K-201 Lecture Exam

¡Supera tus tareas y exámenes ahora con Quizwiz!

Each Information System is comprised of five components. Match the component with the order in which it appears (from left to right) in the Five-Component Model.

1. Hardware (Actor) 2. Software (Instructions) 3. Data (Bridge) 4. Procedures (Instructions) 5. People (Actor) Hardware-Software-Data-Procedures-People <-------Automation moves work from human side to computer side ------->Increasing degree of difficulty of change

How many primary functions does a database management system (DBMS) have?

3 primary functions A DBMS has 3 primary functions: 1.) Create the database and its structures -Database developers use the DBMS to create tables, relationships, and other structures in the data- base. 2.) Process the database -The DBMS provides applications for four processing operations: to read, insert, modify, or delete data. 3.) Administer the database -This function provides tools to assist in the administration of the database. Database administration involves a wide variety of activities like setting up a security system involving user accounts, passwords, permissions, and limits for processing the database. In addition to security, DBMS administrative functions include backing up database data, adding structures to improve the performance of database applications, removing data that are no longer wanted or needed, etc..

What Is a Database Management System (DBMS)?

A database management system (DBMS) is a program used to create, process, and administer a database. Examples of DBMS products: DB2 (IBM), Access and SQL Server (Microsoft), Oracle Database (Oracle Corporation).

Keeping track of data involving multiple themes such as employees, transactions, customers, supplies, etc. should be done with which of the following?

A relational database.

Which of the following is considered a threat caused by human error?

An employee inadvertently installing an old database on top of the current one

What is an entity?

An entity is some thing that the users want to track like Order, Customer, Salesperson, and Item. Some entities represent a physical object, such as Item or Salesperson; others represent a logical construct or transaction, such as Order or Contract. Each entity gets its own table. Attributes: Entities have attributes that describe characteristics of the entity like that of the entity Salesperson are Salesperson Name, Email, Phone, and so forth. Identifier: Entities have an identifier, which is an attribute (or group of attributes) whose value is associated with one and only one entity instance. Customer Number is an identifier of Customer. If each member of the sales staff has a unique name, then Salesperson Name is an identifier of Salesperson.

Nonword passwords are vulnerable to a ________ attack in which the password cracker tries every possible combination of characters.

Brute Force

Which of the following is performed by enterprise application integration?

Companies for which ERP is inappropriate still have the problems associated with information silos, however, and some choose to use enterprise application integration (EAI) to solve those problems. EAI is a suite of software applications that integrates existing systems by providing layers of software that connect applications together. EAI connects system "islands" via a new layer of software.

What describes the data and relationships that will be stored in a database?

Data Model It is like a blueprint so, database developers create a data model before they start designing the database.

________ refers to an organization-wide function that is in charge of developing data policies and enforcing data standards.

Data administration

What is data?

Data is defined as recorded facts or figures. The facts that employee James Smith earns $70.00 per hour and that Mary Jones earns $50.00 per hour are data.

________ protect databases and other organizational data.

Data safeguard

What is a data safeguard?

Data safeguards protect databases and other organizational data. Two organizational units are responsible for data safeguards. Data administration refers to an organization-wide function that is in charge of developing data policies and enforcing data standards. Database administration refers to a function that pertains to a particular database. ERP, CRM, and MRP databases each have a database administration function. Database administra- tion develops procedures and practices to ensure efficient and orderly multiuser processing of the database, to control changes to the database structure, and to protect the database.

What makes databases more useful for obtaining information?

Database Application A database application is a collection of forms, reports, queries, and application programs that serves as an intermediary between users and database data. Database applications reformat database table data to make it more informative and more easily updated.

What are dynamic processes?

Dynamic processes are flexible, informal, and adaptive processes that normally involve strategic and less structured managerial decisions and activities. Deciding whether to open a new store location and how best to solve the problem of excessive product returns are examples, as is using Twitter to generate buzz about next season's product line. Dynamic processes usually require human judgment.

What are enterprise processes?

Enterprise processes span an organization and support activities in multiple departments. At a hospital, the process for discharging a patient supports activities in housekeeping, the pharmacy, the kitchen, nurses' stations, and other hospital departments.

What are relationships?

Entities have relationship and entity-relationship (E-R) diagrams are used to show these relationships. All of the entities of one type are represented by a single rectangle and a line is used to represent a relationship between two entities. Crows feet at only one end of the relationship line means it is a 1:N, or one-to-many relationship and crows feet at both ends of the relationship line means the relationship is N:M, or many-to-many relationship and no crows feet is a 1:1, or one-to-one relationship.

Good data are always worth the cost, no matter how expensive.

False

In order for data to be considered timely it must be delivered in real time.

False

The number of components in the Five Component Model increases in proportion to an Information System's complexity and/or size.

False

A table containing normalized data should have 3 or fewer themes.

False A normalized table should contain data with one and only one theme.

Encryption, the process of transforming clear text into coded, unintelligible text for secure storage or communication is a type of human safeguard.

