MIS Exam 2

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

how to tell sql to disregard whatever comes next

"--"

Which of the following is an example of what an information policy could specify? - A health insurance company stores data that patients self-report as inputs on its website, but does not link that data with information about the patient's search history. - An internal memo at a small corporation outlines how their policies meet local government requirements. - A large corporation grants access to salary information to the direct supervisors of employees and to members of the Human Resources department who administer payroll. - A user agreement on a website indicates that it will store the browsing history linked to the IP address for an indefinite amount of time and reserves the right to sell that information to interested parties.

- A health insurance company stores data that patients self-report as inputs on its website, but does not link that data with information about the patient's search history. - A large corporation grants access to salary information to the direct supervisors of employees and to members of the Human Resources department who administer payroll. - A user agreement on a website indicates that it will store the browsing history linked to the IP address for an indefinite amount of time and reserves the right to sell that information to interested parties.

Which of the following is an example of a web experience that could be improved by web mining? - A travel company wants to know what amenities people search for before booking a hotel for a vacation so that the company can increase the coverage of those amenities on their website. - A small online retailer has noticed that most people viewing products from its gaming pages browse for about 5 minutes and end up making purchases, but over 75 percent of people viewing products from its home goods pages leave within the first 30 seconds. It wants information on how the two pages are different. - A subscription learning app that targets kindergarten students wants to meaningfully update its lessons so that visually impaired children can use them. - A large company wants to know how many people purchased items from its site on the previous Black Friday to predict what this year's sales will be.

- A travel company wants to know what amenities people search for before booking a hotel for a vacation so that the company can increase the coverage of those amenities on their website. - A small online retailer has noticed that most people viewing products from its gaming pages browse for about 5 minutes and end up making purchases, but over 75 percent of people viewing products from its home goods pages leave within the first 30 seconds. It wants information on how the two pages are different. - A subscription learning app that targets kindergarten students wants to meaningfully update its lessons so that visually impaired children can use them.

Because many business executives desire to create a data-driven decision making culture, which 3 of the following are competencies organizations invest in to support DDDM? - Agility in analytics and data analysis - Building a data-driven community - Data proficiency - Increased investment in database servers.

- Agility in analytics and data analysis - Building a data-driven community - Data proficiency

Which of the following are advantages of cloud databases over a traditional database? - Provides increased local control of database features - Can be accessed through an application programming interface (API) - Can support both SQL and NoSQL databases - Are maintained by an external provider, such as Amazon or Oracle

- Can be accessed through an application programming interface (API) - Can support both SQL and NoSQL databases - Are maintained by an external provider, such as Amazon or Oracle

Because many business executives desire to create a data-driven decision making culture, which 3 of the following are competencies organizations invest in to support DDDM? - Data proficiency - Building a data-driven community - Agility in analytics and data analysis - Increased investment in database servers.

- Data proficiency - Building a data-driven community - Agility in analytics and data analysis

Which of these steps in the data mining process most likely involves the actual "mining" or "Knowledge Discovery in Data"? - Data gathering and preparation - Knowledge deployment - Problem definition - Model building and evaluation

- Model building and evaluation

Which of the following is an example of an organization analyzing predictive behavior with the goal of creating new offerings? More than one answer may be correct. - Target keeps track of how many shoppers visit their stores on Sundays. - DropBox tracks how many people subscribe to their services after viewing a specific marketing e-mail. - Netflix tracks what users who viewed all three seasons of Stranger Things also had in their queues. correct - An in-home healthcare provider tracks the hospital readmission rates of elderly people who live alone after they received care for falling in their homes.

- Netflix tracks what users who viewed all three seasons of Stranger Things also had in their queues. correct - An in-home healthcare provider tracks the hospital readmission rates of elderly people who live alone after they received care for falling in their homes.

Which of the following statements about computer viruses are true? - Viruses can destroy programs or alter the operations of a computer or network. - Computer viruses are relatively easy to detect - Mac computers are less susceptible to computer viruses - A computer virus is software that infects computers and is created using computer code.

- Viruses can destroy programs or alter the operations of a computer or network. - A computer virus is software that infects computers and is created using computer code.

5 essential aspects of analytical skills

- curiosity - understanding context - technical mindset - data design - data strategy

selecting the right data

- how will data be collected - where will you get data - what type of data - how much data - how much time do you have

characteristics of open data

- public must have access - must have access rights that allow reuse and redistribution - universally available so that anyone can use

Trends in Data Analytics (4)

- scalable AI - composable data - data fabric as function - data as core business function

which type of system is defined as one that helps make the sales process more efficient? - a decision making process management system - project management system - transaction processing system - inventory management system

- transaction processing system

6 step DDDM process

1. ask 2. prepare 3. process 4. analysis 5. share 6. act

4 steps to protect computers from natural disasters

1. business continuity plan 2. off-site cloud storage 3. maintenance of data inventory 4. geographic data redundancy

4 steps in a data quality audit

1. quality assessment (A) 2. data design (D) 3. quality transformation (T) 4. quality monitoring (M)

what percent of malicious attachments are masked as a microsoft office type file?

