Book of Proof
2nd EditionRichard Hammack
340 solutions
Excursions in Modern Mathematics
8th EditionPeter Tannenbaum
983 solutions
Book of Proof
2nd EditionRichard Hammack
340 solutions
A Transition to Advanced Mathematics
7th EditionDouglas Smith, Maurice Eggen, Richard St. Andre
620 solutions
Recommended textbook solutions
Consumer Behavior: Buying, Having, Being
13th EditionMichael R Solomon
449 solutions
Politics in States and Communities
15th EditionSusan A. MacManus, Thomas R. Dye
177 solutions
Consumer Behavior: Buying, Having, and Being, Global Edition
12th EditionMichael R Solomon
245 solutions
Politics in States and Communities
15th EditionSusan A. MacManus, Thomas R. Dye
177 solutions
Ensure timely and appropriate generation, collection , dissemination, storage, and disposition of project information
1. Planning communication management: determining the information and communication needs of stakeholders (Who needs what information? When will they need it? How will the information be given to them?)
Output: communications management plan and project documents updates
2. Managing Communications: creating
distributing, storing, retrieving, and disposing of communications based on the communications management plan
Outputs: project communications, project document updates, project management plan updates and organizational process assets updates
3. Controlling Communications: monitoring and controlling project communications to ensure that stakeholder communication needs are met
Outputs: work performance information, change requests, project document updates and organizational
process assets updates
Upgrade to remove ads
Only ₩37,125/year
-
Flashcards
-
Learn
-
Test
-
Match
-
Flashcards
-
Learn
-
Test
-
Match
Units 1-8, plus Quizzes
Terms in this set (188)
Unit 1
1. Business Information Systems: An Overview
2. The Different Functions of Business Information Systems
3. Concerns About Information Systems
Decimal Counting System
Using 10 digits to represent quantities
digital system
A system consisting of only two digits, zero and one, to represent quantities.
- Digital systems are not used only to represent information that contains numbers, or quantities. They can also represent any information as combinations of zeroes and ones, or, more accurately, the two states that represent zeroes
and ones.
- Digital information consists of zeroes and ones representing two states
Analog System
Systems based on a continuous signal that varies in strength or quantity
Data
Facts about people, other subjects, and events
Problem
Any undesirable situation
Electromagnetic signals
Are used for analog and digital signals
- Electricity, magnetism, and light
Information
The product of processing data so that it can be used in a particular context by human beings
Data Manipulation
The process of performing calculations and other data transformations related to business transactions.
System
An array of components that work together to achieve a common goal, or multiple goals, by accepting input, processing it, and producing output in an organized manner.
Sub-system
components inside the system boundary
closed system
A system in which no data is allowed to enter or leave; does not interact with any other system
open system
Interfaces and interacts with other systems
database
a collection of organized data that allows access, retrieval, and use of data
Information Map
description of data and information flow within an organization
Information Technology (IT)
A term that refers to all technologies that collectively facilitate construction and maintenance of information systems.
Systems thinking
Basic reasoning behind equipping organizations with enterprise software applications
Enterprise software applications
Systems that serve many parts of the organization by minimizing the need for human data entry and ensuring timely, useful information for the organization's entire supply chain, including taking customer orders, receiving raw materials, manufacturing and shipping, and billing and collection.
Document management systems
provide functions to locate and retrieve such documents from various types of locations
Synergy
2+2=5 rule; occurs when combined resources produce output that exceeds the sum of the outputs of the same resources employed separately.
Hardware
A computer and its peripheral equipment: input, output, and storage devices; hardware also includes data communication equipment
Software
Sets of instructions that tell the computer how to take data in, how to process it, how to display information, and how to store data and information
Telecommunications People
Information systems professionals and users who analyze organizational information needs, design and construct information systems, write computer programs, operate the hardware, and maintain software
Procedures
Rules for achieving optimal and secure operations in data processing; procedures include priorities in dispensing software applications and security measures
Information System
A computer-based set of hardware, software, and telecommunications components supported by people and procedures to process data and turn it into useful information
Human-computer synergy
A human-computer process that takes advantage of a computer's ability to quickly process vast amounts of data that can then be analyzed by a human
Consumer privacy
The handling and protection of sensitive personal information that individuals provide in the course of everyday transactions
Supply Chain Management System
A system that enables the coordination of purchasing, manufacturing, shipping, and billing operations, often supported by an enterprise resource planning system (ERP)
Enterprise Resource Planning System
An information system that supports different activities for different departments, assisting executives with planning and running the different interdependent functions
Business Intelligence System
A system that uses information gleaned from large amounts of data to reveal patterns, trends, and other useful information that can help improve the organization's performance
Four stages of processing
input: Entering data into the IS
data processing: Changing and manipulating data in the IS
output: Getting information out of the IS
storage: Storing data and information
transaction
A business deal or action; exchange of money, goods, or services
Transaction Processing System (TPS)
supports the monitoring, collection, storage, and processing of data from the organization's basic business transactions, each of which generates data
Five basic components of the computer system
1. Input devices: Introduce data
into the IS
2. Computer: processes the data through the IS
3. Output devices: display information
4. Storage devices: display information
5. Networking devices/Communication lines: transfer data and information over various distances
Unit 1 Quiz
...
