music not music

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Inputs to the Analytic system:

- Market Research - Social Media - Census Data - Election Databases

3 TYPES OF CLOUD SERVICE

1. INFRASTRUCTURE AS A SERVICE 2. SOFTWARE AS A SERVICE 3. PLATFORM AS A SERVICE

A DBMS makes the: A) physical database available for different logical views. B) logical database available for different analytical views. C) physical database available for different relational views. D) relational database available for different physical views.

A

A VPN: A) is an encrypted private network configured within a public network. B) is more expensive than a dedicated network. C) provides secure, encrypted communications using Telnet.

A

In terms of the data relationships found by data mining, sequences refers to: A) events linked over time. B) patterns that describe a group to which an item belongs. C) occurrences linked to a single event. D) undiscovered groupings.

A

Instant messaging is a type of ________ service. A) chat B) cellular C) e-mail D) wireless

A

Specific security challenges that threaten the communications lines in a client/server environment include: A) tapping; sniffing; message alteration; radiation. B) hacking; vandalism; denial of service attacks. C) theft, copying, alteration of data; hardware or software failure. D) unauthorized access; errors; spyware

A

Which of the following devices collects data directly from the environment for input into a computer system? A) Sensor B) Touch screen C) Audio input D) Trackball

A

Which type of software provides more control over text and graphic placement in the layout of a page than word processing software? A) Desktop publishing software B) Spreadsheet software C) Graphics software D) Presentation software

A

With regard to relational​ databases, which of the following is false​? A. Each table must have a​ one-to-one relationship to another table. B. A foreign key can be duplicated. C. The​ entity-relationship diagram depicts the relationships among tables in a database. D. A primary key cannot be duplicated. E. A​ customer's name would not make a good primary key.

A

​______ is a set of applications that manages the activities and resources of a computer. A. System software B. Network software C. Platform software D. Management software E. Application software

A

​_________ is when a company transfers tasks of the firm to other firms that operate in​ low-wage countries, possibly reducing job opportunities within the U.S. A. Offshoring B. Outsourcing C. Contracting D. Labor relocation E. Delegating

A

​_________________ has been impacted by information systems as things like traditional guest comment cards are transformed into online guest comment cards. A. Marketing B. Accounting C. Finance D. Instructional technology E. Management

A

Business investments ought to be made for the good of the business, not for the sake of mere technology advancements. Therefore the main driver for Big Data analytics should be an alignment with the vision and the strategy and at any level-strategic, tactical, and operations. Which of the critical success factors for Big Data analytics is being described?

A clear business need

What is a data audit?

A data audit is a method using a survey to determine the accuracy of a data set. Data quality audits can be performed by surveying entire data files or samples from data files.

What does this describe: "Represented as a column in a database table that represents things like a person's first name, last name, and age"

A field is represented as a column in a database table; a field is a group of characteristics formed into a word, a group of words, or a complete number, such as a person's name or age.

What is used to link the supplier and part tables by entering SupplierID in the part table?

A foreign key is used to link tables. In the supplier table, supplier number is the primary key. When the field supplier number appears in the part table, it is called a foreign key.

Mainframe

A large, expensive, powerful computer that can handle hundreds and thousands of connected users simultaneously.

Client/Server Computing

A model for computing that splits processing between clients and servers on a network assigning functions to the machine most able to perform the function.

What is​ service-oriented architecture​ (SOA)?

A set of​ self-contained services that communicate with each other to create a working software application

________ describes the practices and technologies used to minimize the environmental effects of manufacturing and managing computing devices. A) Green computing B) Capacity planning C) On-demand computing D) Cloud computing E) Utility computing

A) Green computing

Companies use a​ _______ model to analyze the costs of obtaining and maintaining an IT system to determine if it is feasible to have the information system as internal or outsourced. A.TCO B.ITIL C.TRP D.feasibility study E.budget planning

A.TCO

CENTRALIZED PROCESSING

ALL PROCESSING IS ACCOMPLISHED BY ONE LARGE CENTRAL COMPUTER

APPLICATION SOFTWARE

APPLIES THE COMPUTER TO A SPECIFIC TASK FOR AN END USER SUCH AS PROCESSING AN ORDER OR GENERATING A MAILING LIST.

_______________________ is an example of a DBMS desktop system geared toward smaller business data needs.

Access

an example of a DBMS desktop system geared toward smaller business data needs:

Access

What is an example of DBMS desktop system geared toward smaller business data needs?

Access; Microsoft Access is a DBMS for desktop systems, whereas DB2, Oracle Database, and Microsoft SQL Server are DBMS for large mainframes and midrange computers. MySQL is a popular open-source DBMS. All of these products are relational DBMSs that support a relational database.

_____________ involves determining who is responsible for actions taken.

Accountability

_______________ involves determining who is responsible for actions taken.

Accountability

Total cost of ownership (TCO) model

All of the costs associated with the design, development, testing, implementation, documentation, training and maintenance of a software system. - Analyzes direct and indirect costs. - Hardware, software account for only about 20% of TCO. - Other costs: Installation, training, support, maintenance, infrastructure, downtime, space, and energy.

BYOD (Bring your own device)

Allowing employees to use their personal mobile devices in workplace.

What is entity another name for?

An entity is another name for a table in a relational database.

What is an entity-relationship diagram?

An entity-relationship diagram is a methodology for documenting a database illustrating the relationship between various entities in the database.

Declining communication costs and the Internet

An estimated 3 billion people worldwide have Internet access. As communication costs fall toward a very small number and approach zero, utilization of communication and computing facilities explodes.

High-performance and power-saving processors

Another way to reduce power requirements and hardware sprawl is to use more efficient and power-saving processors

What is a data dictionary?

As part of a DBMS, a data dictionary documents information about a database. The data dictionary describes the details about the database.

Attempting to determine when a computer hardware system will be maxed out is​ called:

Attempting to determine when a computer hardware system will be maxed out is​ called:

A network that spans a city, and sometimes its major suburbs as well, is called a: A) CAN. B) MAN. C) LAN. D) WAN

B

An example of phishing is: A) setting up a bogus Wi-Fi hot spot. B) setting up a fake medical Web site that asks users for confidential information. C) pretending to be a utility company's employee in order to garner information from that company about their security system. D) sending bulk e-mail that asks for financial aid under a false pretext.

B

Based on your reading of the examples in the chapter, what would be the best use of RFID for a business? A) Logging transactions B) Managing the supply chain C) Lowering network costs

B

Redirecting a Web link to a different address is a form of: A) snooping. B) spoofing. C) sniffing. D) war driving.

B

Technology, economy,​ politics, and global changes are typically classified best by which of the​ following? A. Key environment groups that most impact operational management teams B. ​Broad, general, external environment groups that influence an​ organization's strategy C. General internal groups within an​ organization's environment that influence competitive strategy D. Business unit groups that provide strategic input to the firm E. General groups of business objectives that are the basis for continual process improvement

B

Web browser software requests Web pages from the Internet using which protocol? A) URL B) HTTP C) DNS D) HTML

B

What is the understanding that most American and European privacy law is based​ on? A. Data Privacy Practices​ (DPP) B. Fair Information Practices​ (FIP) C. End User License agreement​ (EULA) D. Stop Online Piracy Act​ (SOPA) E. Digital Millennium Copyright Act​ (DMCA)

B

Which of the following is false about information​ systems? A. Management of information systems brings in behavioral issues in addition to technical issues. B. Customers and suppliers are considered important elements of the information system as they provide key data. C. Information systems is really information technology plus people and organizations. D. Computers are like hammerslong dashthey are not information systems but are used to create information systems. E. Information is created through the​ input, processing, and output activities of an information system.

B

Which of the following statements is not true about cloud computing? A) It consists of three types of services: cloud infrastructure, cloud platform, and cloud software. B) It removes the concern about data and systems security for businesses. C) It allows smaller firms to use resources previously unaffordable. D) It relies on the Internet as the platform for delivering services to users.

B

________ is free software created and updated by a worldwide community of programmers. A) An app B) Open-source software C) Cloud-based software D) A Web service

B

Software used to apply the computer to a specific task for an end user is called: A) system software. B) application software. C) data management software. D) network software. E) web services software.

B) application software.

In terms of the data relationships found by data mining, sequences refers to: A) undiscovered groupings. B) events linked over time. C) occurrences linked to a single event. D) patterns that describe a group to which an item belongs.

B) events linked over time.

To analyze the direct and indirect costs and determine the actual cost of specific technology implementations, you would use a: A) cost benefit analysis. B) total cost of ownership model. C) break-even point. D) capacity plan. E) return on investment model.

B) total cost of ownership model.

Which of the following statements is FALSE about business intelligence​ (BI) systems?

BI systems only support​ decision-making activities.

Concerning​ Porter's model and the​ Internet, which of the following is false​? A. Due to global​ information, customer bargaining power increases. B. With readily available pricing​ information, customer bargaining power increases. C. Due to technology​ requirements, the threat of new entrants decreases. D. The more suppliers a firm​ has, the more control a firm has over those suppliers. E. With new ways to meet​ needs, the threat of substitute products increases.

C

The type of logical database model that treats data as if they were stored in two-dimensional tables is the: A) two-tiered DBMS. B) pre-digital DBMS. C) relational DBMS. D) hierarchical DBMS.

C

Virtualization: A) allows one operating system to manage several physical machines. B) has enabled microprocessor manufacturers to reduce the size of transistors to the width of an atom. C) can boost server utilization rates to 70% or higher. D) allows smartphones to run full-fledged operating systems.

C

Which of the following statements about the Internet security is not true? A) The use of P2P networks can expose a corporate computer to outsiders. B) A corporate network without access to the Internet is more secure than one that provides access. C) VoIP is more secure than the switched voice network. D) Instant messaging can provide hackers access to an otherwise secure network.

C

Which of the following would you use to find out which Web sites with content related to database design were the most often linked to by other Web sites? A) Web usage mining B) Web server mining C) Web structure mining D) Web content mining

C

Which of the following database types would be best suited for storing multimedia? A) Open-source DBMS B) SQL DBMS C) Non-relational DBMS D) Cloud-based database

C) Non-relational DBMS

The primary storage technologies are: A) hard drives, removable drives, storage networks, and magnetic tape. B) flash drives, SSDs, storage networks and magnetic disks. C) storage networks, magnetic tape, magnetic disk, and optical disk. D) storage networks, magnetic disks, hard disks, and optical disks. E) hard drives, magnetic tape, magnetic disk, and optical disk.

C) storage networks, magnetic tape, magnetic disk, and optical disk.

In a student​ database, a collection of related attributes such as​ LastName, FirstName, and​ Student# creates​ a(n) _______________. A. database B. file C. entity D. record E. bit

C. entity

A​ _______________ uniquely represents a record or row. A. foreign key B. data key C. primary key D. cost key E. prime key

C. primary key

A ________ is special software that routes and manages communications on the network and coordinates networks resources. A) switch B) firewall C) server D) network operating system/NOS

D

A characteristic or quality describing an entity is called a(n): A) field. B) tuple. C) key field. D) attribute.

D

An industry-wide effort to develop systems that can configure, optimize, tune, and heal themselves when broken, and protect themselves from outside intruders and self-destruction is called: A) grid computing. B) utility computing. C) cloud computing. D) autonomic computing.

D

Apps: A) lower the cost of switching mobile platforms. B) are an example of open-source software. C) tie the user to a particular hardware platform. D) require the user to have an online connection.

D

The most basic business database is comprised of: A) three tables: for suppliers, parts, and sales. B) four tables: for customers, suppliers, parts, and sales. C) four tables: for customers, suppliers, sales, and employees. D) five tables: for customers, employees, suppliers, parts, and sales.

D

The most common type of electronic evidence is: A) voice-mail. B) spreadsheets. C) instant messages. D) e-mail.

D

The process of employing techniques to help a Web site achieve a higher ranking with the major search engines is called: A) VPN. B) IAB. C) SEM. D) SEO.

D

The telephone system is an example of a ________ network. A) peer-to-peer B) wireless C) packet-switched D) circuit-switched

D

The​ _______________ has helped level the playing field for companies wanting to do business globally. A. database B. transnational C. LAN D. Internet E. systems analyst

D

A​ _______________ is represented as a column in a database table that represents things like a​ person's first​ name, last​ name, and age. A. byte B. bit C. file D. field E. record

D. field

A​ _______________ is used to link the SUPPLIER and PART tables by entering SupplierID in the PART table. A. cost key B. primary key C. data key D. foreign key E. prime key

D. foreign key

Among the five identified moral dimensions of the information​ age, which addresses the question of liability related to information​ systems? A.Information rights and obligations B.Property rights and obligations C.Quality of life D.Accountability and control E.System quality

D.Accountability and control

What is a widely used form of distributed​ processing? A. W.A.D.C. Wide Area Distributed Computing B.Centralized Processing C.Parallel Processing D.Client/Server Computing E.​Multi-Core Processing.

D.Client/Server Computing

What is the understanding that most American and European privacy law is based​ on? A.Data Privacy Practices​ (DPP) B.End User License agreement​ (EULA) C.Digital Millennium Copyright Act​ (DMCA) D.Fair Information Practices​ (FIP) E.Stop Online Piracy Act​ (SOPA)

D.Fair Information Practices​ (FIP)

If you return to a website that welcomes you back by​ name, you likely have small text file on your computer with information about your prior visits called a​ ___________. A.cake B.network C.customization D.cookie E.malware

D.cookie

In​ client/server computing, a client normally consists of​ a: A.smartwatch. B.mainframe. C.supercomputer. D.desktop computer. E.smartphone.

D.desktop computer.

The use and regulation of trade​ secrets, copyrights, and patents is the U.S.​ government's attempt to protect​ ________. A.consumer rights B.government secrets C.capitalism D.intellectual property E.consumer data

D.intellectual property

What is a specific software for​ creating, storing,​ organizing, and accessing data from a​ database?

DBMS

what is a specific software for creating, storing, organizing, and accessing data from a database?

DBMS

SERVER

DESIGNED TO SUPPORT COMPUTER NETWORK, ENABLING USERS TO SHARE FILES AND OTHER NETWORK RESOURCES.

What does Data Management Software do with business data regarding​ inventory, customers, and​ vendors?

Data Management Software​ organizes, manages, and processes business data

What does Data Management Software do with business data regarding​ inventory, customers, and​ vendors?

Data Management Software​ organizes, manages, and processes business data.

__________________ positions are in high demand and offered with very high salaries and very high expectations.

Data Scientist

___________________ is a term used by companies looking to detect and correct​ incomplete, redundant, or incorrect data.

Data scrubbing

A formal name to describe​ self-regulating policies is called​ _____________. A. due process B. accountability C. liability D. privacy E. safe harbor

E

Among the five identified moral dimensions of the information​ age, which addresses the question of liability related to information​ systems? A. Information rights and obligations B. Quality of life C. System quality D. Property rights and obligations E. Accountability and control

E

An organization interested in the most popular open source DBMS on the market would adopt​ _____ SQL. A. Oracle Database B. Access C. DB2 D. Server E. MySQL

E

If you return to a website that welcomes you back by​ name, you likely have small text file on your computer with information about your prior visits called a​ ___________. A. network B. malware C. cake D. customization E. cookie

E

In a relational database generalized categories represent​ a(n) __________, and each category has characteristics called​ ______________. A. ​attribute; entities B. ​relationship; entities C. primary​ key; attributes D. primary​ key; index E. ​entity; attributes

E

What are the four elements of critical​ thinking? A. Dismissing doubt and continuing​ judgment, Focusing on a single​ perspective, Letting experience​ guide, and Being aware of personal limitations B. Maintaining doubt and suspending​ judgment, focusing on one​ perspective, testing alternatives and letting experience​ guide, and Being aware of organizational and personal limitations C. Maintaining​ doubt, suspending​ judgment, testing​ alternatives, and being aware of organizational limitations D. Problem​ Identification, Solution​ Design, Solution​ Evaluation, and Choice Implementation E. Maintaining doubt and suspending​ judgment, Being aware of different​ perspectives, Testing alternatives and letting experience​ guide, and Being aware of organizational and personal limitations

E

As part of a​ DBMS, a(n)​ _________ documents information about a database. A. entity relation diagram B. attribute listing C. data definition D. data manipulation language E. data dictionary

E. data dictionary

____________________________because Big Data and self-service business intelligence go hand in hand. Organizations with Big Data are over 70 percent more likely than other organizations to have BI/BA projects that are driven primarily by the business community, not by the IT group. Across a range of uses - from tackling new business problems, developing entirely new products and services, finding actionable intelligence in less than an hour, and blending data from disparate sources - Big Data has fired the imagination of what is possible through the application of analytics.

Empower

Which of the following refers to the capability of a​ computer, product, or system to add additional​ features?

Expandability

Surprisingly, laws guiding American privacy law are based on a 1973 report called the _____________.

FIP

Surprisingly, laws guiding American privacy law are based on a 1973 report called the:

FIP

Surprisingly, laws guiding American privacy law are based on a 1973 report called the​ _____________.

FIP

What is the understanding that most American and European privacy law is based​ on?

FIP

United States privacy laws are largely based on the ______________________ report

Fair Information Practices

United States privacy laws are largely based on the? _________________ report

Fair Information Practices

United States privacy laws are largely based on the​ _________________ report.

Fair Information Practices

What is the understanding that most American and European privacy law is based on?

Fair Information Practices (FIP)

What is the understanding that most American and European privacy law is based​ on?

Fair Information Practices​ (FIP)

A Web server is a dedicated computer that delivers Web pages to client computers.

False

A data warehouse is typically comprised of several smaller data marts.

False

Authorization refers to the ability to know that a person is who he or she claims to be.

False

Central large mainframe computing has largely replaced client/server computing.

False

Circuit switching makes much more efficient use of the communications capacity of a network than does packet switching.

False

Client/server computing is the most widely used form of centralized processing.

False

DoS attacks are used to destroy information and access restricted areas of a company's information system.

False

HTML5 is the latest evolution of HTML, and is designed to make it much easier to embed third-party add-ons, such as Flash animations, in web pages.

False

RFID technology is being gradually replaced by less costly technologies such as WSNs.

False

Today, most system and application software is custom built by in-house programmers.

False

Client/server computing:

Form of distributed computing Splits processing between clients and servers; both are on the network Clients: user point of entry for the required function and is normally a desktop or computer Servers: provided client with services; stores and processes shared data and perform network management activities; data, processing power and machine

INPUT DEVICES

GATHER DATA AND COLLECT THEM INTO ELECTRONIC FORM

PC, Server, and Mobile Operating Systems

GUIs (Graphical User interface) Multi-touch PC operating systems -Windows, MAC, UNIX, Linux Mobile operating system -Chrome, android, ioS

Where is CERN located?

Geneva, Switzerland

The ethical principle that calls for hypothetically walking in the other person's shoes before making a decision is called the

Golden Rule

Chrome OS

Google's light weight computer operating system for users who do most of their computing on the Internet; runs on computers ranging from netbooks to desktop computers.

A Data scientist is considered a Big Data __________________.

Guru

Which government act was enacted in 1996 to protect your medical records?

HIPAA

COMPUTER SOFTWARE

INCLUDES BOTH SYSTEM AND APPLICATION SOFTWARE.

GRID COMPUTING

INVOLVES CONNECTING GEOGRAPHICALLY REMOTE COMPUTERS INTO A SINGLE NETWORK AND COMBINING THE COMPUTATIONAL POWER OF ALL THE COMPUTERS ON THE GRID

What is a key field?

In a database, a key field is used to uniquely identify each record for retrieval or manipulation.

Which of the following is FALSE about the digital divide in the U.S

It is based only on having fair access to digital technology.

____ is a feature of political systems in which laws permit individuals to recover damages done to them by the actions of others.

Liability

_____ is a feature of political systems in which laws permit individuals to recover damages done to them by the actions of others.

Liability

_____________ involves examining laws on the books that provide individuals and companies the opportunity to recover damages caused by others.

Liability

___________________ involves examining laws on the books that provide individuals and companies the opportunity to recover damages caused by others

Liability

____________________ involves examining laws on the books that provide individuals and companies the opportunity to recover damages caused by others.

Liability

________________involves examining laws on the books that provide individuals and companies the opportunity to recover damages caused by others.

Liability

Which of the following is an example of a popular open source operating​ system?

Linux

__________ is an operating system created by the open source community.

Linux

A​ ________ is a​ large-capacity, high-performance computer that can process large amounts of data very rapidly.

Mainframe

The data _______________ language would allow you to retrieve information from the database (i.e., using the SELECT, FROM, WHERE commands).

Manipulation

____________________is a technique popularized by Google that distributes the processing of very large multi-structured data files across a large cluster of ordinary machines/computer processors.

MapReduce

Which is NOT a way in which NORA technology can create a detailed dossier of a person?

Medical records

Which is NOT a way in which NORA technology can create a detailed dossier of a? person?

Medical records

Which is NOT a way in which NORA technology can create a detailed dossier of a​ person?

Medical records

Transnational firms have no single national headquarters but instead have many regional headquarters and perhaps a world headquarters. What is the transnational strategy characterized​ by?

Nearly all the​ value-adding activities are managed from a global perspective without reference to national borders. Your answer is correct.B.

Technology for running a company's internal networks, services from telephone service companies, and technology for running Web sites linking to other computer systems through the Internet are examples of which component of IT infrastructure?

Networking and telecommunications technology

Consumerization of IT

New information technology emerges in consumer markets first and spreads to business organizations. Forces businesses and IT departments to rethink how IT equipment and services are acquired and managed

__________ involves the process of creating small, stable, yet flexible data structures from complex groups of data when designing a relational database.

Normalization

What is normalization?

Normalization involves the process of creating small, stable, yet flexible data structures from complex groups of data when designing a relational database.

Relational tables need to be ______________ to help avoid duplicate data.

Normalized

What does "NoSQL" stand for?

Not only SQL

LEGACY SYSTEMS

OLDER TPS'S THAT ARE STILL USED TO CUT DOWN ON OPERATING COST

DATA MANAGEMENT SOFTWARE

ORGANIZES, MANAGES, AND PROCESSES BUSINESS DATA CONCERNED WITH INVENTORY, CUSTOMERS AND VENDORS.

PERIPHERAL DEVICES

OUTSIDE THE MAIN COMPUTER SYSTEM UNIT INCLUDES INPUT, OUTPUT AND STORAGE

Multitiered Client/Server Architectures

Often called N-Tier, the work of the entire network is balanced over several different levels of servers, depending on the kind of service being requested.

Where is a cookie that is created during a Web site visit stored?

On the visitor's computer

Which type of software is created and updated by a worldwide community of programmers and is available for free?

Open source

Which type of software is created and updated by a worldwide community of programmers and is available for​ free?

Open source

CLOUD COMPUTING

PROVIDED AS A SHARED POOL OF VIRTUALIZED RESOURCES OVER THE INTERNET

NETWORKING AND TELECOMMUNICATIONS

PROVIDES DATA, VOICE, AND VIDEO CONNECTIVITY TO EMPLOYEES, CUSTOMERS AND SUPPLIERS.

SERVER

PROVIDES THE CLIENTS WITH THE SERVICES

Green Computing

Practices and technologies for designing, making, using, and disposing of computer hardware to reduce environmental impact. Key priority is power reduction IT in United States provides 2% of U.S. power demand and 2% of world's greenhouse gases (BITCOIN) - A piece of info over servers is given out and received as a currency for doing things such as solving math equations online.

What is it called when companies combine data from multiple sources and create electronic dossiers of detailed information on individuals?

Profiling

Among the five identified moral dimensions of the information age, which addresses the question "which cultural values are supported by information technology?"

Quality of life

Among the five identified moral dimensions of the information​ age, which addresses the question​ "which cultural values are supported by information​ technology?"

Quality of life

A) _______________ is the formal name for questioning or making a data request from the database.

Query

What is a formal name for questioning or making a data request from the database?

Query; a query is a request for data from a database. In most DBMS, you would type a series of statements to access data.

Web Services

Refer to set of loosely coupled software components that exchange information with each other using universal web communication standards and languages.

______________ databases are by far the most popular type of database on the market today.

Relational

_______________ databases are by far the most popular type of database on the market today.

Relational

CLIENT/SERVER COMPUTING

SPLITS PROCESSING BETWEEN CLIENTS AND SERVERS

Software Packages and desktop productivity tools

Software suites: microsoft office Web browser Word processing software:

Technology standards

Specifications that establish the compatibility of products and the ability to communicate in a network. Unleash powerful economies of scale and result in price declines as manufacturers focus on the products built to a single standard.

The most popular data manipulation language and method to "question" a database is called ______________.

Structured Query Language

The most popular data manipulation language and method to​ "question" a database is called​ ______________.