38%

what percent of cyberattacks are aimed at small businesses?

43%

what percent of attachments emailed daily are harmful for the recipient?

85%

what percent of cyberattacks launch with phishing email?

91%

relational database management system (RDBMS)

A collection of programs that manages a relational database. The RDBMS software translates a user's logical requests (queries) into commands that physically locate and retrieve the requested data. maintain info about objects, events, people, places. not graphical or narrative data

cyberattack

A deliberate misuse of computers and networks via the Internet that uses malicious code to modify the normal operations of a computer or network

parameter query

A query in which the user interactively specifies one or more criteria values.

action query

A query that adds, changes, or deletes multiple table records at a time.

crosstab query

A query that calculates a sum, average, count, or other type of total on records and then groups the results by two types of information: one down the left side of the datasheet and the other across the top.

Keystroke Logger

A type of spyware program that monitors keystrokes with the intent of stealing passwords, login IDs, or credit card information.

cybercrime

Any criminal action perpetrated primarily through the use of a computer examples: trojan horse virus, computer hacking, digital identity theft

first-party data

Data that has been collected internally by the organization

creating efficiences by ensuring that nearly all of the firms operations coordinate with each other is why many corporations integrate a SCM system with their ____

ERP system

Why is it important for all organizations, no matter how small, to create and implement organizational information policies? - Organizational data are a critical asset; it is important to ensure its security. - Organizational data will be accessed through the web, and therefore need to conform to local laws. - The corporation will not be able to make predictions using the data unless there are policies surrounding the database's design. - The data will not have any value to the organization without policies surrounding its structure and who has access to it.

Organizational data are a critical asset; it is important to ensure its security.

data integrity (definition and when is it increased)

Reliability and accuracy of database aligned with organization goals. increased when data is centralized

information policy

States organization's rules for organizing, managing, storing, sharing information

Four Vs of Big Data

Volume, Velocity, Variety, Veracity

data mart

a data collection, smaller than the data warehouse, that addresses the needs of a particular department or functional area of the business

botnet

a group of compromised computers or mobile devices connected to a network under control of hacker

data warehouse

a place where databases are stored so that they are available when needed. repository of data used to make decisions used to facilitate analysis of data from multiple sources

data quality audit

a structured survey of the accuracy and level of completeness of the data in an information system

web usage mining

aka log mining. includes analysis of web access logs or the when, how, and frequency of website access

microsoft power BI

analytics software that allows for the processing, manipulation, and visualization of data

data quality audit function

audit recommends ways the organization can improve its data quality and reduce costs through increasing data consistency

In analyzing transactions, Walmart discovered that many people who buy Children's Tylenol in their stores also buy orange juice in the same transaction. They used this information to discount Children's Tylenol but raise the price of orange juice during flu season. What is the name of the approach Walmart used to discover this information?

big data

how are AI language models trained to understand language patterns?

by training on large volumes of text data

second-party data

collected directly by another entity and then sold for use

fields

collections of data organized in complex and meaningful ways by database admin in a database

field

column in a relational database

zombie (bot)

computers and IoT devices become this when hacker uses software to infect and they have control. A hacker uses software to infect computers, including laptops, desktops, tablets, and Internet of Things (IoT) devices, turning each computer into a zombie

_____ involves identifying errors in data sets and removing/correcting these errors to ensure the data is accurate - data organization - data governance - data audits - data scrubbing

data scrubbing

analytic platform

designed to assist large data driven companies in the analysis and interpretation of organizational data at high speeds provide info abt: customer, sales and marketing, social media, cybersecurity, plant and facilities analytics

NoSQL databases (nonrelational)

designed to manage large data sets across many platforms and have ability to analyze structured and nonstructured data (different servers). useful in creating queries from social media

web mining

discovery and analysis of useful patterns and information from the WWW

Big Data

encompasses all of the analysis tools and processes related to applying and managing large volumes of data. help better understand trends, patterns and preferences in data

which dimension of ethical behavior in the digital age includes the question of how much time employees are allowed to spend browsing social media?

establishing standards

predictive analytics

focuses on understanding, predicting, and planning for future events

accessing databases via web

global connectivity, requires little change to existing structure, customers can access to view offerings or inventory levels

social engineering

hackers use their social skills to trick people into revealing access credentials or other valuable information

prescriptive analytics

help determine best course of action and is considered to be the most advanced form of data analytics

Businesses use business intelligence (BI) systems to ___.

help them make decisions that are informed by business data and facts

what does the general data protection regulation (GDPR) regulate?

