - The join function takes data from various tables and creates a temporary table to provide data for querying or reporting.

    What do database managers use to develop and maintain relational databases?
    Online Transactional Processing (OLTP)
    Structured Query Language (SQL)
    Visual Basic
    Online Analytical Processing (OLAP)

    Structured Query Language (SQL)
    - DBMS - Database managers use SQL to build, extract, load, and fix the data in a relational database.

    How do typical business analysts access the information in a data warehouse in order to do "what-if "analysis?
    Through data processing
    Through data transformation
    Through data entry
    Through data mining

    Through data mining
    - Analysts use query tools to do data mining of the needed information.

    A data warehouse supports business analysis of problems that do not have a single solution. Which of the following is key in terms of providing information to the analyst?
    Canned reports and dashboards
    Primary and secondary keys
    Local area networks
    Large amounts of historical, pertinent data

    Large amounts of historical, pertinent data
    - A data warehouse is an accumulation of large amounts of data, which, transformed into information, can provide trending and other analytical data.

    Which part of the process of building a data warehouse includes verifying the completeness of the data entered?
    Transforming
    Loading
    Cleaning
    Extracting

    Loading
    - In the final step of loading, an audit is done to determine that all records entered have been accounted for in the data warehouse.

    Unit 7

    1. Data, Information, and Knowledge
    2. Business Intelligence and Knowledge Management

    Data

    Facts, or values of qualitative and quantitative variables

    Management by exception

    A style of management in which managers review only exceptions from expected results that are of a certain size or type, assuming that smaller deviations are unimportant

    Decision Support System (DSS)

    A computer-based system that uses summarized historical data to support decision making when an answer is not clear

    Business Intelligence

    Discovers not-yet-known patterns, trends, and other useful information that can help improve an organization's performance

    Online Analytical Processing (OLAP)

    A type of application that operates on data stored in databases and data warehouses to produce summary tables with multiple combinations of dimensions

    Knowledge Management

    The combination of activities involved in gathering, sharing, analyzing, and disseminating knowledge to improve an organization's performance

    Information

    Data that is put into some kind of context

    Unit 8

    1. Information Security
    2. Risks to Information Systems
    3. Preventing Security Breaches

    Blackouts and brownouts

    Total or partial power loss that disrupts computer processing

    Unit 7 Quiz

    ...

    Which of the following types of information would be most pertinent to a company president?
    Narrow and department-focused data
    Daily operations statistics data
    Detailed and specific data
    Long-term time span data
    Explanation

    Long-term time span data
    - Upper-level management would most likely be looking across the entire company over a broad period of time for trends and general direction.

    In order to be successful at the job, which of the following roles would most likely require reviewing information about competitors?
    Marketing executive
    Bank teller
    IT data security analyst
    Manufacturing line manager

    Marketing executive
    - Top executives are concerned with what the competition is doing, which helps them make plans to prevent the competition from taking market share.

    Which of the following expresses the difference between information and knowledge?
    Knowing when versus knowing why
    Knowing what versus knowing how
    Knowing who versus knowing how
    Knowing why versus knowing what

    Knowing what versus knowing how
    - Knowledge is the application of information. So, knowing "what" is indicative of information. Knowing "how" is indicative of knowledge.

    Which of the following would be included in managing by exception?
    Reviewing sales by week
    Reviewing the worst performing items
    Reviewing currently offered bank rates
    Reviewing time card details

    Reviewing the worst performing items
    - Management by exception is limiting a view to only the best or worst of a sorted list of figures so that the majority of a manager's energy can be expended on taking action to address the critical needs of the company.

    Why would a manager whose responsibility is to improve productivity use a decision support system?
    To explore historical performance for possible solutions
    To monitor a competitor's recent performance
    To find exceptions in daily production data
    To review recent employee output by manufacturing line

    To explore historical performance for possible solutions
    - A mid-level to senior-level manager would use a Decision Support System (DSS) to find solutions by looking at past performance. A DSS has trend and summary data rather than detailed daily transactional data.

    Information technology is said to enable flattening of the organization. How is this made possible?
    Computers deliver information via various mobile devices
    Computers automate assembly lines through advanced robotics
    Computers provide advanced security over transactional data
    Computers process transactional data to deliver advanced reporting

    Computers process transactional data to deliver advanced reporting
    - To flatten the organization means to remove layers of management. Low level managers used to have to collect data, review it, and develop action steps. Computers have eliminated this daily number crunching, producing both statistical reports and exception or actionable reports.