Structured Query Language

DISTRIBUTED PROCESSING

THE USE OF MULTIPLE COMPUTERS LINKED BY A COMMUNICATIONS NETWORK FOR PROCESSING

Two-Tiered Client/Server Architecture

The simplest client/server network consists of a client computer networked to a server computer, with processing split between the two types of machines.

Which is TRUE of a multi-tiered network?

The work of the entire network is balanced over several levels of servers.

Case 6.7 Why is stream analytics becoming more popular?

Threat assessments and security monitoring

Why do organizations perform data quality audits?

To determine accuracy and level of completeness of data.

A DBMS is special software for creating, storing, organizing, and accessing data from a database.

True

A computer language translation program is an example of system software.

True

A data warehouse may include information from legacy systems.

True

Sniffers enable hackers to steal proprietary information from anywhere on a network, including e-mail messages, company files, and confidential reports.

True

Software localization refers to the entire process of converting software to operate in a second language.

True

Today, most Americans connect to the Internet through broadband connections at speeds up to 15 Mbps.

True

Total cost of ownership components include costs for downtime, training, and support.

True

Two computers using TCP/IP can communicate even if they are based on different hardware and software platforms.

True

Viruses can be spread through e-mail.

True

VoIP technology delivers voice information in digital form using packet switching.

True

Web 3.0 is a collaborative effort to add a layer of meaning to the existing Web in order to reduce the amount of human involvement in searching for and processing Web information.

True

When errors are discovered in software programs, the sources of the errors are found and eliminated through a process called debugging.

True

Wireless networks are vulnerable to penetration because radio frequency bands are easy to scan.

True

XML provides a standard format for data exchange, enabling Web services to pass data from one process to another.

True

Zero defects cannot be achieved in larger software programs because fully testing programs that contain thousands of choices and millions of paths would require thousands of years

True

NANOTECHNOLOGY

USE INDIVIDUAL ATOMS AND MOLECULES TO CREATE COMPUTER CHIPS

CLIENT

USER POINT

QUANTUM COMPUTING

USES QUANTUM PHYSICS TO REPRESENT DATA AND PERFORM OPERATIONS OF THE DATA

Optical Drives

Use laser technology to store large quantities of data, including sounds and images, in a highly compact form CD-ROM, CD-R (R for readable), CD-RW (ReWriteable), DVD, DVD-RW Magnetic Tape (old as ****. Looks like old movies) Stores data sequentially and is slow compared to the speed of other storage media

Quantum computing

Use of principles of quantum physics to represent data and perform operations on the data, with the ability to be in many different states at once and to perform many different computations simultaneously. Dramatic increases in computing speed.

_____________________ -This is obviously the most common trait of Big Data. Many factors contributed to the exponential increase in data volume, such as transaction-based data stored through the years, text data constantly streaming in from social media, increasing amounts of sensor data being collected, automatically generated RFID and GPS data, and so forth.

Volume

Which Microsoft operating system specifically supports mobile features such as multitouch and mobile​ devices?

Windows 10

Big Data by itself, regardless of the size, type, or speed, is _________________ unless business users do something with it that delivers value to the organization.

Worthless

______ uniquely allows for​ presentation, communication, and storage of data. It is often used to transfer data from one organization to another.

XML

___________ uniquely allows for​ presentation, communication, and storage of data. It is often used to transfer data from one organization to another.

XML

____________ uniquely allows for presentation, communication, and storage of data. It is often used to transfer data from one organization to another.

XML

​___________ uniquely allows for​ presentation, communication, and storage of data. It is often used to transfer data from one organization to another.

XML

Mashups

Zip realty uses google maps and zillow.com

Data definition is __________.

a DBMS capability that specifies the structure and content of the database

In a database, __________ is used to uniquely identify each record for retrieval or manipulation.

a key field

Which of the following is not one of the major IT infrastructure components?

a mainframe

Taking application components from various​ resources, ________ mixes and matches to create a​ new, customized Internet experience.

a mashup

taking application components from various resources, _____________ mixes and matches to create a new, customized internet experience:

a mashup

Tablet Computers

a portable computing device featuring a touch- screen that can be used as a writing or drawing pad.

In a database, each row represents __________.

a record

what is a service-oriented architecture (SOA)?

a set of self-contained services taht communicate with each other to create a working software application

Service Level Agreement (SLA)

an agreement between the IT organization and the customer that details the service(s) to be provided; the IT organization could be an internal IT department or an external IT service provider, and the customer is the business.

Microcomputers

are the most common types of computers today. The term originally came from the fact that these were the first computers to have their processor on a single chip.

The term​ ____________ describes data sets like​ Google's database that are too big for traditional DBMS to handle.

big data

What is the term for data sets with volumes so huge that they are beyond the ability of typical DBMS to​ capture, store, and​ analyze?

big data

Domestic exporter strategy is characterized by which of the​ following?

centralization

what is a widely used form of distributed processing?

client/ server computing

What is a widely used form of distributed​ processing?

client/server computing

An unethical, but not illegal act committed using a computer is called _____________.

computer abuse

An unethical, but not illegal act committed using a computer is called:

computer abuse

An​ unethical, but not illegal act committed using a computer is called​ _____________.

computer abuse

Putting a key logger on your boss's computer without permission would be considered a(n) ___________.

computer crime

Putting a key logger on your boss's computer without permission would be considered a(n):

computer crime

Putting a key logger on your​ boss's computer without permission would be considered​ a(n) ___________. commission of illegal acts by using a computer or against a computer system

computer crime

Large mainframes, servers, desktop and laptop computers, and mobile devices for accessing corporate data and the Internet are examples of which component of IT infrastructure?

computer hardware

If you return to a website that welcomes you back by name, you likely have small text file on your computer with information about your prior visits called a ___________.

cookie

If you return to a website that welcomes you back by name, you will likely have small text file on your computer with information about your prior visits is called a:

cookie

Which of the following functions of an organization is responsible for information policy, as well as for data planning, data dictionary development, and monitoring data usage in the firm?

data administration

A store printing out receipts based on your buying patterns is related to the​ trend, ___________, where technology trends raise ethical issues.

data analysis

A store printing out receipts based on your buying patterns is related to the trend, ___________, where technology trends raise ethical issues

data analysis advances

A store printing out receipts based on your buying patterns is related to the? trend, ___________, where technology trends raise ethical issues

data analysis advances

A store printing out receipts based on your buying patterns is related to the​ trend, ___________, where technology trends raise ethical issues.

data analysis advances

A location specified to include IT infrastructure such as​ storage, security, and system backup is called​ a:

data center

actually works with the databases, creating relations between tables and implementing controls that would minimize data issues and provide security for the data:

database administration

Output Devices

display data after they have been processed (monitor, printers)

Frustrated customers angry about a site not working is an example of which IT cost of ownership​ (TCO)?

downtime

frustrated customers angry about a site not working is an example of which IT cost of ownership (TCO)?

downtime

In a student​ database, a collection of related attributes such as​ LastName, FirstName, and​ Student# creates​ a(n) _______________.

entity

United States privacy laws are largely based on the​ _________________ report.

fair information practices

A​ _______________ is represented as a column in a database table that represents things like a​ person's first​ name, last​ name, and age.

field

Nearly 80 percent of the Internet searches conducted use​ ___________, which makes it the largest data repository in history.

google

Connecting geographically remote computers in a single network to create a "virtual supercomputer" is called ________.

grid computing

Connecting geographically remote computers in a single network to create a​ "virtual supercomputer" is called​ ________.

grid computing

the most popular open source program that allows for storage of big data

hadoop

A multinational strategy is often described where financial management and strategy operate out of a central​ __________________.

home base

Numerous companies choose​ a(n) _________ model where they retain some infrastructure ​in-houselong dash—primarily their critical systemslong dash—with the​ less-essential systems outsourced to a third party.

hybrid cloud

Numerous companies choose​ a(n) _________ model where they retain some infrastructure ​in-house—primarily their critical systems—with the​ less-essential systems outsourced to a third party.

hybrid cloud

numerous companies choose a(n) ___________ model where they retain some infrastructure in house - primarily their critical systems with the less essential systems outsourced to a third party

hybrid cloud

Which operating system does the iPad use?

iOS

Which operating system does the iPad​ use?

iOS

What is the first step you should take in managing data for a​ firm?

identify the data needed to run the business.

The organization's rules for sharing, disseminating, acquiring, standardizing, classifying, and inventorying information are specified by __________.

information policies

The​ _______________ has helped level the playing field for companies wanting to do business globally.

internet

XML (Extensible Markup Language)

is a markup language that fixed several html deficiencies and is commonly used for program to program interfaction over the web

HTML (Hypertext Markup Language)

is a page description language for specifying how text, graphics, video, and sound are placed on a web page and for creating dynamic links to other web pages and objects.

Public Cloud

is owned and maintained by a cloud service provider and made available to the general public or industry group

Public Cloud

is owned and maintained by a cloud service provider, such as Amazon Web Service, and made available to the general public or industry group.

Virtualization

is the process of presenting a set of computing resources (Such as computing power or data storage) so that they can all be accessed in ways that are not restricted by physical configuration or geographic location. - Allows single physical resource to act as multiple resources (i.e., run multiple instances of OS) - Reduces hardware and power expenditures - Facilitates hardware centralization

Which of the following is false concerning the social and cultural issues in regard to the prevalence of information​ systems?

it is an equalizer for social classes and minorities

A computer _________________ causes the most repetitive stress injuries.

keyboard

A computer​ _________________ causes the most repetitive stress injuries.

keyboard

GUIs (Graphical User interface)

makes extensive use of icons, buttons, bars, and boxes to perform tasks

Taking application components from various​ resources, ________ mixes and matches to create a​ new, customized Internet experience.

mashup

ZipReality, which uses both Zillow and Google​ Maps, is an example of​ a:

mashup

Which is NOT a way in which NORA technology can create a detailed dossier of a​ person?

medical records

Which of the following is the best example of a software​ suite?

microsft office 2013

The popular quality control​ model, six sigma specifically calls for 3.4 defects per​ ____________ as a measure of quality.

million

When is business process management​ (BPM) concluded?

never

Porter's competitive force concerned about barriers to entry​ is/are _______________.

new market entrance

When thinking about downloading and using a photo off the​ Internet, don't forget the ethical​ __________ lunch rule.

no free

When thinking about downloading and using a photo off the Internet, don't forget the ethical ____________rule.

no free lunch

Relational tables need to be​ ______________ to help avoid duplicate data.

normalized

A(n) __________ key uniquely identifies a row or record in a table.

primary

A​ _______________ uniquely represents a record or row.

primary key

a _______________ uniquely represents a record or a row

primary key

Quality described as adhering to specific specifications with minimal variations would be through the lens of​ a:

producer

Professional organizations like the American Medical Association have​ _____________________, which includes specific conduct guidelines such​ as, do no harm.

professional code of conduct

What is it called when companies combine data from multiple sources and create electronic dossiers of detailed information on individuals?

profiling

In the information​ age, the obligations that individuals and organizations have concerning rights to intellectual property fall within the moral dimension of​ ________

property rights and obligations

Case 6.2 In the investment bank case study, the major benefit brought about by the supplanting of multiple databases by the new trade operational store was providing

real-time access to trading data

In a student​ database, a row that describes the top​ student, including his or her​ LastName, FirstName, and​ StudentNumber, is an example of a​ ______________.

record

google apps is a popular cloud-based:

software as a service

risk aversion principle

take the action that produces the least harm or the least potential cost

when thinking about managing and controlling data within a company, which of the following is false?

the actual physical database is never created by the database administration of a company

Are we Relying too much on computers to think for us?

two cognitive failures undermine performance: complacency- over confidence in the computer's ability- causes attention to wander bias- over confidence in the data we receive- causes us to disregard outside sources

Distributed processing

use of multiple computers linked by a communications networks for processing

Nanotechnology

uses individual atoms and molecules to create computer chips and other devices that are thousands of times smaller than current technologies permit.

Which of the following is not a step a firm might take to make sure they have a high level of data quality?

using data mining

Configuring a server to run a variety of instances of an operating system to appear like many different machines to the end user is an example​ of:

virtualization

​_____ is the process of presenting computing resources that are accessed in ways that appear to not be restricted by physical configuration or geographic location.

virtulization

The Apple watch is a new type of mobile digital computing​ called:

wearable computing

Developing effective apps is considered a critical element to successful adoption of:

wearable computing.

Developing effective apps is considered a critical element to successful adoption​ of:

wearable computing.

The Apple watch is a new type of mobile digital computing called:

wearable computing.

The Apple watch is a new type of mobile digital computing​ called:

wearable computing.

Another common name for a web beacon is a __________which tracks user activities.

web bug

f a firm wants to learn more about its​ users, behaviors, and marketing​ effectiveness, they might turn to​ ____, relying on the huge amount of data available through the Internet.

web mining

if a firm wants to learn more about its users, behaviors, and marketing effectiveness, they might turn to ______________, relying on the huge amount of data available through the internet

web mining

Which Microsoft operating system specifically supports mobile features such as multitouch and mobile​ devices?

windows 10

which Microsoft operating system specifically supports mobile features such as multi touch and mobile devices?

windows 10

What is a widely used form of distributed​ processing?

​Client/Server Computing

In a relational database generalized categories represent​ a(n) __________, and each category has characteristics called​ ______________.

​entity; attributes

Case 6.2 What were their challenges?

- Data volumes and variability overwhelmed the legacy system - Unable to deliver real-time alerts in desired timeframe

WHAT 5 COMPONENTS IS IT'S INFRASTRUCTURE MADE OF?

1. HARDWARE 2. SOFTWARE 3. DATA MANAGMENT 4. SERVICES 5. NETWORKING

The utilitarian principle; assumes values are prioritized in an order and the consequences of various courses of action are understood.

4.2.2- Which ethical rule below is combined with its proper description?

Professional codes of conduct

4.2.3- Professional organizations like the American Medical Association have __________, which includes specific conduct guidelines such as, do no harm.

Utilitarian principle

4.2.4- Andrew analyzes an ethical issue at work, evaluates the outcomes of various options, and chooses the one that achieves the greatest value. Which ethical principle is Andrew applying?

False- It is an equalizer for social classes and minorities

4.4.4- Which of the following is false concerning the social and cultural issues in regard to the prevalence of information systems?

Business Process Management​ (BPM) includes​ _________ steps designed to continuously improves the processes of an organization. A. an undetermined number of B. 4 C. 3 D. 5 E. 6

5

Porter's competitive forces model includes​ _________ forces that impact every organization.

5

Microsoft Office 2013

5.3.1- Which of the following is the best example of a software suite?

A set of self-contained services that communicate with each other to create a working software application

5.3.2- What is a service-oriented architecture (SOA)?

Windows 10

5.3.2- Which Microsoft operating system specifically supports mobile features such as multi-touch and mobile devices?

Android

5.3.3- _______ is an open source operating system for mobile devices.

A Mashup

5.3.4- Taking application components from various resources, _______ mixes and matches to create a new, customized Internet experience.

Primary Key

6.1.2- a _________ uniquely represents a record or row.

data AUDIT

6.4.3- A data ___ is a method using a survey to determine the accuracy of a data set.

The process of streamlining data to minimize redundancy and awkward many-to-many relationships is called: A) normalization. B) data scrubbing. C) data cleansing. D) data administration.

A

Which protocol is the Internet based on? A) TCP/IP B) FTP C) packet-switching D) HTTP

A

Web Server

A computer connected to the Internet used to store Web page documents.

Multitouch

A feature on tablets that senses when a user touches more than one location at a time. It is commonly used for pinch and spread gestures.

What is a non-relational database management system?

A non-relational database management system is a system for working with large quantities of structured and unstructured data that would be difficult to analyze with a relational model.

Which of the following is FALSE about techno stress?

Affected people start to behave like computers, devoid of emotions.

What would an organization use to specify rules for sharing, disseminating, acquiring, standardizing, classifying, and inventorying information?

An information policy; an information policy identifies who can share information, where it can be distributed, and who is responsible for updating and maintaining the information.

What is an intrusion detection system?

An intrusion detection system is a computer program that senses when another computer is attempting to scan the disk or otherwise access a computer.

Windows

An operating system used by the majority of PCs.

Android

An operating system used on mobile devices that is based on the Linux OS and supported by Google.

______________________ is an open source operating system for mobile devices.

Android

___________________________ is an open source operating system for mobile devices.

Android

​___________________________ is an open source operating system for mobile devices.

Android

Wintel PC

Any computer that uses Intel microprocessors (or compatible processors) and a Windows operating system.

Software Outsourcing

Application Service Provider (firm that delivers a software application or access to by charging a fee) or Internet Business Services (provide web based support by providing order processing, billing and customer relationship management), including offshore outsourcing.

Data mining is a tool for allowing users to: A) quickly compare transaction data gathered over many years. B) find hidden relationships in data. C) obtain online answers to ad hoc questions in a rapid amount of time. D) summarize massive amounts of data into much smaller, traditional reports.

B

How do software vendors correct flaws in their software after it has been distributed? A) They issue bug fixes. B) They issue patches. C) They re-release the software. D) They release updated versions of the software.

B

In which method of encryption is a single encryption key sent to the receiver so both sender and receiver share the same key? A) SSL B) Symmetric key encryption C) Public key encryption D) Private key encryption

B

Technology services

Businesses need people to run and manage the infrastructure components and to train employees in how to use these technologies for their work

MongoDB and SimpleDB are both examples of: A) Open-source databases. B) SQL databases. C) NoSQL databases. D) Cloud databases.

C

Smaller firms may outsource some or many security functions to: A) ISPs. B) MISs. C) MSSPs. D) CAs.

C

________ controls ensure that valuable business data files on either disk or tape are not subject to unauthorized access, change, or destruction while they are in use or in storage. A) Software B) Administrative C) Data security D) Implementation

C

SOFTWARE AS A SERVICE

CUSTOMERS USE SOFTWARE HOSTED BY THE VENDOR ON THE VENDOR'S CLOUD INFRASTRUCTURE AND DELIVERED AS A SERVICE OVER A NETWORK.

Which of the following can be used to automatically enforce consistency among different sets of data? Data administration, data cleansing, data quality audit, data governance

Data cleansing

Computer Networks and Client/Server Computing

Distributed processing Centralized processing

Over 70 percent of malware today is aimed at small businesses.

False

Challenges of Big Data Analytics

Skill availability (Data scientists are in short supply)

Why are legacy systems still​ used?

They are too expensive to redesign.

_______________________ is an example of a DBMS desktop system geared toward smaller business data needs.

access

A photo you have taken of your family is considered? ______________, and is protected by law

intellectual property

The use and regulation of trade​ secrets, copyrights, and patents is the U.S.​ government's attempt to protect​ ________.

intellectual property

the most common type of database is a:

relational

Google Apps is a popular​ cloud-based:

software as a service (SaaS)

Profiling

4.1.2- What is it called when companies combine data from multiple sources and create electronic dossiers of detailed information on individuals?

Data storage costs rapidly decline

4.1.3- What technology raises ethical issues related to the limitless data that can be collected about you?

FIP

4.3.1- Surprisingly, laws guiding American privacy law are based on a 1973 report called the ______.

Fair information Practices (FIP)

4.3.2- What is the understanding that most American and European privacy law is based on?

Cookie

4.3.3- If you return to a website that welcomes you back by name, you likely have a small text file on your computer with information about your prior visits is called a ______.

intellectual property

4.3.4- The use and regulation of trade secrets, copyrights, and patents in the U.S. government's attempt to protect _________.

Computer abuse

4.4.1- An unethical, but not illegal act committed using a computer is called ________.

Digital Divide

4.4.1- In the U.S., while there are many people that have access to technology and information, there are many that do not. This creates a _____ that leads to unequal opportunities.

Computer Crime

4.4.2- Putting a key logger on your boss's computer without permission would be considered a(n) ______.

Porter's competitive forces model includes​ _________ forces that impact every organization. A. an undetermined number of B. 5 C. 4 D. 6 E. 3

5

usiness Process Management​ (BPM) includes​ _________ steps designed to continuously improves the processes of an organization.

5

IT infrastructure

5.1.1- Collectively, the coordination of computer hardware, software, data management, networking, and technology services collectively is termed:

System Software

5.1.1- _______ is a set of applications that manages the activities and resources of a computer.

Mainframe

5.2.1- A car reservation system requiring processing a thousand transactions per second would likely require a ________ to process the transactions.

Grid Computing

5.2.1- What type of computing connecting computers that are not near one another into a signal network and combining the computational power of the computers on the network?

Client/Server Computing

5.2.2- What is a widely used form of distributed processing?

Solid State Drives

5.2.3- The popular USB "thumb" drive uses a storage technology very similar to:

Downtime

5.4.3- Frustrated customers angry about a site not working is an example of which IT cost of ownership (TCO)?

TCO

5.4.4- Companies use a ____ model to analyze the costs of obtaining and maintaining an IT system to determine if it is feasible to have the information system as internal or outsourced.

Foreign Key

6.1.3- A _____ is used to link the SUPPLIER and PART tables by entering Supplier in the PART table.

False- Each table must have a one-to-one relationship to another table.

6.1.4- With regard to relational database, which of the following is false?

Data dictionary

6.2.1- As part of a DBMS, a(n) ______ documents information about a database.

Access

6.2.1- ______ is an example of a DBMS desktop system geared toward smaller business data needs.

MySQL

6.2.2- An organization interested in the most popular open source DBMS on the market would adopt ____ SQL.

DBMS

6.2.2- What is a specific software for creating, storing, organizing, and accessing data from a database?

Query

6.2.3- (A) ______ is the formal name for questioning or making a data request from the database.

False- Microsoft Access does not have report generation capability.

6.2.4- Which of the following is false about Microsoft Access?

Big Data

6.3.1- The term ____ describes data sets like Google's database that are too big for traditional DBMS to handle.

Big Data

6.3.2- What is the term for data sets with volumes so huge that they are beyond the ability of typical DBMS to capture, store, and analyze?

Web Mining

6.3.4- IF a firm wants to learn more about its users, behaviors, and marketing effectiveness, they might turn to ______, relying on the huge amount of data available through the Internet.

Information Policy

6.4.1- If Megan sends out unauthorized data to another organization, she has likely violated the company's _________.

An Information Policy

6.4.1- What would an organization use to specify rules for sharing, disseminating, acquiring, standardizing, classifying, and inventorying information?

Database Administration

6.4.2- The _____ actually works with the database, creating relations between tables and implementing controls that would minimize data issues and provide security for the data.

Data Scrubbing

6.4.2- ____ is a term by companies looking to detect and correct incomplete, redundant, or incorrect data.

False- The actual physical database is never created by the database administration of a company.

6.4.4- When thinking about managing and controlling data within a company, which of the following is a false?

Copyright is protected throughout the life of the author plus an additional _____ years after the author's death.

70

Copyright is protected throughout the life of the author plus an additional​ ______ years after the​ author's death.

70

What solution would a corporation use if they had a collection of mostly older systems which they wanted to connect to one​ another? A. Enterprise applications B. Enterprise Linking Systems​ (ELS) C. Customer Relations Management​ (CRM) D. Use a Network Operating System​ (NOS) E. Simple Object Access Protocol​ (SOAP)

A

The philosophy that quality should be the responsibility of everyone that works in a firm and every business unit is best known as which of the​ following? A. Total quality management B. Quality control C. Business process improvement D. Six sigma E. Lean business

A

The popular USB​ "thumb" drive uses a storage technology very similar​ to: A. solid state drives. B. digital video disks. C. magnetic disks. D. ​3D-Printers. E. ​CD-ROMs.

A

The primary storage technologies are: A) storage networks, magnetic tape, magnetic disk, and optical disk. B) hard drives, magnetic tape, magnetic disk, and optical disk. C) storage networks, magnetic disks, hard disks, and optical disks. D) hard drives, removable drives, storage networks, and magnetic tape.

A

The total amount of digital information that can be transmitted through any telecommunications medium is measured in: A) bps. B) Hertz. C) baud. D) gigaflops

A

To analyze the direct and indirect costs and determine the actual cost of specific technology implementations, you would use a: A) total cost of ownership model. B) return on investment model. C) break-even point. D) cost benefit analysis.

A

To use the analog telephone system for sending digital data, you must also use: A) a modem. B) a router. C) DSL. D) twisted wire.

A

Together, a protocol prefix, a domain name, a directory path, and a document name, are called a(n): A) uniform resource locator. B) IP address. C) third level domain. D) root domain.

A

Translating software to different languages is commonly referred to as: A) software localization. B) scaling. C) service-oriented architecture. D) outsourcing.

A

Using numerous computers to inundate and overwhelm the network from numerous launch points is called a(n) ________ attack. A) DDoS B) DoS C) SQL injection D) phishing

A

One or more access points positioned on a ceiling, wall, or other strategic spot in a public place to provide maximum wireless coverage for a specific area are referred to as: A) touch points. B) hotspots. C) hot points. D) wireless hubs.