how companies protect personal data

web structure mining

includes analysis of hyperlinks, nodes, and related web pages

web content mining

includes extraction of info from web pages/docs, including text, images, videos, and interactives

Site Visibility

includes how/when the site surfaces when queries are executed in search engines

Site Accessibility

includes the structure of websites and pages to ensure device/platform access and scalability. making info available to users with physical and cognitive limitations

Data centralization is critical for increasing data ________.

integrity

Primary Key

key that must contain unique value

a type of AI that uses data and algorithims to create learning is called ____ learning. algorithims that are developed are designed to execute specific tasks

machine

generative adversarial network

machine learning model that uses two neural networks. designed to compete against each other to create artificial instances of data that are interpreted as real data

primary effect of truncating y-axis in data visualization

making data differences seem smaller than they are

In contrast to computerized systems, traditional file management systems can create issues with ______. - organization, repetition, and lack of consistency - too many manual records, file folders, and papers - the organization of papers, files, and documents - the need for records, signatures, and workable systems

organization, repetition, and lack of consistency. each file is independent of another file in a traditional system

data governance

personnel, processes, and technology needed to oversee and secure an organization's data and data assets protect data from risk, misuse, regulatory noncompliance, and quality and cost issues should determine who, what, where, how

bullwhip effect

phenomenon that often occurs when small variations in consumer demand create amplified demand variations in supply chain. sophisticated SCM can reduct impact

Microsoft's analytics software that allows for the processing, manipulation, and visualization of data is called Microsoft ____ BI

power

data mining

process organizations use to find meaningful patterns and relationships within the data sets it has collected. yields probabilities and no exact answers a research and analysis technique in which data analysts employ mathematical tools and artificial intelligence (AI) to search large volumes of data and discover less-obvious patterns and trends

query

question or search for info in a database

analytic platforms

quickly gather and analyze specific organizational data to provide information that guides decision making

advantages of data quality audit

recommends ways the organization can improve its data quality and reduce costs through increasing data consistency

syntax

refers to a set of rules and guidelines that define a specific computer language.

site usability

refers to how easily website users can interact with the site

data administration

responsible for policies and procedures that are used to manage an organizations data. common tasks: development of info policies, data planning, database design, security, how internal and external users use data

record

row of info in a relational database. collection of related fields

descriptive analytics

seeks to uncover historical trends in data. what happened, what is occurring, what is the ROI

table

sheet in relational database

what are third party cookies?

small text files created by websites other than those visited by web customers

Database Management System (DBMS)

software program designed to organize data and administer different databases. allows management and manipulation of data in databases

third-party data

sold by an entity that didn't actually collect the data.

data type

specifies the data in a field such as text, numeric, or date/time

which program is typically limited to one user at a time

spreadsheet

relational database

stores and allows access to data objects that are related to one another

Most databases are composed of multiple ____, which are groups of assigned records and fields organized in rows and columns.

tables

relational databases organize data into ____ based on structured data groupings - forms - tables - reports - queries

tables

Latency

the amount of time taken by data to travel from devices to data center and back

Database Administrator (DBA)

the person responsible for coordinating, controlling, and managing the database. primary role: monitor database and ensure it functions when needed

database policies specifications:

they specify rules used, who has access, how data is collected, where it is distrubuted

(D)DoS: (distributed) denial-of-service attack

this type of attack takes place when hacker gains unauthorized access and control of network of computers connected to internet attack on a network designed to interrupt or stop traffic by flooding with too many requests DoS uses one device whereas DDoS used multiple

Cognitive Computing

use of computer models that are designed to simulate human thought. used in complex environments where solutions may be ambiguous

Data-driven decision making

use of facts, metrics, and data to guide strategic business decisions that align with organizational goals, objectives, and initiatives

SQL Query

use specific SQL statements to execute the query. translated by the rdbms to create input

SQL Statements

used for human interface and communication with relational databases. to answer questions about the database. standard language - user generated lines of code to answer questions against database - common commands: select, update, delete, create, drop

A leading manufacturer of fitness trackers partners with a large health insurance network. Insurance network members receive a discounted fitness tracker and financial rewards for setting and achieving tracked personal fitness goals. Which characteristic of the resulting Big Data would be most directly affected by a tracker software error that counted users' arm movements as steps? - veracity - volume - velocity - variety

veracity

which situation involves a computer ethics violation that you should report

you pass coworkers computer screen and see him surfing through child porn


Kaugnay na mga set ng pag-aaral

Employment law, Chapter 11 -Work-Life Conflicts and Other Diversity Issues

View Set

Chapter 11: The production Function

View Set

Writing Equations in Point-Slope and Slope-Intercept Form

View Set

MIC205 Exam 1 (modules 1,2,3) MISSING 3

View Set

RH124 Chapter 7: Controlling Access to Files

View Set

NFA 201- SmartBook Unit 4: How Food Becomes You

View Set