A new company needs to automate its standard business processes. What does the company need to implement to make this happen?
An information system
- An information system is a collection of hardware and software used to perform certain business functions.
An IT team works with a business analyst to develop a business intelligence system. This situation is a good example of _____.
Human-computer synergy
- When both computers and people come together to solve a business
process, such as a computer crunching data to display information in a way that an analyst can take action on, it is referred to as human-computer synergy.
What is the purpose of a transaction processing system?
To record data collected
- A transaction processing system is used to collect any and all business data into files and databases for use by the organization.
John, a new CIO for a business, knows that it is best if all the core business systems interface seamlessly, using a common data structure. What type of system should he purchase?
An Enterprise Resource Planning System
- An Enterprise Resource Planning System provides support for the core business systems on a common platform with common data storage.
What is the core information system component for a business intelligence system?
Data warehouse
- A business intelligence system is a collection of data stored on data warehouses. It is used by analytical engines to present trends and other interpretations of information.
A business department that deals with hiring, training, and management of personnel would use which of the following systems to perform its major functions of record-keeping and employee evaluation?
- The Human Resource (HR) system is responsible for employee record keeping, including employee evaluations.
A business maintains large amounts of very sensitive data on its clients. What IT role is charged with planning and implementing information safekeeping measures for this type of company?
Chief Security Officer
- The role of the Chief Security Officer,
who usually reports to the CIO, is to manage the safekeeping and security of data, protecting it from both internal and external threats.
What should IT professionals follow in order to ensure that the systems being developed meet high ethical standards and good practices?
Codes of conduct
Which of the following is an undesirable effect of new technology?
Can give easy access to another person's personal information
- As companies gather more and more personal data, there is more of a chance that this personal data can be used against a person's wishes, invading his or her personal privacy.
Which term refers to all of the ways that data is turned into information?
Data manipulation
- Data manipulation is a
process of organizing data into information that can then be interpreted and used to draw conclusions.
Unit 2
1. Strategic Uses of Information Systems
2. Evaluating Information Systems
3. The Five Forces of Industry Competitive Advantage
Porter's Five Forces
Competitive rivalry; Buyer bargaining power; Threat of substitutes; Supplier bargaining power; Threat of new entrants
Affiliate programs
An arrangement in which a website provides sales for another website through a link to the seller's site and for which the affiliate is paid
Strategic Information System
Any information system that can help an organization achieve a long-term competitive advantage
Late mover
A company that adopts new technology after the competition has done so
Early mover
A company that adopts new technology before the competition does
Switching costs
Expenses that are incurred when a customer stops buying a product or service from one business and starts buying it from another
Unit 2 Quiz
...
Which of the following initiatives would enable a business to gain a competitive edge?
Retention of autonomy
Differentiation of products or services
Use of different suppliers
Layoff of non-essential personnel
Differentiation
of products or services
- There are several ways to gain a competitive advantage. One of them is to differentiate your products and services from those of your competitor, causing yours to be seen as the better deal or quality.
A large online retailer that originally specialized in selling books online is now selling other items to its customers. What key technology for this type of business allows it to expand so
readily?
Business-to-consumer system
Financial management system
Transactional processing
Open source software
Business-to-consumer system
- An online retailer must become an expert at meeting the needs of its customer and so must perfect business-to-consumer systems.
In order to become more competitive, a company has decided to reduce the price it charges for goods made. What information system
would provide the needed data to do this?
Budgeting
Transactional
Cost accounting
eCommerce
Cost accounting
- A cost accounting system keeps track of all the various costs associated with the manufacture of goods, including raw product, manufacturing costs, shipping, storage, and sales.
What makes information systems strategic in nature?
They improve the day-to-day operations of the
business
They greatly improve the speed of processing data
They enable the company to stay on course in terms of its mission
They enable fundamental changes to happen in a business
They enable fundamental changes to happen in a business
- A strategic information system aligns with the strategic goals of the company to fundamentally change processes or direction within the company.
What must a company
do with its strategic information system in order to remain competitive?
Continually modify and enhance it
Replace it often with the newest technology on the market
Support eCommerce activities
Obtain a patent to protect it
Continually modify and enhance it
- A company must continually modify and enhance its systems, always trying to outperform its competitors with better, more desirable services and products.
An existing start-up business is losing precious market share to its competitors, who have easily implemented the newest technology. What is one reason the first business cannot follow its competitors?
Cost of the security measures required
Cost of converting from legacy systems
Cost of the cloud computing required
Cost of meeting government regulations
Cost of converting from legacy systems
- An existing company would most
likely have legacy systems that would need to be converted to a new technology. This is an added burden of cost and time that a start-up company does not have.
