How does user comprehension of information change when using a mobile device quizlet?

Recommended textbook solutions

Book of Proof

2nd EditionRichard Hammack

340 solutions

Excursions in Modern Mathematics

8th EditionPeter Tannenbaum

983 solutions

Book of Proof

2nd EditionRichard Hammack

340 solutions

A Transition to Advanced Mathematics

7th EditionDouglas Smith, Maurice Eggen, Richard St. Andre

620 solutions

Recommended textbook solutions

Consumer Behavior: Buying, Having, Being

13th EditionMichael R Solomon

449 solutions

Politics in States and Communities

15th EditionSusan A. MacManus, Thomas R. Dye

177 solutions

Consumer Behavior: Buying, Having, and Being, Global Edition

12th EditionMichael R Solomon

245 solutions

Politics in States and Communities

15th EditionSusan A. MacManus, Thomas R. Dye

177 solutions

Ensure timely and appropriate generation, collection , dissemination, storage, and disposition of project information

1. Planning communication management: determining the information and communication needs of stakeholders (Who needs what information? When will they need it? How will the information be given to them?)
Output: communications management plan and project documents updates

2. Managing Communications: creating distributing, storing, retrieving, and disposing of communications based on the communications management plan
Outputs: project communications, project document updates, project management plan updates and organizational process assets updates

3. Controlling Communications: monitoring and controlling project communications to ensure that stakeholder communication needs are met
Outputs: work performance information, change requests, project document updates and organizational process assets updates

Upgrade to remove ads

Only ₩37,125/year

  • Flashcards

  • Learn

  • Test

  • Match

  • Flashcards

  • Learn

  • Test

  • Match

Units 1-8, plus Quizzes

Terms in this set (188)

Unit 1

1. Business Information Systems: An Overview
2. The Different Functions of Business Information Systems
3. Concerns About Information Systems

Decimal Counting System

Using 10 digits to represent quantities

digital system

A system consisting of only two digits, zero and one, to represent quantities.
- Digital systems are not used only to represent information that contains numbers, or quantities. They can also represent any information as combinations of zeroes and ones, or, more accurately, the two states that represent zeroes and ones.
- Digital information consists of zeroes and ones representing two states

Analog System

Systems based on a continuous signal that varies in strength or quantity

Data

Facts about people, other subjects, and events

Problem

Any undesirable situation

Electromagnetic signals

Are used for analog and digital signals
- Electricity, magnetism, and light

Information

The product of processing data so that it can be used in a particular context by human beings

Data Manipulation

The process of performing calculations and other data transformations related to business transactions.

System

An array of components that work together to achieve a common goal, or multiple goals, by accepting input, processing it, and producing output in an organized manner.

Sub-system

components inside the system boundary

closed system

A system in which no data is allowed to enter or leave; does not interact with any other system

open system

Interfaces and interacts with other systems

database

a collection of organized data that allows access, retrieval, and use of data

Information Map

description of data and information flow within an organization

Information Technology (IT)

A term that refers to all technologies that collectively facilitate construction and maintenance of information systems.

Systems thinking

Basic reasoning behind equipping organizations with enterprise software applications

Enterprise software applications

Systems that serve many parts of the organization by minimizing the need for human data entry and ensuring timely, useful information for the organization's entire supply chain, including taking customer orders, receiving raw materials, manufacturing and shipping, and billing and collection.

Document management systems

provide functions to locate and retrieve such documents from various types of locations

Synergy

2+2=5 rule; occurs when combined resources produce output that exceeds the sum of the outputs of the same resources employed separately.

Hardware

A computer and its peripheral equipment: input, output, and storage devices; hardware also includes data communication equipment

Software

Sets of instructions that tell the computer how to take data in, how to process it, how to display information, and how to store data and information

Telecommunications People

Information systems professionals and users who analyze organizational information needs, design and construct information systems, write computer programs, operate the hardware, and maintain software

Procedures

Rules for achieving optimal and secure operations in data processing; procedures include priorities in dispensing software applications and security measures

Information System

A computer-based set of hardware, software, and telecommunications components supported by people and procedures to process data and turn it into useful information

Human-computer synergy

A human-computer process that takes advantage of a computer's ability to quickly process vast amounts of data that can then be analyzed by a human

Consumer privacy

The handling and protection of sensitive personal information that individuals provide in the course of everyday transactions

Supply Chain Management System

A system that enables the coordination of purchasing, manufacturing, shipping, and billing operations, often supported by an enterprise resource planning system (ERP)

Enterprise Resource Planning System

An information system that supports different activities for different departments, assisting executives with planning and running the different interdependent functions

Business Intelligence System

A system that uses information gleaned from large amounts of data to reveal patterns, trends, and other useful information that can help improve the organization's performance

Four stages of processing

input: Entering data into the IS
data processing: Changing and manipulating data in the IS
output: Getting information out of the IS
storage: Storing data and information

transaction

A business deal or action; exchange of money, goods, or services

Transaction Processing System (TPS)

supports the monitoring, collection, storage, and processing of data from the organization's basic business transactions, each of which generates data

Five basic components of the computer system

1. Input devices: Introduce data into the IS
2. Computer: processes the data through the IS
3. Output devices: display information
4. Storage devices: display information
5. Networking devices/Communication lines: transfer data and information over various distances

Unit 1 Quiz

...