    Which of the following refers to a program that provides economic indices, stock and commodity pricing, and company performance data?
    Enterprise Resource Planning System (ERP)
    Executive Information System (EIS)
    Distribution Management System (DMS)
    Decision Support System (DSS)

    Executive Information System (EIS)
    - An Executive Information System (EIS) provides summarized and actionable data as well as external data such as stock prices to senior executives.

    Quinn must determine who gets access to what information in his company. Why is an issue related to Quinn's charge?
    1. Determining who gets access to specific information gives Quinn considerable knowledge of company financials; he needs to share the company's financial information with not only share-holders, but all employees
    2. Determining who gets access to specific information gives Quinn considerable knowledge of company financials; he needs to report any alarming data to the CEO
    3. Determining who gets access to specific information gives Quinn considerable power; he will likely lose friendships and make enemies at work
    4. Determining who gets access to specific information gives Quinn considerable power; others may not like this or they may try to convince him to give access to those who shouldn't have it

    4. Determining who gets access to specific information gives Quinn considerable power; others may not like this or they may try to convince him to give access to those who shouldn't have it
    - The person who has access to information and can grant that access to others is in a powerful political position.

    Which of the following is considered vital to gaining a competitive advantage?
    Governmental data gathered and summarized
    Intelligence derived from data
    Security firewalls added to networks
    Financial audits done thoroughly and validated

    Intelligence derived from data
    - In the Flatworld textbook, Caesar's approach to using data to gain a competitive advantage is explored. Caesar's takes full advantage of all the data it accumulates about a customer to entice that customer to enjoy his or her experience at Caesar's more fully, which will encourage the customer to come back often rather than choosing to visit other casinos.

    A retail giant uses its wealth of data to enable a fiercely competitive model by tightly controlling what aspect of its business?
    Supplier distribution
    Customer marketing
    Value chain
    Executive pay and bonuses

    Value chain
    - The big retail chains are now accumulating data on customer buying activities to best ensure that the right goods are at the right place for the right price. The companies work closely with their value chains to make this happen.

    Social engineering

    Deceptive methods that hackers use to entice people to release confidential information such as access codes and passwords; often, the thieves misrepresent themselves as technicians who need one's password for fixing a problem in a network

    Identity theft

    The criminal practice of obtaining enough personal information to pretend to be the victim, usually resulting in using the victim's credit cards or issuing new credit cards under that person's name

    Honeytoken

    A bogus record in a networked database that neither employees nor business partners would ever access for legitimate purposes. When an intruder copies the database or the part of the database that contains that record, a simple program alerts security personnel, who can start an investigation

    Logic bomb

    A destructive computer program that is inactive until it is triggered by an event taking place in the computer, such as the deletion of a certain record from a file

    Denial of service attacks

    These attacks result in the inability of legitimate visitors to log on to a website because too many malicious requests are launched by an attacker

    Redundant Array of Independent Disks (RAID)

    A set of magnetic disk packs maintained for backup purposes; sometimes used for storing large databases

    Atomic transaction

    A transaction whose entry is not complete until all entries into the appropriate files have been successfully completed; it is an important data entry control

    Demilitarized zone

    A network of computers and other devices connected to the internet in which visitors are not allowed direct access to other resources

    Encryption

    The conversion of plaintext to an unreadable stream of characters, especially to prevent a party that intercepts telecommunicated messages from reading them

    Transport Layer Security

    The successor of Secure Sockets Layer (SSL); the software in the web browser responsible for secure communication

    Why is data security a top organizational priority?
    Security breaches can be a means of controlling senior management and finances
    Security breaches are a solely internal problem that significantly impacts hiring possibilities
    Security breaches can be a financial disaster to the company
    Security breaches can be a marketing boon when executed correctly

    Security breaches can be a financial disaster to the company
    - Security of data, which is a critical company asset, has to be the concern of all company employees, considering the implications of data being misused or deleted.

