Kitchens - ISOM 210 - 6a-7b

¡Supera tus tareas y exámenes ahora con Quizwiz!

___________ tracking occurs when a company places active or semi-passive RFID tags on expensive products or assets to gather data on the items' location with little or no manual intervention.

Asset

What tracks corporate metrics such as critical success factors and key performance indicators and include advanced capabilities such as interactive controls allowing users to manipulate data for analysis?

Business intelligence dashboards

Select two terms that describe the process for weeding out, fixing, or discarding inconsistent, incorrect, or incomplete data.

Data scrubbing. Data cleansing.

2G

Digital cell phone service

Analytical data

Encompasses all organizational data, and its primary purpose is to support the performing of managerial analysis tasks.

What is an enterprisewide security strategy to enforce corporate epolicies while enabling employee use of mobile devices such as smart phones and tablets?

Enterprise mobility management

Which data element stores a single piece of data about a person, place, thing, transaction, or event?

Entity

_________ are designated locations where Wi-Fi access points are publicly available.

Hotspots

What is the blending of personal and business use of technology devices and applications?

IT consumerization

What is the ability for a blockchain ledger to remain a permanent, indelible, and unalterable history of transactions?

Immutability

What presents the results of data analysis, displaying the patterns, relationships, and trends in a graphical format?

Infographics

Unique

Is each transaction and event represented only once in the data?

Timely

Is the data current with respect to business needs?

Accurate

Is there an incorrect value in the data?

What is the practice of gathering data and ensuring that it is uniform, accurate, consistent, and complete, including such entities as customers, suppliers, products, sales, employees, and other critical entities that are commonly integrated across organizational systems?

Master data management

What provides details about data?

Metadata

________ uses electronic tags and labels to identify objects wirelessly over short distances.

RFID

What means immediate, up-to-date data?

Real-time data

What is a collection of related data elements?

Records

Data at rest

Refers to all data in computer storage.

__________ integrity constraints are rules that enforce basic and fundamental information-based constraints.

Relational

What is a standard security technology for establishing an encrypted link between a web server and a browser, ensuring that all data passed between them remain private?

Secure sockets layer

___________ -passive RFID tags use a battery to run the microchip's circuitry, but communicate by drawing power from the RFID reader.

Semi

Data

Transactional data sender, receiver, number of coins.

True or false: Business-critical integrity constraints tend to mirror the very rules by which an organization achieves success.

True

A(n) ___________ point is the computer or network device that serves as an interface between devices and the network.

access

A(n) _______ is an entity that is capable of participating in an action or a network.

actor

A data _________ is a business analytics specialist who uses visual tools to help people understand complex data.

artist

A(n) _________ is the smallest element of data and has a value of either 0 or 1.

bit

A blockchain is formed by linking together ___________, data structures containing a hash, previous hash, and data.

blocks

The problem of being data rich and information poor results from an inability to turn business data into ______.

business intelligence

A(n) ______ can compare two or more datasets to identify patterns and trends.

comparative analysis

A data _______ is the common term for the representation of multidimensional data.

cube

A(n) _________ maintains data about various types of objects (inventory), events (transactions), people (employees), and places (warehouses).

database

Attributes are the data elements associated with an ________.

entity

Wireless __________ is a means by which portable devices can connect wirelessly to a local area network, using access points that send and receive data via radio waves.

fidelity

A(n) __________ key is a primary key of one table that appears as an attribute in another table and acts to provide a logical relationship between the two tables.

foreign

The ________ block is the first block created in the blockchain.

genesis

Data ___________ refers to the overall management of the availability, usability, integrity, and security of company data.

governance

A data ________ is a storage repository that holds a vast amount of raw data in its original format until the business needs it.

lake

A _______ records classified and summarized transactional data

ledger

A(n) ___________ area network is a large computer network usually spanning a city.

metropolitan

One primary goal of a database is to eliminate data redundancy by recording each piece of data in _______ place(s) in the database.

only one

The ____________ view of data deals with the physical storage of data on a storage device.

physical

Wi-Fi __________ access is a wireless security protocol to protect Wi-Fi networks.

protected

A(n) ___________ database model stores data in the form of logically related two-dimensional tables.

relational

Data ________ includes the tests and evaluations used to determine compliance with data governance polices to ensure correctness of data.

validation

What is the fifth-generation wireless broadband technology based on the 802.11ac standard engineered to greatly increase the speed and responsiveness of wireless networks?