A new company needs to automate its standard business processes. What does the company need to implement to make this happen?

An information system
- An information system is a collection of hardware and software used to perform certain business functions.

An IT team works with a business analyst to develop a business intelligence system. This situation is a good example of _____.

Human-computer synergy
- When both computers and people come together to solve a business process, such as a computer crunching data to display information in a way that an analyst can take action on, it is referred to as human-computer synergy.

What is the purpose of a transaction processing system?

To record data collected
- A transaction processing system is used to collect any and all business data into files and databases for use by the organization.

John, a new CIO for a business, knows that it is best if all the core business systems interface seamlessly, using a common data structure. What type of system should he purchase?

An Enterprise Resource Planning System
- An Enterprise Resource Planning System provides support for the core business systems on a common platform with common data storage.

What is the core information system component for a business intelligence system?

Data warehouse
- A business intelligence system is a collection of data stored on data warehouses. It is used by analytical engines to present trends and other interpretations of information.

A business department that deals with hiring, training, and management of personnel would use which of the following systems to perform its major functions of record-keeping and employee evaluation?

- The Human Resource (HR) system is responsible for employee record keeping, including employee evaluations.

A business maintains large amounts of very sensitive data on its clients. What IT role is charged with planning and implementing information safekeeping measures for this type of company?

Chief Security Officer
- The role of the Chief Security Officer, who usually reports to the CIO, is to manage the safekeeping and security of data, protecting it from both internal and external threats.

What should IT professionals follow in order to ensure that the systems being developed meet high ethical standards and good practices?

Codes of conduct

Which of the following is an undesirable effect of new technology?

Can give easy access to another person's personal information
- As companies gather more and more personal data, there is more of a chance that this personal data can be used against a person's wishes, invading his or her personal privacy.

Which term refers to all of the ways that data is turned into information?

Data manipulation
- Data manipulation is a process of organizing data into information that can then be interpreted and used to draw conclusions.

Unit 2

1. Strategic Uses of Information Systems
2. Evaluating Information Systems
3. The Five Forces of Industry Competitive Advantage

Porter's Five Forces

Competitive rivalry; Buyer bargaining power; Threat of substitutes; Supplier bargaining power; Threat of new entrants

Affiliate programs

An arrangement in which a website provides sales for another website through a link to the seller's site and for which the affiliate is paid

Strategic Information System

Any information system that can help an organization achieve a long-term competitive advantage

Late mover

A company that adopts new technology after the competition has done so

Early mover

A company that adopts new technology before the competition does

Switching costs

Expenses that are incurred when a customer stops buying a product or service from one business and starts buying it from another

Unit 2 Quiz

...

Which of the following initiatives would enable a business to gain a competitive edge?
Retention of autonomy
Differentiation of products or services
Use of different suppliers
Layoff of non-essential personnel

Differentiation of products or services
- There are several ways to gain a competitive advantage. One of them is to differentiate your products and services from those of your competitor, causing yours to be seen as the better deal or quality.

A large online retailer that originally specialized in selling books online is now selling other items to its customers. What key technology for this type of business allows it to expand so readily?
Business-to-consumer system
Financial management system
Transactional processing
Open source software

Business-to-consumer system
- An online retailer must become an expert at meeting the needs of its customer and so must perfect business-to-consumer systems.

In order to become more competitive, a company has decided to reduce the price it charges for goods made. What information system would provide the needed data to do this?
Budgeting
Transactional
Cost accounting
eCommerce

Cost accounting
- A cost accounting system keeps track of all the various costs associated with the manufacture of goods, including raw product, manufacturing costs, shipping, storage, and sales.

What makes information systems strategic in nature?
They improve the day-to-day operations of the business
They greatly improve the speed of processing data
They enable the company to stay on course in terms of its mission
They enable fundamental changes to happen in a business

They enable fundamental changes to happen in a business
- A strategic information system aligns with the strategic goals of the company to fundamentally change processes or direction within the company.

What must a company do with its strategic information system in order to remain competitive?
Continually modify and enhance it
Replace it often with the newest technology on the market
Support eCommerce activities
Obtain a patent to protect it

Continually modify and enhance it
- A company must continually modify and enhance its systems, always trying to outperform its competitors with better, more desirable services and products.

An existing start-up business is losing precious market share to its competitors, who have easily implemented the newest technology. What is one reason the first business cannot follow its competitors?
Cost of the security measures required
Cost of converting from legacy systems
Cost of the cloud computing required
Cost of meeting government regulations

Cost of converting from legacy systems
- An existing company would most likely have legacy systems that would need to be converted to a new technology. This is an added burden of cost and time that a start-up company does not have.