    Which of the following appropriately describes a corporate security officer's job responsibilities?
    Ensure the integrity and reliability of data resources
    Reduce the costs of hardware and software maintenance
    Maintain an average up-time of 99%
    Meet company goals regarding diversity of the work force

    Ensure the integrity and reliability of data resources
    - The Chief Security Officer focuses on ensuring the reliability and integrity of data resources. The other choices are more true of the data center manager.

    What would a computer thief use keystroke logging to do?
    Plant a logic bomb
    Steal information
    Create a denial of service attack
    Disable an antivirus program

    Steal information
    - Keystroke logging is used by thieves to gain access to personal files in order to obtain or destroy information.

    What is the goal of phishing?
    Using the reputation of a trusted firm or friend to trick someone into revealing information
    Analyzing email body characteristics for identification of a consumer
    Determining weak or easily compromised passwords from various users
    Forging or disguising the identity of an email transmission to prevent responses from users

    Using the reputation of a trusted firm or friend to trick someone into revealing information
    - Phishing, also called social engineering, is a computer thief's way of deceiving computer users into giving out their personal information.

    Jill answered an email from her bank asking her to confirm her account information and personal password. What was she a victim of?
    Encryption
    Shoulder surfing
    Trojan Horse
    Social Engineering

    Social Engineering
    - She was a victim of social engineering, also called phishing.

    Why would Trisha, a security officer, ask to add a duplicate non-production database to a server that is connected to the internet?
    To dedicate to running virus protection software
    To specifically detect and isolate intruders
    To identify the collection of white- and black-listed individuals
    To store only company IDs and passwords

    To specifically detect and isolate intruders
    - This is called creating a honey pot. It is used solely to detect and catch intruders and isolate them from company resources.

    Most computer users have various antivirus programs installed. These antivirus programs control which of the following?
    Zero-day exploits
    Spoofing
    Phishing
    Trojan Horses

    Trojan Horses
    - Anti-virus programs most often catch executables loaded onto a PC without the computer user's consent, such as Trojan Horses and Logic Bombs.

    How would a computer thief hijack a computer?
    Install a peripheral
    Install a bot
    Install an applet
    Install a utility

    Install a bot
    - A computer hacker would install a small program called a bot. This program would start executing on its own, giving the hijacker access rights to the computer.

    What is the role of the International Organization for Standardization (ISO)?
    It provides a set of standards for information security management
    It provides backup of critical files and ensures hardened password protection
    It provides consultants to companies to develop security policies
    It regulates legal enforcement of standardized security measures

    It provides a set of standards for information security management
    - ISO, also referred to as ISO27K, is an international organization aimed at setting standards for information security management.

    What makes asymmetric encryption work?
    Use of a secret key of 128 bits
    Use of both a pubic and private key
    Use of more than one public key
    Use of strictly private keys

    Use of both a pubic and private key
    - Asymmetric encryption uses both a public and a private key. A symmetric key is a secret key of 128 bits.

    Other sets by this creator

    Comprehensive Overview

    54 terms

    TaraB878

    Overall Comprehension

    216 terms

    TaraB878

    Final

    49 terms

    TaraB878

    Pre-Final

    6 terms

    TaraB878

    Verified questions

    algebra

    Fill in the blanks. Each real number t corresponds to a point (x, y) on the ________ ________.

    Verified answer

    algebra

    Use the Egyptian algorithm to find the product of $29$ and $75$.

    Verified answer

    calculus

    Find the critical numbers of each function. $f(x)=x^{3}-48 x$

    Verified answer

    pre algebra

    Replace each circle with the proper comparison symbol: (a) $3.0303 \bigcirc 3.303 \qquad$ (b) $0.6 \bigcirc 0.600$

    Verified answer

    Recommended textbook solutions

    How does user comprehension of information change when using a mobile device quizlet?

    Numerical Analysis

    9th EditionJ. Douglas Faires, Richard L. Burden

    873 solutions

    How does user comprehension of information change when using a mobile device quizlet?

    Book of Proof

    2nd EditionRichard Hammack

    340 solutions

    How does user comprehension of information change when using a mobile device quizlet?

    Topology

    2nd EditionJames Munkres

    622 solutions

    How does user comprehension of information change when using a mobile device quizlet?

    Introduction to Real Analysis

    4th EditionDonald R. Sherbert, Robert G. Bartle

    842 solutions