5G

Data in motion

A stream of data that is moving or being transported between locations within or between computer systems.

_________________ is a device that can measure the force of acceleration, whether caused by gravity or by movement.

Accelerometer

____________ represents the loss of a network signal strength measured in decibels (dB) and occurs because the transmissions gradually dissipate in strength over longer distances or because of radio interference or physical obstructions such as walls.

Attenuation

What uses GPS tracking to track vehicles?

Automatic vehicle location

What is an entity that is participating with ill-intentions?

Bad actor

What measures network performance and represents the maximum amount of data that can pass from one point to another in a unit of time?

Bandwidth

____ rate is the number of bits transferred or received per unit of time.

Bit

________ is a type of digital currency in which a record of transactions is maintained and new units of currency are generated by the computational solution of mathematical problems and which operates independently of a central bank.

Bitcoin

What is a type of distributed ledger, consisting of blocks of data that maintain a permanent and tamper-proof record of transactional data?

Blockchain

What is a wireless PAN technology that transmits signals over short distances among cell phones, computers, and other devices?

Bluetooth

3G

Broadband Internet services over cellular networks; Added MMS (multimedia message services) or picture message services

What enforces business rules vital to an organization's success and often require more insight and knowledge than relational integrity constraints?

Business-critical integrity constraints

___________ is the science and art of making an illustrated map or chart.

Cartography

What uses plastic or conductive polymers instead of silicon-based microchips, allowing them to be washed or exposed to water without damaging the chip?

Chipless RFID tags

_______ analysis can compare two or more datasets to identify patterns and trends.

Comparative

What occurs when a company keeps tabs of competitor's activities on the web using software that automatically tracks all competitor website activities such as discounts and new products?

Competitive monitoring

Dual persona technology creates two completely separate user interfaces one the same device, one for work and one for personal use. What is dual persona technology an example of?

Containerization

What isolates corporate applications from personal applications on a device?

Containerization

Select the four functions that a database management system can perform on data in a database?

Create data. Delete data. Update data. Read data.

What is the collection of data from various sources for the purpose of data processing?

Data aggregation

What compiles all of the metadata about the data elements in the data model?

Data dictionary

Select a term that is a synonym for data element, the smallest or basic unit of data in a database.

Data field

What occurs when a company examines its data to determine if it can meet business expectations, while identifying possible data gaps or where missing data might exist?

Data gap analysis

What occurs when a system produces incorrect, inconsistent, or duplicate data?

Data integrity issues

What is the time it takes for data to be stored or retrieved?

Data latency

What is a technique for establishing a match, or balance, between the source data and the target data warehouse?

Data map

What contains a subset of data warehouse data?

Data mart

What are logical data structures that detail the relationships among data elements using graphics or pictures?

Data models

What is an individual item on a graph or a chart?

Data point

What determines the accuracy and completeness of its data?

Data quality audits

Select the four primary traits of the value of data.

Data quality. Data type. Data timeliness. Data governance.

Select the statement that accurately describes a situation in which there is too much data to properly understand or make use of it.

Data rich and information poor

Who is responsible for ensuring the policies and procedures are implemented across the organization and acts as a liaison between the MIS department and the business?

Data steward

Data in use

Data that is currently being updated, processed, erased, accessed or read by a system.

What describes technologies that allow users to "see" or visualize data to transform information into a business perspective?

Data visualization

What moves beyond Excel graphs and charts into sophisticated analysis techniques such as pie charts, controls, instruments, maps, time-series graphs, and more?

