Chapter 17 Flashcards
Data mining is the
process of discovering unknown patterns and relationships in large amounts of data
Two critical steps are required to make sure that data can be accessed by authorized users and no one else. They are
authentication and authorization
The goal of an executive information system (EIS) is to
provide accurate, complete, relevant, and timely information to managers
To properly secure data and data networks, a manager should use
a. firewalls
b. all of these - Correct
c. virtual private networks
d. Web-based SSL encryption
e. authentication and authorization
A(n) __________ is a private company network that allows employees to easily access, share, and publish information using Internet software.
intranet
__________ is the direct electronic transmission of purchase and ordering information from one company’s computer system to another company’s computer system.
Electronic data interchange
Which of the following statements about knowledge is true?
Knowledge is the understanding that one gains from information.
According to ____, the cost of computing will drop by 50 percent as computer-processing power doubles every 18 months.
Moore’s law
The term ____ refers to facts and figures that are in an unusable form.
raw data
The first company to use new information technology to substantially lower costs or differentiate products or services often gains ____.
first-mover advantage
Why is information strategically important for organizations?
information can be used to obtain first-mover advantage.
Which of the following is one of the critical issues companies need to address in order to sustain a competitive advantage through information technology?
Is the firm’s use of information technology difficult for another company to create or buy?
The key to sustaining competitive advantage is ____.
using information technology to continuously improve and support the core functions of a business
According to the resource-based view of information technology, sustainable competitive advantage ____.
a. is difficult to create or acquire
b. occurs when information technology adds value
c. is accurately described by all of these - correct
d. differs across firms
e. can be created by using information technology to continuously improve and support the core functions of a business
The two basic methods of capturing information are ____.
manual and electronic
Because they are inexpensive and easy to use, ____, which convert printed text and pictures into digital images, have become an increasingly popular method for capturing data electronically.
electronic scanners
____ is the process of discovering unknown patterns and relationships in large amounts of data.
Data mining
Using ____ data mining, the user simply tells the data mining software to uncover whatever patterns and relationships it can find in a data set
unsupervised
Unsupervised data mining is particularly good at identifying ____.
sequence patterns
b. association or affinity patterns c. data clusters d. all of these - all of these is correct
____ occur in data mining when two or more database elements occur together in a significant pattern, with one of the elements preceding the other.
Sequence patterns
Unsupervised data mining can be used to recognize ____ patterns.
affinity, sequence, and predictive
Which of the following statements about data mining is true?
Data mining typically uses data from a data warehouse.
____ is the process of ensuring that data are reliably and consistently retrievable in a usable format for authorized users, but no one else.
Protecting information
Which of the following is NOT an example of a security problem that may threaten data and data networks?
mob flashing
Two critical steps are required to make sure that data can be accessed by authorized users and no one else. They are ____.
authentication and authorization
A system that requires employees to scan their thumbprints as they start work is called a(n)___________.
biometrics
Three kinds of information technology are used by executives, managers, and workers inside the company to access and share information. They are ____.
executive information systems, portals, and intranets
A(n) ____ uses internal and external sources of data to provide managers and executives the information they need to monitor and analyze organizational performance
a. executive information system
____ is the direct electronic transmission of purchase and ordering information from one company’s computer system to another company’s computer system.
Electronic data interchange
Unlike an executive information system, a decision support system (DSS) ____.
helps managers understand problems and potential solutions by acquiring and analyzing information with sophisticated models