The US has monopoly laws to prevent one company from completely dominating the market with its advanced technology. What type of issue does market domination pose?
Security
Societal
Sales
Safety
Societal
- This is a societal issue. When one
company dominates a technology niche, it can charge what it wants for products and use harsh practices to keep competitors at bay. This does not support a free market.
A company is attempting to implement a new system by isolating the project team members, having them make all the strategic decisions while management focuses on running the business. What problem does this pose for the project?
Sloppy development and testing
practices
Inaccurate estimates of needed resources
Commercial pressures
Weak executive commitment
Weak executive commitment
- The key to this question is that the team is making strategic decisions. This is the executive team's responsibility. Without the executive team's commitment, shown by its involvement in decision making, this project will probably not be implemented successfully.
An IT
executive must determine where to use technology to help a company whose customers have become less loyal. What information system would meet this challenge?
An eCommerce site to gather customer feedback and offer discounts
A supply chain management system to improve the manufacturing process
A Human Resource management system to provide better training
A financial system to provide analysts with advanced reporting
An eCommerce site to gather
customer feedback and offer discounts
- The problem is most likely that the buyer is finding an alternative product with a competitor. The way to address this is to determine why the consumer is choosing the other product. An eCommerce site would allow the business to speak directly with its customers to determine the problem while offering discounts as an incentive to stay.
Obtaining a patent on items best addresses which of Porter's five
forces?
Power of suppliers
Rivalry among existing competitors
Potential new entrants
Power of buyers
Potential new entrants
- Obtaining a patent on goods or services is one effective way of keeping competitors from taking market share by cloning items, thus stopping potential new entrants.
Unit 3
1. Business Functions
2. Business Functions and Supply
Chains
3. Customer Relationship Management System
4. Enterprise Resource Planning System
Human Resource Management (HRM) system
A system that houses all employee data from recruiting, hiring, evaluation, payroll, and leaving the company
Enterprise Resource Planning (ERP) system
An information system that supports different activities for different departments, assisting executives with planning and running different interdependent functions
Customer Relationship Management
A set of applications designed to gather and analyze information about customers
Cash Management System
An information system that helps reduce the interest and fees that organizations have to pay when borrowing money and increases the yield that organizations can receive on unused funds
Computer-aided design (CAD)
Special software used by engineers and designers to facilitate their work by helping with the creation, modification, and optimization of their designs
Supply Chain
All of the activities performed from the purchase of raw material to the shipping of manufactured goods and collection of the goods for their sale
Supply Chain Management (SCM)
The coordination of purchasing, manufacturing, shipping, and billing operations, often supported by an enterprise resource planning system
Material Requirement Planning (MRP)
Inventory control that includes a calculation of future needs
Targeted Marketing
A strategy of promoting products and services to the people who are most likely to purchase them
Unit 3 Quiz
...
A business needs to focus on marketing more effectively to the consumers who
purchase its product. What information system would best fit this need?
Supply Chain Management
Distribution Center Management
Customer Relationship Management
Human Resource Management
Customer Relationship Management
- A customer relationship management system will help a business collect information about its customers, including what they buy and with what else. These and other kinds of information can help them tailor their marketing to
meet the needs of specific customers, thus using their marketing dollars more wisely.
Which of the following systems would most likely be used by the employees in the engineering department of a business?
Computer-Aided Design, Simulation
Salesforce, Purchasing
Evaluation, Payroll
Simulation, Cost Accounting
Computer-Aided Design, Simulation
- The engineering department, which is charged with
making sure products are designed for quality, safety, and efficiency, would use Computer Aided Design (CAD) with simulation software.
What type of information system does the distribution process in a business use to ensure on-time delivery of goods to retailers?
Price management software
Scheduling software
Ticketing software
Inventory control software
Scheduling software
- While all of the
above types of software may be used in a distribution center, it is the scheduling software that will ensure on-time delivery.
In which part of a supply chain management system would a business consultant look to research substandard price labels being applied?
Distributor
Supplier
Retailer
Customer
Retailer
- Usually price tags are applied at either the manufacturer site or at the retail store.
The distributor is not a part of the supply chain.
What activity is supported by a supply chain system at the start of the supply chain?
Orders from the manufacture to the supplier
Product design and costing
Assembly and packaging
Receiving and inventory control
Orders from the manufacture to the supplier
- Product design and costing are not supported by supply chain applications. Therefore, the
first activity would include orders from the manufacturer to the supplier.
Which of the following activities is included in a customer relationship management system?
Inventory controls and product returns
Market research and customer service
New product design and engineering
Work and delivery scheduling
Market research and customer service
- A Customer Relationship Management (CRM) system
supports marketing research, targeted marketing, salesforce automation, and customer service.
What type of marketing collects data on customers and creates specific ad campaigns to meet prospective clients' determined needs?
Social
Brand
Promotional
Target
Target
- Target marketing uses information collected by the company or purchased from other companies to find clients who will most likely
purchase a company's goods.