Data visualization tools

What is a logical collection of data, gathered from many different operational databases, that supports business analysis activities and decision-making tasks?

Data warehouse

Select the four primary reasons low-quality data occurs in a system.

Data-entry personnel enter abbreviated data to save time. Third-party and external data contains inconsistencies and errors. Different systems have different data entry standards and formats. Online customers intentionally enter inaccurate data to protect their privacy.

What is a worldwide gap giving advantage to those with access to technology?

Digital divide

What is erroneous or flawed data?

Dirty data

_________ computing processes and manages algorithms across many machines in a computing environment.

Distributed

Which of the following are problems associated with dirty data? (Choose all that apply)

Duplicate data. Incorrect data. Non-formatted data.

Select the statement that accurately defines the relationship between entities and attributes in a relational database.

Each attribute of an entity occupies a separate column of a table.

Choose Your Own Device

Employees choose a company approved and configured device.

Company Issued, Personally Enabled

Employees provided with corporate devices.

Bring Your Own Device

Employees use their own device.

Transactional data

Encompasses all of the data contained within a single business process or unit of work, and its primary purpose is to support daily operational tasks.

What is the time remaining before reaching a destination using the present speed and is typically used for navigation applications?

Estimated time enroute

What is the time of day of an expected arrival at a certain destination and is typically used for navigation applications?

Estimated time of arrival

Inconsistent Data Definitions

Every department had its own method for recording data so when trying to share information, data did not match and users did not get the data they really needed.

___________, transformation, and loading is a process that extracts data from internal and external databases, transforms it using a common set of enterprise definitions, and loads it into a data warehouse.

Extraction

_____ data is the application of big data analytics to smaller data sets in near-real or real-time in order to solve a problem or create business value.

Fast

What links business assets to a centralized system where they can be tracked and monitored over time?

GIS map automation

Select the three primary wireless business applications.

GIS. GPS. RFID.

__________ is a GPS technology adventure game that posts the longitude and latitude location for an item on the Internet for users to find.

Geocache

___________ in spatial databases is a coding process that assigns a digital map feature to an attribute that serves as a unique ID (tract number, node number) or classification (soil type, zoning category).

Geocoding

What term describes a round coin-sized object that is uniquely numbered and hidden in geocache?

Geocoin

What stores, views, and analyzes geographic data creating, multidimensional charts or maps?

Geographic information system

Select three measurements of bandwidth.

Gigabits. Megabits. Kilobits.

What is a satellite-based navigation system providing extremely accurate position, time, and speed information?

Global positioning system

Previous Hash

Hash of the previous block in the blockchain.

4G

High-speed access, anywhere, anytime, to anything digital—audio, video, text

What is a broad administrative area that deals with identifying individuals in a system and controlling their access to resources within that system by associating user rights and restrictions with the established identity?

Identity management

Select the three accurate statements reflecting the business advantages of a relational database.

Increased data integrity. Increased data security. Reduced data redundancy.

_________ present the results of data analysis, displaying the patterns, relationships, and trends in a graphical format.

Infographics

What are rules that help ensure the quality of data?

Integrity constraints

Complete

Is a value missing from the data?

Consistent

Is aggregate or summary data in agreement with detailed data?

__________ represents a north/south measurement of position.

Latitude

Which applications use location information to provide a service?

Location-based services

What focuses on how individual users logically access data to meet their own particular business needs?

Logical view of data

What represents an east/west measurement of position?

Longitude

Which technology has multiple transmitters and receivers, allowing them to send and receive greater amounts of data than traditional networking devices?

MIMO

Lack of Data Standards

Managers need to perform cross-functional analysis using data from all departments, which differed in granularities, formats, and levels.

What is a large computer network usually spanning a city?

Metropolitan area network

What is the set of processes and procedures involved in writing software for use on wireless devices?

Mobile application development

What is a security strategy that administers and enforces corporate epolicies for applications on mobile devices?

Mobile application management

Identify the three primary areas of an enterprise mobility strategy.

Mobile application management. Mobile device management. Mobile information management.