B

Porter's competitive force concerned about barriers to entry​ is/are _______________. A. traditional competitors B. new market entrants C. emerging companies D. Internet service providers E. substitute products and services

B

Purchasing computing power from a central computing service and paying only for the amount of computing power used is commonly referred to as: A) grid computing. B) utility computing. C) client/server computing. D) autonomic computing.

B

Quality described as adhering to specific specifications with minimal variations would be through the lens of​ a: A. salesperson. B. producer. C. customer. D. store. E. child.

B

Relational database systems use ________ to ensure that relationships between coupled tables remain consistent. A) intersection relations B) referential integrity rules C) entity-relationship diagrams D) foreign keys

B

Rigorous password systems: A) are one of the most effective security tools. B) may hinder employee productivity. C) are costly to implement. D) are often disregarded by employees.

B

Specific security challenges that threaten corporate servers in a client/server environment include: A) tapping; sniffing; message alteration; radiation. B) hacking; vandalism; denial of service attacks. C) theft, copying, alteration of data; hardware or software failure. D) unauthorized access; errors; spyware.

B

The IT infrastructure computer software component includes both​ ____________ and​ __________ software categories. A. ​Windows; MacOS B. ​system; application C. ​database; spreadsheet D. ​programming; system E. ​Oracle; SQL Server 2014

B

The business case for using grid computing involves all of the following except: A) cost savings. B) centralized maintenance. C) speed of computation. D) agility.

B

The method of slicing digital messages into parcels, transmitting them along different communication paths, and reassembling them at their destinations is called: A) multiplexing. B) packet switching. C) packet routing. D) ATM.

B

The project operation: A) combines relational tables to provide the user with more information than is otherwise available. B) creates a subset consisting of columns in a table. C) organizes elements into segments. D) identifies the table from which the columns will be selected.

B

The​ Problem-Solving Model consists of​ __________________, solution​ design, solution evaluation and​ choice, and implementation. A. implementation B. problem identification C. solution design D. evaluation E. analysis

B

Tools for consolidating, analyzing, and providing access to vast amounts of data to help users make better business decisions are known as: A) DSS. B) business intelligence. C) OLAP. D) data mining.

B

Tricking employees to reveal their passwords by pretending to be a legitimate member of a company is called: A) sniffing. B) social engineering. C) phishing. D) pharming.

B

In terms of the data relationships found by data mining, associations refers to: A) events linked over time. B) patterns that describe a group to which an item belongs. C) occurrences linked to a single event. D) undiscovered groupings.

C

In the domain name "http://myspace.blogging.com", what are the root, top-level, second-level, and third-level domains, respectively? A) "http://", myspace, blogging, com B) "http://", com, blogging, myspace C) ".", com, blogging, myspace D) ".", myspace, blogging, com

C

In the​ U.S., while there are many people that have access to technology and​ information, there are many that do not. This creates a​ ______ that leads to unequal opportunities. A. reengineering job loss B. social society C. digital divide D. social gap E. hierarchy

C

Large amounts of data stored in electronic form are ________ than the same data in manual form. A) less vulnerable to damage B) more secure C) vulnerable to many more kinds of threats D) more critical to most businesses

C

Linux is: A) primarily concerned with the tasks of end users. B) designed for specific machines and specific microprocessors. C) an example of open-source software. D) especially useful for processing numeric data.

C

Surprisingly, laws guiding American privacy law are based on a 1973 report called the​ _____________. A. GAAP B. SQL C. FIP D. CPU E. TIO

C

T lines: A) operate over existing telephone lines to carry voice, data, and video. B) operate over coaxial lines to deliver Internet access. C) are high-speed, leased data lines providing guaranteed service levels. D) have up to twenty-four 64-Kbps channels.

C

Collectively, the coordination of computer​ hardware, software, data​ management, networking, and technology services collectively is​ termed: A. Mainframe computing. B. business intelligence. C. IT compliance. D. distributed processing. E. IT infrastructure.

E

When thinking about downloading and using a photo off the Internet, don't forget the ethical? __________ assume that virtually all tangible and intangible objects are owned by someone else unless there is specific declaration otherwise

no free lunch rule

Relational Database

6.1.1- The most common type of database is a ___________.

Data Warehouse

6.3.1- Most larger corporations utilize a ___ to consolidate data from a business along with external data.

In a relational database, a record is also called a(n): A) tuple. B) row. C) entity. D) field.

A

Which of the following types of computer would you use to support a computer network? A) Server B) Mainframe C) Workstation D) PC

A

What is a collection of integrated records?

A database is a collection of integrated records.

In a table for customers, the information about a single customer would reside in a single: A) field. B) row. C) column. D) table.

B

Microsoft Excel is an example of: A) data management software. B) spreadsheet software. C) presentation graphics. D) word processing software.

B

The use of multiple computers linked by a communications network for processing is called: A) grid computing. B) distributed processing. C) client/server computing. D) centralized processing.

B

h of the following refers to the ability of a computer, product, or system to expand to serve a larger number of users without breaking down? A) Modifiability B) Scalability C) Expandability D) Disintermediation

B

The 802.11 set of standards is known as: A) WLAN. B) WSN. C) Wi-Fi. D) WiMax.

C

What is a widely used form of distributed​ processing? A. W.A.D.C. Wide Area Distributed Computing B. ​Multi-Core Processing. C. ​Client/Server Computing D. Parallel Processing E. Centralized Processing

C

Which of the following is a challenge posed by Wi-Fi networks? A) Lack of broadband support B) Connectivity issues with wired LANs C) Susceptibility to interference from nearby wireless systems D) High cost of infrastructure technology

C

Which of the following is not one of the most important programming languages for business? A) Java B) C++ C) XML D) Visual Basic

C

Software that organizes, manages, and processes business data, such as data concerned with inventory, customers, and vendors, is called: A) system software. B) application software. C) data management software. D) network software. E) web services software.

C) data management software.

Which of the following is an open-source operating system designed for mobile devices? A) iOS B) OS X C) Chrome D) Android

D

Which of the following is false about Microsoft​ Access? A. Microsoft Access works with Crystal​ Reports, a popular report generator. B. Microsoft Access is a DBMS. C. Microsoft Access has capabilities for developing desktop system applications. D. Microsoft Access does not have report generation capability. E. Microsoft Access has rudimentary data dictionary capabilities.

D

________ refers to all of the methods, policies, and organizational procedures that ensure the safety of the organization's assets, the accuracy and reliability of its accounting records, and operational adherence to management standards. A) "Legacy systems" B) "SSID standards" C) "Vulnerabilities" D) "Controls"

D

Legacy systems are still in use today because: A) they can only be run on the older mainframe computers. B) many integrate well using new Web services technologies. C) they contain valuable data that would be lost during redesign. D) they are too expensive to redesign.

D) they are too expensive to redesign.

​____________________ is a term used by companies looking to detect and correct​ incomplete, redundant, or incorrect data. A. Referential integrity B. Data mining C. Primary key D. Data scrubbing E. SQL

D. Data scrubbing

If a firm wants to learn more about its​ users, behaviors, and marketing​ effectiveness, they might turn to​ ____, relying on the huge amount of data available through the Internet. A. Hadoop B. HANA C. data marts D. Web mining E. sentiment analysis software

D. Web mining

​(A) _______________ is the formal name for questioning or making a data request from the database. A. Access B. DDL C. DML D. query E. cloud

D. query

Relational databases enforce​ ______________ integrity to​ ensure, for​ instance, that a teacher​ can't be assigned to a CLASS table unless they already exist in the TEACHER table. A. ethical B. secondary C. data flow D. referential E. task model

D. referential

The most common type of database is a​ __________. A. SAP database B. normalized database C. ​non-relational database D. relational database E. hierarchical database

D. relational database

_______________________ use a combination of their business, communication, and technical skills to investigate Big Data looking for ways to improve current business analytics practices (from descriptive to predictive and prescriptive) and hence to improve decisions for new business opportunities.

Data Scientist

____________________ is a term used by companies looking to detect and correct​ incomplete, redundant, or incorrect data.

Data scrubbing

What is a database whose content focuses on historical organizational data?

Data warehouse; a data warehouse is a database that stores current and historical data of potential interest to decision makers throughout the company. The data originate in many core operational transaction systems, such as systems for sales, customer accounts, and manufacturing, and can include data from website transactions.

A​ _______________ is used to link the SUPPLIER and PART tables by entering SupplierID in the PART table. A. primary key B. data key C. cost key D. prime key E. foreign key

E

Systems designed to help maintain and improve customer data and its relationship with customers are called​ __________________ systems. A. customer attention B. guest feedback C. transaction processing D. knowledge management E. customer relationship management

E

The BPM step which addresses the question of which processes need to be addressed is​ ___________________________. A. process analysis B. the needs analysis C. analyzing existing processes D. continuous measurement E. identifying processes for change

E

In order to manage their relationship with an outsourcer or technology service provider, firms need a contract that includes a(n): A) API. B) capacity plan. C) SOA. D) TCO. E) SLA.

E) SLA.

The practice in law-governed societies in which laws are known and understood, and there is an ability to appeal to higher authorities to ensure that the laws are applied correctly is called: A) responsibility. B) the courts of appeal. C) accountability. D) liability. E) due process.

E) due process.

Which of the following involves searching for patterns and relationships among​ data? A. Knowledge management B. Data processing C. Data warehousing D. Data marting E. Data mining

E. Data mining

CLIENT/SERVER ARCHITECTS

ENTIRE NETWORK IS BALANCES OVER SEVERAL LEVELS OF SERVERS, DEPENDING ON THE KIND OF SERVICE BEING REQUESTED

Which of the following refers to the capability of a computer, product, or system to add additional features?

EXPANDABILITY

With regard to relational​ databases, which of the following is false​?

Each table must have a​ one-to-one relationship to another table.

What is hadoop used for?

Hadoop is used to process large quantities of structured and transactional data (Ex. Facebook)

Which of the following best describes cloud computing?

In cloud computing, firms and individuals obtain computing power and software as services over a network, including the Internet, rather than purchasing and installing the hardware and software on their own computers.

Which of the following is false concerning the social and cultural issues in regard to the prevalence of information​ systems?

It is an equalizer for social classes and minorities

Computer Vision Syndrome​ (CVS)

It is an equalizer for social classes and minorities.

If you needed a DBMS for large commercial use on a mainframe, _____________ would be a viable option.

Microsoft SQL Server

which of the following is false about Microsoft access?

Microsoft access does not have report generation capability

which of the following is the best example of a software suite?

Microsoft office 2013

What are individuals involved in data administration responsible for?

They are responsible for information policy, data planning, data dictionary development, and monitoring data usage in a firm.

Why are legacy systems still used?

They are too expensive to redesign.

ZipReality, which uses both Zillow and Google​ Maps, is an example of​ a: A. mashup. B. mushup. C. LMS. D. Zip drive. E. Microsoft Cloud.

A

________ is a crime in which an imposter obtains key pieces of personal information to impersonate someone else. A) Identity theft B) Spoofing C) Social engineering D) Evil twins

A

What does this describe: "an automated or manual tool for storing and organizing information about the data maintained in a database"

A data dictionary

What do most larger corporations utilize to consolidate data from a business along with external data?

A data warehouse. The data is stable and typically not changed once it is put into the data warehouse.

A spreadsheet is great to manage information about on thing, but what is preferred to manage information about more than one thing?

A database is preferred to manage information about more than one thing, such as items for sale and suppliers of items.

What is a database management system, DBMS, for?

A database management system is a software program for creating, processing, and administering a database.

In ____?______, the numbers rather than intuition, gut feeling, or supposition drive decision making. There is also a culture of experimentation to see what works and doesn't. To create ____?____, senior management needs to do the following: recognize that some people can't or won't adjust; be a vocal supporter; stress that outdated methods must be discontinued; ask to see what analytics went into decisions; link incentives and compensation to desired behaviors

A fact-based decision-making culture

What uniquely represents a record or row?

A primary key uniquely represents a record or row. This key field is the unique identifies for all the information in any row of the table, and a primary key cannot be duplicated.

It is a well-known fact that if you don't have committed executive backing, it is difficult (if not impossible) to succeed. If the scope is a single or a few analytical applications, the support can be at the departmental level. However, if the target is enterprise-wide organizational transformation, which is often the case for Big Data initiatives, _____________________ needs to be at the highest levels and organization-wide. Which one best Critical Success Factor for Big Data Analytics best fills the blank in the previous sentence?

A strong committed sponsorship

The term "________" refers to large disparities in access to computers and the Internet among different social groups and different locations. A) digital divide B) technostress C) RSI D) CVS E) CTS

A) digital divide

Redesigning and automating business processes can be seen as a double-edged sword because: A) increases in efficiency may be accompanied by job losses. B) reliance on technology results in the loss of hands-on knowledge. C) increases in efficiency may be accompanied by poor data quality. D) it can concentrate power in the hands of senior executives. E) support for middle-management decision making may be offset by poor data quality.

A) increases in efficiency may be accompanied by job losses.

A field identified in a table as holding the unique identifier of the table's records is called the: A) primary key. B) primary field. C) foreign key. D) key field.

A) primary key.

The U.S. Department of Commerce developed a(n) ________ framework in order to enable U.S. businesses to legally use personal data from EU countries. A) safe harbor B) P3P C) PGP D) COPPA E) FIP

A) safe harbor

SOLID STATE DRIVES

ARRAY OF SEMI CONDUCTORS AS AN INTERNAL DISK DRIVE, WHEREAS PORTABLE USB FLASH DRIVES USE SIMILAR TECHNOLOGY FOR EXTERNAL STORAGE

Legacy systems are still in use today because: A) they can only be run on the older mainframe computers. B) they are too expensive to redesign. C) many integrate well using new Web services technologies. D) they contain valuable data that would be lost during redesign.

B

Software used to apply the computer to a specific task for an end user is called: A) system software. B) application software. C) data management software. D) network software.

B

The confusion created by ________ makes it difficult for companies to create customer relationship management, supply chain management, or enterprise systems that integrate data from different sources. A) batch processing B) data redundancy C) data independence D) online processing

B

What are the four generic information system strategies for dealing with competitive​ forces? A. ​Low-cost leadership,​ margin/cost ratio below national​ average, market​ focus, and deepening customer online data B. ​Low-cost leadership, product​ differentiation, focus on market​ niche, and strengthening customer and supplier intimacy C. ​Low-cost leadership, product​ differentiation, focus on​ e-market, and strengthening customer and supplier privacy D. ​Low-cost leadership, product conforms to standard​ design, focus on broad​ market, and strengthening customer and supplier intimacy E. ​Customer/Competitor data​ leader, product​ e-visibility, increasing percentage of online to in store sales​ ratio, data security

B

What are the relationships that the relational database is named for? A) Relationships between rows and columns B) Relationships between entities C) Relationships between fields and records D) Relationships between databases

B

What is the foundation technology for Web services? A) HTML B) XML C) SOAP D) UDDI

B

Which of the following best illustrates the relationship between entities and attributes? A) The entity CUSTOMER with the attribute PRODUCT B) The entity CUSTOMER with the attribute ADDRESS C) The entity PRODUCT with the attribute PURCHASE D) The entity PRODUCT with the attribute CUSTOMER

B

Which of the following is a powerful analysis technology that crunches data from multiple sources to find hidden connections and typically used by the​ government? A. FIP B. NORA C. ​TCP-IP D. ERP E. ​SEC_DBA

B

________ use scanning software to look for known problems such as bad passwords, the removal of important files, security attacks in progress, and system administration errors. A) Stateful inspections B) Intrusion detection systems C) Application proxy filtering technologies D) Packet filtering technologies

B

In a student​ database, a row that describes the top​ student, including his or her​ LastName, FirstName, and​ StudentNumber, is an example of a​ ______________. A. field B. record C. database D. file E. group

B. record

Taking application components from various​ resources, ________ mixes and matches to create a​ new, customized Internet experience. A.SaaS B.a mashup C.XML D.cloud computing E.open source software

B.a mashup

Bandwidth is the: A) number of frequencies that can be broadcast through a medium. B) number of cycles per second that can be sent through a medium. C) difference between the highest and lowest frequencies that can be accommodated on a single channel. D) total number of bytes that can be sent through a medium per second.

C

Biometric authentication: A) is inexpensive. B) is used widely in Europe for security applications. C) can use a person's voice as a unique, measurable trait. D) only uses physical measurements for identification.

C

Bluetooth can be used to link up to ________ devices within a 10-meter area using low-power, radio-based communication. A) four B) six C) eight D) ten

C

Checking for quality and paying creditors would fall within which two functional​ areas? A. Finance and​ accounting, and human resources B. Manufacturing and​ production, and human resources C. Manufacturing and​ production, and finance and accounting D. Manufacturing and​ production, and sales and marketing E. Human​ resources, and sales and marketing

C

Connecting geographically remote computers in a single network to create a "virtual supercomputer" is called: A) co-location. B) cloud computing. C) grid computing. D) autonomic computing.

C

Detecting and correcting data in a database or file that are incorrect, incomplete, improperly formatted, or redundant is called: A) data auditing. B) defragmentation. C) data scrubbing. D) data optimization

C

Electronic data are more susceptible to destruction, fraud, error, and misuse because information systems concentrate data in computer files that: A) are easily decrypted. B) can be opened with easily available software. C) may be accessible by anyone who has access to the same network. D) are unprotected by up-to-date security systems.

C

For 100 percent availability, online transaction processing requires: A) high-capacity storage. B) a multi-tier server network. C) fault-tolerant computer systems. D) dedicated phone lines.

C

Many companies have social networks that gather and use information from customers and employees thus creating an important role for the​ _____ to coordinate the protection of all data. A. chief security executive B. chief web officer C. chief privacy officer D. chief social officer E. chief information officer

C

Software that organizes, manages, and processes business data, such as data concerned with inventory, customers, and vendors, is called: A) system software. B) application software. C) data management software. D) network software.

C

When is business process management​ (BPM) concluded? A. When the business process reaches an acceptable level of efficiency B. After implementation of the new process C. BPM is never concluded. D. When the business process is complete E. After you identify the process that needs to be​ changed, then you implement Business Process Modification.

C

Which of the following is false concerning the social and cultural issues in regard to the prevalence of information​ systems? A. It has increased the ability to telecommute while confusing the separation between work and personal life. B. It has led to an increased reliance on information systems. C. It is an equalizer for social classes and minorities. D. It has led to increased work efficiency while reducing the number of middle manager positions. E. It is easier for a business to quickly​ change, but competitive advantage is maintained for shorter time frames.

C

_____ is when a firm connects numerous computers together into one network to create​ one, very powerful computer system that has coordinated processing A. Centralized processing B. ​Client/server computing C. Grid computing D. Mainframe computing E. Distributed processing

C

________ describes the practices and technologies used minimize the environmental effects of manufacturing and managing computing devices. A) Capacity planning B) Cloud computing C) Green computing D) Autonomic computing

C

___________________ is a term used by companies looking to detect and correct​ incomplete, redundant, or incorrect data. A. SQL B. Data mining C. Data scrubbing D. Primary key E. Referential integrity

C

A DBMS makes the: A) relational database available for different physical views. B) physical database available for different relational views. C) physical database available for different logical views. D) logical database available for different analytical views.

C) physical database available for different logical views.

​_____ is when a firm connects numerous computers together into one network to create​ one, very powerful computer system that has coordinated processing A.Distributed processing B.Centralized processing C.Grid computing D.Mainframe computing E.Client/server computing

C.Grid computing

Managing Hardware and Software Technology

Capacity Planning Scalability Total Cost of Ownership (TCO model)

What is the process of predicting when a computer hardware system will become​ saturated?

Capacity planning

___________________ becauseusing the strengths of each database platform and enabling them to coexist in your organization's data architecture are essential. There is ample literature that talks about the necessity of maintaining and nurturing synchronicity of traditional data warehouses with the capabilities of new platforms

Coexist

A one-to-many relationship between two entities is symbolized in a diagram by a line that ends: A) in two short marks. B) in one short mark. C) with a crow's foot. D) with a crow's foot preceded by a short mark

D

A salesperson clicks repeatedly on the online ads of a competitor's in order to drive the competitor's advertising costs up. This is an example of: A) phishing. B) pharming. C) spoofing. D) click fraud.

D

A(n) ________ is a dedicated computer in a client/server environment that hosts a DBMS. A) web server B) application server C) database server D) client server

D

Evil twins are: A) Trojan horses that appears to the user to be a legitimate commercial software application. B) e-mail messages that mimic the e-mail messages of a legitimate business. C) fraudulent Web sites that mimic a legitimate business's Web site. D) bogus wireless network access points that look legitimate to users.

D

If someone at your work accuses you of sending inappropriate​ emails, you should be afforded​ __________________. A. responsibility B. accountability C. a third chance D. due process E. liability

D

If you accept a position as an information systems​ manager, you have​ a(n) ____________ to accept the​ costs, benefits, and obligations for the decisions you make. A. accountability B. due process C. recklessness D. responsibility E. liability

D

The select operation: A) combines relational tables to provide the user with more information than is otherwise available. B) creates a subset consisting of columns in a table. C) identifies the table from which the columns will be selected. D) creates a subset consisting of all records in the file that meet stated criteria.

D

When thinking about managing and controlling data within a​ company, which of the following is false​? A. An information policy would establish who in human resources could get to employee​ data, for example. B. As part of​ control, a firm may set policy about passwords for accessing data. C. An information policy sets up who can access what information within a firm. D. The actual physical database is never created by the database administration of a company. E. Large companies may have several​ departments, each handling specific tasks involving data assurance for the firm.

D

Which of the following is false regarding business process​ management? A. If a process needs​ major, quick​ revisions, business process reengineering may be required. B. Measurement may be needed during the design of a process in addition to after implementation. C. It is important to prioritize projects for improvement. D. The BPM process concludes once metrics are established and the system is implemented. E. It is important to document the sequence of a current​ system, then create diagrams of the​ new, improved system.

D

Which of the following specifications replaces WEP with a stronger security standard that features changing encryption keys? A) TLS B) AUP C) VPN D) WPA2

D

Which of the following statements is not true about search engines? A) They are arguably the Internet's "killer app." B) They have solved the problem of how users instantly find information on the Internet. C) They are monetized almost exclusively by search engine marketing. D) There are hundreds of search engines vying for user attention, with no clear leader having yet emerged.

D

Which of the following types of computer is used for weather forecasting? A) Mainframe B) Server C) Minicomputer D) Supercomputer

D

Which organization helps define the overall structure of the Internet? A) None (no one "owns" the Internet) B) W3C C) ICANN D) IAB

D

Which signal types are represented by a continuous waveform? A) Laser B) Optical C) Digital D) Analog

D

_____ is the process of presenting computing resources that are accessed in ways that appear to not be restricted by physical configuration or geographic location. A. Optimization B. Cloud computing C. Nanotechnology D. Virtualization E. Network infrastructure

D

________ identify the access points in a Wi-Fi network. A) NICs B) Mac addresses C) URLs D) SSIDs

D

________ integrate(s) disparate channels for voice communications, data communications, instant messaging, e-mail, and electronic conferencing into a single experience. A) Wireless networks B) Intranets C) Virtual private networks D) Unified communications

D

Which of the following types of computer would you use to support a computer network? A) Mainframe B) Tablet C) PC D) Server E) Workstation

D) Server

_________ prohibits an organization from collecting any personal information unless the individual specifically takes action to approve information collection and use. A) The opt-out model B) A safe harbor C) P3P D) The opt-in model E) FIP principles

D) The opt-in model

) NORA is: A) a sentencing guideline adopted in 1987 mandating stiff sentences on business executives. B) an ethical principle. C) a federal privacy law protecting networked data. D) a data analysis technology that finds hidden connections between data in disparate sources. E) a profiling technology used by the EU.

D) a data analysis technology that finds hidden connections between data in disparate sources.

OUTPUT DEVICES

DISPLAY DATA AFTER THEY HAVE BEEN PROCESSED

What does Data Management Software do with business data regarding inventory, customers, and vendors?

DMS organizes, manages ,and process business data

Which of the following adjusts copyright laws to the Internet age by making it illegal to make, distribute, or use devices that circumvent technology-based protections of copyrighted materials?

DMV

What is data mining?

Data mining is the application of statistical techniques to find patterns and relationships among data and to classify and predict future behavior.