The US has monopoly laws to prevent one company from completely dominating the market with its advanced technology. What type of issue does market domination pose?
Security
Societal
Sales
Safety

Societal
- This is a societal issue. When one company dominates a technology niche, it can charge what it wants for products and use harsh practices to keep competitors at bay. This does not support a free market.

A company is attempting to implement a new system by isolating the project team members, having them make all the strategic decisions while management focuses on running the business. What problem does this pose for the project?
Sloppy development and testing practices
Inaccurate estimates of needed resources
Commercial pressures
Weak executive commitment

Weak executive commitment
- The key to this question is that the team is making strategic decisions. This is the executive team's responsibility. Without the executive team's commitment, shown by its involvement in decision making, this project will probably not be implemented successfully.

An IT executive must determine where to use technology to help a company whose customers have become less loyal. What information system would meet this challenge?
An eCommerce site to gather customer feedback and offer discounts
A supply chain management system to improve the manufacturing process
A Human Resource management system to provide better training
A financial system to provide analysts with advanced reporting

An eCommerce site to gather customer feedback and offer discounts
- The problem is most likely that the buyer is finding an alternative product with a competitor. The way to address this is to determine why the consumer is choosing the other product. An eCommerce site would allow the business to speak directly with its customers to determine the problem while offering discounts as an incentive to stay.

Obtaining a patent on items best addresses which of Porter's five forces?
Power of suppliers
Rivalry among existing competitors
Potential new entrants
Power of buyers

Potential new entrants
- Obtaining a patent on goods or services is one effective way of keeping competitors from taking market share by cloning items, thus stopping potential new entrants.

Unit 3

1. Business Functions
2. Business Functions and Supply Chains
3. Customer Relationship Management System
4. Enterprise Resource Planning System

Human Resource Management (HRM) system

A system that houses all employee data from recruiting, hiring, evaluation, payroll, and leaving the company

Enterprise Resource Planning (ERP) system

An information system that supports different activities for different departments, assisting executives with planning and running different interdependent functions

Customer Relationship Management

A set of applications designed to gather and analyze information about customers

Cash Management System

An information system that helps reduce the interest and fees that organizations have to pay when borrowing money and increases the yield that organizations can receive on unused funds

Computer-aided design (CAD)

Special software used by engineers and designers to facilitate their work by helping with the creation, modification, and optimization of their designs

Supply Chain

All of the activities performed from the purchase of raw material to the shipping of manufactured goods and collection of the goods for their sale

Supply Chain Management (SCM)

The coordination of purchasing, manufacturing, shipping, and billing operations, often supported by an enterprise resource planning system

Material Requirement Planning (MRP)

Inventory control that includes a calculation of future needs

Targeted Marketing

A strategy of promoting products and services to the people who are most likely to purchase them

Unit 3 Quiz

...

A business needs to focus on marketing more effectively to the consumers who purchase its product. What information system would best fit this need?
Supply Chain Management
Distribution Center Management
Customer Relationship Management
Human Resource Management

Customer Relationship Management
- A customer relationship management system will help a business collect information about its customers, including what they buy and with what else. These and other kinds of information can help them tailor their marketing to meet the needs of specific customers, thus using their marketing dollars more wisely.

Which of the following systems would most likely be used by the employees in the engineering department of a business?
Computer-Aided Design, Simulation
Salesforce, Purchasing
Evaluation, Payroll
Simulation, Cost Accounting

Computer-Aided Design, Simulation
- The engineering department, which is charged with making sure products are designed for quality, safety, and efficiency, would use Computer Aided Design (CAD) with simulation software.

What type of information system does the distribution process in a business use to ensure on-time delivery of goods to retailers?
Price management software
Scheduling software
Ticketing software
Inventory control software

Scheduling software
- While all of the above types of software may be used in a distribution center, it is the scheduling software that will ensure on-time delivery.

In which part of a supply chain management system would a business consultant look to research substandard price labels being applied?
Distributor
Supplier
Retailer
Customer

Retailer
- Usually price tags are applied at either the manufacturer site or at the retail store. The distributor is not a part of the supply chain.

What activity is supported by a supply chain system at the start of the supply chain?
Orders from the manufacture to the supplier
Product design and costing
Assembly and packaging
Receiving and inventory control

Orders from the manufacture to the supplier
- Product design and costing are not supported by supply chain applications. Therefore, the first activity would include orders from the manufacturer to the supplier.

Which of the following activities is included in a customer relationship management system?
Inventory controls and product returns
Market research and customer service
New product design and engineering
Work and delivery scheduling

Market research and customer service
- A Customer Relationship Management (CRM) system supports marketing research, targeted marketing, salesforce automation, and customer service.

What type of marketing collects data on customers and creates specific ad campaigns to meet prospective clients' determined needs?
Social
Brand
Promotional
Target

Target
- Target marketing uses information collected by the company or purchased from other companies to find clients who will most likely purchase a company's goods.

