MIS Exam 2
how to tell sql to disregard whatever comes next
"--"
Which of the following is an example of what an information policy could specify? - A health insurance company stores data that patients self-report as inputs on its website, but does not link that data with information about the patient's search history. - An internal memo at a small corporation outlines how their policies meet local government requirements. - A large corporation grants access to salary information to the direct supervisors of employees and to members of the Human Resources department who administer payroll. - A user agreement on a website indicates that it will store the browsing history linked to the IP address for an indefinite amount of time and reserves the right to sell that information to interested parties.
- A health insurance company stores data that patients self-report as inputs on its website, but does not link that data with information about the patient's search history. - A large corporation grants access to salary information to the direct supervisors of employees and to members of the Human Resources department who administer payroll. - A user agreement on a website indicates that it will store the browsing history linked to the IP address for an indefinite amount of time and reserves the right to sell that information to interested parties.
Which of the following is an example of a web experience that could be improved by web mining? - A travel company wants to know what amenities people search for before booking a hotel for a vacation so that the company can increase the coverage of those amenities on their website. - A small online retailer has noticed that most people viewing products from its gaming pages browse for about 5 minutes and end up making purchases, but over 75 percent of people viewing products from its home goods pages leave within the first 30 seconds. It wants information on how the two pages are different. - A subscription learning app that targets kindergarten students wants to meaningfully update its lessons so that visually impaired children can use them. - A large company wants to know how many people purchased items from its site on the previous Black Friday to predict what this year's sales will be.
- A travel company wants to know what amenities people search for before booking a hotel for a vacation so that the company can increase the coverage of those amenities on their website. - A small online retailer has noticed that most people viewing products from its gaming pages browse for about 5 minutes and end up making purchases, but over 75 percent of people viewing products from its home goods pages leave within the first 30 seconds. It wants information on how the two pages are different. - A subscription learning app that targets kindergarten students wants to meaningfully update its lessons so that visually impaired children can use them.
Because many business executives desire to create a data-driven decision making culture, which 3 of the following are competencies organizations invest in to support DDDM? - Agility in analytics and data analysis - Building a data-driven community - Data proficiency - Increased investment in database servers.
- Agility in analytics and data analysis - Building a data-driven community - Data proficiency
Which of the following are advantages of cloud databases over a traditional database? - Provides increased local control of database features - Can be accessed through an application programming interface (API) - Can support both SQL and NoSQL databases - Are maintained by an external provider, such as Amazon or Oracle
- Can be accessed through an application programming interface (API) - Can support both SQL and NoSQL databases - Are maintained by an external provider, such as Amazon or Oracle
Because many business executives desire to create a data-driven decision making culture, which 3 of the following are competencies organizations invest in to support DDDM? - Data proficiency - Building a data-driven community - Agility in analytics and data analysis - Increased investment in database servers.
- Data proficiency - Building a data-driven community - Agility in analytics and data analysis
Which of these steps in the data mining process most likely involves the actual "mining" or "Knowledge Discovery in Data"? - Data gathering and preparation - Knowledge deployment - Problem definition - Model building and evaluation
- Model building and evaluation
Which of the following is an example of an organization analyzing predictive behavior with the goal of creating new offerings? More than one answer may be correct. - Target keeps track of how many shoppers visit their stores on Sundays. - DropBox tracks how many people subscribe to their services after viewing a specific marketing e-mail. - Netflix tracks what users who viewed all three seasons of Stranger Things also had in their queues. correct - An in-home healthcare provider tracks the hospital readmission rates of elderly people who live alone after they received care for falling in their homes.
- Netflix tracks what users who viewed all three seasons of Stranger Things also had in their queues. correct - An in-home healthcare provider tracks the hospital readmission rates of elderly people who live alone after they received care for falling in their homes.
Which of the following statements about computer viruses are true? - Viruses can destroy programs or alter the operations of a computer or network. - Computer viruses are relatively easy to detect - Mac computers are less susceptible to computer viruses - A computer virus is software that infects computers and is created using computer code.
- Viruses can destroy programs or alter the operations of a computer or network. - A computer virus is software that infects computers and is created using computer code.
5 essential aspects of analytical skills
- curiosity - understanding context - technical mindset - data design - data strategy
selecting the right data
- how will data be collected - where will you get data - what type of data - how much data - how much time do you have
characteristics of open data
- public must have access - must have access rights that allow reuse and redistribution - universally available so that anyone can use
Trends in Data Analytics (4)
- scalable AI - composable data - data fabric as function - data as core business function
which type of system is defined as one that helps make the sales process more efficient? - a decision making process management system - project management system - transaction processing system - inventory management system
- transaction processing system
6 step DDDM process
1. ask 2. prepare 3. process 4. analysis 5. share 6. act
4 steps to protect computers from natural disasters
1. business continuity plan 2. off-site cloud storage 3. maintenance of data inventory 4. geographic data redundancy
4 steps in a data quality audit
1. quality assessment (A) 2. data design (D) 3. quality transformation (T) 4. quality monitoring (M)
what percent of malicious attachments are masked as a microsoft office type file?