What is the ability to purchase goods and services through a wireless Internet-enabled device?

Mobile business

What is a security strategy comprised of products and services that offer remote support for mobile devices, such as smart phones, laptops, and tablets?

Mobile device management

Ineffective Direct Data Access

Most data stored in operational databases did not allow users direct access; users had to wait to have their queries or questions answered by MIS professionals who could code SQL.

What is about ensuring that everyone has equal access to the Internet?

Net neutrality

What provides communication for devices owned by a single user that work over a short distance?

PAN

_________ RFID tags do not have a power source, whereas active RFID tags have their own transmitter and a power source (typically a battery).

Passive

_________ computing is the growing trend of embedding computer capabilities into everyday objects to make them effectively communicate and perform useful tasks in a way that minimizes the end user's need to interact with computers as computers.

Pervasive

What is a field that uniquely identifies a given record in a table?

Primary key

Which of the following are examples of analytical data? (Check all that apply.)

Product statistics. Sales projections.

What is a website that looks and behaves as if it is a mobile application but it is just a normal website?

Progressive web application

What is a way to validate transactions and achieve the distributed consensus?

Proof-of-stake

What is a requirement to define an expensive computer calculation, also called mining, that needs to be performed in order to create a new group of trustless transactions on the distributed ledger or blockchain?

Proof-of-work

What is a device that measures the acceleration (the rate of change of velocity) of an item and is used to track truck speeds or taxi cab speeds?

RFID accelerometer

What is a transmitter/receiver that reads the contents of RFID tags in the area?

RFID reader

What is an electronic identification device that is made up of a chip and antenna?

RFID tag

_______ data is data that has not been processed for use.

Raw

Which system allows users to create, read, update, and delete data in a relational database?

Relational database management system

What receives and repeats a signal to extend its attenuation or range?

Repeater

Select three terms that represent the event that occurs when paper maps are laid edge to edge and items that run across maps but do not match are reconfigured to match.

Rubber sheeting. Warping. Edge matching.

What is a combination of HTTP and SSL to provide encryption and secure identification of an Internet server?

SHTTP or HTTPS

Which of the following are examples of transactional data? (Check all that apply.)

Sales receipt. Airline ticket.

What is a space station that orbits the Earth receiving and transmitting signals from Earth-based stations over a wide area?

Satellite

Select three common uses of GIS in a business.

Sending information alerts. Mapping quantities. Finding what is nearby.

___________ offer more advanced computing ability and connectivity than basic cell phones.

Smartphones

_____ data identifies the primary location where data is collected.

Source

What identifies the primary location where data is collected?

Source data

What identifies the geographic location of features and boundaries on Earth, such as natural or constructed features, oceans, and more?

Spatial data

___________ is a method of sending audio and video files over the Internet in such a way that the user can view the file while it is being transferred.

Streaming

Which of the following is generated continuously by thousands of data sources, which typically send in the data records simultaneously and in small sizes?

Streaming data

5G

Superior data communication rate; Expected to provide artificial intelligence capabilities on wearable devices

Hash

The blocks unique identifier like a fingerprint.

Poor Data Quality

The data, if available, were often incorrect or incomplete. Therefore, users could not rely on the data to make decisions.

1G

The original analog cell phone network

True or false: Gender, for instance can be referred to in many ways (Male, Female, M/F, 1/0), but it should be standardized on a data warehouse with one common way of referring to each data element that stores gender (M/F).

True

Inadequate Data Usefulness

Users could not get the data they needed; what was collected was not always useful for intended purposes.

Why does a database offer increased information security?

Various security features of databases ensure that individuals have only certain types of access to certain types of data.

________ over IP uses IP technology to transmit telephone calls.

Voice

_________ over LTE allows mobile voice calls to be made over broadband networks, creating—under the right network conditions—clearer audio and fewer dropped calls.

Voice

What is an encryption algorithm designed to protect wireless transmission data?

WEP

What is a local area network that uses radio signals to transmit and receive data over distances of a few hundred feet?