A​ _______________ is represented as a column in a database table that represents things like a​ person's first​ name, last​ name, and age. A. record B. byte C. file D. bit E. field

E

Business​ ______________ are the strategized steps and activities that are coordinated within an organization. A. intelligence B. acumen C. databases D. analysts E. processes

E

What is emerging as a major business area of innovation that offers a flexible collection of computers on the Internet that can perform tasks previously performed on corporate​ computers? A. The Android OS B. Grid computing C. Use of Web OS D. The use of non SQL databases E. Cloud computing

E

What is it called when companies combine data from multiple sources and create electronic dossiers of detailed information on​ individuals? A. Social gathering B. Data rooting C. Data sourcing D. BigData E. Profiling

E

What is​ service-oriented architecture​ (SOA)? A. An​ XML-based productivity suite B. A​ service-oriented computer platform C. A​ service-oriented networking architecture D. A​ service-oriented operating system architecture E. A set of​ self-contained services that communicate with each other to create a working software application

E

What would an organization use to specify rules for​ sharing, disseminating,​ acquiring, standardizing,​ classifying, and inventorying​ information? A. Company mission statement B. EULA C. Fair use policy D. Copyright law E. An information policy

E

Which of the following is the best example of a software​ suite? A. Firefox B. Java C. Microsoft Windows 7 D. XML E. Microsoft Office 2013

E

_______________________ are the functional business processes responsible for quality assurance. A. Human resources B. Instructional technology C. Finance and accounting D. Sales and marketing E. Manufacturing and production

E

_______________________ is an example of a DBMS desktop system geared toward smaller business data needs. A. DB2 B. SQL Server C. MySQL D. Oracle Database E. Access

E

_______________________ is the functional business process responsible for managing cash accounts. A. Human resources B. Sales and marketing C. Manufacturing and production D. Instructional technology E. Finance and accounting

E

The ethical "no free lunch" rule states that: A) one should take the action that produces the least harm or incurs the least cost. B) if an action cannot be taken repeatedly, then it is not right to be taken at any time. C) if an action is not right for everyone to take, it is not right for anyone to take. D) one can put values in rank order and understand the consequences of various courses of action. E) if something someone else has created is useful to you, it has value, and you should assume the creator wants compensation for this work

E) if something someone else has created is useful to you, it has value, and you should assume the creator wants compensation for this work

A grouping of characters into a word, a group of words, or a complete number is called a record.

False

A mainframe is a type of legacy workstation.

False

Allowing departments to make their own software and hardware purchases increases efficiency and minimizes the need for centralized support.

False

An ISP is a commercial organization that owns a region of transcontinental high-speed backbone networks carrying the bulk of Internet traffic.

False

An NOS must reside on a dedicated server computer in order to manage a network.

False

An SaaS provider maintains a large Web server, or series of servers, and provides fee-paying subscribers with space to maintain their Web sites.

False

An acceptable use policy defines the acceptable level of access to information assets for different users.

False

Malicious software programs referred to as spyware include a variety of threats such as computer viruses, worms, and Trojan horses.

False

One of the main benefits of moving to mobile business computing platforms is the dramatically lower costs of hardware.

False

Packet filtering catches most types of network attacks.

False

The term cracker is used to identify a hacker whose specialty is breaking open security systems.

False

The use of different terms for identifying data in a firm's various information systems is an example of redundant data.

False

Traditional data warehouses have been able to keep up with the variety and complexity of data

False

Using an online storage service such as DropBox is a type of virtualization.

False

What is the most popular open-source program that allows for storage of big data?

Hadoop; hadoop is an open-source software framework, managed by the Apache Software Foundation that enabled distributed parallel processing of huge amounts of data across inexpensive computers.

Which storage device uses magnetic film or aluminum platters for storing data?

Hard disk Explanation Hard disks use magnetic disks and platters. Optical drives such as DVD or CD-ROM drives, use a reflective surface that is read by an optical reader. Flash devices such as SD cards store information using programmable, non-volatile flash memory. DLT drives use magnetic tape.

You need a storage device that has very large storage capacity, is fast and is relatively inexpensive. Which storage device will best suit your needs?

Hard disk Explanation A hard disk has a large memory capacity, is fast, and is relatively inexpensive. Optical disks are also inexpensive, but are not as fast and do not provide the storage capacity of hard disks. USB flash drives are not as inexpensive as hard disks with equal storage capacity and are not available with the capacity as the larger hard disks. Solid State Drives (SSD) have a large memory capacity and are fast, but are much more expensive than comparable hard drives.

Up to several TB in storage capacity and cost per MB is cheap.

Hard disk drive (HDD)

Magnetic Disk (looks like phonograph)

Hard drives (HDD) -Pin reads the device and that is how info is stored. Solid State Drives (Mac airs and USB drives) called so because nothing moves to read the information and memory. It doesn't spin. They are faster than HDD.

Collectively, the coordination of computer​ hardware, software, data​ management, networking, and technology services collectively is​ termed:

IT infrastructure

In a database, what does each column represent?

In a database, each column represents an attribute or a field.

Describe how an entity and attributes relate to relational databases:

In a relational database generalized categories represent an entity, and each category has characteristics called attributes.

Multi-core processor

Integrated circuit with two or more processors, enhanced performance and reduced power consumption

Grid computing

Involves connecting geographically remote computers connects into single network to act as virtual computer by combining the computational power if all computers on the grid People realize servers and mainframes are very expensive. The alternative is grid computing. Instead of a server, everyone uses everyone's computers while not being used at the time to use their processing power to make a "supercomputer".

What are the four generic information system strategies for dealing with competitive​ forces?

Low-cost leadership, product​ differentiation, focus on market​ niche, and strengthening customer and supplier intimacy Your answer is correct.E.

Contemporary Hardware Trends

Mobile Digital Consumerization of IT and BYOD Nanotechnology Quantum Computing Virtualization Cloud Computing Green Computing High-performance and power-saving processors Autonomic Computing

Major products including Bluemix and​ Salesforce.com's Force.com are considered​ a:

Platform as a Service​ (PaaS).

What method does an SDHC card use for storing data?

Reprogammable memory Explanation Flash devices store information using programmable, non-volatile flash memory. Common flash devices are MMC, SD, SDHC, and XD memory cards as well as USB thumb drives. DLT drivers use magnetic tape. Hard disks and floppy disks use magnetic disks and platters. Optical drives use a reflective surface and optical readers.

Cloud-based software and tools

SaaS (software as a service) - just internet browser required, no software

A formal name to describe self-regulating policies is called _______________.

Safe harbor

A flash device and storage capacity similar to a small hard drive.

Solid state drive (SSD)

Faster than other devices. No moving parts. Last longer than other storage devices.

Solid state drive (SSD)

The popular USB​ "thumb" drive uses a storage technology very similar​ to:

Solid state drives

Mainframes

Still used by large banks, insurance companies, stock brokerages, airline reservations systems, and government agencies to keep track of records and transactions Large-capacity, high-performance computer that can process large amounts of data very rapidly

Why are legacy systems still​ used

They are too expensive to redesign.

Case 6.2 The investment bank greatly benefitted after moving from many old disparate systems to a unified new system.

This case illustrates an excellent example in the banking industry, where disparate data sources are integrated into a Big Data infrastructure to achieve a single source of the truth.

Big Data plus "__________" yields value

"Big Analytics"

Safe Harbor

4.3.1- A(n) _______ is a mechanism that enables the U.S. government to extend consumer protection beyond U.S. borders through private policies and self-regulation that meet U.S. guidelines.

Desktop computer

5.2.2- In client/server computing, a client normally consists of a:

Hadoop

6.3.3- ____ is the most popular open-source program that allows for storage of big data.

Copyright is protected throughout the life of the author plus an additional? ______ years after the? author's death

70

DATA CENTER

A FACILITY HOUSING COMPUTER SYSTEMS AND ASSOCIATED COMPONENTS SUCH AS TELECOMMUNICATIONS, STORAGE, SECURITY SYSTEMS, AND BACK UP POWER SUPPLIES.

DBMS typically include report-generating tools in order to: A) retrieve and display data. B) display data in an easier-to-read format. C) display data in graphs. D) perform predictive analysis

B

IPv6 is being developed in order to: A) update the packet transmission protocols for higher bandwidth. B) create more IP addresses. C) allow for different levels of service. D) support Internet2.

B

If Megan sends out unauthorized data to another​ organization, she has likely violated the​ company's ______________. A. DBMS B. information policy C. data foundations D. primary key E. data warehouse

B

The main challenge coming to Microsoft's Office software suite will be: A) open-source, Linux-based suites such as StarOffice. B) Web-based productivity software such as Google Apps. C) mobile software. D) in-house, custom software created using open-source Web services.

B

The term​ ____________ describes data sets like​ Google's database that are too big for traditional DBMS to handle. A. Excel B. big data C. analytics D. Oracle Database E. Access

B

Domestic exporter strategy is characterized by which of the​ following? A. Transnationalism B. Virtual organization C. Centralization D. Regionalization E. Decentralization

C

Hadoop is a(n): A) NoSQL database technology that stores both data and procedures acting on the data as objects. B) data mining platform designed for storing and analyzing big data produced by Web communications and transactions. C) open-source software framework designed for distributing data-processing over inexpensive computers. D) pre-configured hardware-software system designed for analyzing big data

C

If a firm wants to learn more about its​ users, behaviors, and marketing​ effectiveness, they might turn to​ ____, relying on the huge amount of data available through the Internet. A. sentiment analysis software B. HANA C. Web mining D. Hadoop E. data marts

C

The most prominent data manipulation language today is: A) Access. B) DB2. C) SQL. D) Crystal Reports.

C

The tool that enables users to view the same data in different ways using multiple dimensions is: A) Hadoop. B) SQL. C) OLAP. D) data mining.

C

What is the domestic exporter strategy characterized​ by? A. Slight concentration of corporate activities in the home country of origin B. Concentration financial management and control out of a central home base while decentralizing​ production, sales, and marketing operations to units in other countries C. Heavy centralization of corporate activities in the home country of origin D. Import of raw​ products, export of finished products ratio is above​ 50% E. No centralization of corporate activities in the country of origin

C

Which of the following services enables logging on to one computer system and working on another? A) FTP B) LISTSERV C) Telnet D) World Wide Web

C

What technology trend raises ethical issues related to the limitless data that can be collected about you?

Data storage costs rapidly decline

___________________________ is an open source operating system for mobile devices. A. UNIX B. Linux C. Moodle D. Windows mobile E. Android

E

What are examples of managing and controlling data within a company?

Firms may set policies about passwords for accessing data. Large companies may have several departments handling specific tasks involving data assurance for the firm.

What does each row in a database represent?

In a database, each row represents a record.

Which of the following is an operating-system and hardware-independent programming language that is the leading interactive programming environment for the Web?

Java

Most Big Data is generated by _____________.

Machines

Smartphones have the same security flaws as other Internet-connected devices.

True

The​ _________ actually works with the​ databases, creating relations between tables and implementing controls that would minimize data issues and provide security for the data

database administration

If Megan sends out unauthorized data to another​ organization, she has likely violated the​ company's ______________.

information policy

​A(n) _____ is a mechanism that enables the U.S. government to extend consumer protection beyond U.S. borders through private policies and​ self-regulation that meet U.S. guidelines.

safe harbor

What is CERN and why is it important to the world of Science?

- European Organization for Nuclear Research -Plays leading role in fundamental studies of physics. -Operates the world's largest particle laboratory

7 HARDWARE TRENDS

1. MOBILE DIGITAL PLATFORM 2. CONSUMERIZATION OF IT 3. NANOTECHNOLOGY AND QUANTUM COMPUTERS 4. VIRTUALIZATION 5. CLOUD COMPUTING 6. GREEN COMPUTING 7. HIGH PERFORMANCE/POWER SAVING PROCESSORS

three princible sources of poor system performance

1. software bugs and errors 2. hardware or facility failures caused by natural or other causes 3. poor input data quality

Computer Vision Syndrome (CVS)

4.4.2- What affects approximate 90% of persons who spend 3 or more hours a day at a computer?

Keyboard

4.4.3- A computer _______causes the most repetitive stress injuries.

Systems integration

5.1.2- IT professionals working to make a new system work with an existing system is focusing on:

Data Management Software organizes, manages, and processes business data.

5.1.2- What does Data Management Software do with business data regarding inventory, customers, and vendors?

System & Application

5.1.3- The IT infrastructure computer software component includes both ________ and ________ software categories.

Grid Computing

5.1.4- ______ is when a firm connects numerous computers together into one network to create one, very powerful computer system that has coordinate processing.

Mashup

5.4.1- ZipReality, which uses both Zillow and Google Maps, is an example of a:

Field

6.1.1- A _______ is represented as a column in a database table that represents things like a person's first name, last name, and age.

Entity & Attributes

6.1.2- In a relational database generalized categories represent a(n) ______, and each category has characteristics called ______.

Data Warehouse

6.3.2- A(n) _______ is a database whose content focuses on historical organizational data.

In co-location, a firm: A) purchases and owns their Web server but locates the server in the physical facility of a hosting service. B) contracts with an external vendor to run their computer center and networks. C) off-loads peak demand for computing power to remote, large-scale data centers. D) utilizes an external, distributed computing grid.

A

A private cloud is operated by a single organization but may be managed by a third party and be located off premises.

True

A router is a device that forwards packets of data through different networks, ensuring that the data gets to the right address.

True

A software package for a mainframe usually requires a programmer to install it.

True

A walkthrough is a type of software testing used before software is even written.

True

Biometric authentication is the use of physical characteristics such as retinal images to provide identification.

True

Both Oracle and Microsoft Access use SQL to retrieve information from the database.

True

Case 6.3 Now that the solution is in place eBay can more cost effectively process massive amounts of data at very high speeds

True

Case 6.3 The load balancing helped the company meet its Big Data needs with the extremely fast data handling and application availability requirement, enabling the buying and selling of practically anything in an online marketplace.

True

DBMS simplify how end users work with databases by separating the logical and physical views of the data.

True

Data administration is a special organizational function that manages the policies and procedures through which data can be managed as an organizational resource.

True

Data cleansing is the same process as data scrubbing.

True

End users use a data manipulation language to manipulate data in the database.

True

Every record in a file should contain at least one key field.

True

Increasingly, voice, video, and data communications are all based on Internet technology.

True

Nanotechnology uses individual atoms and molecules to create computer chips and other devices that are thousands of times smaller than current technologies permit.

True

One form of spoofing involves forging the return address on an e-mail so that the e-mail message appears to come from someone other than the sender.

True

SSL is a protocol used to establish a secure connection between two computers.

True

Nanotechnology

Uses individual atoms and molecules to create computer chips and other devices thousands for times than current technologies (IBM)

Data center

a facility housing computer systems and associated components, such as telecommunications, storage, security systems, and backup power supplies

Liability

a feature of political systems in which laws permit individuals to recover damages done to them by the actions of others

the fact that companies can now organize and analyze vast amounts of data on individuals to determine individual behavior profiles is due mostly to:

advances in data analysis

The fact that companies can now organize and analyze vast amounts of data on individuals to determine individual behavior profiles is due mostly to:

advances in data analysis.

The fact that companies can now organize and analyze vast amounts of data on individuals to determine individual behavior profiles is due mostly​ to:

advnaces in data analysis

Centralized processing

all processing is accomplished by one large central computer (less common)

__________ would specify that only selected members of the payroll and human resources department would have the right to change sensitive employee data, such as an employee's salary and social security number, and that these departments are responsible for making sure that such employee data are accurate.

an information policy

what would an organization use to specify rules for sharing, disseminating, acquiring, standardizing, classifying, and inventorying information?

an information policy

​___________________________ is an open source operating system for mobile devices.

android

In a student​ database, a column called LastName would be an example of​ a(n) _____________.

attribute

in a student database, a column called LastName would be an example of a(n) _____________.

attribute

A data​ __________ is a method using a survey to determine the accuracy of a data set.

audit

a data ___________ is a method using a survey to determine the accuracy of a data set

audit

It has been shown that one of the best ways to reduce quality problems is to reduce​ _____________.

cycle time

A location specified to include IT infrastructure such as​ storage, security, and system backup is called​ a:

data center.

As part of a DBMS, a(n) ______________ documents information about a database

data dictionary

As part of a​ DBMS, a(n)​ _________ documents information about a database.

data dictionary

Software such as Sequel Server 2014 which is used to manage business data (i.e., inventory) is an example of _______________ software.

data management

Software such as Sequel Server 2014 which is used to manage business data​ (i.e., inventory) is an example of​ _______________ software.

data management

Which of the following involves searching for patterns and relationships among​ data?

data mining

__________ is a type of intelligence gathering that uses statistical techniques to explore records in a data warehouse, hunting for hidden patterns and relationships that are undetectable in routine reports.

data mining

What technology trend raises ethical issues related to the limitless data that can be collected about​ you?

data storage cost rapidly decline

The __________ functions of an organization are responsible for defining and maintaining a database. These functions are performed by a database design and management group.

database administration

The special organizational function whose responsibilities include the technical and operational aspects of managing data, including physical database design andmaintenance, is called ________.

database administration

The special organizational function whose responsibilities include the technical and operational aspects of managing​ data, including physical database design and​ maintenance, is called​ ________.

database administration

In the U.S., while there are many people that have access to technology and information, there are many that do not. This creates a ______ that leads to unequal opportunities

digital divide

In the U.S., while there are many people that have access to technology and information, there are many that do not. This creates a __________ that leads to unequal opportunities

digital divide

In the​ U.S., while there are many people that have access to technology and​ information, there are many that do not. This creates a​ ______ that leads to unequal opportunities.

digital divide

n the​ U.S., while there are many people that have access to technology and​ information, there are many that do not. This creates a​ ______ that leads to unequal opportunities.

digital divide

If someone at your work accuses you of sending inappropriate​ emails, you should be afforded​ __________________.

due process

Case 6.3 Why did eBay need a Big Data solution?

eBay is the world's largest online marketplace, and its success requires the ability to turn the enormous volumes of data it generates into useful insights for customers. Big Data is essential for this effort.

With regard to relational​ databases, which of the following is false​?

each table must have a one-to-one relationship to another table

Principles of right and wrong that you use to make choices are called​ _____________.

ethics

Principles of right and wrong that you use to make choices are called​...

ethics

A​ _______________ is used to link the SUPPLIER and PART tables by entering SupplierID in the PART table.

forgein key

What type of computing involves connecting computers that are not near one another into a signal network and combining the computational power of the computers on the​ network?

grid computing

_____ is when a firm connects numerous computers together into one network to create​ one, very powerful computer system that has coordinated processing

grid computing

​____________________ is the most popular​ open-source program that allows for storage of big data.

hadoop

Slippery slope rule

if an action cannot be taken repeatedly, it is not right to take at all

Immanuel Kant's categorical imperative

if an action is not right for everyone to take, it is not right for anyone

if megan sends out unauthorized data to another organization, she has likely violated the company's _______________

information policy

the use and regulation of trade secrets, copyrights, and patents is the U.S. government's attempt to protect:

intellectual property

Private clouds

is operated solely for an organization In cloud computing, hardware and software capabilities are provided as services over the internet. Businesses and employees have access to applications and IT infrastructure anywhere at any time using an internet-connected device

Tracking your movements without consent is most related to the​ trend, ___________, where technology trends raise ethical issues.

mobile device growth impact

Professional organizations like the American Medical Association have _____________________, which includes specific conduct guidelines such as, do no harm.

professional codes of conduct

Professional organizations like the American Medical Association have​ _____________________, which includes specific conduct guidelines such​ as, do no harm.

professional codes of conduct

What is it called when companies combine data from multiple sources and create electronic dossiers of detailed information on​ individuals?

profiling

In the information age, the obligations that individuals and organizations have concerning rights to intellectual property fall within the moral dimension of _______________________________

property rights and obligations

In the information? age, the obligations that individuals and organizations have concerning rights to intellectual property fall within the moral dimension of? ________.

property rights and obligations

In the information​ age, the obligations that individuals and organizations have concerning rights to intellectual property fall within the moral dimension of​ ________.

property rights and obligations

mong the five identified moral dimensions of the information​ age, which addresses the question​ "which cultural values are supported by information​ technology?"

quality of life

(A) _______________ is the formal name for questioning or making a data request from the database.

query

formal name for questioning or making a data request from the database:

query

​(A) _______________ is the formal name for questioning or making a data request from the database.

query

Disney is using a/an ___________ technology in the form of a wristband to help improve the guest experience by combining a guest's room key, park ticket, and eventually a vacation-planning system to make the experience more efficient with reduced wait times.

radio-frequency identification (RFID)

In a student database, a collection of related attributes such as LastName, FirstName, and Student# creates a(n) _______________.

record

In a student database, a row that describes the top student, including his or her LastName, FirstName, and StudentNumber, is an example of a ______________.

record

Relational databases enforce ______________ integrity to ensure, for instance, that a teacher can't be assigned to a CLASS table unless they already exist in the TEACHER table.

referential

Relational databases enforce​ ______________ integrity to​ ensure, for​ instance, that a teacher​ can't be assigned to a CLASS table unless they already exist in the TEACHER table.

referential

Socialbility

refers to the ability of a computer, product, or system to expand to serve a large number of users without breaking down.

If you accept a position as an information systems manager, you have a(n) __________ to accpet the costs, benefits, and obligations for the decisions you make:

responsibility

If you accept a position as an information systems manager, you have a(n) ____________ to accept the costs, benefits, and obligations for the decisions you make.

responsibility

If you accept a position as an information systems​ manager, you have​ a(n) ____________ to accept the​ costs, benefits, and obligations for the decisions you make.

responsibility

A mechanism that enables the U.S. government to extend consumer protection beyond U.S. borders through private policies and self-regulation that meet U.S. guidelines:

safe harbor

A(n) _____ is a mechanism that enables the U.S. government to extend consumer protection beyond U.S. borders through private policies and self-regulation that meet U.S. guidelines.

safe harbor

A(n) _____ is a mechanism that enables the U.S. government to extend consumer protection beyond U.S. borders through private policies and​ self-regulation that meet U.S. guidelines.

safe harbor

he IT infrastructure computer software component includes both​ ____________ and​ __________ software categories.

system: application

The IT infrastructure computer software component includes both​ ____________ and​ __________ software categories.

system; application

IT professionals working to make a new system work with an existing system is focusing on:

systems integration

IT professionals working to make a new system work with an existing system is focusing​ on:

systems integration

which of the following is false regarding business process​ management?

the BPM process concludes once metrics are established and the system is implemented.

The system software that manages and controls the computer's activities is called __________.

the operating system

Software Packages

A prewritten, precoded, commericially available set of programs that eliminates the need for individuals or organizations to write their own software programs for certain functions.

Do you think Big Data analytics could change the outcome of an election?

- May have changed the outcome in 2008 and 2012 elections - Many agree democrats had competitive advantage in utilizing Big Data Analytics

What should companies do to succeed with Big Data?

- Simplify - Coexist - Visualize - Empower - Integrate - Govern - Evangelize

Virtualization

5.2.4- ______ is the process of presenting computing resources that are accessed in ways that appear to not be restricted by physical configuration or geographic location.

Software as a Service (SaaS)

5.3.1- Google Apps is a popular cloud-based:

Capacity planning

5.4.1- What is the process of predicting when a computer hardware system will become saturated?

Capacity Planning

5.4.2- Attempting to determine when a computer hardware system will be maxed out is called:

Hybrid Cloud

5.4.2- Numerous companies choose a(n) ______ model where they retain some infrastructure in-house --- primarily their critical systems--- with the less-essential systems outsourced to a third party.

A data mart usually can be constructed more rapidly and at lower cost than a data warehouse because: A) it typically focuses on a single subject area or line of business. B) all the information is historical. C) it uses a Web interface. D) all of the information belongs to a single company.

A

A practice in which eavesdroppers drive by buildings or park outside and try to intercept wireless network traffic is referred to as: A) war driving. B) sniffing. C) cybervandalism. D) driveby tapping.

A

An important word associated with social business is​ ___________ which includes​ customers, suppliers,​ employees, managers, and oversight committees. A. conversations B. customer attention C. business intelligence D. database E. digital dashboard

A

Application controls: A) can be classified as input controls, processing controls, and output controls. B) govern the design, security, and use of computer programs and the security of data files in general throughout the organization. C) apply to all computerized applications and consist of a combination of hardware, software, and manual procedures that create an overall control environment. D) include software controls, computer operations controls, and implementation controls.

A

For​ technology, which are the three interrelated advances that make MIS so exciting now and into the​ future? A. Big​ data, cloud​ computing, and the mobile digital platform B. Social​ media, virtual​ meetings, and cloud computing C. Big​ data, social​ media, and cloud computing D. Cloud​ computing, the​ Internet, and databases E. Big​ data, cloud​ computing, and telecommunications

A

Frustrated customers angry about a site not working is an example of which IT cost of ownership​ (TCO)? A. Downtime B. Infrastructure C. Fault Tolerance D. Space and Energy E. Mashup

A

If you include​ hardware, software,​ networking, and necessary management​ consulting, this amounts to over​ ________ in 2015 in the United States. A. ​$1 trillion B. ​$3.8 trillion C. ​$500 billion D. ​$1 billion E. ​$100 billion

A

In Europe, and much of the world, the standard for cellular services is: A) GSM. B) LTE. C) Wi-Max. D) CDMA.