What system would a salesperson use to find information about a client's inventory position and suggested purchase amounts?
Supply Chain Management (SCM) System
Distribution Center Management (DCM) System
Customer Relationship Management (CRM) System
Human Resource Management (HRM) System
Customer Relationship Management (CRM) System
- A Customer Relationship Management
(CRM) system would have this type of data. A salesperson would most likely use a laptop, PDA, smart phone, or tablet computer to access the data.
An Enterprise Resource Planning (ERP) system collects many types of data from one system and provides it to another related system. Which of the following is a good example of this?
Budget data to payroll processing
Employee data to marketing management
Sales data to inventory
management
Invoice data to manufacturing management
Sales data to inventory management
- While data is easily transferred from one system to another, it must be relevant to the receiving system. Sales data is very relevant to inventory management, as it allows analysts to monitor the inventory position along the supply chain, taking action when inventory is too low or too high at any point along the chain.
The
easy interface of data across the various applications in an Enterprise Resource Planning (ERP) System is why many companies purchase and implement ERP systems. What is a possible risk in doing so?
ERP packages are a significant expense to the business to implement
ERP packages require a complete change of infrastructure
ERP packages require many more employees along the supply chain
ERP packages tend to make a company less competitive
ERP
packages are a significant expense to the business to implement
- ERP packages are very complex and require a lot of tailoring to meet the needs of a given company. This can be expensive and time consuming.
Unit 4
1. Business Hardware
2. Business Software
Central processing unit (CPU)
The circuitry of a computer microprocessor that fetches instructions and data from the primary memory and executes the instructions
Internal memory
The memory circuitry inside the computer that communicates directly with the CPU; consists of RAM and ROM
Parallel processing
The capacity for several CPUs in one computer to process different data at the same time
Ergonomics
The science of designing and modifying machines to better suit people's health and comfort
Magnetic disk
A disk or set of disks that share a spindle and are coated with an easily magnetized substance to record data in the form of tiny magnetic fields
Systems software
The software that executes routine tasks and includes operating systems, language translators, and communications software
Object-oriented programming language
A language that combines data and the procedures that process the data into a single unit called an "object," which can be invoked from different programs
Groupware
Any of several types of software that enable users of computers in remote locations to work together on the same project
Open source software
Software whose source code can be accessed by the general public
Cloud computing
Either an organization's or an individual's hardware or software with services provided over the Internet
Unit 4 Quiz
...
What computer component serves as the brains of the computer and executes all of the instructions?
External Memory
Central Processing Unit
Internal Memory
Microprocessor
Central Processing Unit
- The Central Processing Unit (CPU) accepts data and instructions from the
internal memory, decodes and executes the instructions, and passes data back to the memory.
What does a supercomputer have that makes it so powerful?
Distributed computing
Machine cycles
Multiple processors
Microprocessing
Multiple processors
- A supercomputer has multiple processors which perform in parallel, thus allowing this giant and expensive computer to process massive amounts of data
quickly
The banking industry developed an input device to greatly improve the processing of the millions of checks that needed to be entered. What is this device called?
Touch Screen Recognition (TSR) reader
Optical Mark Recognition (OMR) reader
Optical Character Recognition (OCR) reader
Magnetic-Ink Character Recognition (MICR) reader
Magnetic-Ink Character Recognition (MICR) reader
The banking
industry added MICR strips to each check. The checks are scanned into the MICR reader, the data entry clerk enters the amount, and the information is saved.
A company is being sued by several workers over repetitive motion damage in the use of their PCs. What should the purchasing agent for the company consider in the future to keep this type of legal action from occurring again?
Backward compatibility
Warranties
Ergonomics
Green
power
Ergonomics
- The purchasing agent must consider the ergonomics of equipment to ensure that workers do not develop physical problems through constant use of the equipment.
Application software is used to enable a user to complete specific tasks. Which of the following is considered a type of application software?
Hyper-text Markup Language (HTML)
Operating System Software
Word
Processor
Firewall
Word Processor
- A word processor allows a user to enter text into a document. Operating Systems software allows the machine code to work. A firewall is a device that keeps unwanted cyber intruders from entering a network. HTML is a language used to develop applications.
A project manager is looking to reduce the time it normally takes to develop code. What can this project manager use
to accomplish this goal?
Machine-code language
Object-oriented programming
Assembly language
Systems software
Object-oriented programming
- Object-oriented programming allows a programmer to reuse pieces of already-developed code, thus requiring less time to develop a program and improving the ease of code maintenance.
The development of applications for the internet has spawned many new
languages. Which language is associated with the generation of applets?
Visual Basic
JavaScript
C++
HTML
JavaScript
- JavaScript is credited with producing applets that can be easily used by web developers to increase the speed of delivery of applications.
There are many forms of popular operating systems, some created to work on specific pieces of hardware. What makes the Linux system different
from all the others?