WLAN

What is the practice of tagging pavement with codes displaying where Wi-Fi access is available?

War chalking

Which of the following are answers to tough business questions BI can answer? (Choose all that apply)

Where is the business going? Where is the business now? Where has the business been?

Select the statement below that accurately reflects a database.

While a database has only one physical view, it can easily support multiple logical views that provides for flexibility.

What includes the inner workings of a Wi-Fi service or utility, including the signal transmitters, towers, or poles, along with additional equipment required to send out a Wi-Fi signal?

Wi-Fi infrastructure

_______ is a communications technology aimed at providing high-speed wireless data over metropolitan area networks.

WiMAX

What is a metropolitan area network that uses radio signals to transmit and receive data?

Wireless MAN

Select the four wireless communication network categories.

Wireless metropolitan area networks. Wireless wide area networks. Personal area networks. Wireless local area network.

Select the two accurate statements about mobility and wireless communications.

Wireless refers to any type of operation accomplished without the use of a hard-wired connection. Mobile means the technology can travel with the user.

A(n) _________ rule defines how a company performs certain aspects of its business and typically results in either a yes/no or true/false answer.

business

A web server requires an SSL __________, an electronic document that confirms the identity of a website or server and verifies that a public key belongs to a trustworthy individual or company.

certificate

Business intelligence ________ track corporate metrics such as critical success factors and key performance indicators and include advanced capabilities such as interactive controls allowing users to manipulate data for analysis.

dashboards

War ________ is deliberately searching for Wi-Fi signals while driving by in a vehicle.

driving

Data ___________ refers to the extent of detail within the data (fine and detailed or coarse and abstract).

granularity

A _____ is a function that converts an input of letters and numbers into an encrypted output of a fixed length.

hash

Data ___________ occurs when the same data element has different values.

inconsistency

Mobile _________ management is a security strategy that involves keeping sensitive data encrypted and allowing only approved applications to access or transmit it.

information

Data _________ is a measure of the quality of data.

integrity

Analysis ___________ occurs when the user goes into an emotional state of over analyzing (or over-thinking) a situation so that a decision or action is never taken, in effect paralyzing the outcome. In the time of big data, analysis paralysis is a growing problem.

paralysis

A wireless access ____________ enables devices to connect to a wireless network to communicate with each other.

point

A(n) ___________ -by-example tool helps users graphically design the answer to a question against a database.

query

A _______ access network is a technology that connects individual devices to other parts of a network through radio connections.

radio

Data __________ is the duplication of data, or the storage of the same data in multiple places.

redundancy

Data ___________ is the management and oversight of an organization's data assets to help provide business users with high-quality data that is easily accessible in a consistent manner.

stewardship

A(n) __________ query language asks users to write lines of code to answer questions against a database.

structured

Real-time __________ provide real-time data in response to requests.

systems

A data map is a technique for establishing a match, or balance, between the source data and the ______ data warehouse.

target

Data-driven decision management is an approach to business governance that values decisions that can be backed up with ______ data.

verifiable

A(n) ________ area network spans a large geographic area such as a state, province, or country.

wide

A(n) ___________-WAN is a wide area network that uses radio signals to transmit and receive data.

wireless

Proof-of-_________ is a requirement to define an expensive computer calculation, also called mining, that needs to be performed in order to create a new group of trustless transactions on the distributed ledger or blockchain.

work


Conjuntos de estudio relacionados

Medical-Surgical Nursing - Cardiovascular System, Blood, and Lymphatic Systems

View Set

Maternal-Newborn chapter 16- Labor & Delivery

View Set

Intro to Economics - quiz 1 (multiple choice)

View Set

Intro to American Politics Final

View Set

public speaking midterm study guide

View Set

MKTG 4280 Ch. 9 McGraw-Hill Connect

View Set

biology--chapter 3 organelle terms

View Set

CHH. 41: A Team Approach to Healthcare

View Set

Словарь терминов по истории России, необходимых для выполнения заданий ЕГЭ

View Set