A

In TCP/IP, IP is responsible for: A) disassembling and reassembling of packets during transmission. B) establishing an Internet connection between two computers. C) moving packets over the network. D) sequencing the transfer of packets.

A

Pharming involves: A) redirecting users to a fraudulent Web site even when the user has typed in the correct address in the Web browser. B) pretending to be a legitimate business's representative in order to garner information about a security system. C) setting up fake Web sites to ask users for confidential information. D) using e-mails for threats or harassment.

A

Putting a key logger on your​ boss's computer without permission would be considered​ a(n) ___________. A. computer crime B. ethical C. computer abuse D. well intentioned E. spam

A

Regarding dimensions of business​ problems, a lack of properly trained employees is considered a​ ______________ dimension. A. people B. technology C. training D. organizational E. networking

A

Running a Java program on a computer requires: A) a Java Virtual Machine to be installed on the computer. B) a Java Virtual Machine to be installed on the server hosting the Java applet. C) an applet to be downloaded to the user's computer. D) no extra or specialized software, as Java is platform-independent.

A

Application Server

A computer on a network that is dedicated to running applications and delivering applications to client computers.

What is a data manipulation language?

A data manipulation language is a language associated with a database management system that end users and programmers use to manipulate data in the database.

What does this describe: "A structured survey of the accuracy and level of completeness of the data in an information system"

A data quality audit

Cloud Computing

A model of computing in which firms and individuals obtain computing resources over the internet

What are the steps of the problem solving​ process? A. Problem​ Identification, Solution​ Design, and Solution Implementation B. Problem​ Identification, Team​ Organizing, Resolution​ Building, and Resolution Implementation C. Problem​ Identification, Solution​ Design, Solution Evaluation and​ Choice, and Implementation D. Problem​ Definition, Problem​ Scrutiny, Generating​ Solutions, Analyzing the Solutions and Selecting the best Solution E. Defining the​ problem, choosing the best​ solution, implementing the solution.

C

What does Data Management Software do with business data regarding​ inventory, customers, and​ vendors? A. Data Management Software makes business data searchable via Google. B. Data Management Software aggregates data purchased from BigData. C. Data Management Software​ organizes, manages, and processes business data. D. Data Management Software merges it with HTML to make a web page. E. Data Management Software merges it with SQL to make a database.

C

Intellectual property can best be described as: A) tangible or intangible property created from a unique idea. B) the expression of an intangible idea. C) intangible property created by individuals or corporations. D) unique creative work or ideas.

C) intangible property created by individuals or corporations.

What affects approximately​ 90% of persons who spend 3 or more hours a day at a​ computer?

CVS

Which of the following is NOT a function of a data warehouse?

Catalog data

Which of the following is NOT a function of a data​ warehouse?

Cleanse data

Computer hardware platforms

Client machines. - Desktop PCs, laptops. - Mobile computing: smartphones, tablets. Servers. - Blade servers: ultrathin computers stored in racks. Mainframes: - IBM mainframe equivalent to thousands of blade servers. Top chip producers: Intel, AMD.

What is a widely used form of distributed​ processing?

Client/Server Computing

3 different types of services

Cloud infrastructure as a service Cloud platform as a service Cloud software as a service (google apps)

What affects approximately​ 90% of persons who spend 3 or more hours a day at a​ computer?

Computer Vision Syndrom (CVS)

What affects approximately 90% of persons who spend 3 or more hours a day at a computer?

Computer Vision Syndrome (CVS)

What affects approximately​ 90% of persons who spend 3 or more hours a day at a​ computer?

Computer Vision Syndrome​ (CVS)

Server

Computer specifically optimized to provide software and other resources to other computers over a network.

What affects approximately 90% of persons who spend 3 or more hours a day at a computer?

Computer vision syndrome

Types of Computer Hardware

Computers Servers Mainframes Supercomputers Grid computing Computer Networks and Client/Server Computing Client/server computing:

Moore's law and microprocessing power

Computing power doubles every 18 months (later changed to 2 years). Nanotechnology: Shrinks size of transistors to size comparable to size of a virus. There are at least three variations of Moore's Law, none of which were ever stated: 1. The power of the microprocessors doubles every 18 months; 2. Computing power doubles every 18 months; and 3. The price of computing falls by half every 18 months.

Platform as a Service (PaaS)

Customers use infrastructure and programming tools supported by the cloud service provider to develop their own applications.

Infrastructure as a Service (IaaS)

Customers use processing, storage, networking, and other computing resources from cloud service providers to run their information systems.

A network that covers entire geographical regions is most commonly referred to as a(n): A) local area network. B) intranet. C) peer-to-peer network. D) wide area network.

D

Because important financial documents are required to be submitted via the Internet in formats such as​ XBRL, ______________ has been impacted by information systems. A. management B. marketing C. instructional technology D. accounting E. finance

D

Data mining is more ________ than OLAP. A) data focused B) multidimensional C) query oriented D) discovery driven

D

Enterprise Systems are also known as​ ________________. A. Cloud computing B. Transaction Processing Systems​ (TPS) C. Enterprise Social Systems D. Enterprise Resource Planning​ (ERP) Systems E. Parallel processing

D

In a(n) ________ computing model, companies use their own infrastructure for essential computing tasks and adopt public cloud computing for less critical operations or additional processing during peak business periods. A) scalable B) quantum C) autonomic D) hybrid cloud

D

Most antivirus software is effective against: A) only those viruses active on the Internet and through e-mail. B) any virus. C) any virus except those in wireless communications applications. D) only those viruses already known when the software is written.

D

Most larger corporations utilize a​ ______ to consolidate data from a business along with external data. A. DBMS B. data mart C. Hadoop D. data warehouse E. data consolidator

D

Numerous companies choose​ a(n) _________ model where they retain some infrastructure ​in-houselong dashprimarily their critical systemslong dashwith the​ less-essential systems outsourced to a third party. A. hierarchical B. web hosting C. onshore outsourcing D. hybrid cloud E. service level

D

Outsourcing to domestic U.S. firms and​ _____________ outsourcing are both considered ways to reduce costs by US organizations. A. China B. Canada C. network D. offshore E. Internet

D

What affects approximately​ 90% of persons who spend 3 or more hours a day at a​ computer? A. Retinal socket swelling B. Retinal Pixelazation​ (RP) C. Repetitive Upper Spinal Strain​ (RUSS) D. Computer Vision Syndrome​ (CVS) E. Cognitive Dimming

D

What are the dimensions of information​ systems? A. ​Organizations, Data, and Information Technology B. Coarseness of​ data, depth of​ information, and source reliance C. ​Information, Data, and Internet Technology D. ​Organizations, People, and Information Technology E. ​Information, Data, and Computer Technology

D

What is the purpose of a DBMS's data definition function? A) Storing and managing the data in the database B) Storing definitions of data elements C) Normalizing the database D) Structuring the database

D

Which of the following is considered by many to be the defining Web 2.0 application? A) Instant messaging B) E-mail C) Blogging D) Social networking

D

Which of the following is not a typical feature of DBMS? A) Data manipulation language B) Report generation tools C) Data dictionary D) Query wizard tool

D

Which of the following is not an example of a computer used as an instrument of crime? A) Theft of trade secrets B) Intentionally attempting to intercept electronic communication C) Unauthorized copying of software D) Breaching the confidentiality of protected computerized data

D

The most popular data manipulation language and method to​ "question" a database is called​ ______________. A. Data Definition Language B. Simple Question Language C. Standard Query Process D. Structured Query Language E. Structured Question Language

D. Structured Query Language

What is​ service-oriented architecture​ (SOA)? A. A​ service-oriented computer platform B. An​ XML-based productivity suite C. A​ service-oriented operating system architecture D. A set of​ self-contained services that communicate with each other to create a working software application E.A​ service-oriented networking architecture

D. A set of​ self-contained services that communicate with each other to create a working software application

What is a specific software for creating, storing, organizing, and accessing data from a database?

DBMS; the DBMS relieves the user of having to understand where and how the data are stored by separating the logical and physical views of the data.

Which of the following is typically used for large data backups of servers?

DLT tape Explanation DLT tape systems are used primarily for backups. The large storage capacity of these systems make them ideal for server backups. CD-R and DVD-R do not provide sufficient storage capacity for server backups. RAID is a data protection method that preserves data on hard disks if one disk in a set fails. It is not considered a back mechanism.

What technology trend raises ethical issues related to the limitless data that can be collected about​ you?

Data storage costs rapidly decline

What is this scenario about: "David creates a central database by extracting, transforming, and loading metadata from various internal and external sources of info. He plans to use this database for executing various functions."

Data warehouse

Data management and storage

Database software: IBM (DB2), Oracle, Microsoft (SQL Server), Sybase (Adaptive Server Enterprise), MySQL. Physical data storage: EMC Corp (large-scale systems), Seagate, Western Digital. Storage area networks (SANs): Connect multiple storage devices on dedicated network.

What are some important database design principles?

Designing a database requires both a logical design and a physical design. The logical design models the database from a business perspective. The organization's data model should reflect its key business processes and decision-making requirements. The process of creating small, stable, flexible, and adaptive data structures from complex groups of data when designing a relational database is termed normalization. A well-designed relational database will not have many-to-many relationships, and all attributes for a specific entity will only apply to that entity. It will try to enforce referential integrity rules to ensure that relationships between coupled tables remain consistent. An entity-relationship diagram graphically depicts the relationship between entities (tables) in a relational database.

Why are information policy, data administration, and data quality assurance essential for managing the firm's data resources?

Developing a database environment requires policies and procedures for managing organizational data as well as a good data model and database technology. A formal information policy governs the maintenance, distribution, and use of information in the organization. In large corporations, a formal data administration function is responsible for information policy, as well as for data planning, data dictionary development, and monitoring data usage in the firm. Data that are inaccurate, incomplete, or inconsistent create serious operational and financial problems for businesses because they may create inaccuracies in product pricing, customer accounts, and inventory data, and lead to inaccurate decisions about the actions that should be taken by the firm. Firms must take special steps to make sure they have a high level of data quality. These include using enterprise-wide data standards, databases designed to minimize inconsistent and redundant data, data quality audits, and data cleansing software.

Which of the following adjusts copyright laws to the Internet age by making it illegal to​ make, distribute, or use devices that circumvent​ technology-based protections of copyrighted​ materials?

Digital Millennium Copyright Act

Concerning​ Porter's model and the​ Internet, which of the following is false​?

Due to technology​ requirements, the threat of new entrants decreases.

A​ __________________ is a popular business organization that has a product or service created in the home country​ (i.e., McDonald's and Chem​ Dry), and distributes the same products worldwide. Individual stores or locations are often owned by a local individual. A. partnership B. transnational C. corporation D. multinational E. franchiser

E

In a student​ database, a column called LastName would be an example of​ a(n) _____________. A. database B. entity C. record D. file E. attribute

E. attribute

​______ is a set of applications that manages the activities and resources of a computer. A.Network software B.Platform software C.Application software D.Management software E.System software

E.System software

Enterprise software applications

Enterprise application providers: SAP and Oracle. Middleware providers: IBM, Oracle.

Consulting and system integration services

Even large firms do not have resources for full range of support for new, complex infrastructure. Leading consulting firms: Accenture, IBM Global Services, HP, Infosys, Wipro Technologies. Software integration: ensuring new infrastructure works with legacy systems. Legacy systems: older TPS created for mainframes that would be too costly to replace or redesign

​Surprisingly, laws guiding American privacy law are based on a 1973 report called the​ _____________.

FIP

An analog signal is a discrete, binary waveform that transmits data coded into two discrete states such as 1-bits and 0-bits.

False

An information policy specifies the procedures and rules for defining the structure and content of corporate databases.

False

Application server software is responsible for locating and managing stored Web pages.

False

Most back-end databases are able to interpret HTML commands.

False

OLAP is used to find hidden patterns and relationships in large databases, and infer rules from these to infer future behavior.

False

The two key services of Hadoop are HDFS and in-memory computing.

False

XML is limited to describing how data should be presented in the form of Web pages; HTML can perform presentation, communication, and storage of data.

False

Mobile search makes up approximately 10% of all Internet searches.

False (20%)

A hub is a networking device that connects network components and is used to filter and forward data to specified destinations on the network.

False (switch, not a hub)

Which of the following is NOT a function of a data​ warehouse?

Filter data

On-Demand Computing

Firms off-loading peak demand for computing power to remote, large-scale data processing centers, investing just enough to handle average processing loads and paying for only as much additional computing power as they need. Also called utility computing.

Operating Systems

First software loaded on a computer. It manages all the software applications and determines which applications take priority, manages memory requests, and communicates with input and output devices. (Example: Linux, Windows XP, and Macintosh X.)

Case 6.5 Is there a strong case to make for large cities to use Big Data Analytics and related information technologies? Identify and discuss examples of what can be done with analytics beyond what is portrayed in this application case.

For the Dublin case, Big Data Analytics were used primarily to ease traffic problems and better understand the traffic network.

collectively, the coordination of computer hardware, software, data management, networking, and technology services collectively is termed:

IT infastructure

Which of the following best defines IT infrastructure?

IT infrastructure is the shared technology resources that provide the platform for the firm's specific information system applications.

Collectively, the coordination of computer​ hardware, software, data​ management, networking, and technology services collectively is​ termed:

IT infrastructure.

​Collectively, the coordination of computer​ hardware, software, data​ management, networking, and technology services collectively is​ termed:

IT infrastructure.

What is the first step you should take in managing data for a firm?

Identify the data needed to run the business.

What is the first step you should take in managing data for a​ firm?

Identify the data needed to run the business.

Servers

If your business has number of computers networked together or maintains a website Optimized to support computer networks, sharing files, and resources Provide hardware platform for e-commerce by adding special software, they can be customized to deliver web pages, process purchase and sale transactions, or exchange data with systems inside the company

Which of the following is not an advantage of SSDs over HDDs?

Inexpensive Explanation Solid State Drives (SDDs) are generally more expensive than hard disk drives (HDDs). Some advantages of SSDs over HDDs include the following: They are faster They have no moving parts so they last longer. They have lower power consumption. They are less susceptible to physical damage (from dropping) and immune from magnetic fields. They are smaller and lighter.

If Megan sends out unauthorized data to another organization, she has likely violated the company's?

Information policy

Which is the BEST description of intellectual property?

Intangible property created by individuals or corporations

Which is the BEST description of intellectual? property?

Intangible property created by individuals or corporations

Which is the BEST description of intellectual​ property?

Intangible property created by individuals or corporations

____________________because blending data from disparate sources for your organization is an essential part of Big Data Analytics. Organizations that can blend different relational, semi-structured, and raw data sources in real time, without expensive up-front costs, will the ones that get the best value from Data.

Integrate

Multicore Processor

Integrated circuit to which two or more processors have been attached for enhanced performance, reduced power consumption and more efficient simultaneous processing of multiple tasks.

Which of the following is false concerning the social and cultural issues in regard to the prevalence of information systems?

It is an equalizer for social classes and minorities.

Which of the following is FALSE about the digital divide in the? U.S.?

It is based only on having fair access to digital technology.

Which of the following is FALSE about the digital divide in the​ U.S.?

It is based only on having fair access to digital technology.

What is one of "The Sexiest Job of the 21st Century"?

LSU ISDS Masters of Science in Analytics

Computers

Laptops (personal computers), Mobile Devices, Workstations - Desktops in the office

Case 6.1 What were the proposed solution and the obtained results?

Luxottica did not outsource their data storage and promotional campaign development and management, nor did they merge with companies in Asia.

SYSTEM SOFTWARE

MANAGES THE RESOURCES AND ACTIVITIES OF THE COMPUTER

Secondary storage technology

Magnetic Disk (looks like phonograph) Optical Drives Storage Networks (SANs)

________ is free software created and updated by a worldwide community of programmers. A) Open-source software B) A web service C) An app D) Cloud-based software E) Office software

A) Open-source software

Software applications that are based on combining different online software applications are​ called:

Mashups

Apps

Mobile apps

Mobile Digital Trend

Mobile devices, smartphones, Netbooks, tablets, e-book readers

What is the first step you should take in managing data for a​ firm? A. Identify the data needed to run the business. B. Back up the data. C. Normalize the data before importing to a database. D. Audit your data quality. E. Cleanse the data before importing it to any database.

A. Identify the data needed to run the business.

Relational tables need to be​ ______________ to help avoid duplicate data. A. normalized B. entitled C. relationally modeled D. task modeled E. ethically analyzed

A. normalized

___________________________ is an open source operating system for mobile devices. A.Android B.Moodle C.Linux D.UNIX E.Windows mobile

A.Android

Frustrated customers angry about a site not working is an example of which IT cost of ownership​ (TCO)? A.Downtime B.Fault Tolerance C.Infrastructure D.Space and Energy E.Mashup

A.Downtime

HTML5

Next evolution of HTML, which will make it possible to embed images, video,and audio directly into a document without add-on software.

Which of the following are advantages of solid state storage compared to hard drives?

No moving parts. Lower power requirements Explanation Solid state drives have the following advantages when compare to hard disk drives: They have lower power consumption. They have no moving parts (and hence less prone to failure) They are faster They are less susceptible to physical damage (from dropping) They are smaller and lighter. They are smaller and lighter. They use standard SATA disk interfaces. The storage capacity for SSDs is small in comparison to HDDs. SSDs are several times more expensive than comparable HDDs.

What method does an eMMC card use for storing data?

Non-volatile memory chips. Explanation Flash devices store information using programmable, non-volatile flash memory. Common flash devices are eMMC, SD, SSD, MiniSD, MicroSD, memory sticks, and USB thumb drives. DLT drives use magnetic tape. Hard disks use magnetic disks and platters. Optical drives use a reflective surface and optical readers.

Which tool enables users to view the same data in different ways using multiple dimensions?

OLAP

Which tool enables users to view the same data in different ways using multiple​ dimensions?

OLAP

Legacy Systems

Older systems current in use in a facility that often cannot be easily replaced but must become part of new systems.

Where is a cookie that is created during a Web site visit? stored?

On the? visitor's computer

Where is a cookie that is created during a Web site visit​ stored?

On the​ visitor's computer

Characteristics of Cloud Computing

On-demand self service Ubiquitous network access Location independent resource pooling Rapid elasticity Measured service

What does this define: "The capability for manipulating and analyzing large volumes of data from multiple perspectives"

Online analytical processing, OLAP.

____________________ involves determining who is responsible for actions taken

Accountability

Among the five identified moral dimensions of the information age, which addresses the question of liability related to information systems?

Accountability and control

Among the five identified moral dimensions of the information​ age, which addresses the question of liability related to information​ systems?

Accountability and control

Competitive forces model for IT infrastructure investment

Addresses the question of how much your firm should spend on IT Infrastructure. 1. Market demand for firm's services. 2. Firm's business strategy. 3. Firm's IT strategy, infrastructure, and cost. 4. Information technology assessment. 5. Competitor firm services. 6. Competitor firm IT infrastructure investments. (See page 203 for details)

Which of the following is FALSE about techno? stress?

Affected people start to behave like? computers, devoid of emotions.

Which of the following is FALSE about techno​ stress?

Affected people start to behave like​ computers, devoid of emotions.

A field identified in a record as holding the unique identifier for that record is called the: A) primary key. B) key field. C) primary field. D) foreign key.

B

A(n) ________ is a box consisting of a radio receiver/transmitter and antennas that links to a wired network, router, or hub. A) hot spot B) access point C) server D) wireless router

B

All of the following are tools or technologies for extracting information from unstructured data sets except: A) sentiment analysis software. B) SQL queries. C) Hadoop. D) Non-relational DBMS.

B

The development and use of methods to make computer systems resume their activities more quickly after mishaps is called: A) high-availability computing. B) recovery-oriented computing. C) fault-tolerant computing. D) disaster-recovery planning.

B

The device that acts as a connection point between computers and can filter and forward data to a specified destination is called a(n): A) hub. B) switch. C) router. D) NIC.

B

Software Trends:

Open source software Cloud-based software and tools Mashups Apps

Computer Software

Operating System Software PC, Server, and Mobile Operating Systems Software Packages and desktop productivity tools

Unix

Operating system developed by AT&T. It is considered portable, meaning it can run on just about any hardware platform.

Ideal for music and video. Portable and cheap with a long shelf life.

Optical disc

Uses lasers to read and write information stored in the form of pits in their reflective coating.

Optical disc

Which of the following best describes the importance of creating an accurate data model for your business's database? A) It is not essential, as the data model itself is modified by the database continuously. B) Critical, as without one, your data may be inaccurate, incomplete, or difficult to retrieve C) Essential, as table relationships cannot be created without an accurate data model D) Somewhat important, as the type of data model will define what kinds of data will be stored

B

Which type of network is used to connect digital devices within a half-mile or 500-meter radius? A) Microwave B) LAN C) WAN D) MAN

B

You are working in the IT department of a small paper supply company and planning a new database that monitors employee benefits and productivity. What would be the relationship you need to establish between Employee_ID in the Employee table and Parking_spot_number in the Perks table? A) one-to-many B) one-to-one

B

Which of the following refers to the ability of a computer, product, or system to expand to serve a larger number of users without breaking down? A) Modifiability B) Scalability C) SLA D) Disintermediation E) Expandability

B) Scalability

The main challenge coming to Microsoft's Office software suite will be: A) mobile software. B) Web-based productivity software such as Google Apps. C) in-house, custom software created using open-source Web services. D) open-source, Linux-based suites such as StarOffice.

B) Web-based productivity software such as Google Apps.

Most larger corporations utilize a​ ______ to consolidate data from a business along with external data. A. data mart B. data warehouse C. data consolidator D. DBMS E. Hadoop

B. data warehouse

The special organizational function whose responsibilities include the technical and operational aspects of managing​ data, including physical database design and​ maintenance, is called​ ________. A. data auditing B. database administration C. information policy administration D. data administration E. data mining

B. database administration

What is the process of predicting when a computer hardware system will become​ saturated? A.Burden testing B.Capacity planning C.Overload planning D.Saturation testing E.Permeation testing

B.Capacity planning

What does Data Management Software do with business data regarding​ inventory, customers, and​ vendors? A.Data Management Software merges it with HTML to make a web page. B.Data Management Software​ organizes, manages, and processes business data. C.Data Management Software merges it with SQL to make a database. D.Data Management Software makes business data searchable via Google. E.Data Management Software aggregates data purchased from BigData.

B.Data Management Software​ organizes, manages, and processes business data.

What is it called when companies combine data from multiple sources and create electronic dossiers of detailed information on​ individuals? A.Social gathering B.Profiling C.BigData D.Data rooting E.Data sourcing

B.Profiling

Which of the following statements is FALSE about business intelligence (BI) systems?

BI systems are used by any business professionals and knowledge workers.

Which of the following statements is FALSE about business intelligence​ (BI) systems?

BI systems only support​ decision-making activities

BYOD

BRING YOUR OWN DEVICE

Why is a relational DBMS so powerful?

Because relational database products are available as cloud computing services.

What is the term for data sets with volumes so huge that they are beyond the ability of typical DBMS to​ capture, store, and​ analyze?

Big Data

Case 6.2 How can Big Data benefit large-scale trading banks?

Big Data can potentially handle the high volume, high variability, continuously streaming data that trading banks need to deal with. Traditional relational databases are often unable to keep up with the data demand.

Among the following statements, which one is NOT applicable to big data?

Big data can be processed with traditional techniques.

Among the following​ statements, which one is NOT applicable to big​ data?

Big data can be processed with traditional techniques.

What is the term for data sets with volumes so huge that they are beyond the ability of typical DBMS to capture, store, and analyze?

Big data; big data consists of unstructured or semistructured data not suitable for relational database products that organize data in the form of columns and rows.

What term describes data sets like Google's database that are too big for traditional DBMS to handle?

Big data; big data is used to describe data sets with volumes so huge that they are beyond the ability of typical DBMS to capture, store, and analyze.

In order to manage their relationship with an outsourcer or technology service provider, firms need a contract that includes a(n): A) TCO. B) SOA. C) SLA. D) API.

C

Software applications that combine different components of online software applications are referred to as: A) integrated software. B) widgets. C) mashups. D) grid computing.

C

Virtualization

Process of presenting a set of computing resources so they can be accessed in ways that are unrestricted by physical configuration or geographic location Enables single physical resource to appear to the user as multiple resources. Enables companies to host multiple systems on single machine.

What is it called when companies combine data from multiple sources and create electronic dossiers of detailed information on​ individuals?