It is used only on micro-computers
It is a prototype without the usual OS functionality
It is a proprietary operating system
It is open source software
It is open source software
- Linux is open source software. It is free of charge and many developers can and do upgrade it. It is used on a wide variety of computer platforms. The risk is on the maintenance of something that is always in flux.
Software-as-a-Service (SaaS) is a type of which category of computing?
Source Computing
End-user Computing
Utility Computing
Cloud Computing
Cloud Computing
- Cloud computing includes Software as a Service and Utility Computing. Software as a Service allows a firm to subscribe to a third-party software provider. Utility computing refers to a situation in which a company runs its software on a third-party's hardware.
What benefit does platform-as-a-service (PaaS), a form of hardware cloud computing, offer to a company?
It reduces the cost of data communication network connectivity
It decreases the costs of vendor compliance management and reporting
It improves the speed of development of application software
It eliminates the cost of owning and running the company's own data center
It eliminates the cost of owning and
running the company's own data center
- Platform-as-a-Service (PaaS) eliminates the need to purchase servers, storage components, and other data center hardware, thus reducing the capital cost of supporting the company's applications.
UNIT 5
1. Business Networks and Telecommunications
2. Networking and Internet Services
3. Networking Trends
Telecommunications
Communications over a long distance, as opposed to communication within a computer or between adjacent hardware pieces
Videoconferencing
A telecommunications system that allows people who are in different locations to meet via transmitted images
Peer-to-peer (P2P) file sharing
Software applications that enable two internet users to send data to and receive data from each other; the technology is highly objectionable to organizations that sell copyrighted materials because the software promotes violation of copyrights
Network
A combination of a communications device and a computer or several computers, or of two or more computers, so that the various devices can send and receive text or audiovisual information to one another
Virtual Private Network
Hardware and software installed to ensure that a network path that includes the internet enables employees of the same organization or employees of business partners to communicate confidentially
VoIP (Voice over Internet Protocol)
Technologies that enable voice communication by utilizing the internet instead of a telephone network
Circuit Switching
A communications process in which a dedicated channel is established for the duration of a transmission; the sending node signals the receiving node and the receiver acknowledges the signal and then receives the entire message
Internet Service Provider
An individual or organization that provides an internet connection and sometimes other related services to subscribers
UNIT 5 QUIZ
...
How have advances in telecommunications helped make business in the 21st century more efficient?
By improving the security of business data
By improving the throughput of the manufacturing line
By providing a better distribution of
data
By reducing the time needed to on-board employees
By providing a better distribution of data
- Telecommunications have helped business in a number of ways. One is that they allow data to be retrieved instantly from wherever it is needed.
What would a business be concerned about in terms of peer-to-peer sharing, an outgrowth of telecommunications?
The proliferation of emails in place of written
documents
A tendency to use information from public sources
A disruption in the flow of business data
The legal ramifications of unauthorized downloads
The legal ramifications of unauthorized downloads
- The legal ramifications come into play when an employee downloads copyrighted or other protected material without the owner's consent.
A network manager needs to allow members of the HR team to share
data. Knowing that this is sensitive data, what type of network should the manager set up?
Wide Area Network
Value-added Network
Local Area Network
Metropolitan Area Network
Local Area Network
- While all of the above network types would work, the most secure one is the LAN. Only PCs hardwired into this network could share data, thus keeping others out.
A company can create more information
security by leasing lines in a network which only its authorized employees can access. What is this type of network called?
Value-Added Network (VAN)
Virtual Private Network (VPN)
Personal Area Network (PAN)
Wide Area Network (WAN)
Virtual Private Network (VPN)
- A virtual private network is created by leasing lines in a network and giving employees authorized ids/password to access the network. In this way, the company has the best of both
worlds - a private network without building and maintenance costs.
A business or an individual today needs to have access to the internet for many forms of communication and information. Which method of connection is adversely affected by an increased number of users?
Fiber optics
Asymmetric DSL
Satellite
Cable
Cable
- Of all the choices given, only cable degrades with increases in the number of
users based on the bandwidth each takes.
Many people can be seen at coffee houses and bistros working away on their tablets or PCs. How are these individuals most likely connected to the internet?
Over a wireless network
Over a value-added network
Over an optical carrier
Over a leased line
Over a wireless network
- Customers at coffee houses are normally connected to the internet via a wireless
connection provided by the retail establishment.
Radio Frequency Identification (RFID) tags are being used in many business to improve the flow of goods. What do tags need in order to work correctly?
A source of power
- An RFID tag responds to transmission signals using a very small amount of power or uses power from the reader that queries it.
Telecommuting is
now possible because of advanced telecommunications. What is one societal benefit of telecommuting?
Decrease in social service needs
Decrease in layoffs
Decrease in compensation claims
Decrease in pollution
Decrease in pollution
- Society benefits from the decrease in commuter traffic, which leads to a decrease in pollution.
Which of the following technologies, which relies solely on a connection
to the web, might replace the current land line telephone in most consumer households?