What system would a salesperson use to find information about a client's inventory position and suggested purchase amounts?
Supply Chain Management (SCM) System
Distribution Center Management (DCM) System
Customer Relationship Management (CRM) System
Human Resource Management (HRM) System

Customer Relationship Management (CRM) System
- A Customer Relationship Management (CRM) system would have this type of data. A salesperson would most likely use a laptop, PDA, smart phone, or tablet computer to access the data.

An Enterprise Resource Planning (ERP) system collects many types of data from one system and provides it to another related system. Which of the following is a good example of this?
Budget data to payroll processing
Employee data to marketing management
Sales data to inventory management
Invoice data to manufacturing management

Sales data to inventory management
- While data is easily transferred from one system to another, it must be relevant to the receiving system. Sales data is very relevant to inventory management, as it allows analysts to monitor the inventory position along the supply chain, taking action when inventory is too low or too high at any point along the chain.

The easy interface of data across the various applications in an Enterprise Resource Planning (ERP) System is why many companies purchase and implement ERP systems. What is a possible risk in doing so?
ERP packages are a significant expense to the business to implement
ERP packages require a complete change of infrastructure
ERP packages require many more employees along the supply chain
ERP packages tend to make a company less competitive

ERP packages are a significant expense to the business to implement
- ERP packages are very complex and require a lot of tailoring to meet the needs of a given company. This can be expensive and time consuming.

Unit 4

1. Business Hardware
2. Business Software

Central processing unit (CPU)

The circuitry of a computer microprocessor that fetches instructions and data from the primary memory and executes the instructions

Internal memory

The memory circuitry inside the computer that communicates directly with the CPU; consists of RAM and ROM

Parallel processing

The capacity for several CPUs in one computer to process different data at the same time

Ergonomics

The science of designing and modifying machines to better suit people's health and comfort

Magnetic disk

A disk or set of disks that share a spindle and are coated with an easily magnetized substance to record data in the form of tiny magnetic fields

Systems software

The software that executes routine tasks and includes operating systems, language translators, and communications software

Object-oriented programming language

A language that combines data and the procedures that process the data into a single unit called an "object," which can be invoked from different programs

Groupware

Any of several types of software that enable users of computers in remote locations to work together on the same project

Open source software

Software whose source code can be accessed by the general public

Cloud computing

Either an organization's or an individual's hardware or software with services provided over the Internet

Unit 4 Quiz

...

What computer component serves as the brains of the computer and executes all of the instructions?
External Memory
Central Processing Unit
Internal Memory
Microprocessor

Central Processing Unit
- The Central Processing Unit (CPU) accepts data and instructions from the internal memory, decodes and executes the instructions, and passes data back to the memory.

What does a supercomputer have that makes it so powerful?
Distributed computing
Machine cycles
Multiple processors
Microprocessing

Multiple processors
- A supercomputer has multiple processors which perform in parallel, thus allowing this giant and expensive computer to process massive amounts of data quickly

The banking industry developed an input device to greatly improve the processing of the millions of checks that needed to be entered. What is this device called?
Touch Screen Recognition (TSR) reader
Optical Mark Recognition (OMR) reader
Optical Character Recognition (OCR) reader
Magnetic-Ink Character Recognition (MICR) reader

Magnetic-Ink Character Recognition (MICR) reader
The banking industry added MICR strips to each check. The checks are scanned into the MICR reader, the data entry clerk enters the amount, and the information is saved.

A company is being sued by several workers over repetitive motion damage in the use of their PCs. What should the purchasing agent for the company consider in the future to keep this type of legal action from occurring again?
Backward compatibility
Warranties
Ergonomics
Green power

Ergonomics
- The purchasing agent must consider the ergonomics of equipment to ensure that workers do not develop physical problems through constant use of the equipment.

Application software is used to enable a user to complete specific tasks. Which of the following is considered a type of application software?
Hyper-text Markup Language (HTML)
Operating System Software
Word Processor
Firewall

Word Processor
- A word processor allows a user to enter text into a document. Operating Systems software allows the machine code to work. A firewall is a device that keeps unwanted cyber intruders from entering a network. HTML is a language used to develop applications.

A project manager is looking to reduce the time it normally takes to develop code. What can this project manager use to accomplish this goal?
Machine-code language
Object-oriented programming
Assembly language
Systems software

Object-oriented programming
- Object-oriented programming allows a programmer to reuse pieces of already-developed code, thus requiring less time to develop a program and improving the ease of code maintenance.

The development of applications for the internet has spawned many new languages. Which language is associated with the generation of applets?
Visual Basic
JavaScript
C++
HTML

JavaScript
- JavaScript is credited with producing applets that can be easily used by web developers to increase the speed of delivery of applications.