Profiling

Open source software

Provides all computer users free access to its program code, so they can modify code to fix errors or to make improvements) -Linux, apache

Networking and telecommunications technology

Provides data, voice, and video connectivity to employees, customers, and suppliers

Data management technology

Organizes, manages, and processes business data concerned with inventory, customers, and vendors

​A(n) __________ key uniquely identifies a row or record in a table.

PRIMARY

________________________This type of analytics evaluates every incoming observation against all prior observations when analyzing Big Data in the context of intelligent systems and recognizing how the new observation relates to all prior observations enables the discovery of real-time insights.

Perpetual Analytics

Which U.S. act restricts the information the federal government can collect and regulates what it can do with the information?

Privacy Act of 1974

Which U.S. act restricts the information the federal government can collect and regulates what it can do with the​ information?

Privacy Act of 1974

Which of the following is NOT a rule in an organization's information policy?

Procedures and accountabilities around managing data resources

When thinking about managing and controlling data within a​ company, which of the following is false​?

The actual physical database is never created by the database administration of a company

When thinking about managing and controlling data within a​ company, which of the following is false​?

The actual physical database is never created by the database administration of a company.

Among the following, what is the best way to distinguish between reporting tools and data mining tools?

The complexity of techniques used

Among the​ following, what is the best way to distinguish between reporting tools and data mining​ tools?

The complexity of techniques used

iOS

The operating system owned and developed by Apple and used for their various mobile devices.

Which Ethical rule below is combined with its proper description?

The utilitarian principle; assumes values are prioritized in an order and the consequences of various courses of action are understood

Which Ethical rule below is combined with its proper​ description?

The utilitarian​ principle; assumes values are prioritized in an order and the consequences of various courses of action are understood

Which is TRUE of a​ multi-tiered network?

The work of the entire network is balanced over several levels of servers.

Seven Main Components of IT Infrastructure

These components constitute investments that must coordinated with one another to provide the firm with a coherent infrastructure. 1. Computer hardware platforms. 2. Operating system platforms. 3. Enterprise software applications. 4. Data management and storage. 5. Networking/telecommunications platforms. 6. Internet platforms. 7. Consulting system integration services.

The database administration functions of an organization are responsible for defining and maintaining a database. What performs these functions?

These functions are performed by a database design and management group.

In a large company today, you will often find an infrastructure that includes hundreds of small LANs linked to each other as well as to corporate-wide networks.

True

OLAP is a key tool of BI.

True

Public key encryption uses two keys.

True

The collection of Web services that are used to build a firm's software systems constitutes what is known as a service-oriented architecture.

True

The traditional means for capturing, storing, and analyzing data are not capable of dealing with Big Data effectively and efficiently and so a new breed of technologies are needed to take on the Big Data (developed or purchased or hired or outsourced).

True

The trunk lines of the Internet are typically owned by network service providers.

True

To create a computer network, you must have at least two computers.

True

To secure mobile devices, a company will need to implement special mobile device management software.

True

What are examples of steps firms may take to make sure they have a high level of data quality?

Using enterprise-wide data standards, performing data quality audits, and using databases designed to minimize inconsistent and redundant data.

Andrew analyzes an ethical issue at work, evaluates the outcomes of various options, and chooses the one that achieves the greatest value. Which ethical principle is Andrew applying?

Utilitarian principle

Metcalfe's Law and network economics

Value or power of a network grows exponentially as a function of the number of network members. As network members increase, more people want to use it (demand for network access increases).

__________________ -Data flows can be highly inconsistent, with periodic peaks, making data loads hard to manage.

Variability

______________________ -Data today comes in all types of formats-ranging from traditional databases to hierarchical data stores created by the end users and OLAP systems, to text documents, e-mail, XML, meter-collected, sensor-captured data, to video, audio, and stock ticker data. By some estimates, 80 to 85 percent of all organizations' data is in some sort of unstructured or semi-structured format.

Variety

Why is a relational DBMS so powerful?

Relational database products are available as cloud computing services.

Case 6.2 What did Big Data offer to address this problem?

Scalability, benefits included a new alert feature, less downtime, faster capacity to process complex changes, and reduced operations costs.

Service-Oriented Architecture (SOA)

Set of self-contained services that communicate with one another to create a working software application. Software developers reuse these services in other combinations to assemble other applications as needed. - Example: an "invoice service" to serve whole firm for calculating and sending printed invoices. Dollar Rent A Car. - Uses Web services to link online booking system with Southwest Airlines' Web site.

A use case in the energy industry for stream analytics is a classic ___________________ application for the electric power supply chain.

Smart Grid

The mobile digital platform

Smartphones (iPhone, Android, and Blackberry). - Data transmission, Web surfing, e-mail, and IM. Netbooks: Small lightweight notebooks optimized for wireless communication and core tasks Tablets (iPad). Networked e-readers (Kindle and Nook). Wearable devices (smart watches, smart glasses).

What software is used for data cleansing?

Specialized data cleansing software are used to automatically survey data files.

Software applications that are based on combining different online software applications are called:

mashups

Software applications that are based on combining different online software applications are​ called:

mashups

Racking your movements without consent is most related to the trend,

mobile device growth impact

Tracking your movements without consent is most related to the? trend, ___________, where technology trends raise ethical issues.

mobile device growth impact

Professional organizations like the American Medical Association have ___________________, which includes specific conduct guidelines such as, do not harm.

professional codes of conduct

six sigma is a specific measure of​ _________, representing​ ____________________.

quality; 3.4 defects per million opportunities

​_______________ databases are by far the most popular type of database on the market today.

relational

The most common type of database is a​ __________.

relational database

Google Apps is a popular​ cloud-based:

software as a service​ (SaaS).

the poplar USB "thumb" drive uses a storage technology very similar to:

solid state drives

The popular USB​ "thumb" drive uses a storage technology very similar​ to:

solid state drives.

The popular USB​ "thumb" drive uses a storage technology very similar​ to:

solid states drive

The Windows operating system is an example of _____________

system software

​______ is a set of applications that manages the activities and resources of a computer.

system software

Which of the following statements about the power of a relational DBMS is false?

the relational database has become the primary method for organizing and maintaining data in information systems because it is so rigidly controlled

Cloud Computing

use of web services to perform functions that were traditionally performed with software on an individual computer; i.e. Flickr, Google Docs, etc.

the process of presenting computing resources that are accessed in ways that appear to not be restricted by physical configuration or geographic location:

virtualization

​_____ is the process of presenting computing resources that are accessed in ways that appear to not be restricted by physical configuration or geographic location.

virtualization

Another common name for a web beacon is a? ____________, which tracks user activities

web bug

Another common name for a web beacon is a​ ____________, which tracks user activities.

web bug

If a firm wants to learn more about its​ users, behaviors, and marketing​ effectiveness, they might turn to​ ____, relying on the huge amount of data available through the Internet.

web mining

A server dedicated to managing HTML pages is called​ a(n):

web server

a server dedicated to managing HTML pages is called​ a(n):

web server

A server dedicated to managing HTML pages is called a(n

web server.

Which of the following best describes a data quality audit?

a structured survey of the accuracy and level of completeness of the data in an information system

In a database, each column represents __________.

an attribute or a field

Which of the following best describes a data dictionary?

an automated or manual tool for storing and organizing information about the data maintained in a database

Determining the​ inputs, outputs, and resources​ required, and documenting the sequence of activities in a process typically occur during​ the:

analysis of existing processes

an open source operating system for mobile devices

android

__________ refers to programs written for a specific application to perform functions specified by end users.

application software

Application Software

applies to the computer to specific task for an end user, such as processing an order or generating a mailing list

Blade Servers

are computers consisting of a circuit board with processors, memory and network connections that are stored in racks.

the term ________________ describes data sets like google's database that are too big for traditional DBMS to handle

big data

what is the term for data sets with volumes so huge that they are beyond the ability of typical DBMS to capture, store, and analyze

big data

A ________ is represented by a 0 or 1. Eight together make a byte (i.e., 00101100).

bit

A​ ________ is represented by a 0 or 1. Eight together make a byte​ (i.e., 00101100).

bit

A​ ________ in a database represents a single character such as a letter or number.

byte

From an IT perspective, __________ is the process of predicting when a computer hardware system becomes saturated.

capacity planning

attempting to determine when a computer hardware system will be maxed out is called:

capacity planning

what is the process of predicting when a computer hardware system will become saturated?

capacity planning

Attempting to determine when a computer hardware system will be maxed out is​ called:

capacity planning.

Microsoft Azure SQL is an example of a _________________ database

cloud

Microsoft Azure SQL is an example of a​ _________________ database.

cloud

Putting a key logger on your​ boss's computer without permission would be considered​ a(n) ___________.

computer crime

Storage Area Networks (SANs)

connect multiple storage devices on a separate high-speed network dedicated to storage. The SAN creates a large central pool of storage that can be rapidly accessed and shared by multiple servers.

Which of the following is NOT a challenge of managing IT infrastructure?

consulting with shareholders on best practices

The​ _________ actually works with the​ databases, creating relations between tables and implementing controls that would minimize data issues and provide security for the data.

data administration

A location specified to include IT infrastructure such as storage, security, and system backup is called a:

data center.

Which of the following involves searching for patterns and relationships among data?

data mining

most larger corporations utilize a __________ to consolidate data from a business along with external data:

data warehouse

​A(n) _____________ is a database whose content focuses on historical organizational data.

data warehouse

The​ _________ actually works with the​ databases, creating relations between tables and implementing controls that would minimize data issues and provide security for the data.

database administration

Organizations perform data quality audits to __________.

determine accuracy and level of completeness of data

If someone at your work accuses you of sending inappropriate emails, you should be afforded:

due process

If someone at your work accuses you of sending inappropriate​ emails, you should be afforded​ _________________

due process

In a relational database generalized categories represent​ a(n) __________, and each category has characteristics called​ ______________.

entity; attributes

a ______________ is represented as a column in a database table that represents things like a person's first name, last name, and age

field

Which of the following is NOT a function of a data​ warehouse?

filter data

A​ _______________ is used to link the SUPPLIER and PART tables by entering SupplierID in the PART table.

foreign key

a _______________ is used to link the SUPPLIER and PART tables by entering SuplierID in the PART table

foreign key

A​ __________________ is a popular business organization that has a product or service created in the home country​ (i.e., McDonald's and Chem​ Dry), and distributes the same products worldwide. Individual stores or locations are often owned by a local individual.

franchiser

Legacy systems

generally older transaction processing systems created for older computers that continue to be used to avoid the high cost of replacing or redesigning them

what type of computing involves connecting computers that are not near another into a signal network and combining the computational power of the computers on the network?

grid computing

when a firm connects numerous computers together into one network to create one, very powerful computer system that has coordinated processing:

grid computing

​_____ is when a firm connects numerous computers together into one network to create​ one, very powerful computer system that has coordinated processing

grid computing

If you want to collect data (i.e., photos) from someone and use the data, you must obtain ________.

informed consent

If you want to collect data? (i.e., photos) from someone and use the? data, you must obtain? _____________

informed consent

If you want to collect data​ (i.e., photos) from someone and use the​ data, you must obtain​ ___________

informed consent

If you want to collect data​ (i.e., photos) from someone and use the​ data, you must obtain​ _____________.

informed consent

Keyboards, computer mice, touch screens, magnetic ink, and digital scanners are all examples of __________.

input devices

If a firm wants to learn more about its​ users, behaviors, and marketing​ effectiveness, they might turn to​ ____, relying on the huge amount of data available through the Internet.

Web mining

If a firm wants to learn more about its users, behaviors, and marketing effectiveness, what might they turn to?

Web mining, which relies on the huge amounts of data available through the Internet. It is possible to discern buying and social marketing patterns through the web data.

The Federal Trade Commission Fair Information Practice principle of Notice/Awareness states that:

Websites must disclose their information practices before collecting data.

The Federal Trade Commission Fair Information Practice principle of? Notice/Awareness states? that:

Websites must disclose their information practices before collecting data.

Disney is using​ a/an ___________ technology in the form of a wristband to help improve the guest experience by combining a​ guest's room​ key, park​ ticket, and eventually a​ vacation-planning system to make the experience more efficient with reduced wait times.

​radio-frequency identification​ (RFID)

Due Process

4.2.1- If someone at your work accuses you of sending inappropriate emails, you should be afforded ___________.

Liability

4.2.1- _______ is a feature of political systems in which laws permit individuals to recover damages done to them by the actions of others.

responsibility

4.2.2- If you accept a position as an information systems manager, you have a(n) _______ to accept the costs, benefits, and obligations for the decisions you make.

Safe Harbor

4.3.2- A formal name to describe self-regulating policies is called _______

What are the major objectives that businesses use information systems to​ achieve? A. Operational​ excellence, new​ products, services, and business​ models; customer/supplier​ intimacy; improved decision​ making; competitive​ advantage; and​ day-to-day survival B. Increase​ profit, decrease​ expenses, increase customer​ exposure, and customer relations management C. Operational​ excellence; customer​ intimacy; improved decision​ making; competitive​ advantage; and​ day-to-day survival D. ​Products; customer and supplier​ intimacy; improved decision​ making; competitive​ advantage; and​ day-to-day survival E. Customer​ relations; automated​ orders, customer and​ vendor; employee​ management; and data management

A

What is a specific software for​ creating, storing,​ organizing, and accessing data from a​ database? A. DBMS B. SQL C. Excel D. Dreamweaver E. HTML5

A

What is the first step you should take in managing data for a firm? A) Identify the data needed to run the business B) Cleanse the data before importing it to any database C) Normalize the data before importing to a database D) Audit your data quality

A

What is the term for data sets with volumes so huge that they are beyond the ability of typical DBMS to​ capture, store, and​ analyze? A. Big Data B. Hadoop C. DeepData D. ConsoliDATA E. Voluminous Data

A

Which of the following is a type of optical disk storage? A) CD-ROM B) Hard drive C) USB Flash drive D) Magnetic tape

A

Software as a Service (SaaS)

A form of cloud computing where a firm subscribes to a third-party software and receives a service that is delivered online. (Leading examples are Google Apps)

A foreign country attempting to access government networks in order to disable a national power grid would be an example of: A) phishing. B) denial-of-service attacks. C) cyberwarfare. D) cyberterrorism.

C

A multinational strategy is often described where financial management and strategy operate out of a central​ __________________. A. transnational B. exporter C. home base D. franchiser E. home field

C

A schematic of the entire database that describes the relationships in a database is called a(n): A) data dictionary. B) intersection relationship diagram. C) entity-relationship diagram. D) data definition diagram.

C

A set of self-contained services that communicate with each other to create a working software application is called: A) Web services. B) enterprise integration. C) SOA. D) ERP.

C

A single screen of graphs or charts of key performance indicators is known as​ a(n) ________________________. A. ESS B. aggregator C. digital dashboard D. portal E. DSS

C

A software suite: A) includes capabilities for presentation graphics as well as text-editing and spreadsheets. B) provides functions to support the collaborative activities of workgroups, including software for group writing, information-sharing, and electronic meetings. C) includes full-featured versions of application software bundled as a unit. D) combines the functions of important PC software packages.

C

An online store asking you to complete a customer satisfaction survey to better understand its customers after making a purchase is primarily addressing which business​ objective? A. competitive advantage B. decision making C. customer and supplier intimacy D. training E. survival

C

Analysis of an information system that rates the likelihood of a security incident occurring and its cost is included in a(n): A) security policy. B) AUP. C) risk assessment. D) business impact analysis.

C

Apple's ITunes and a traditional music store have very different business​ ___________ with regards to how they produce and deliver products to customers. A. analysts B. management C. models D. customers E. information systems

C

A thick magnetic disk made of aluminum platters. Uses read/write heads to access data stored on the platters.

Hard disk drive (HDD)

What are the principal tools and technologies for accessing information from databases to improve business performance and decision making?

Contemporary data management technology has an array of tools for obtaining useful information from all the different types of data used by businesses today, including semi-structured and unstructured big data in vast quantities. These capabilities include data warehouses and data marts, Hadoop, in-memory computing, and analytical platforms. OLAP represents relationships among data as a multidimensional structure, which can be visualized as cubes of data and cubes within cubes of data, enabling more sophisticated data analysis. Data mining analyzes large pools of data, including the contents of data warehouses, to find patterns and rules that can be used to predict future behavior and guide decision making. Text mining tools help businesses analyze large unstructured data sets consisting of text. Web mining tools focus on analysis of useful patterns and information from the World Wide Web, examining the structure of Web sites and activities of Web site users as well as the contents of Web pages. Conventional databases can be linked via middleware to the Web or a Web interface to facilitate user access to an organization's internal data.

______________________ is a method of capturing, tracking, and analyzing streams of data to detect events (out of normal happenings) of certain types that are worthy of the effort.

Critical event processing

The ethical principle that calls for hypothetically walking in the other? person's shoes before making a decision is called the? ______________

Golden Rule

The ethical principle that calls for hypothetically walking in the other​ person's shoes before making a decision is called the​ ______________

Golden Rule

The ethical principle that calls for hypothetically walking in the other​ person's shoes before making a decision is called the​ ______________.

Golden rule

Nearly 80 percent of the Internet searches conducted use ___________, which makes it the largest data repository in history.

Google

Nearly 80 percent of the Internet searches conducted use? ___________, which makes it the largest data repository in history

Google

Nearly 80 percent of the Internet searches conducted use​ ___________, which makes it the largest data repository in history.

Google

_____ is when a firm connects numerous computers together into one network to create​ one, very powerful computer system that has coordinated processing

Grid computing

​_____ is when a firm connects numerous computers together into one network to create​ one, very powerful computer system that has coordinated processing

Grid computing

​_______________ is an upgrade to traditional HTML because it allows the addition of multimedia features​ (i.e., video) without cumbersome​ add-ons.

HTML5

You've probably used __________ to find the best airfare on the Internet, get directions to a restaurant, do a search on Google, or connect with a friend on Facebook.

Hadoop

__________ breaks a big data problem down into sub-problems, distributes them among up to thousands of inexpensive computer processing nodes, and then combines the result into a smaller data set that is easier to analyze.

Hadoop

Explanation

Hard disk drives (HDD) are thick magnetic disks made of aluminum platters, They use read/write heads to access data stored on the platters. They have up to several TB in storage capacity and their cost per MB is cheap. Solid state drive (SSD) is a flash device with storage capacity similar to a small hard drive. They are faster than other devices. They have no moving parts and last longer than other storage devices. Optical discs use lasers to read and write information that is stored in the form of pits in their reflective coating. They are ideal for storing and playing music and video. They are portable and cheap and have a long shelf life.

What are the components for IT infrastructure?

Hardware, software, data management technology, Networking & telecommunications technology, and technology services

Internet platforms

Hardware, software, management services to support company Web sites (including Web-hosting services), intranets, extranets. Internet hardware server market: IBM, Dell, Sun (Oracle), HP. Web development tools/suites: Microsoft (Visual Studio and .NET), Oracle-Sun (Java), Adobe, Real Networks.

What is the domestic exporter strategy characterized​ by?

Heavy centralization of corporate activities in the home country of origin

Hitachi's new wearable device that can track office temperature, interactions, and even movements around the office is called the:

Hitachi Business Microscope (HBM).

Hitachi's new wearable device that can track office​ temperature, interactions, and even movements around the office is called​ the:

Hitachi Business Microscope​ (HBM).

​Hitachi's new wearable device that can track office​ temperature, interactions, and even movements around the office is called​ the:

Hitachi Business Microscope​ (HBM).

Companies use a​ _______ model to analyze the costs of obtaining and maintaining an IT system to determine if it is feasible to have the information system as internal or outsourced.

TCO

Companies use a​ _______ model to analyze the costs of obtaining and maintaining an IT system to determine if it is feasible to have the information system as internal or outsourced.

TCO (Total cost of ownership)

companies use a _____________ model to analyze the costs of obtaining and maintaining an IT system to determine if it is feasible to have the information system as internal or outsources:

TCO - total cost of ownership model

VIRTUALIZATION

THE PROCESS OF PRESENTING A SET OF COMPUTER RESOURCES SO THAT THEY CAN ALL BE ACCESSED IN WAYS THAT ARE NOT RESTRICTED BY PHYSICAL CONFIGURATION OR GEOGRAPHICAL LOCATION

Networking/telecommunications platforms

Telecommunication services: - Telecommunications, cable, telephone company charges for voice lines and Internet access - AT&T, Verizon Network operating systems:Windows Server, Linux, Unix. Network hardware providers: Cisco, Alcatel-Lucent, \Juniper Networks.

Fiber-optic cable is more expensive and harder to install than wire media.

True

Which model can be used to analyze the direct and indirect costs to help firms determine the actual cost of specific technology implementations?

Total cost of ownership (TCO)

Which model can be used to analyze the direct and indirect costs to help firms determine the actual cost of specific technology​ implementations?

Total cost of ownership​ (TCO)

A physical view shows data as it is organized on the storage media.

True

​_______________________ is an example of a DBMS desktop system geared toward smaller business data needs.

access

The fact that companies can now organize and analyze vast amounts of data on individuals to determine individual behavior profiles is due mostly​ to:

advances in data analysis

The BPM step which addresses the question of which processes need to be addressed is​ ___________________________.

identifying processes for change

WEB SERVER SOFTWARE

RESPONSIBLE FOR LOCATING AND MANAGING STORED WEB PAGES

What is the most common type of database?

Relational database; the relational database is the primary method for organizing and maintaining data today in information systems.

How do relational databases organize data?

Relational databases organize data in two-dimensional tables with rows and columns called relations.

Linux

Reliable and compactly designed operating system that is offshoot of UNIX and that can run on many different hardware platforms and is available free or at very low cost. Used as alternative to UNIX and Windows NT. - Open-source OS used in high-performance computing. - Used in mobile devices, local area networks, Web servers, Android OS.

The most common type of database is a​ __________.

relation database

IT professionals working to make a new system work with an existing system is focusing​ on:

system integration

A set of applications that manages the activities and resources of a computer:

system software

Critical success factors for Big Data Analytics

- A clear business need (alignment with the vision and the strategy) - Strong committed sponsorship (Execution champion) - A fact-based decision-making culture

What are the functions of "NoSQL"?

- A new style of database - To store and process large volumes of unstructured, semi-structured, and multi-structured data - Can handle Big Data better than traditional relational database technology

Stream Analytics is also called:

- Data-in-motion analytics - Real-time data analytics

Case 6.5 What were the challenges Dublin City was facing; what were the proposed solution, initial results, and future plans?

- Getting a good picture of traffic in the city from a high-level perspective - Gave operators ability to see the system as a whole instead of individual corridors

Case 6.5 How can big data analytics help ease the traffic problem in large cities?

- Integrating geospatial data from buses and data on bus timetables into a central geographic information system, can create a digital map of the city. - Using the dashboard screen, operators can drill down to see the number of buses that are on time or delayed on each route. - Can produce a detailed report on areas of buses frequently delayed and take prompt action to ease congestion.

Accountability and control

4.1.1- Among the five moral dimensions of the information age, which addresses the question of liability related to information systems?

Case 6.7 How did telecommunication company in this case use stream analytics for better business outcomes? What additional benefits can you for-see?

- Stream analytics to boost customer satisfaction and competitive advantage - Selected to work with Splunk (one of the leading analytics services providers in the area - Provided beneficial results in the areas of application troubleshooting, operations, compliance, and security

Case 6.4 What is the role of analytics and Big Data in modern day politics?

- This case study makes it clear that politics and elections are suitable arenas for Big Data. - Main Characteristics are volume, variety, velocity. - Help predict outcomes - Targeting potential voters and donors

What are the 6 V's that define Big data?

- Volume - Variety - Velocity - Veracity - Variability - Value Proposition

Analytic system outputs or goals:

- Voter mobilization - Organize movements - Increase number of volunteers - Raise money contributions

Case 6.1 What does "Big Data" mean to Luxottica?

->For Luxottica, Big Data includes everything they can find about their customer interactions (in the form of transactions, click streams, product reviews, and social media postings). They see this as constituting a massive source of business intelligence for potential product, marketing, and sales opportunities.

Using data to understand customers/clients and business operations to sustain and foster growth and profitability is:

-An increasingly challenge task for today's enterprises -Is not a new technological fad, rather, it's a business priority

Case 6.3 What were the challenges eBay was facing?

-Explosive growth - Needed a solution that did not have typical bottlenecks, scalability issues, and transactional constraints - Needed a solution to perform rapid analysis on a broad assortment of the structured and unstructured data it captured.

Advances in data analysis

4.1.1- The fact that companies can now organize and analyze vast amounts of data on individuals to determine individual behavior profiles is due mostly to:

NORA

4.1.1- Which of the following is a powerful analysis technology that crunches data from multiple sources to find hidden connections and typically used by the government?

5 steps of ethical analysis

1. Identify and describe the facts clearly 2. Define the conflict or dilemma and identify the higher-order values involved 3. identify the stakeholders 4. identify the options that you can reasonably take 5. identify the potential consequences of you options

Quality of life

4.1.2- Among the five identified moral dimensions of the information age, which addresses the question "which cultural values are supported by information technology?"