Voice over Internet Provider
Smart Phone
Personal Digital Assistant
MP3 Player
Voice over Internet Provider
- The only device that relies only on access to the internet is a VoIP phone. PDAs and smart phones use cellular connections, as well.
How do devices on the network communicate with one another to smoothly
transfer data at a high level of quality?
Using TCP/IP protocol
Using RFID's
Using VoIP protocol
Using digital line subscription
Using TCP/IP protocol
- TCP/IP protocol is the messaging system all devices use to accept and send data along, ensuring completeness and quality.
Unit 6
1. Databases and Data Warehouses
2. Relational Operations
3. Technology of
Data Warehouses
Data warehouse
A huge collection of historical data that can be processed to support management decision making
Structured Query Language
The data definition and manipulation language of choice for many developers of relational database management systems
Relational operation
An operation that creates a temporary table that is a subset of the original table or tables in a relational database
Composite key
In a data file, a combination of two fields that can serve as a unique key to locate specific records
Join table
In relational database manipulation, a table created by linking data from multiple tables
Primary key
In a file, a field that holds values that are unique to each record
Relational Database Model
A general structure of databases in which records are organized in tables and the relationships among tables are maintained through foreign keys
Database Management System (DBMS)
A computer program that allows the user to construct a database, populate it with data, and manipulate the data
Data redundancy
The existence of the same data in more than one place in a computer system
Unit 6 Quiz
...
What is the benefit of storing data in a database over a flat file structure?
It makes data programs dependent
It leads to faster daily loading
It makes the data more secure
It reduces data redundancy
It reduces data redundancy
- A database provides data integrity as the data is cleansed from transactional data.
John, a database administrator, tries to ensure that
each data field in the database is stored only once, eliminating data redundancy. Why is this a good practice?
It improves data validity
It increases security
It increases processing time
It decreases data recovery time
It improves data validity
- Having data in only one place in a database improves processing time and data validity.
When a variety of fields are loaded together as an unit, what is
the unit called?
A character
An entity
A record
A table
A record
- Characters make up fields, fields make up records, and records make up tables.
What is the first step in designing a relational database?
Determine the number of fields needed and tables desired
Determine how the data will be loaded
Determine the number of entities and how they relate
Determine the primary, secondary,
and composite keys required
Determine the number of entities and how they relate
- It is important to first determine what objects will make up the database (entities) and how they relate to one another. This will drive the design of the tables and keys needed.
What is a downside of using databases that have been designed to house transactional data for querying?
It takes longer to build the needed
keys
It takes longer to verify completeness
It takes longer to load and update data
It takes longer to retrieve the needed data
It takes longer to retrieve the needed data
- Databases that are set set up to house transactions are designed for fast loading. When analysis is desired, many temporary tables need to be built, which can take a long time and a lot of processing power.
What does the join
function do that is a unique relational operation?
Creates composite keys
Builds data marts
Builds temporary tables
Removes unwanted data
Builds temporary tables
- The join function takes data from various tables and creates a temporary table to provide data for querying or reporting.
What do database managers use to develop and maintain relational databases?
Online Transactional Processing
(OLTP)
Structured Query Language (SQL)
Visual Basic
Online Analytical Processing (OLAP)
Structured Query Language (SQL)
- DBMS - Database managers use SQL to build, extract, load, and fix the data in a relational database.
How do typical business analysts access the information in a data warehouse in order to do "what-if "analysis?
Through data processing
Through data transformation
Through
data entry
Through data mining
Through data mining
- Analysts use query tools to do data mining of the needed information.
A data warehouse supports business analysis of problems that do not have a single solution. Which of the following is key in terms of providing information to the analyst?
Canned reports and dashboards
Primary and secondary keys
Local area networks
Large amounts of
historical, pertinent data
Large amounts of historical, pertinent data
- A data warehouse is an accumulation of large amounts of data, which, transformed into information, can provide trending and other analytical data.
Which part of the process of building a data warehouse includes verifying the completeness of the data entered?
Transforming
Loading
Cleaning
Extracting
Loading
- In the final step of loading, an audit is done to determine that all records entered have been accounted for in the data warehouse.
Unit 7
1. Data, Information, and Knowledge
2. Business Intelligence and Knowledge Management
Data
Facts, or values of qualitative and quantitative variables
Management by exception
A style of management in which managers review only exceptions from expected results that are of a certain size or type, assuming that smaller deviations are unimportant
Decision Support System (DSS)
A computer-based system that uses summarized historical data to support decision making when an answer is not clear
Business Intelligence
Discovers not-yet-known patterns, trends, and other useful information that can help improve an organization's performance
Online Analytical Processing (OLAP)
A type of application that operates on data stored in databases and data warehouses to produce summary tables with multiple combinations of dimensions
Knowledge Management
The combination of activities involved in gathering, sharing, analyzing, and disseminating knowledge to improve an organization's performance
Information
Data that is put into some kind of context
Unit 8
1.