There are many forms of popular operating systems, some created to work on specific pieces of hardware. What makes the Linux system different from all the others?
It is used only on micro-computers
It is a prototype without the usual OS functionality
It is a proprietary operating system
It is open source software

It is open source software
- Linux is open source software. It is free of charge and many developers can and do upgrade it. It is used on a wide variety of computer platforms. The risk is on the maintenance of something that is always in flux.

Software-as-a-Service (SaaS) is a type of which category of computing?
Source Computing
End-user Computing
Utility Computing
Cloud Computing

Cloud Computing
- Cloud computing includes Software as a Service and Utility Computing. Software as a Service allows a firm to subscribe to a third-party software provider. Utility computing refers to a situation in which a company runs its software on a third-party's hardware.

What benefit does platform-as-a-service (PaaS), a form of hardware cloud computing, offer to a company?
It reduces the cost of data communication network connectivity
It decreases the costs of vendor compliance management and reporting
It improves the speed of development of application software
It eliminates the cost of owning and running the company's own data center

It eliminates the cost of owning and running the company's own data center
- Platform-as-a-Service (PaaS) eliminates the need to purchase servers, storage components, and other data center hardware, thus reducing the capital cost of supporting the company's applications.

UNIT 5

1. Business Networks and Telecommunications
2. Networking and Internet Services
3. Networking Trends

Telecommunications

Communications over a long distance, as opposed to communication within a computer or between adjacent hardware pieces

Videoconferencing

A telecommunications system that allows people who are in different locations to meet via transmitted images

Peer-to-peer (P2P) file sharing

Software applications that enable two internet users to send data to and receive data from each other; the technology is highly objectionable to organizations that sell copyrighted materials because the software promotes violation of copyrights

Network

A combination of a communications device and a computer or several computers, or of two or more computers, so that the various devices can send and receive text or audiovisual information to one another

Virtual Private Network

Hardware and software installed to ensure that a network path that includes the internet enables employees of the same organization or employees of business partners to communicate confidentially

VoIP (Voice over Internet Protocol)

Technologies that enable voice communication by utilizing the internet instead of a telephone network

Circuit Switching

A communications process in which a dedicated channel is established for the duration of a transmission; the sending node signals the receiving node and the receiver acknowledges the signal and then receives the entire message

Internet Service Provider

An individual or organization that provides an internet connection and sometimes other related services to subscribers

UNIT 5 QUIZ

...

How have advances in telecommunications helped make business in the 21st century more efficient?
By improving the security of business data
By improving the throughput of the manufacturing line
By providing a better distribution of data
By reducing the time needed to on-board employees

By providing a better distribution of data
- Telecommunications have helped business in a number of ways. One is that they allow data to be retrieved instantly from wherever it is needed.

What would a business be concerned about in terms of peer-to-peer sharing, an outgrowth of telecommunications?
The proliferation of emails in place of written documents
A tendency to use information from public sources
A disruption in the flow of business data
The legal ramifications of unauthorized downloads

The legal ramifications of unauthorized downloads
- The legal ramifications come into play when an employee downloads copyrighted or other protected material without the owner's consent.

A network manager needs to allow members of the HR team to share data. Knowing that this is sensitive data, what type of network should the manager set up?
Wide Area Network
Value-added Network
Local Area Network
Metropolitan Area Network

Local Area Network
- While all of the above network types would work, the most secure one is the LAN. Only PCs hardwired into this network could share data, thus keeping others out.

A company can create more information security by leasing lines in a network which only its authorized employees can access. What is this type of network called?
Value-Added Network (VAN)
Virtual Private Network (VPN)
Personal Area Network (PAN)
Wide Area Network (WAN)

Virtual Private Network (VPN)
- A virtual private network is created by leasing lines in a network and giving employees authorized ids/password to access the network. In this way, the company has the best of both worlds - a private network without building and maintenance costs.

A business or an individual today needs to have access to the internet for many forms of communication and information. Which method of connection is adversely affected by an increased number of users?
Fiber optics
Asymmetric DSL
Satellite
Cable

Cable
- Of all the choices given, only cable degrades with increases in the number of users based on the bandwidth each takes.

Many people can be seen at coffee houses and bistros working away on their tablets or PCs. How are these individuals most likely connected to the internet?
Over a wireless network
Over a value-added network
Over an optical carrier
Over a leased line

Over a wireless network
- Customers at coffee houses are normally connected to the internet via a wireless connection provided by the retail establishment.

Radio Frequency Identification (RFID) tags are being used in many business to improve the flow of goods. What do tags need in order to work correctly?

A source of power
- An RFID tag responds to transmission signals using a very small amount of power or uses power from the reader that queries it.

Telecommuting is now possible because of advanced telecommunications. What is one societal benefit of telecommuting?
Decrease in social service needs
Decrease in layoffs
Decrease in compensation claims
Decrease in pollution

Decrease in pollution
- Society benefits from the decrease in commuter traffic, which leads to a decrease in pollution.

