Chapter 17 Flashcards

(30 cards)

1
Q

Data mining is the

A

process of discovering unknown patterns and relationships in large amounts of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Two critical steps are required to make sure that data can be accessed by authorized users and no one else. They are

A

authentication and authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The goal of an executive information system (EIS) is to

A

provide accurate, complete, relevant, and timely information to managers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

To properly secure data and data networks, a manager should use

A

a. firewalls
b. all of these - Correct
c. virtual private networks
d. Web-based SSL encryption
e. authentication and authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A(n) __________ is a private company network that allows employees to easily access, share, and publish information using Internet software.

A

intranet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

__________ is the direct electronic transmission of purchase and ordering information from one company’s computer system to another company’s computer system.

A

Electronic data interchange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following statements about knowledge is true?

A

Knowledge is the understanding that one gains from information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

According to ____, the cost of computing will drop by 50 percent as computer-processing power doubles every 18 months.

A

Moore’s law

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The term ____ refers to facts and figures that are in an unusable form.

A

raw data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The first company to use new information technology to substantially lower costs or differentiate products or services often gains ____.

A

first-mover advantage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why is information strategically important for organizations?

A

information can be used to obtain first-mover advantage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following is one of the critical issues companies need to address in order to sustain a competitive advantage through information technology?

A

Is the firm’s use of information technology difficult for another company to create or buy?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The key to sustaining competitive advantage is ____.

A

using information technology to continuously improve and support the core functions of a business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

According to the resource-based view of information technology, sustainable competitive advantage ____.

A

a. is difficult to create or acquire
b. occurs when information technology adds value
c. is accurately described by all of these - correct
d. differs across firms
e. can be created by using information technology to continuously improve and support the core functions of a business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The two basic methods of capturing information are ____.

A

manual and electronic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Because they are inexpensive and easy to use, ____, which convert printed text and pictures into digital images, have become an increasingly popular method for capturing data electronically.

A

electronic scanners

17
Q

____ is the process of discovering unknown patterns and relationships in large amounts of data.

18
Q

Using ____ data mining, the user simply tells the data mining software to uncover whatever patterns and relationships it can find in a data set

19
Q

Unsupervised data mining is particularly good at identifying ____.

A

sequence patterns

b. association or affinity patterns	
c. data clusters	 
d. all of these	 - all of these is correct
20
Q

____ occur in data mining when two or more database elements occur together in a significant pattern, with one of the elements preceding the other.

A

Sequence patterns

21
Q

Unsupervised data mining can be used to recognize ____ patterns.

A

affinity, sequence, and predictive

22
Q

Which of the following statements about data mining is true?

A

Data mining typically uses data from a data warehouse.

23
Q

____ is the process of ensuring that data are reliably and consistently retrievable in a usable format for authorized users, but no one else.

A

Protecting information

24
Q

Which of the following is NOT an example of a security problem that may threaten data and data networks?

25
Two critical steps are required to make sure that data can be accessed by authorized users and no one else. They are ____.
authentication and authorization
26
A system that requires employees to scan their thumbprints as they start work is called a(n)___________.
biometrics
27
Three kinds of information technology are used by executives, managers, and workers inside the company to access and share information. They are ____.
executive information systems, portals, and intranets
28
A(n) ____ uses internal and external sources of data to provide managers and executives the information they need to monitor and analyze organizational performance
a. executive information system
29
____ is the direct electronic transmission of purchase and ordering information from one company's computer system to another company's computer system.
Electronic data interchange
30
Unlike an executive information system, a decision support system (DSS) ____.
helps managers understand problems and potential solutions by acquiring and analyzing information with sophisticated models