Information Security
2. Risks to Information Systems
3. Preventing Security Breaches
Blackouts and brownouts
Total or partial power loss that disrupts computer processing
Unit 7 Quiz
...
Which of the following types of information would be most pertinent to a company
president?
Narrow and department-focused data
Daily operations statistics data
Detailed and specific data
Long-term time span data
Explanation
Long-term time span data
- Upper-level management would most likely be looking across the entire company over a broad period of time for trends and general direction.
In order to be successful at the job, which of the following roles would most likely
require reviewing information about competitors?
Marketing executive
Bank teller
IT data security analyst
Manufacturing line manager
Marketing executive
- Top executives are concerned with what the competition is doing, which helps them make plans to prevent the competition from taking market share.
Which of the following expresses the difference between information and knowledge?
Knowing when
versus knowing why
Knowing what versus knowing how
Knowing who versus knowing how
Knowing why versus knowing what
Knowing what versus knowing how
- Knowledge is the application of information. So, knowing "what" is indicative of information. Knowing "how" is indicative of knowledge.
Which of the following would be included in managing by exception?
Reviewing sales by week
Reviewing the worst
performing items
Reviewing currently offered bank rates
Reviewing time card details
Reviewing the worst performing items
- Management by exception is limiting a view to only the best or worst of a sorted list of figures so that the majority of a manager's energy can be expended on taking action to address the critical needs of the company.
Why would a manager whose responsibility is to improve
productivity use a decision support system?
To explore historical performance for possible solutions
To monitor a competitor's recent performance
To find exceptions in daily production data
To review recent employee output by manufacturing line
To explore historical performance for possible solutions
- A mid-level to senior-level manager would use a Decision Support System (DSS) to find solutions by looking at past performance. A DSS has trend
and summary data rather than detailed daily transactional data.
Information technology is said to enable flattening of the organization. How is this made possible?
Computers deliver information via various mobile devices
Computers automate assembly lines through advanced robotics
Computers provide advanced security over transactional data
Computers process transactional data to deliver advanced reporting
Computers
process transactional data to deliver advanced reporting
- To flatten the organization means to remove layers of management. Low level managers used to have to collect data, review it, and develop action steps. Computers have eliminated this daily number crunching, producing both statistical reports and exception or actionable reports.
Which of the following refers to a program that provides economic indices, stock and commodity pricing, and
company performance data?
Enterprise Resource Planning System (ERP)
Executive Information System (EIS)
Distribution Management System (DMS)
Decision Support System (DSS)
Executive Information System (EIS)
- An Executive Information System (EIS) provides summarized and actionable data as well as external data such as stock prices to senior executives.
Quinn must determine who gets access to what
information in his company. Why is an issue related to Quinn's charge?
1. Determining who gets access to specific information gives Quinn considerable knowledge of company financials; he needs to share the company's financial information with not only share-holders, but all employees
2. Determining who gets access to specific information gives Quinn considerable knowledge of company financials; he needs to report any alarming data to the CEO
3. Determining who gets access to specific
information gives Quinn considerable power; he will likely lose friendships and make enemies at work
4. Determining who gets access to specific information gives Quinn considerable power; others may not like this or they may try to convince him to give access to those who shouldn't have it
4. Determining who gets access to specific information gives Quinn considerable power; others may not like this or they may try to convince him to give access to those
who shouldn't have it
- The person who has access to information and can grant that access to others is in a powerful political position.
Which of the following is considered vital to gaining a competitive advantage?
Governmental data gathered and summarized
Intelligence derived from data
Security firewalls added to networks
Financial audits done thoroughly and validated
Intelligence derived from
data
- In the Flatworld textbook, Caesar's approach to using data to gain a competitive advantage is explored. Caesar's takes full advantage of all the data it accumulates about a customer to entice that customer to enjoy his or her experience at Caesar's more fully, which will encourage the customer to come back often rather than choosing to visit other casinos.
A retail giant uses its wealth of data to enable a fiercely competitive model by
tightly controlling what aspect of its business?
Supplier distribution
Customer marketing
Value chain
Executive pay and bonuses
Value chain
- The big retail chains are now accumulating data on customer buying activities to best ensure that the right goods are at the right place for the right price. The companies work closely with their value chains to make this happen.