Which of the following technologies, which relies solely on a connection to the web, might replace the current land line telephone in most consumer households?
Voice over Internet Provider
Smart Phone
Personal Digital Assistant
MP3 Player

Voice over Internet Provider
- The only device that relies only on access to the internet is a VoIP phone. PDAs and smart phones use cellular connections, as well.

How do devices on the network communicate with one another to smoothly transfer data at a high level of quality?
Using TCP/IP protocol
Using RFID's
Using VoIP protocol
Using digital line subscription

Using TCP/IP protocol
- TCP/IP protocol is the messaging system all devices use to accept and send data along, ensuring completeness and quality.

Unit 6

1. Databases and Data Warehouses
2. Relational Operations
3. Technology of Data Warehouses

Data warehouse

A huge collection of historical data that can be processed to support management decision making

Structured Query Language

The data definition and manipulation language of choice for many developers of relational database management systems

Relational operation

An operation that creates a temporary table that is a subset of the original table or tables in a relational database

Composite key

In a data file, a combination of two fields that can serve as a unique key to locate specific records

Join table

In relational database manipulation, a table created by linking data from multiple tables

Primary key

In a file, a field that holds values that are unique to each record

Relational Database Model

A general structure of databases in which records are organized in tables and the relationships among tables are maintained through foreign keys

Database Management System (DBMS)

A computer program that allows the user to construct a database, populate it with data, and manipulate the data

Data redundancy

The existence of the same data in more than one place in a computer system

Unit 6 Quiz

...

What is the benefit of storing data in a database over a flat file structure?
It makes data programs dependent
It leads to faster daily loading
It makes the data more secure
It reduces data redundancy

It reduces data redundancy
- A database provides data integrity as the data is cleansed from transactional data.

John, a database administrator, tries to ensure that each data field in the database is stored only once, eliminating data redundancy. Why is this a good practice?
It improves data validity
It increases security
It increases processing time
It decreases data recovery time

It improves data validity
- Having data in only one place in a database improves processing time and data validity.

When a variety of fields are loaded together as an unit, what is the unit called?
A character
An entity
A record
A table

A record
- Characters make up fields, fields make up records, and records make up tables.

What is the first step in designing a relational database?
Determine the number of fields needed and tables desired
Determine how the data will be loaded
Determine the number of entities and how they relate
Determine the primary, secondary, and composite keys required

Determine the number of entities and how they relate
- It is important to first determine what objects will make up the database (entities) and how they relate to one another. This will drive the design of the tables and keys needed.

What is a downside of using databases that have been designed to house transactional data for querying?
It takes longer to build the needed keys
It takes longer to verify completeness
It takes longer to load and update data
It takes longer to retrieve the needed data

It takes longer to retrieve the needed data
- Databases that are set set up to house transactions are designed for fast loading. When analysis is desired, many temporary tables need to be built, which can take a long time and a lot of processing power.

What does the join function do that is a unique relational operation?
Creates composite keys
Builds data marts
Builds temporary tables
Removes unwanted data

Builds temporary tables
- The join function takes data from various tables and creates a temporary table to provide data for querying or reporting.

What do database managers use to develop and maintain relational databases?
Online Transactional Processing (OLTP)
Structured Query Language (SQL)
Visual Basic
Online Analytical Processing (OLAP)

Structured Query Language (SQL)
- DBMS - Database managers use SQL to build, extract, load, and fix the data in a relational database.

How do typical business analysts access the information in a data warehouse in order to do "what-if "analysis?
Through data processing
Through data transformation
Through data entry
Through data mining

Through data mining
- Analysts use query tools to do data mining of the needed information.

A data warehouse supports business analysis of problems that do not have a single solution. Which of the following is key in terms of providing information to the analyst?
Canned reports and dashboards
Primary and secondary keys
Local area networks
Large amounts of historical, pertinent data

Large amounts of historical, pertinent data
- A data warehouse is an accumulation of large amounts of data, which, transformed into information, can provide trending and other analytical data.

Which part of the process of building a data warehouse includes verifying the completeness of the data entered?
Transforming
Loading
Cleaning
Extracting

Loading
- In the final step of loading, an audit is done to determine that all records entered have been accounted for in the data warehouse.

Unit 7

1. Data, Information, and Knowledge
2. Business Intelligence and Knowledge Management

Data

Facts, or values of qualitative and quantitative variables

Management by exception

A style of management in which managers review only exceptions from expected results that are of a certain size or type, assuming that smaller deviations are unimportant

Decision Support System (DSS)

A computer-based system that uses summarized historical data to support decision making when an answer is not clear

Business Intelligence

Discovers not-yet-known patterns, trends, and other useful information that can help improve an organization's performance

Online Analytical Processing (OLAP)

A type of application that operates on data stored in databases and data warehouses to produce summary tables with multiple combinations of dimensions

Knowledge Management

The combination of activities involved in gathering, sharing, analyzing, and disseminating knowledge to improve an organization's performance

Information

Data that is put into some kind of context

Unit 8

1. Information Security
2. Risks to Information Systems
3. Preventing Security Breaches

Blackouts and brownouts

Total or partial power loss that disrupts computer processing

Unit 7 Quiz

...