​____________________, which is now available for average consumers to​ purchase, has been used in industry to create solid​ objects, layer by​ layer, from specifications in a digital file.

3D printing

A collection of computers on the Internet that allow for innovations such as software as a service​ (SaaS) is simply called​ (the): A. Cloud. B. big data. C. operating system. D. database. E. Internet.

A

A data ________ stores current and historical data of potential interest to decision makers throughout the company. A) warehouse B) mart C) archive D) mine

A

A digital certificate system: A) uses third-party CAs to validate a user's identity. B) uses digital signatures to validate a user's identity. C) uses tokens to validate a user's identity. D) is used primarily by individuals for personal correspondence.

A

A field identified in a table as holding the unique identifier of the table's records is called the: A) primary key. B) key field. C) primary field. D) foreign key.

A

A firewall allows the organization to: A) enforce a security policy on data exchanged between its network and the Internet. B) check the accuracy of all transactions between its network and the Internet. C) create an enterprise system on the Internet. D) check the content of all incoming and outgoing e-mail messages.

A

A one-to-one relationship between two entities is symbolized in a diagram by a line that ends: A) in two short marks. B) in one short mark. C) with a crow's foot. D) with a crow's foot topped by a short mark.

A

A(n) _____ is a mechanism that enables the U.S. government to extend consumer protection beyond U.S. borders through private policies and​ self-regulation that meet U.S. guidelines. A. safe harbor B. EU trade agreement C. ​opt-in agreement D. copyright E. ethics code

A

A(n) ________ is a structured survey of the accuracy and level of completeness of the data in an information system. A) data quality audit B) systems analysis C) systems audit D) data analysis

A

A(n) _____________ is a database whose content focuses on historical organizational data. A. data warehouse B. historical data house C. data historicity D. Access Database E. SQL Server

A

All of the following are types of information systems general controls except: A) application controls. B) computer applications controls. C) physical hardware controls. D) administrative controls

A

An automated or manual file that stores information about data elements and data characteristics such as usage, physical representation, ownership, authorization, and security is the: A) data dictionary. B) data definition diagram. C) entity-relationship diagram. D) relationship dictionary.

A

An example of a pre-digital database is a: A) library's card-catalog. B) cash register receipt. C) doctor's office invoice. D) list of sales totals on a spreadsheet.

A

An example of autonomic computing is: A) virus protection software that runs and updates itself automatically. B) software programmed to run on any hardware platform. C) cell phones taking on the functions of handheld computers. D) programming languages that allow non-programmers to create custom applications.

A

An independent computer program that copies itself from one computer to another over a network is called a: A) worm. B) Trojan horse. C) bug. D) pest.

A

Business process management​ (BPM) is concluded​ _________________________. A. never B. after the new system has been properly tested C. after senior management has signed off on the project D. after the analysis has been completed E. after customer complaints have been resolved

A

Digital subscriber lines: A) operate over existing telephone lines to carry voice, data, and video. B) operate over coaxial lines to deliver Internet access. C) are very-high-speed data lines typically leased from long-distance telephone companies. D) have up to twenty-four 64-Kbps channels.

A

Expansion to global markets requires more coordination of resources for a firm to create their goods. This has transformed the need for information systems for the field of​ ________________. A. operations management B. accounting C. marketing D. human resources E. finance

A

MySQL is a: A) DBMS for small handheld computing devices. B) popular open-source DBMS. C) mainframe relational DBMS. D) DBMS for desktop systems.

B

In 2004, ICQ users were enticed by a sales message from a supposed anti-virus vendor. On the vendor's site, a small program called Mitglieder was downloaded to the user's machine. The program enabled outsiders to infiltrate the user's machine. What type of malware is this an example of? A) Trojan horse B) Virus C) Worm D) Spyware

A

In client/server computing, the client is: A) the computer that acts as the user point of entry. B) the location of the bulk of the processing. C) software program used for logging on to the network. D) the computer that firsts asks for services.

A

In clustering, a data mining tool will: A) find new groupings within data. B) find related predictions from existing values. C) find several events grouped by time. D) find new associations.

A

In​ client/server computing, a client normally consists of​ a: A. desktop computer. B. smartphone. C. supercomputer. D. mainframe. E. smartwatch.

A

Linux: A) is a Windows-like operating system. B) plays a major role in running Web servers and local area networks. C) is the primary OS used in quantum computing. D) is designed to support only UNIX computers.

A

OLAP is a tool for enabling: A) users to obtain online answers to ad hoc questions in a rapid amount of time. B) users to view both logical and physical views of data. C) programmers to quickly diagram data relationships. D) programmers to normalize data.

A

Phishing is a form of: A) spoofing. B) logging. C) sniffing. D) driving.

A

Prior to the development of ________, computer networks used leased, dedicated telephone circuits to communicate with other computers in remote locations. A) packet switching B) routers C) servers D) coaxial cable

A

Professional organizations like the American Medical Association have​ _____________________, which includes specific conduct guidelines such​ as, do no harm. A. professional codes of conduct B. utilitarian principles C. liability D. golden rule E. no free lunch rules

A

Six sigma is a specific measure of​ _________, representing​ ____________________. A. ​quality; 3.4 defects per million opportunities B. customer web​ interaction; e-sales C. ​quality; 0 defects during production D. production​ rate; production margin E. vender web​ interaction; business process efficiency

A

Software that manages the resources of the computer is called: A) system software. B) application software. C) data management software. D) network software.

A

Statements ranking information risks and identifying security goals are included in a(n): A) security policy. B) AUP. C) risk assessment. D) business impact analysis.

A

The Gramm-Leach-Bliley Act: A) requires financial institutions to ensure the security of customer data. B) specifies best practices in information systems security and control. C) imposes responsibility on companies and management to safeguard the accuracy of financial information. D) outlines medical security and privacy rules.

A

The Internet poses specific security problems because: A) it was designed to be easily accessible. B) Internet data is not run over secure lines. C) Internet standards are universal. D) it changes so rapidly.

A

The child domain of the root is the: A) top-level domain. B) second-level domain. C) host name. D) domain extension.

A

The interactive, multiuser operating system developed by Bell Laboratories in 1969 to be highly supportive of communications and networking is: A) UNIX. B) Linux. C) Mac OS. D) COBOL.

A

What technology trend raises ethical issues related to the limitless data that can be collected about​ you? A. Data storage costs rapidly decline B. Computer power doubles every 18 months C. Mobile device growth impact D. Networking advances E. Dynamic web pages

A

What would be a reason for using a workstation rather than a personal computer? A) When you need more powerful computational abilities B) When you need to access a network C) When you need to serve applications and data to client computers D) When you need to share resources

A

Which of the following enables multiple users to create and edit Web documents? A) Wiki B) Blog C) Social networking D) Pinterest

A

Which of the following is an interorganizational system that provides a seamless flow of information to both suppliers of raw materials as well as to​ customers? A. Supply chain management system B. Customer relationship management system C. Knowledge management system D. Executive support system E. Business intelligence system

A

Which of the following most accurately describes an information​ system? A. A set of components that​ gather, analyze,​ store, and utilize information for making better decisions for a firm B. The technology and data that a business leverages to gain a competitive advantage C. A software program that calculates a solution for a company D. A database that stores all the transactions that occur in a business E. All of the data a firm collects that pertains to its business

A

Which of the following would you use to find patterns in user interaction data recorded by Web servers? A) Web usage mining B) Web server mining C) Web structure mining D) Web content mining

A

Which process is used to protect transmitted data in a VPN? A) Tunneling B) PPP C) VOIP D) Packet switching

A

Which type of network serves a small group of computers, allowing them to share resources and peripherals without using a dedicated server? A) Peer-to-peer B) Wireless C) LAN D) Ring

A

Within a corporate information services department, the task of creating the physical database and its logical relations are responsibilities of the ________ function. A) database administration B) data administration C) server administration D) data modeling

A

You use ________ to predict when a computer hardware system becomes saturated. A) capacity planning B) virtualization C) localization D) measured service

A

Your company, an online clothing store, has calculated that a loss of Internet connectivity for 5 hours results in a potential loss of $1,000 to $2,000 and that there is a 50% chance of this occurring. What is the annual expected loss from this exposure? A) $750 B) $1,000 C) $1,500 D) $3,000

A

_____ refers to the use of social networking to extend a​ business' collaboration efforts in order to engage and connect better with their​ employees, suppliers,​ and/or their customers. A. Social business B. Collaboration C. Customer support D. Networking E. Web marketing

A

________ refers to policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems. A) "Security" B) "Controls" C) "Benchmarking" D) "Algorithms"

A

____________________ is the most popular​ open-source program that allows for storage of big data. A. Hadoop B. Andromeda C. Access D. SQL Server E. DBMS

A

____________________, which is now available for average consumers to​ purchase, has been used in industry to create solid​ objects, layer by​ layer, from specifications in a digital file. A. ​3-D printing B. Cycle time C. ​Computer-aided design D. Dot matrix printing E. Color printing

A

​_____ is output from an information system that is returned to key people who analyze it​ to, evaluate​ it, and refine inputs for the system. A. Feedback B. Business intelligence C. A finalized report D. Data E. Knowledge

A

Describe characteristics about relational databases:

A customer's name would not make a good primary key. A primary key cannot be duplicated. A foreign key can be duplicated. The entity-relationship diagram depicts the relationships among tables in a database. Tables can have one-to-many relationships or one-to-one relationships.

Which of the following best defines a mainframe?

A mainframe is a large-capacity, high performance computer that can process large amounts of data very rapidly.

Businesses use ________ tools to search and analyze unstructured data sets, such as e-mails and memos. A) Hadoop B) Web mining C) text mining D) OLAP

C

In a relational database, the three basic operations used to develop useful sets of data are: A) select, project, and where. B) select, join, and where. C) select, project, and join. D) select, from, and join.

C

​Collectively, the coordination of computer​ hardware, software, data​ management, networking, and technology services collectively is​ termed: A.IT infrastructure. B.business intelligence. C.IT compliance. D.distributed processing. E.Mainframe computing.

A.IT infrastructure.

_____ is a feature of political systems in which laws permit individuals to recover damages done to them by the actions of others. A.Liability B.Compliance C.Due process D.Responsibility E.Accountability

A.Liability

Scalability

Ability of system to expand to serve large number of users without breaking down - (Amazon makes 80% or more of profits in one specific quarter on black friday)

What would an organization use to specify rules for​ sharing, disseminating,​ acquiring, standardizing,​ classifying, and inventorying​ information?

An information policy

Michael Porter developed the​ ________________ model, which emerged as a leading model for better understanding the important concept of competitive advantage. A. competitive advantage B. competitive forces C. component display D. big data E. information technology

B

43) You have been hired as a security consultant for a law firm. Which of the following constitutes the greatest source of security threats to the firm? A) Wireless network B) Employees C) Authentication procedures D) Lack of data encryption

B

A table that links two tables that have a many-to-many relationship is often called a(n): A) derived table. B) intersection relation. C) foreign table. D) entity-relationship table.

B

A(n) ________ allows users to interact with a computer by using several fingers to perform gestures without using a mouse or keyboard. A) GUI B) multitouch interface C) touch screen D) interface

B

All of the following place strain on system capacity, except for: A) increased number of users. B) minimized response time for transaction processing. C) increased business volume. D) large numbers of interactive Web pages.

B

Among the five identified moral dimensions of the information​ age, which addresses the question​ "which cultural values are supported by information​ technology?" A. Accountability and control B. Quality of life C. Information rights and obligations D. Property rights and obligations E. System quality

B

An example of the business objective​ ___________ would include one online coin shop offering a free app that can detect fake​ coins, and all other online stores following this strategy or potentially going out of business. A. customer and supplier intimacy B. survival C. competitive advantage D. decision making E. training

B

Andrew analyzes an ethical issue at​ work, evaluates the outcomes of various​ options, and chooses the one that achieves the greatest value. Which ethical principle is Andrew​ applying? A. Golden Rule principle B. Utilitarian principle C. Risk aversion principle D. ​Descartes' rule of change E. ​Kant's categorical imperative

B

Attempting to determine when a computer hardware system will be maxed out is​ called: A. CPU speed. B. capacity planning. C. XML. D. referential integrity. E. business intelligence.

B

In a multitiered network: A) the work of the entire network is centralized. B) the work of the entire network is balanced over several levels of servers. C) processing is split between clients and servers. D) processing is handled by multiple, geographically remote clients.

B

In a telecommunications network architecture, a protocol is: A) a device that handles the switching of voice and data in a local area network. B) a standard set of rules and procedures for control of communications in a network. C) a communications service for microcomputer users. D) the main computer in a telecommunications network.

B

In controlling network traffic to minimize slow-downs, a technology called ________ is used to examine data files and sort low-priority data from high-priority data. A) high availability computing B) deep-packet inspection C) application proxy filtering D) stateful inspection

B

It has been shown that one of the best ways to reduce quality problems is to reduce​ _____________. A. the number of employees involved in the business process B. cycle time C. outsourcing D. cost E. the number of departments involved in the business process

B

Linux plays a major role in supporting business information systems, and has garnered about ________ of the U.S. server market. A) 10 percent B) 25 percent C) 50 percent D) 80 percent

B

Microsoft Word is an example of: A) open-source software. B) word-processing software. C) software productivity suite. D) data management software.

B

What is social​ business? A. Use of social networking platforms to handle all customer relations B. Use of social networking platforms to engage​ employees, customers, and suppliers C. Identifying customers through the use of social media D. Doing business through a social network only E. A company whose only web presence is on social media

B

What is the primary difference between 3G and 4G cellular systems? A) 4G systems are digital. B) 4G systems have greater transmission speeds. C) 3G systems are unable to handle Web browsing. D) 3G systems have poor security.

B

What is the process of predicting when a computer hardware system will become​ saturated? A. Permeation testing B. Capacity planning C. Burden testing D. Saturation testing E. Overload planning

B

What service converts IP addresses into more recognizable alphanumeric names? A) HTML B) DNS C) IP D) HTTP

B

What technology allows people to have content pulled from Web sites and fed automatically to their computers? A) FTP B) RSS C) HTTP D) Bluetooth

B

What type of device gathers data and converts them into electronic form for use by the computer? A) Output device B) Input device C) Optical storage D) Magnetic storage

B

Which of the following is a type of ambient data? A) Computer log containing recent system errors B) A file deleted from a hard disk C) A file that contains an application's user settings D) A set of raw data from an environmental sensor

B

Which of the following is the most common source of business system failure? A) Software errors B) Data quality C) Facility catastrophes D) Hardware failures

B) Data quality

Multitiered Client/Server Network (N-Tier)/Multi-Tiered Client/Server Machines

Balances the different loads of work ( web services and application servers) In a multitiered client/servers network client requests for service are handled by different levels of servers First level webserver; second level application server Example: Shoe company looks at all the distributors who sell their shoes. They process the amount of shoes and price to them and then the company fulfills the order, ships to customer and updates records to Shoe company.

Computer forensics tasks include all of the following except: A) presenting collected evidence in a court of law. B) securely storing recovered electronic data. C) collecting physical evidence on the computer. D) finding significant information in a large volume of electronic data.

C

For the sale of online used textbooks with many suppliers and low cost to switch to a different​ supplier, is an example​ of: A. new entrants being unable to enter the market. B. rivalry being strong. C. customers having a lot of power. D. suppliers having a lot of power. E. similar products causing high substitute power.

C

Google Apps is a popular​ cloud-based: A. open source software. B. DBMS. C. software as a service​ (SaaS). D. operating system. E. mapping program.

C

Hackers create a botnet by: A) infecting Web search bots with malware. B) using Web search bots to infect other computers. C) causing other people's computers to become "zombie" PCs following a master computer. D) infecting corporate servers with "zombie" Trojan horses that allow undetected access through a back door.

C

Consumerization of IT and BYOD

Bring Your Own Device. -Ex: iphone. Bring it to work, and use it for email and etc. Con - Your company may have access to your phone. If they want they can pull emails, etc. Forces businesses to rethink the way they obtain and manage information technology equipment and services

A ________ in a database represents a single character such as a letter or number.

Byte

57) An authentication token is a(n): A) device the size of a credit card that contains access permission data. B) type of smart card. C) gadget that displays passcodes. D) electronic marker attached to a digital authorization file.

C

A LAN would be used to connect all of the following except: A) all of the computers in a large building. B) all of the devices within a 10-meter area. C) all of the computers in a city. D) all of the computers in a small office.

C

A car reservation system requiring processing a thousand transactions per second would likely require a​ __________ to process the transactions. A. workstation B. supercomputer C. mainframe D. microcomputer E. personal computer

C

A computer​ _________________ causes the most repetitive stress injuries. A. virus B. fan C. keyboard D. hard drive E. monitor

C

A data​ __________ is a method using a survey to determine the accuracy of a data set. A. scrubbing B. base C. audit D. cleansing E. review

C

The "Internet of Things" refers to: A) the increasing focus on shopping as the major user activity on the Internet. B) the microblogging trend, in which users exchange short text and pictures rather than longer and more in-depth content and text. C) a vision of a pervasive Web, in which common objects are connected to and controlled over the Internet. D) the trend away from platform-independent Web applications to mobile-device specific apps.

C

The Internet is based on which three key technologies? A) TCP/IP, HTML, and HTTP B) TCP/IP, HTTP, and packet switching C) Client/server computing, packet switching, and the development of communications standards for linking networks and computers D) Client/server computing, packet switching, and HTTP

C

The Sarbanes-Oxley Act: A) requires financial institutions to ensure the security of customer data. B) specifies best practices in information systems security and control. C) imposes responsibility on companies and management to safeguard the accuracy of financial information. D) outlines medical security and privacy rules.

C

The WiMax standard can transmit up to a distance of approximately: A) 30 meters. B) 500 meters. C) 30 miles. D) 5 miles.

C

The most common Web server today, controlling 65 percent of the market, is: A) Microsoft IIS. B) WebSTAR. C) Apache HTTP Server. D) Netscape Server.

C

The most common type of database is a​ __________. A. normalized database B. ​non-relational database C. relational database D. hierarchical database E. SAP database

C

The popular quality control​ model, six sigma specifically calls for 3.4 defects per​ ____________ as a measure of quality. A. hundred B. hundred thousand C. million D. billion E. thousand

C

The toy manufacturer you work for wants to exchange data with a chain of toy stores in order to improve their distribution and speed to market. The toy stores use different software than your firm. Which of the following tools or technologies presents the best solution? A) Mashups B) Extranet C) Web services D) Cloud computing

C

What are the four layers of the TCP/IP reference model? A) Physical, application, transport, and network interface B) Physical, application, Internet, and network interface C) Application, transport, Internet, and network interface D) Application, hardware, Internet, and network interface

C

What type of computing involves connecting computers that are not near one another into a signal network and combining the computational power of the computers on the​ network? A. Mainframe computing B. Parallel computing C. Grid computing D. ​Multi-threaded computing E. Time slice computing

C

When a leading discount​ store's database was​ breached, a lot of attention was on the​ company's ____________________, who is specifically responsible for training employees about security. A. systems analyst B. chief information officer C. chief security officer D. chief privacy officer E. chief financial officer

C

Which Ethical rule below is combined with its proper​ description? A. ​Moore's Law; the number of transistors in a dense integrated circuit has doubled approximately every two years. B. Immanuel​ Kant's categorical​ imperative; placing yourself in the place of​ others, and thinking of yourself as the object of the decision C. The utilitarian​ principle; assumes values are prioritized in an order and the consequences of various courses of action are understood D. Golden​ Rule; an action is not right for everyone to​ take, it is not right for anyone E. Ethical​ rule; some actions have extremely high failure costs of very low probability or extremely high failure costs of moderate probability

C

Which Microsoft operating system specifically supports mobile features such as multitouch and mobile​ devices? A. Mac OS B. Windows 15 C. Windows 10 D. Microsoft SQL Server 2014 E. Microsoft Azure

C

Which of the following database types would be best suited for storing multimedia? A) SQL DBMS B) Open-source DBMS C) Non-relational DBMS D) Cloud-based database

C

Which of the following is an example of the "visual Web"? A) Twitter B) Blogger C) Pinterest D) Facebook

C

Which of the following is not a characteristic of packet switching? A) Packets travel independently of each other. B) Packets are routed through many different paths. C) Packet switching requires point-to-point circuits. D) Packets include data for checking transmission errors.

C

Which of the following is not an example of a computer used as a target of crime? A) Knowingly accessing a protected computer to commit fraud B) Accessing a computer system without authority C) Illegally accessing stored electronic communication D) Threatening to cause damage to a protected computer

C

Which type of network would be most appropriate for a business that comprised three employees and a manager located in the same office space, whose primary need is to share documents? A) PAN B) Domain-based LAN C) Peer-to-peer network D) Campus area network

C

_____ is responsible for​ enterprise-wide governance and usage of information to maximize the value of the​ organization's data. A. Chief information officers B. Chief privacy officer C. Chief data officer D. Chief knowledge officer E. Information systems developers

C

​ESS, DSS, and MIS systems all fall under the generic term of​ _______ systems as they help with the decision making process. A. transaction processing B. enterprise C. business intelligence D. infrastructure E. management information

C

Advertisers use ________ in order to display more relevant ads based on a user's search and browsing history. A) NORA B) FIP principles C) behavioral targeting D) web bugs E) intelligent agents

C) behavioral targeting

COMPUTER HARDWARE

CONSIST OF TECHNOLOGY FOR COMPUTER PROCESSING, DATA STORAGE, HARDWARE AND SOFTWARE.

PLATFORM AS A SERVICE

CUSTOMERS USE INFRASTRUCTURE AND PROGRAMMING TOOLS SUPPORTED BY THE CLOUD SERVICE PROVIDER TO DEVELOP THEIR OWN APPLICATIONS

INFRASTRUCTURE AS A SERVICE

CUSTOMERS USE PROCESSING, STORAGE, NETWORKING AND OTHER COMPUTING RESOURCES FROM CLOUD SERVICE PROVIDERS TO RUN THEIR INFORMATION SYSTEMS

Which of the following adjusts copyright laws to the Internet age by making it illegal to? make, distribute, or use devices that circumvent? technology-based protections of copyrighted? materials?

Digital Millennium Copyright Act

Web Hosting Service

Company with large Web server computers to maintain the Web sites of fee-paying subscribers.

Mashups

Composite software applications that depend on high speed networks, universal communications standards, and open source code and are intended to be greater than the sum of their parts. (Combinations of two or more online applications, such as combining mapping software (Google Maps) with local content)

Storage Networks (SANs)

Connect multiple storage devices on a separate high-speed network dedicated to storage. Ex: TLearn. They use all of the different parts that come together to form SANs because of costs. A typical SAN consists of a server, storage devices, and networking devices, and is used strictly for storage. The SAN stores data on many different types of storage devices, providing data to the enterprise. The SAN supports communication between any server and the storage unit as well as between different storage devices in the network..

Computer hardware

Consists of technology for computer processing, data storage, input, and output

Pre-configured hardware-software systems that use both relational and non-relational technology optimized for analyzing large datasets are referred to as: A) Hybrid DBMS. B) Hadoop. C) BI. D) Analytic platforms.

D

A client computer networked to a server computer, with processing split between the two types of machines, is called a(n) ________ architecture. A) service-oriented B) on-demand C) multitiered client/server D) two-tiered client/server

D

A high-speed network dedicated to storage that connects different kinds of storage devices, such as tape libraries and disk arrays so they can be shared by multiple servers, best describes: A) SSN. B) ASP. C) LAN. D) SAN.

D

A keylogger is a type of: A) worm. B) Trojan horse. C) virus. D) spyware.

D

Access is a: A) DBMS for small handheld computing devices. B) popular open-source DBMS. C) DBMS for midrange computers. D) DBMS for desktop PC systems.

D

As part of a​ DBMS, a(n)​ _________ documents information about a database. A. entity relation diagram B. attribute listing C. data definition D. data dictionary E. data manipulation language

D

A​ _______________ uniquely represents a record or row. A. prime key B. foreign key C. cost key D. primary key E. data key

D

ChicagoCrime.org, which combines Google Maps with crime data for the city of Chicago, is an example of: A) cloud computing. B) SOA. C) a widget. D) a mashup.

D

Comprehensive security management products, with tools for firewalls, VPNs, intrusion detection systems, and more, are called ________ systems. A) DPI B) MSSP C) NSP D) UTM

D

Currently, the protocols used for secure information transfer over the Internet are: A) TCP/IP and SSL. B) S-HTTP and CA. C) HTTP and TCP/IP. D) SSL, TLS, and S-HTTP.

