MIS Mid Term Flashcards
A ____ system is a type of transaction processing system (TPS).
Payroll
____ is understanding the role of information in generating and using business intelligence.
Information Literacy
The supervisor program of an OS is called the ____.
Kernel
Sales records are an example of the ____ component of an information system.
Internal Data
CD-ROMs and DVDs are examples of ____ disks.
Optical
Online brokerage firms operate in a highly competitive environment, so they use information technologies to make their services more unique in order to combat ____.
Rivalry Among Existing Competitors
A(n) ____ is a type of memory that must be accessed sequentially.
Magnetic Tape
____ is the opposite of buyer power.
Supplier Power
____ memory, which is nonvolatile, holds data when the computer is off or during the course of a program’s operation.
Secondary
Using ____ software, you can perform “what if” analysis on data.
Spreadsheet
The BIOS is part of the ____.
Motherboard
In designing an MIS, the first task is to define the system’s ____ clearly.
Objectives
____ means saving data in computer memory and retrieval is accessing data from memory.
Storage
The portion of the computer responsible for adding numbers is the ____.
ALU
A(n) ____ is the link between devices connected to the computer.
Bus
Optical discs use ____ beams to access and store data.
Laser
The term RAID stands for ____.
Redundant Array of Independent Disks
A successful ____ program helps improve customer service and create a long term relationship between an organization and its customers.
CRM
The four Ms of resources are: ____.
Manpower, Machinery, Materials, and Money
Typically, data has a(n) ____ orientation.
Time
In a(n) ____ file, each alphabetic, numeric, or special character is represented with a 7-bit binary number.
ASCII
A ____ is a computer and all software for managing network resources and offering services to a network.
Server
The Clipboard’s contents are stored on ____.
RAM
Management information system (MIS) ____ include programs developed in-house.
Software Components
A ____ is the size of a character.
Byte
With the ____, records can be accessed sequentially or randomly, depending on the number being accessed.
Indexed Sequential Access Method
Within a data model, the ____ describes how data is organized and the relationship among records.
Data Structure
Accessing one central database server could increase ____ for remote users.
Communication Costs
In a relational model, when a primary key for one table appears in another table, it is called a ____ key.
Foreign
A database ____, the heart of DBMS software, is responsible for data storage, manipulation, and retrieval.
Engine
The structure and organization of data in a database is called the data ____.
Hierarchy
Data marts usually have more limited ____ than data warehouses.
Scope
____ uses multiple sources of information and provides multidimensional analysis.
OLAP
Grouping objects along with their attributes and methods into a class is called ____.
Encapsulation
A ____ operation searches data in a table and retrieves records based on certain criteria.
Select
A data ____ stores definitions, such as data types for fields, default values, and validation rules for data in each field.
Dictionary
A database is a collection of related ____ that can be stored in a central location or in multiple locations.
Data
How data is stored on and retrieved from a hard disk is the ____ view.
Physical
In a data warehouse, ____ means collecting data from a variety of sources and converting it into a format that can be used in transformation processing.
Extraction
Distributing data among multiple sites minimizes the effects of computer ____.
Failures
A ____ is a group of related fields in a database.
Record
With ____, you request data from a database by constructing a statement made up of query forms.
Query by Example
To improve database efficiency, a process called ____ is used.
Normalization
The most common data model is the ____ model.
Relational
____ tools can be used to examine point-of-sale data to generate reports on customers’ purchase history.
Data-Mining
A(n) ____ database has the ability to represent more complex data relationships than a relational database.
Object-Oriented
To begin designing a relational database, you must define the ____ structure by defining each table and the fields in it.
Logical
____ usually utilize internal data and respond in real time.
OLTP
A ____ is a collection of data from a variety of sources used to support decision-making applications and generate business intelligence.
Data Warehouse
In the ____ model, each record can have multiple parents and multiple children.
Network
A(n) ____ is a set of rules specifying legal and ethical use of a system and activities and the consequences of noncompliance.
Acceptable Use Policy
____ attacks inundate a Web site or network with e-mails and other network traffic so that it becomes overloaded and can’t handle legitimate traffic.
Denial-of-Service
A ____ attack typically targets Internet servers.
Denial-of-Service
____ are a type of access control.
Passwords
Amazon.com uses ____ to provided customized book recommendations based on past purchases.
Cookies
____ refers to the accuracy of information resources within an organization.
Integrity
Data encryption transforms data into a scrambled form called ____.
Ciphertext
____ is capturing and recording network traffic.
Sniffing
____ is registering, selling, or using a domain name to profit from someone else’s trademark.
Cybersquatting
A ____ attack floods a network or server with service requests to prevent legitimate users’ access to the system.
Denial-of-Service
Information technology and the Internet has, in essence, resulted in two societal groups: the information rich and the information poor. This is called the ____.
Digital Divide
A backup power unit is also called a(n) ____.
UPS
____ planning outlines procedures for keeping an organization operational.
Business Continuity
A ____ is built-in to a system by its designer.
Backdoor
A ____ travels from computer to computer, in a network, but it doesn’t usually erase data.
Worm
The McCumber cube defines ____ characteristics of information security.
Nine
Intentional threats include ____.
Attacks by Disgruntled Employees
A ____ protects new processes.
Patent
You make two copies of a software package you just bought and sell one to a friend. This action is ____.
Illegal and Unethical
A ____ is used to verify whether a user’s access is valid by logging the user off (after he or she attempts to connect to the network) and then calling the user back at a predetermined number.
Callback Modem
Dell, Microsoft, and Unisys Corporation created a partnership to design a voting system for several U.S. states. This is an example of ____.
A Virtual Organization
____ are generated by Web server software, record a user’s actions on a Web site.
Log Files
Many experts believe management can reduce employee’s unethical behavior by developing and enforcing a ____.
Code of Ethics