Chapter 17 Flashcards
Data mining is the
process of discovering unknown patterns and relationships in large amounts of data
Two critical steps are required to make sure that data can be accessed by authorized users and no one else. They are
authentication and authorization
The goal of an executive information system (EIS) is to
provide accurate, complete, relevant, and timely information to managers
To properly secure data and data networks, a manager should use
a. firewalls
b. all of these - Correct
c. virtual private networks
d. Web-based SSL encryption
e. authentication and authorization
A(n) __________ is a private company network that allows employees to easily access, share, and publish information using Internet software.
intranet
__________ is the direct electronic transmission of purchase and ordering information from one company’s computer system to another company’s computer system.
Electronic data interchange
Which of the following statements about knowledge is true?
Knowledge is the understanding that one gains from information.
According to ____, the cost of computing will drop by 50 percent as computer-processing power doubles every 18 months.
Moore’s law
The term ____ refers to facts and figures that are in an unusable form.
raw data
The first company to use new information technology to substantially lower costs or differentiate products or services often gains ____.
first-mover advantage
Why is information strategically important for organizations?
information can be used to obtain first-mover advantage.
Which of the following is one of the critical issues companies need to address in order to sustain a competitive advantage through information technology?
Is the firm’s use of information technology difficult for another company to create or buy?
The key to sustaining competitive advantage is ____.
using information technology to continuously improve and support the core functions of a business
According to the resource-based view of information technology, sustainable competitive advantage ____.
a. is difficult to create or acquire
b. occurs when information technology adds value
c. is accurately described by all of these - correct
d. differs across firms
e. can be created by using information technology to continuously improve and support the core functions of a business
The two basic methods of capturing information are ____.
manual and electronic