38%
what percent of cyberattacks are aimed at small businesses?
43%
what percent of attachments emailed daily are harmful for the recipient?
85%
what percent of cyberattacks launch with phishing email?
91%
relational database management system (RDBMS)
A collection of programs that manages a relational database. The RDBMS software translates a user's logical requests (queries) into commands that physically locate and retrieve the requested data. maintain info about objects, events, people, places. not graphical or narrative data
cyberattack
A deliberate misuse of computers and networks via the Internet that uses malicious code to modify the normal operations of a computer or network
parameter query
A query in which the user interactively specifies one or more criteria values.
action query
A query that adds, changes, or deletes multiple table records at a time.
crosstab query
A query that calculates a sum, average, count, or other type of total on records and then groups the results by two types of information: one down the left side of the datasheet and the other across the top.
Keystroke Logger
A type of spyware program that monitors keystrokes with the intent of stealing passwords, login IDs, or credit card information.
cybercrime
Any criminal action perpetrated primarily through the use of a computer examples: trojan horse virus, computer hacking, digital identity theft
first-party data
Data that has been collected internally by the organization
creating efficiences by ensuring that nearly all of the firms operations coordinate with each other is why many corporations integrate a SCM system with their ____
ERP system
Why is it important for all organizations, no matter how small, to create and implement organizational information policies? - Organizational data are a critical asset; it is important to ensure its security. - Organizational data will be accessed through the web, and therefore need to conform to local laws. - The corporation will not be able to make predictions using the data unless there are policies surrounding the database's design. - The data will not have any value to the organization without policies surrounding its structure and who has access to it.
Organizational data are a critical asset; it is important to ensure its security.
data integrity (definition and when is it increased)
Reliability and accuracy of database aligned with organization goals. increased when data is centralized
information policy
States organization's rules for organizing, managing, storing, sharing information
Four Vs of Big Data
Volume, Velocity, Variety, Veracity
data mart
a data collection, smaller than the data warehouse, that addresses the needs of a particular department or functional area of the business
botnet
a group of compromised computers or mobile devices connected to a network under control of hacker
data warehouse
a place where databases are stored so that they are available when needed. repository of data used to make decisions used to facilitate analysis of data from multiple sources
data quality audit
a structured survey of the accuracy and level of completeness of the data in an information system
web usage mining
aka log mining. includes analysis of web access logs or the when, how, and frequency of website access
microsoft power BI
analytics software that allows for the processing, manipulation, and visualization of data
data quality audit function
audit recommends ways the organization can improve its data quality and reduce costs through increasing data consistency
In analyzing transactions, Walmart discovered that many people who buy Children's Tylenol in their stores also buy orange juice in the same transaction. They used this information to discount Children's Tylenol but raise the price of orange juice during flu season. What is the name of the approach Walmart used to discover this information?
big data
how are AI language models trained to understand language patterns?
by training on large volumes of text data
second-party data
collected directly by another entity and then sold for use
fields
collections of data organized in complex and meaningful ways by database admin in a database
field
column in a relational database
zombie (bot)
computers and IoT devices become this when hacker uses software to infect and they have control. A hacker uses software to infect computers, including laptops, desktops, tablets, and Internet of Things (IoT) devices, turning each computer into a zombie
_____ involves identifying errors in data sets and removing/correcting these errors to ensure the data is accurate - data organization - data governance - data audits - data scrubbing
data scrubbing
analytic platform
designed to assist large data driven companies in the analysis and interpretation of organizational data at high speeds provide info abt: customer, sales and marketing, social media, cybersecurity, plant and facilities analytics
NoSQL databases (nonrelational)
designed to manage large data sets across many platforms and have ability to analyze structured and nonstructured data (different servers). useful in creating queries from social media
web mining
discovery and analysis of useful patterns and information from the WWW
Big Data
encompasses all of the analysis tools and processes related to applying and managing large volumes of data. help better understand trends, patterns and preferences in data
which dimension of ethical behavior in the digital age includes the question of how much time employees are allowed to spend browsing social media?
establishing standards
predictive analytics
focuses on understanding, predicting, and planning for future events
accessing databases via web
global connectivity, requires little change to existing structure, customers can access to view offerings or inventory levels
social engineering
hackers use their social skills to trick people into revealing access credentials or other valuable information
prescriptive analytics
help determine best course of action and is considered to be the most advanced form of data analytics
Businesses use business intelligence (BI) systems to ___.