Which of the following types of information would be most pertinent to a company president?
Narrow and department-focused data
Daily operations statistics data
Detailed and specific data
Long-term time span data
Explanation

Long-term time span data
- Upper-level management would most likely be looking across the entire company over a broad period of time for trends and general direction.

In order to be successful at the job, which of the following roles would most likely require reviewing information about competitors?
Marketing executive
Bank teller
IT data security analyst
Manufacturing line manager

Marketing executive
- Top executives are concerned with what the competition is doing, which helps them make plans to prevent the competition from taking market share.

Which of the following expresses the difference between information and knowledge?
Knowing when versus knowing why
Knowing what versus knowing how
Knowing who versus knowing how
Knowing why versus knowing what

Knowing what versus knowing how
- Knowledge is the application of information. So, knowing "what" is indicative of information. Knowing "how" is indicative of knowledge.

Which of the following would be included in managing by exception?
Reviewing sales by week
Reviewing the worst performing items
Reviewing currently offered bank rates
Reviewing time card details

Reviewing the worst performing items
- Management by exception is limiting a view to only the best or worst of a sorted list of figures so that the majority of a manager's energy can be expended on taking action to address the critical needs of the company.

Why would a manager whose responsibility is to improve productivity use a decision support system?
To explore historical performance for possible solutions
To monitor a competitor's recent performance
To find exceptions in daily production data
To review recent employee output by manufacturing line

To explore historical performance for possible solutions
- A mid-level to senior-level manager would use a Decision Support System (DSS) to find solutions by looking at past performance. A DSS has trend and summary data rather than detailed daily transactional data.

Information technology is said to enable flattening of the organization. How is this made possible?
Computers deliver information via various mobile devices
Computers automate assembly lines through advanced robotics
Computers provide advanced security over transactional data
Computers process transactional data to deliver advanced reporting

Computers process transactional data to deliver advanced reporting
- To flatten the organization means to remove layers of management. Low level managers used to have to collect data, review it, and develop action steps. Computers have eliminated this daily number crunching, producing both statistical reports and exception or actionable reports.

Which of the following refers to a program that provides economic indices, stock and commodity pricing, and company performance data?
Enterprise Resource Planning System (ERP)
Executive Information System (EIS)
Distribution Management System (DMS)
Decision Support System (DSS)

Executive Information System (EIS)
- An Executive Information System (EIS) provides summarized and actionable data as well as external data such as stock prices to senior executives.

Quinn must determine who gets access to what information in his company. Why is an issue related to Quinn's charge?
1. Determining who gets access to specific information gives Quinn considerable knowledge of company financials; he needs to share the company's financial information with not only share-holders, but all employees
2. Determining who gets access to specific information gives Quinn considerable knowledge of company financials; he needs to report any alarming data to the CEO
3. Determining who gets access to specific information gives Quinn considerable power; he will likely lose friendships and make enemies at work
4. Determining who gets access to specific information gives Quinn considerable power; others may not like this or they may try to convince him to give access to those who shouldn't have it

4. Determining who gets access to specific information gives Quinn considerable power; others may not like this or they may try to convince him to give access to those who shouldn't have it
- The person who has access to information and can grant that access to others is in a powerful political position.

Which of the following is considered vital to gaining a competitive advantage?
Governmental data gathered and summarized
Intelligence derived from data
Security firewalls added to networks
Financial audits done thoroughly and validated

Intelligence derived from data
- In the Flatworld textbook, Caesar's approach to using data to gain a competitive advantage is explored. Caesar's takes full advantage of all the data it accumulates about a customer to entice that customer to enjoy his or her experience at Caesar's more fully, which will encourage the customer to come back often rather than choosing to visit other casinos.

A retail giant uses its wealth of data to enable a fiercely competitive model by tightly controlling what aspect of its business?
Supplier distribution
Customer marketing
Value chain
Executive pay and bonuses

Value chain
- The big retail chains are now accumulating data on customer buying activities to best ensure that the right goods are at the right place for the right price. The companies work closely with their value chains to make this happen.

Social engineering

Deceptive methods that hackers use to entice people to release confidential information such as access codes and passwords; often, the thieves misrepresent themselves as technicians who need one's password for fixing a problem in a network

Identity theft

The criminal practice of obtaining enough personal information to pretend to be the victim, usually resulting in using the victim's credit cards or issuing new credit cards under that person's name

Honeytoken

A bogus record in a networked database that neither employees nor business partners would ever access for legitimate purposes. When an intruder copies the database or the part of the database that contains that record, a simple program alerts security personnel, who can start an investigation

Logic bomb

A destructive computer program that is inactive until it is triggered by an event taking place in the computer, such as the deletion of a certain record from a file

Denial of service attacks

These attacks result in the inability of legitimate visitors to log on to a website because too many malicious requests are launched by an attacker

