Chapter 17 Flashcards

1
Q

Data mining is the

A

process of discovering unknown patterns and relationships in large amounts of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Two critical steps are required to make sure that data can be accessed by authorized users and no one else. They are

A

authentication and authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The goal of an executive information system (EIS) is to

A

provide accurate, complete, relevant, and timely information to managers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

To properly secure data and data networks, a manager should use

A

a. firewalls
b. all of these - Correct
c. virtual private networks
d. Web-based SSL encryption
e. authentication and authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A(n) __________ is a private company network that allows employees to easily access, share, and publish information using Internet software.

A

intranet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

__________ is the direct electronic transmission of purchase and ordering information from one company’s computer system to another company’s computer system.

A

Electronic data interchange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following statements about knowledge is true?

A

Knowledge is the understanding that one gains from information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

According to ____, the cost of computing will drop by 50 percent as computer-processing power doubles every 18 months.

A

Moore’s law

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The term ____ refers to facts and figures that are in an unusable form.

A

raw data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The first company to use new information technology to substantially lower costs or differentiate products or services often gains ____.

A

first-mover advantage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why is information strategically important for organizations?

A

information can be used to obtain first-mover advantage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following is one of the critical issues companies need to address in order to sustain a competitive advantage through information technology?

A

Is the firm’s use of information technology difficult for another company to create or buy?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The key to sustaining competitive advantage is ____.

A

using information technology to continuously improve and support the core functions of a business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

According to the resource-based view of information technology, sustainable competitive advantage ____.

A

a. is difficult to create or acquire
b. occurs when information technology adds value
c. is accurately described by all of these - correct
d. differs across firms
e. can be created by using information technology to continuously improve and support the core functions of a business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The two basic methods of capturing information are ____.

A

manual and electronic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Because they are inexpensive and easy to use, ____, which convert printed text and pictures into digital images, have become an increasingly popular method for capturing data electronically.

A

electronic scanners

17
Q

____ is the process of discovering unknown patterns and relationships in large amounts of data.

A

Data mining

18
Q

Using ____ data mining, the user simply tells the data mining software to uncover whatever patterns and relationships it can find in a data set

A

unsupervised

19
Q

Unsupervised data mining is particularly good at identifying ____.

A

sequence patterns

b. association or affinity patterns	
c. data clusters	 
d. all of these	 - all of these is correct
20
Q

____ occur in data mining when two or more database elements occur together in a significant pattern, with one of the elements preceding the other.

A

Sequence patterns

21
Q

Unsupervised data mining can be used to recognize ____ patterns.

A

affinity, sequence, and predictive

22
Q

Which of the following statements about data mining is true?

A

Data mining typically uses data from a data warehouse.

23
Q

____ is the process of ensuring that data are reliably and consistently retrievable in a usable format for authorized users, but no one else.

A

Protecting information

24
Q

Which of the following is NOT an example of a security problem that may threaten data and data networks?

A

mob flashing

25
Q

Two critical steps are required to make sure that data can be accessed by authorized users and no one else. They are ____.

A

authentication and authorization

26
Q

A system that requires employees to scan their thumbprints as they start work is called a(n)___________.

A

biometrics

27
Q

Three kinds of information technology are used by executives, managers, and workers inside the company to access and share information. They are ____.

A

executive information systems, portals, and intranets

28
Q

A(n) ____ uses internal and external sources of data to provide managers and executives the information they need to monitor and analyze organizational performance

A

a. executive information system

29
Q

____ is the direct electronic transmission of purchase and ordering information from one company’s computer system to another company’s computer system.

A

Electronic data interchange

30
Q

Unlike an executive information system, a decision support system (DSS) ____.

A

helps managers understand problems and potential solutions by acquiring and analyzing information with sophisticated models