help them make decisions that are informed by business data and facts
what does the general data protection regulation (GDPR) regulate?
how companies protect personal data
web structure mining
includes analysis of hyperlinks, nodes, and related web pages
web content mining
includes extraction of info from web pages/docs, including text, images, videos, and interactives
Site Visibility
includes how/when the site surfaces when queries are executed in search engines
Site Accessibility
includes the structure of websites and pages to ensure device/platform access and scalability. making info available to users with physical and cognitive limitations
Data centralization is critical for increasing data ________.
integrity
Primary Key
key that must contain unique value
a type of AI that uses data and algorithims to create learning is called ____ learning. algorithims that are developed are designed to execute specific tasks
machine
generative adversarial network
machine learning model that uses two neural networks. designed to compete against each other to create artificial instances of data that are interpreted as real data
primary effect of truncating y-axis in data visualization
making data differences seem smaller than they are
In contrast to computerized systems, traditional file management systems can create issues with ______. - organization, repetition, and lack of consistency - too many manual records, file folders, and papers - the organization of papers, files, and documents - the need for records, signatures, and workable systems
organization, repetition, and lack of consistency. each file is independent of another file in a traditional system
data governance
personnel, processes, and technology needed to oversee and secure an organization's data and data assets protect data from risk, misuse, regulatory noncompliance, and quality and cost issues should determine who, what, where, how
bullwhip effect
phenomenon that often occurs when small variations in consumer demand create amplified demand variations in supply chain. sophisticated SCM can reduct impact
Microsoft's analytics software that allows for the processing, manipulation, and visualization of data is called Microsoft ____ BI
power
data mining
process organizations use to find meaningful patterns and relationships within the data sets it has collected. yields probabilities and no exact answers a research and analysis technique in which data analysts employ mathematical tools and artificial intelligence (AI) to search large volumes of data and discover less-obvious patterns and trends
query
question or search for info in a database
analytic platforms
quickly gather and analyze specific organizational data to provide information that guides decision making
advantages of data quality audit
recommends ways the organization can improve its data quality and reduce costs through increasing data consistency
syntax
refers to a set of rules and guidelines that define a specific computer language.
site usability
refers to how easily website users can interact with the site
data administration
responsible for policies and procedures that are used to manage an organizations data. common tasks: development of info policies, data planning, database design, security, how internal and external users use data
record
row of info in a relational database. collection of related fields
descriptive analytics
seeks to uncover historical trends in data. what happened, what is occurring, what is the ROI
table
sheet in relational database
what are third party cookies?
small text files created by websites other than those visited by web customers
Database Management System (DBMS)
software program designed to organize data and administer different databases. allows management and manipulation of data in databases
third-party data
sold by an entity that didn't actually collect the data.
data type
specifies the data in a field such as text, numeric, or date/time
which program is typically limited to one user at a time
spreadsheet
relational database
stores and allows access to data objects that are related to one another
Most databases are composed of multiple ____, which are groups of assigned records and fields organized in rows and columns.
tables
relational databases organize data into ____ based on structured data groupings - forms - tables - reports - queries
tables
Latency
the amount of time taken by data to travel from devices to data center and back
Database Administrator (DBA)
the person responsible for coordinating, controlling, and managing the database. primary role: monitor database and ensure it functions when needed
database policies specifications:
they specify rules used, who has access, how data is collected, where it is distrubuted
(D)DoS: (distributed) denial-of-service attack
this type of attack takes place when hacker gains unauthorized access and control of network of computers connected to internet attack on a network designed to interrupt or stop traffic by flooding with too many requests DoS uses one device whereas DDoS used multiple
Cognitive Computing
use of computer models that are designed to simulate human thought. used in complex environments where solutions may be ambiguous
Data-driven decision making
use of facts, metrics, and data to guide strategic business decisions that align with organizational goals, objectives, and initiatives
SQL Query
use specific SQL statements to execute the query. translated by the rdbms to create input
SQL Statements
used for human interface and communication with relational databases. to answer questions about the database. standard language - user generated lines of code to answer questions against database - common commands: select, update, delete, create, drop
A leading manufacturer of fitness trackers partners with a large health insurance network. Insurance network members receive a discounted fitness tracker and financial rewards for setting and achieving tracked personal fitness goals. Which characteristic of the resulting Big Data would be most directly affected by a tracker software error that counted users' arm movements as steps? - veracity - volume - velocity - variety
veracity
which situation involves a computer ethics violation that you should report
you pass coworkers computer screen and see him surfing through child porn