Redundant Array of Independent Disks (RAID)

A set of magnetic disk packs maintained for backup purposes; sometimes used for storing large databases

Atomic transaction

A transaction whose entry is not complete until all entries into the appropriate files have been successfully completed; it is an important data entry control

Demilitarized zone

A network of computers and other devices connected to the internet in which visitors are not allowed direct access to other resources

Encryption

The conversion of plaintext to an unreadable stream of characters, especially to prevent a party that intercepts telecommunicated messages from reading them

Transport Layer Security

The successor of Secure Sockets Layer (SSL); the software in the web browser responsible for secure communication

Why is data security a top organizational priority?
Security breaches can be a means of controlling senior management and finances
Security breaches are a solely internal problem that significantly impacts hiring possibilities
Security breaches can be a financial disaster to the company
Security breaches can be a marketing boon when executed correctly

Security breaches can be a financial disaster to the company
- Security of data, which is a critical company asset, has to be the concern of all company employees, considering the implications of data being misused or deleted.

Which of the following appropriately describes a corporate security officer's job responsibilities?
Ensure the integrity and reliability of data resources
Reduce the costs of hardware and software maintenance
Maintain an average up-time of 99%
Meet company goals regarding diversity of the work force

Ensure the integrity and reliability of data resources
- The Chief Security Officer focuses on ensuring the reliability and integrity of data resources. The other choices are more true of the data center manager.

What would a computer thief use keystroke logging to do?
Plant a logic bomb
Steal information
Create a denial of service attack
Disable an antivirus program

Steal information
- Keystroke logging is used by thieves to gain access to personal files in order to obtain or destroy information.

What is the goal of phishing?
Using the reputation of a trusted firm or friend to trick someone into revealing information
Analyzing email body characteristics for identification of a consumer
Determining weak or easily compromised passwords from various users
Forging or disguising the identity of an email transmission to prevent responses from users

Using the reputation of a trusted firm or friend to trick someone into revealing information
- Phishing, also called social engineering, is a computer thief's way of deceiving computer users into giving out their personal information.

Jill answered an email from her bank asking her to confirm her account information and personal password. What was she a victim of?
Encryption
Shoulder surfing
Trojan Horse
Social Engineering

Social Engineering
- She was a victim of social engineering, also called phishing.

Why would Trisha, a security officer, ask to add a duplicate non-production database to a server that is connected to the internet?
To dedicate to running virus protection software
To specifically detect and isolate intruders
To identify the collection of white- and black-listed individuals
To store only company IDs and passwords

To specifically detect and isolate intruders
- This is called creating a honey pot. It is used solely to detect and catch intruders and isolate them from company resources.

Most computer users have various antivirus programs installed. These antivirus programs control which of the following?
Zero-day exploits
Spoofing
Phishing
Trojan Horses

Trojan Horses
- Anti-virus programs most often catch executables loaded onto a PC without the computer user's consent, such as Trojan Horses and Logic Bombs.

How would a computer thief hijack a computer?
Install a peripheral
Install a bot
Install an applet
Install a utility

Install a bot
- A computer hacker would install a small program called a bot. This program would start executing on its own, giving the hijacker access rights to the computer.

What is the role of the International Organization for Standardization (ISO)?
It provides a set of standards for information security management
It provides backup of critical files and ensures hardened password protection
It provides consultants to companies to develop security policies
It regulates legal enforcement of standardized security measures

It provides a set of standards for information security management
- ISO, also referred to as ISO27K, is an international organization aimed at setting standards for information security management.

What makes asymmetric encryption work?
Use of a secret key of 128 bits
Use of both a pubic and private key
Use of more than one public key
Use of strictly private keys

Use of both a pubic and private key
- Asymmetric encryption uses both a public and a private key. A symmetric key is a secret key of 128 bits.

Other sets by this creator

Comprehensive Overview

54 terms

TaraB878

Overall Comprehension

216 terms

TaraB878

Final

49 terms

TaraB878

Pre-Final

6 terms

TaraB878

Verified questions

algebra

Fill in the blanks. Each real number t corresponds to a point (x, y) on the ________ ________.

Verified answer

algebra

Use the Egyptian algorithm to find the product of $29$ and $75$.

Verified answer

calculus

Find the critical numbers of each function. $f(x)=x^{3}-48 x$

Verified answer

pre algebra

Replace each circle with the proper comparison symbol: (a) $3.0303 \bigcirc 3.303 \qquad$ (b) $0.6 \bigcirc 0.600$

Verified answer

Recommended textbook solutions

Numerical Analysis

9th EditionJ. Douglas Faires, Richard L. Burden

873 solutions

Book of Proof

2nd EditionRichard Hammack

340 solutions

Topology

2nd EditionJames Munkres

622 solutions

Introduction to Real Analysis

4th EditionDonald R. Sherbert, Robert G. Bartle

842 solutions

Toplist

Neuester Beitrag

Stichworte