False Encryption is a type of technical safeguard that also safeguards data.

Microsoft Access is a database.

False It is a Database Management System (DBMS).

The lost-update problem can be resolved by implementing multi-user database processing.

False The lost-update problem is actually caused by multi-user database processing. Some type of locking must be used to coordinate activities among the multiple users.

A database is simply a group of tables or files

False. A database is not just a group of tables, it also includes relationships among the rows in those tables and metadata.

N:M relationships should be represented in a data model the same way a 1:N relationship is represented.

Fasle

Describe a database and its various elements.

Fields-Columns Bytes-Characters Table-File Records-Row A database is a collection of tables plus relationships among the rows in the tables, plus metadata that describes the structure of the database.

What is a human safe-guard?

Human safeguards involve the people and procedure components of information systems. In gen- eral, human safeguards result when authorized users follow appropriate procedures for system use and recovery.

Which of the following conditions exists when data are isolated in separated information systems?

Information Silos An information silo is the condition that exists when data are isolated in separated information systems. For example, customer, sales, product, and other data each uses that data for its own purposes and will likely store slightly different data. Sales, for example, will store contact data for customers' purchasing agents, while Accounting will store contact data for customers' accounts payable personnel. It's completely natural for workgroups to develop information systems solely for their own needs, but, over time, the existence of these separate systems will result in information silos that cause numerous problems. So the problem with information silos is inconsistent duplicated data, and therefore it is said to have a data integrity problem.

What is information?

Information is knowledge derived from data and information is data presented in a meaningful context. We do something to data to produce information. Information is processed data or information is data processed by summing, ordering, averaging, grouping, comparing, etc. The statement that the average hourly wage of all the graphic designers is $60.00 per hour is information. Average wage is knowledge derived from the data of individual wages. The fact that Jeff Parks earns $30.00 per hour is data, but the statement that Jeff Parks earns less than half the average hourly wage of $60.00 per hour of the company's Web designers, however, is information.

Which phase of the customer life cycle focuses on sending messages to the target market to attract customer prospects?

Marketing

What is metadata?

Metadata is the data displayed in Design View of a table in an Access database.

According to your textbook, in the five-component framework of an information system, which is the most important?

People

Define Primary Key, foreign key, and metadata.

Primary Key: a column or group of columns that identifies a unique row in a table Foreign Key: a column or group of columns used to represent relationships, the value of the foreign key matches the value of the primary key in a different table Metadata: data that describes data and is the data displayed in Design View of a table in an Access database.

What is process effectiveness?

Process effectiveness is a measure of how well a process achieves organizational strategy. If an organization differentiates itself on quality customer service and if the process in Figure 7-1 requires 5 days to respond to an order request, then that process is ineffective. Companies that provide customized manufacturing might make their processes more effective by using 3D printing.

What is process efficiency?

Process efficiency is a measure of the ratio of process outputs to inputs. If an alternative to a process can produce the same order approvals/rejections (output) for less cost or produce more approvals/rejections for the same cost, it is more efficient.

Who should be responsible for signing off on the data model before a database is developed?

Project manager

Which of the following is an international standard language for processing a database?

SQL Structured Query Language (SQL) is an international standard language for processing a database. All five of the DBMS products mentioned earlier accept and process SQL statements.

What are structured processes?

Standardized processes that involve day-to-day operations: accepting a return, placing an order, purchasing raw materials, and so forth.

In order to access your student records, you must authenticate with your IU username and passphrase. This is an example of which caregory of safeguard?

Technical Safeguard

A ________ is a person or an organization that seeks to obtain or alter data or other IS assets illegally, without the owner's permission and often without the owner's knowledge.

Threat

In the context of security threats, pretexting, sniffing, spoofing, and phishing are all examples of ________.

Unauthorized data disclosure

When transferring funds online through the website of a reputed bank. Which of the following will be displayed in the address bar of your browser that will let you know that the bank is using the Secure Sockets Layer (SSL) protocol?

Use of SSL/TLS makes it safe to send sensitive data such as credit card numbers and bank balances. Just be certain that you see https:// in your browser and not just http://.

What is true about human safeguards for employees?

User accounts should be defined to give users the least possible privilege needed to perform their jobs. Also, general job descriptions should provide a separation of duties and authorities. For example, no single individual should be allowed to both approve expenses and write checks.

A(n)________ system is a suite of applications, a database, and a set of inherent processes for managing all the interactions with the customer, from lead generation to customer service.

customer relationship management

Tony requests a credit approval of $25,000. Instead, he gets $15,000 approved as customer credit. Which of the following problems caused by information silos is most likely the reason behind it?

disjointed processes


Conjuntos de estudio relacionados

Pharmacology Central Nervous System Stimulants

View Set

Ch. 13 The Eye and Ear ABBREVIATIONS

View Set

Bio 181 final exam (units 13-16)

View Set

IBUS TEST 2 multiple choice q's ch 6-12

View Set

Physics: Circular Motion (True/False)

View Set