Social engineering
Deceptive methods that hackers use to entice people to release confidential information such as access codes and passwords; often, the thieves misrepresent themselves as technicians who need one's password for fixing a problem in a network
Identity theft
The criminal practice of obtaining enough personal information to pretend to be the victim, usually resulting in using the victim's credit cards or issuing new credit cards under that person's name
Honeytoken
A bogus record in a networked database that neither employees nor business partners would ever access for legitimate purposes. When an intruder copies the database or the part of the database that contains that record, a simple program alerts security personnel, who can start an investigation
Logic bomb
A destructive computer program that is inactive until it is triggered by an event taking place in the computer, such as the deletion of a certain record from a file
Denial of service attacks
These attacks result in the inability of legitimate visitors to log on to a website because too many malicious requests are launched by an attacker
Redundant Array of Independent Disks (RAID)
A set of magnetic disk packs maintained for backup purposes; sometimes used for storing large databases
Atomic transaction
A transaction whose entry is not complete until all entries into the appropriate files have been successfully completed; it is an important data entry control
Demilitarized zone
A network of computers and other devices connected to the internet in which visitors are not allowed direct access to other resources
Encryption
The conversion of plaintext to an unreadable stream of characters, especially to prevent a party that intercepts telecommunicated messages from reading them
Transport Layer Security
The successor of Secure Sockets Layer (SSL); the software in the web browser responsible for secure communication
Why is data security a top organizational priority?
Security breaches can be a means of controlling senior management and finances
Security breaches are a solely internal problem that significantly impacts hiring
possibilities
Security breaches can be a financial disaster to the company
Security breaches can be a marketing boon when executed correctly
Security breaches can be a financial disaster to the company
- Security of data, which is a critical company asset, has to be the concern of all company employees, considering the implications of data being misused or deleted.
Which of the following appropriately
describes a corporate security officer's job responsibilities?
Ensure the integrity and reliability of data resources
Reduce the costs of hardware and software maintenance
Maintain an average up-time of 99%
Meet company goals regarding diversity of the work force
Ensure the integrity and reliability of data resources
- The Chief Security Officer focuses on ensuring the reliability and integrity of data resources. The other choices are more true
of the data center manager.
What would a computer thief use keystroke logging to do?
Plant a logic bomb
Steal information
Create a denial of service attack
Disable an antivirus program
Steal information
- Keystroke logging is used by thieves to gain access to personal files in order to obtain or destroy information.
What is the goal of
phishing?
Using the reputation of a trusted firm or friend to trick someone into revealing information
Analyzing email body characteristics for identification of a consumer
Determining weak or easily compromised passwords from various users
Forging or disguising the identity of an email transmission to prevent responses from users
Using the reputation of a trusted firm or friend to trick someone into revealing information
- Phishing, also
called social engineering, is a computer thief's way of deceiving computer users into giving out their personal information.
Jill answered an email from her bank asking her to confirm her account information and personal password. What was she a victim of?
Encryption
Shoulder surfing
Trojan Horse
Social Engineering
Social Engineering
- She was a victim of social engineering, also called
phishing.
Why would Trisha, a security officer, ask to add a duplicate non-production database to a server that is connected to the internet?
To dedicate to running virus protection software
To specifically detect and isolate intruders
To identify the collection of white- and black-listed individuals
To store only company IDs and passwords
To specifically detect and isolate intruders
- This is
called creating a honey pot. It is used solely to detect and catch intruders and isolate them from company resources.
Most computer users have various antivirus programs installed. These antivirus programs control which of the following?
Zero-day exploits
Spoofing
Phishing
Trojan Horses
Trojan Horses
- Anti-virus programs most often catch executables loaded onto a PC without the computer user's
consent, such as Trojan Horses and Logic Bombs.
How would a computer thief hijack a computer?
Install a peripheral
Install a bot
Install an applet
Install a utility
Install a bot
- A computer hacker would install a small program called a bot. This program would start executing on its own, giving the hijacker access rights to the computer.
What is the
role of the International Organization for Standardization (ISO)?
It provides a set of standards for information security management
It provides backup of critical files and ensures hardened password protection
It provides consultants to companies to develop security policies
It regulates legal enforcement of standardized security measures
It provides a set of standards for information security management
- ISO, also referred to as ISO27K, is
an international organization aimed at setting standards for information security management.
What makes asymmetric encryption work?
Use of a secret key of 128 bits
Use of both a pubic and private key
Use of more than one public key
Use of strictly private keys
Use of both a pubic and private key
- Asymmetric encryption uses both a public and a private key. A symmetric key is a secret key of 128
bits.
Comprehensive Overview
54 terms
TaraB878
Overall Comprehension
216 terms
TaraB878
Final
49 terms
TaraB878
Pre-Final
6 terms
TaraB878
Verified questionsalgebra
Fill in the blanks. Each real number t corresponds to a point (x, y) on the ________ ________.
Verified answer
algebra
Use the Egyptian algorithm to find the product of $29$ and $75$.
Verified answer
calculus
Find the critical numbers of each function. $f(x)=x^{3}-48 x$
Verified answer
pre algebra
Replace each circle with the proper comparison symbol: (a) $3.0303 \bigcirc 3.303 \qquad$ (b) $0.6 \bigcirc 0.600$
Verified answer
Recommended textbook solutionsNumerical Analysis
9th EditionJ. Douglas Faires, Richard L. Burden
873 solutions
Book of Proof
2nd EditionRichard Hammack
340 solutions
Topology
2nd EditionJames Munkres
622 solutions
Introduction to Real Analysis
4th EditionDonald R. Sherbert, Robert G. Bartle
842 solutions