D

Specific security challenges that threaten clients in a client/server environment include: A) tapping; sniffing; message alteration; radiation. B) hacking; vandalism; denial of service attacks. C) theft, copying, alteration of data; hardware or software failure. D) unauthorized access; errors; spyware.

D

Taking application components from various​ resources, ________ mixes and matches to create a​ new, customized Internet experience. A. open source software B. cloud computing C. XML D. a mashup E. SaaS

D

The HIPAA Act of 1996: A) requires financial institutions to ensure the security of customer data. B) specifies best practices in information systems security and control. C) imposes responsibility on companies and management to safeguard the accuracy of financial information. D) outlines medical security and privacy rules

D

The logical view of a database: A) shows how data are organized and structured on the storage media. B) presents an entry screen to the user. C) allows the creation of supplementary reports. D) presents data as they would be perceived by end users.

D

The most appropriate wireless networking standard for creating PANs is: A) I-mode. B) IEEE 802.11b. C) WiFi. D) Bluetooth.

D

The senior leadership position responsible for the​ organization's data is called the​ ____________ officer. A. chief privacy B. chief information C. systems analyst D. chief data E. chief security

D

Virtually anyone can set up​ a(n) ________________, an application of social business which allows for publishing opinions and experiences about a variety of topics. A. file sharing B. training program C. social network D. blog E. Internet

D

Which of the following is not a type of output device? A) Speakers B) Cathode ray tube C) Ink jet printer D) Keyboard

D

Which of the following statements about RFID is not true? --- radio frequency identification A) RFIDs transmit only over a short range. B) RFIDs use an antenna to transmit data. C) Microchips embedded in RFIDs are used to store data. D) RFIDs require line-of-sight contact to be read.

D

Which of the following statements about data warehouses is not true? A) They store supply data to be used across the enterprise for management analysis and decision making. B) Data warehouse systems provide a range of ad hoc and standardized query tools, analytical tools, and graphical reporting facilities. C) They may include data from Web site transactions. D) Data warehouse systems provide easy-to-use tools for managers to easily update data.

D

Which of the following storage technology stores data sequentially? A) CD-ROM B) RAID C) Magnetic disks D) Magnetic tape

D

With​ E-commerce and the​ Internet, which of the following depicts a trend in​ advertising? A. ​E-commerce and Internet advertising have remained flat and traditional advertising and commerce has also remained flat. B. ​E-commerce and Internet advertising have grown while traditional advertising and commerce have decreased. C. ​E-commerce and Internet advertising have decreased while traditional advertising and commerce have remained flat. D. ​E-commerce and Internet advertising have grown while traditional advertising and commerce have grown also. E. ​E-commerce and Internet advertising have grown while traditional advertising and commerce have remained flat.

D

_____ are the people or​ groups, both internal and external to the​ organization, for whom applications are developed. A. Senior managers B. Knowledge workers C. Clients D. End users E. Managers

D

________ is an operating system-independent, processor-independent, object-oriented programming language that has become a leading interactive programming environment for the Web. A) XML B) SOA C) HTML D) Java

D

___________________ is/are an application of social business that allows for the opportunity to share documents. A. Crowdsourcing B. Social networks C. Social marketing D. File sharing E. Communities

D

​(A) _______________ is the formal name for questioning or making a data request from the database. A. DDL B. DML C. cloud D. query E. Access

D

​________________ focus(es) on providing decision making data available for middle managers to make sound business decisions. A. Transaction processing systems B. Decision support systems C. Business intelligence D. Management information systems E. Executive support systems

D

The introduction of new information technology has: A) a waterfall effect in raising ever more complex ethical issues. B) a dampening effect on the discourse of business ethics. C) no impact. D) a ripple effect, raising new ethical, social, and political issues. E) a beneficial effect for society as a whole, while raising dilemmas for consumers.

D) a ripple effect, raising new ethical, social, and political issues.

U.S. businesses are allowed to use personal data from EU countries if they: A) create a safe harbor. B) make their privacy protection policies publicly available. C) have informed consent. D) develop equivalent privacy protection policies

D) develop equivalent privacy protection policies

​_____ is the process of presenting computing resources that are accessed in ways that appear to not be restricted by physical configuration or geographic location. A.Cloud computing B.Network infrastructure C.Optimization D.Virtualization E.Nanotechnology

D.Virtualization

If someone at your work accuses you of sending inappropriate​ emails, you should be afforded​ __________________. A.responsibility B.a third chance C.accountability D.due process E.liability

D.due process

Which of the following can be used to automatically enforce consistency among different sets of data?

Data cleansing

What is data cleansing?

Data cleansing is used to detect and correct inaccurate day in a database; not only corrects data, but enforces consistency among different sets of data that originated in separate information systems.

What is data definition?

Data definition is a DBMS capability that specifies the structure and content of the database.

What does data governance deal with?

Data governance deals with the overall policies and processes for managing the availability, usability, integrity, and security of the data employed in an enterprise.

Define data:

Data is a DBMS capability that specifies the structure and content of the database.

Which of the following involves searching for patterns and relationships among​ data?

Data mining

What is a term used by companies looking to detect and correct incomplete, redundant, or incorrect data?

Data scrubbing; data scrubbing consists of activities for detecting and correcting data in a database.

Autonomic Computing

Development of systems that can configure themselves, heal themselves, optimize and tune themselves, and protect themselves from outside intruders and self-destruction -For example; Anti-virus software

Hadoop was originally created by ______________ at Yahoo.

Doug Cutting

Frustrated customers angry about a site not working is an example of which IT cost of ownership​ (TCO)?

Downtime

An​ unethical, but not illegal act committed using a computer is called​ _____________. A. closed source B. well intentioned C. computer fraud D. computer crime E. computer abuse

E

Creating a new system that provides charts and graphs to assist senior management make​ non-routine decisions is called​ (a): A. Transaction processing system. B. Decision support systems. C. Management information systems. D. Business intelligence. E. Executive support systems.

E

Determining the​ inputs, outputs, and resources​ required, and documenting the sequence of activities in a process typically occur during​ the: A. implementation of a new process. B. development process. C. development of metrics for the process. D. identification of processes that need changed. E. analysis of existing processes.

E

IT professionals working to make a new system work with an existing system is focusing​ on: A. data accuracy B. cost C. volatility D. data mining E. systems integration

E

IoT stands for​ the: A. Intranet of Things. B. Internet Protocol of Things. C. IPhone of Things D. Instructional Technology of Things E. Internet of Things.

E

The senior leadership position responsible for the​ organization's internal knowledge​ (i.e. tacit​ knowledge) is called the​ ____________. A. knowledge management officer B. systems analyst C. chief training officer D. chief privacy officer E. chief knowledge officer

E

The​ Problem-Solving Model phase where you determine a performance discrepancy that might be caused by an outdated system is the​ ________ phase. A. analysis B. evaluation C. implementation D. solution design E. problem identification

E

The​ _________ actually works with the​ databases, creating relations between tables and implementing controls that would minimize data issues and provide security for the data. A. information policy group B. auditing team C. data cleansing team D. CIO E. database administration

E

Transnational firms have no single national headquarters but instead have many regional headquarters and perhaps a world headquarters. What is the transnational strategy characterized​ by? A. ​Production, finance/accounting,​ sales/marketing, human​ resources, and strategic management are set up to optimize resources in the home country of origin. B. Concentration financial management and control out of a central home base while decentralizing​ production, sales, and marketing operations to units in other countries C. Product​ created, designed,​ financed, and initially produced in the home country but relies heavily on foreign personnel for further​ production, marketing, and human resources D. Centralizing financial services in a country that offers the most favorable tax laws E. Nearly all the​ value-adding activities are managed from a global perspective without reference to national borders.

E

Connecting geographically remote computers in a single network to create a "virtual supercomputer" is called: A) co-location. B) centralized processing. C) cloud computing. D) client/server computing. E) grid computing.

E) grid computing.

What would an organization use to specify rules for​ sharing, disseminating,​ acquiring, standardizing,​ classifying, and inventorying​ information? A. Fair use policy B. Copyright law C. EULA D. Company mission statement E. An information policy

E. An information policy

In a relational database generalized categories represent​ a(n) __________, and each category has characteristics called​ ______________. A. primary​ key; attributes B. ​attribute; entities C. primary​ key; index D. ​relationship; entities E. ​entity; attributes

E. ​entity; attributes

What technology trend raises ethical issues related to the limitless data that can be collected about​ you? A.Mobile device growth impact B.Computer power doubles every 18 months C.Networking advances D.Dynamic web pages E.Data storage costs rapidly decline

E.Data storage costs rapidly decline

IT professionals working to make a new system work with an existing system is focusing​ on: A.data mining B.data accuracy C.volatility D.cost E.systems integration

E.systems integration

The IT infrastructure computer software component includes both​ ____________ and​ __________ software categories. A.​programming; system B.Windows; MacOS C.Oracle; SQL Server 2014 D.database; spreadsheet E.​system; application

E.​system; application

Quantum Computing

Enables processing times that are million of times faster than current high-speed processing Uses principles of quantum physics to represent data and perform operations on the data. Quantum Computing creates computer chips. "Machine Learning" - inputting data and machine figures out answer. Same thing is used with building processors. Scientists don't know how processors that are 1,000 times better than the ones we have now work.

_________________________because with the backing of one or more executive sponsors, future business graduates from LSU E.J. Ourso College of Business like yourself can get the ball rolling and instill a virtuous cycle: The more departments in your organization realize actionable benefits, the more pervasive analytics becomes across your organization. Fast, easy-to-use visual analytics is the key that opens the door to organization-wide analytics adoption and collaboration.

Evangelize

What is the understanding that most American and European privacy law is based on?

Fair information Practices (FIP)

IT infrastructure technology is the set of physical devices required to operate the entire enterprise.

False

Implementing a Web interface for a database requires changes to the database itself.

False

In linking databases to the Web, the role of the application server is to host the DBMS

False

SaaS providers deliver and provide Web-based, remote access to storage.

False

Smartphones typically feature state-of-the-art encryption and security features, making them highly secure tools for businesses.

False

TCP/IP was developed in the 1960s to enable university scientists to transmit data from computer to computer.

False

The distributed nature of cloud computing makes it somewhat easier to track unauthorized access.

False

The number of cycles per second that can be sent through any telecommunications medium is measured in kilobytes.

False

The principles of right and wrong that can be used by individuals to make choices to guide their behavior are called morals.

False

Describe how rows and columns are related in a relational database:

In a relational database, each row is a unique record for one of the items in the table and each column is an attribute of the item.

Evolution of IT infrastructure

General-purpose mainframe and minicomputer era: 1959 to present. - 1958: IBM first mainframes introduced. - 1965: Less expensive DEC minicomputers introduced. Personal computer era: 1981 to present. - 1981: Introduction of IBM PC. - Proliferation in 80s, 90s resulted in growth of personal software. Client/server era: 1983 to present. - Desktop clients networked to servers, with processing work split between clients and servers. - Network may be two-tiered or multitiered (N-tiered). - Various types of servers (network, application, Web). Enterprise computing era: 1992 to present - Move toward integrating disparate networks, applications using Internet standards and enterprise applications. Cloud and mobile computing: 2000 to present - Cloud computing: computing power and software applications supplied over the Internet or other network. - Fastest growing form of computing.

_____________________Govern because data govern has always been a challenging issue in IT, and it is getting even more puzzling with the advent of Big Data. More than 80 countries have data privacy laws. The European Union (EU) defines seven "safe harbor privacy principles" for the protection of their citizens' private data. In the US, Sarbanes-Oxley affects all publicly listed companies.

Govern

What type of computing involves connecting computers that are not near one another into a signal network and combining the computational power of the computers on the​ network?

Grid computing

APPLICATION SERVER

HANDLES ALL APPLICATION OPERATIONS BETWEEN A USER AND AN ORGANIZATION'S BACK-END BUSINESS SYSTEMS

Which government act was enacted in 1996 to protect your medical? records?

HIPAA

Which government act was enacted in 1996 to protect your medical​ records?

HIPAA

______________ is an upgrade to traditional HTML because it allows the addition of multimedia features​ (i.e., video) without cumbersome​ add-ons.

HTML5

_______________ is an upgrade to traditional HTML because it allows the addition of multimedia features​ (i.e., video) without cumbersome​ add-ons.

HTML5

____________is an upgrade to traditional HTML because it allows the addition of multimedia features (i.e., video) without cumbersome add-ons.

HTML5

__________________ is the most popular​ open-source program that allows for storage of big data.

Hadoop

___________________is an open source framework for storing and analyzing massive amounts of distributed, unstructured data.

Hadoop

​____________________ is the most popular​ open-source program that allows for storage of big data.

Hadoop

Which of the following statements is NOT a characteristic of Hadoop?

Hadoop extracts data from multiple tables that have a relationship.

Which of the following statements is NOT a characteristic of​ Hadoop?

Hadoop extracts data from multiple tables that have a relationship.

​Collectively, the coordination of computer​ hardware, software, data​ management, networking, and technology services collectively is​ termed:

IT infrastructure

Computer software

Includes: System Software Application Software

Which of the following is false concerning the social and cultural issues in regard to the prevalence of information​ systems?

It is an equalizer for social classes and minorities.

Which of the following is FALSE about the U.S. CAN-SPAM Act of 2003?

It outlaws unsolicited commercial messaging.

Which of the following is FALSE about the U.S.? CAN-SPAM Act of? 2003?

It outlaws unsolicited commercial messaging.

Which of the following is FALSE about the U.S.​ CAN-SPAM Act of​ 2003?

It outlaws unsolicited commercial messaging.

Which of the following is an example of a popular open source operating system?

Linux.

Which of the following is an example of a popular open source operating​ system?

Linux.

What does the process of server virtualization entail?

Server virtualization is the process of running two or more operating system instances on the same server. The host operating system runs virtual operating system instances as applications.

IT infrastructure

Set of physical devices and software required to operate enterprise. Set of firmwide services including: - Computing platforms providing computing services - Telecommunications services - Data management services - Application software services - Physical facilities management services - IT management, education, and other services "Service platform" perspective. - More accurate view of value of investments

Power-efficient processors

Low power consumption essential in mobile computing

MAGNETIC DISK

MOST WIDELY USED

What does metadata describe?

Metadata describes characteristics of each field in a database table; thus, they are data that describe data.

Which of the following is false about Microsoft​ Access?

Microsoft Access does not have report generation capability.

Describe Microsoft Access:

Microsoft Access is a DBMS that has rudimentary data dictionary capabilities. It has capabilities for developing desktop system applications. It works with Crystal Reports, because it has report generation capabilities.

Which of the following is the best example of a software​ suite?

Microsoft Office 2013

If you needed a DBMS for large commercial use on a​ mainframe, _____________ would be a viable option.

Microsoft SQL Server

Supercomputers

More sophisticated and used for extremely complex calculations and thousands of variables. Used in engineering, scientific simulations, military weapons research, weather forecasting

An organization interested in the most popular open source DBMS on the market would adopt​ _____ SQL.

MySQL

an organization interested in the most popular open source DBMS on the market would adopt ______ SQL

MySQL

What SQL would an organization interested in the most popular open source DBMS on the market adopt?

MySQL; MySQL supports a relational database and is popular because it runs easily on Macintosh systems.

Which of the following is a powerful analysis technology that crunches data from multiple sources to find hidden connections and typically used by the government?

NORA

Which of the following is a powerful analysis technology that crunches data from multiple sources to find hidden connections and typically used by the​ government?

NORA

which of the following is a powerful analysis technology that crunches data from multiple sources to find hidden connections and typically used by the government?

NORA

In the Health Services the biggest potential source of Big Data comes from ___________________.

Patient Monitoring

Major products including Bluemix and Salesforce.com's Force.com are considered a:

Platform as a Service (PaaS).

Professional organizations like the American Medical Association have​ _____________________, which includes specific conduct guidelines such​ as, do no harm.

Professional codes of conduct

Green computing (Green IT)

Practices and technologies for manufacturing, using, disposing of computing and networking hardware. Reducing power consumption a high priority. IT responsible for 2% U.S. power demand.

A(n) __________ key uniquely identifies a row or record in a table.

Primary

Which U.S. act restricts the information the federal government can collect and regulates what it can do with the? information?

Privacy Act of 1974

Capacity Planning

Process of predicting when hardware system becomes saturated They cannot use more energy/resources then they have. Ensuring firm has enough computing power for current and future needs. Predicting when you will be using 100% of processing power. Factors include: -Maximum number of users - It's expensive to have other people or resources. Companies want to pay companies to manage their servers than to have their own control over a server. -Impact of current, future software - Can we keep up by ourselves? -Performance measures - How well could we make it by ourselves?

A formal name to describe​ self-regulating policies is called​ _____________.

Safe harbor

Hardware Storage, Input, and Output Technology

Secondary storage technology Input and Output Devices

Operating system platforms

Server level: 65% run Unix or Linux; 35% run Windows. Client level: - 90% run Microsoft Windows (Windows 8, Windows 7, etc.) - Mobile/multitouch (Android, iOS). - Cloud computing (Google's Chrome OS).

__________________because it is hard to keep track of all of the new database vendors, open source projects, and Big Data service providers. It will be even more crowded and complicated in the years ahead.

Simplify

Open Source Software

Software such as Linux that includes its uncompiled source code which can be modified and distributed by programmers. - Produced by community of programmers. - Free and modifiable by user. - Examples: Apache web server, Mozilla Firefox browser, OpenOffice

______ is a set of applications that manages the activities and resources of a computer.

System Software

​______ is a set of applications that manages the activities and resources of a computer.

System software

Operating System Software

System software that manages and controls the computer's activities Computers chief manager, enabling the system to handle many different tasks and users at the same time Allocates and assigns system resources, schedules the use of computer resources and computer jobs Provides locations in primary memory for data and programs, and controls the input and output devices Coordinates scheduling of work Keeps track of each computer job and who is using the system

Which of the following are magnetic storage devices?

Tape drive Hard disk Explanation The following are magnetic storage devices: A hard disk is a thick magnetic disk encases in a thicker protective shell. A tape drive (also called a digital linear tape or DLT drive) stores data on magnetic tapes similar to audio cassette tapes. Optical discs such as CDs and DVDs use lasers for both reading and writing information. Flash devices store information using programmable, non-volatile flash memory. Solid state drives are flash devices with a storage capacity similar to a small hard drive.

Who actually works with the databases, creating relations between tables and implementing controls that would minimize data issues and provide security for the data?

The data administration; they integrate the information policy into the database.

What are the major capabilities of DBMS and why is a relational DBMS so powerful?

The principal capabilities of a DBMS includes a data definition capability, a data dictionary capability, and a data manipulation language. The data definition capability specifies the structure and content of the database. The data dictionary is an automated or manual file that stores information about the data in the database, including names, definitions, formats, and descriptions of data elements. The data manipulation language, such as SQL, is a specialized language for accessing and manipulating the data in the database. The relational database has been the primary method for organizing and maintaining data in information systems because it is so flexible and accessible. It organizes data in two-dimensional tables called relations with rows and columns. Each table contains data about an entity and its attributes. Each row represents a record and each column represents an attribute or field. Each table also contains a key field to uniquely identify each record for retrieval or manipulation. Relational database tables can be combined easily to deliver data required by users, provided that any two tables share a common data element. Non-relational databases are becoming popular for managing types of data that can't be handled easily by the relational data model. Both relational and non-relational database products are available as cloud computing services.

Clients

The user point of entry for the required function in client/server computing. Normally a desktop computer, workstation, or laptop computer.

Which Ethical rule below is combined with its proper description?

The utilitarian principle; assumes values are prioritized in an order and the consequences of various courses are understood

Attempting to determine when a computer hardware system will be maxed out is​ called:

capacity planning

What is the process of predicting when a computer hardware system will become​ saturated?

capacity planning

What are the problems of managing data resources in a traditional file environment and how are they solved by a database management system?

Traditional file management techniques make it difficult for organizations to keep track of all of the pieces of data they use in a systematic way and to organize these data so that they can be easily accessed. Different functional areas and groups were allowed to develop their own files independently. Over time, this traditional file management environment creates problems such as data redundancy and inconsistency, program-data dependence, inflexibility, poor security, and lack of data sharing and availability. A database management system (DBMS) solves these problems with software that permits centralization of data and data management so that businesses have a single consistent source for all their data needs. Using a DBMS minimizes redundant and inconsistent files.

A firm's information policy lays out who is responsible for updating and maintaining the information in a database system.

True

A foreign key is a field that links to a separate table.

True

Coaxial cable is similar to that used for cable television and consists of thickly insulated copper wire.

True

Common Gateway Interface is a specification for processing data on a Web server.

True

Computer worms spread much more rapidly than computer viruses.

True

Hadoop can process large quantities of any type of data, including video and Twitter feeds.

True

Hypertext markup language specifies how text, graphics, video, and sound are placed on a document.

True

In 2013, the security firm McAfee identified approximately 35,000 kinds of mobile malware.

True

In a client/server network, a network server provides every connected client with an address so it can be found by others on the network.

True

In blogging, a trackback is a list of entries in other blogs that refer to a post in the first blog.

True

In cloud computing, rapid elasticity refers to the ability of computing resources to be quickly altered to meet demand.

True

In-memory computing relies on a computer's main memory for storing data.

True

NAT conceals the IP addresses of the organization's internal host computers to deter sniffer programs.

True

Systems integration means ensuring the legacy systems work with new elements of the infrastructure.

True

Telephone networks are fundamentally different from computer networks.

True

The Domain Name System (DNS) converts domain names to IP addresses.

True

Web browsers are the primary interface for accessing the Internet.

True

Web mining is the discovery of useful patterns on the Web.

True

Web services can exchange information between two different systems regardless of the operating system or programming languages on which the systems are based.

True

Total Cost of Ownership (TCO model)

Used to analyze direct and indirect costs to help determine the actual cost of owning a specific technology TCO can be reduced through increased centralization, standardization of hardware and software resources

Two-Tiered Client/Server Machines

Uses two types of machines

Andrew analyzes an ethical issue at​ work, evaluates the outcomes of various​ options, and chooses the one that achieves the greatest value. Which ethical principle is Andrew​ applying?

Utilitarian principle

Configuring a server to run a variety of instances of an operating system to appear like many different machines to the end user is an example of

VIRTUALIZATION

________________ -This characteristic of Big Data is its potential to contain more useful patterns and interesting anomalies than "small" data.

Value Proposition

One of the V's in Big Data and process of extracting actionable information from continuously flowing/streaming data

Velocity

____________________ -refers to both how fast data is being produced and how fast the data must be processed (i.e., captured, stored, and analyzed) to meet the need or demand. RFID tags, automated sensors, GPS devices, and smart meters are driving an increasing need to deal with torrents of data in near—real time.

Velocity

____________________ - refers to the conformity to facts: accuracy, quality, truthfulness, or trustworthiness of Big Data

Veracity

____ is the process of presenting computing resources that are accessed in ways that appear to not be restricted by physical configuration or geographic location.

Virtualization

​_____ is the process of presenting computing resources that are accessed in ways that appear to not be restricted by physical configuration or geographic location.

Virtualization

____________________because according to leading analytics research companies like Forrester and Gartner, enterprises find advanced data visualization platforms to be essential tools that enable them to monitor business, find patterns, and take action to avoid threats and snatch opportunities.

Visualize

The Federal Trade Commission Fair Information Practice principle of​ Notice/Awareness states​ that:

Websites must disclose their information practices before collecting data.

Which of the following is NOT a rule in an​ organization's information​ policy?

What the relationships inside the data are

Instead of buying and installing software programs, subscribing companies rent the same functions from these services, with users paying either on a subscription or per-transaction basis. The scenario describes which kind of external software source?

a cloud-based software service

Java

a computer language, developed by Sun Microsystems, that lets you encode applications, such as animated objects or computer programs, on the Internet.

Which of the following best describes a data manipulation language?

a data manipulation language is associated with a database management system that end users and programmers use to manipulate date in the database

____________________ involves determining who is responsible for actions taken

accountability

Among the five identified moral dimensions of the information age, which address the question of liability related to information systems?

accountability and control

Among the five identified moral dimensions of the information​ age, which addresses the question of liability related to information​ systems?

accountability and control

The fact that companies can now organize and analyze vast amounts of data on individuals to determine individual behavior profiles is due mostly​ to:

advances in data analysis.

What would an organization use to specify rules for​ sharing, disseminating,​ acquiring, standardizing,​ classifying, and inventorying​ information?

an information policy

Michael Porter developed the​ ________________ model, which emerged as a leading model for better understanding the important concept of competitive advantage.

competitive forces

If you return to a website that welcomes you back by​ name, you likely have small text file on your computer with information about your prior visits called a​ ___________.

cookie

For the sale of online used textbooks with many suppliers and low cost to switch to a different​ supplier, is an example​ of:

customers having a lot of power

___________________ is a term used by companies looking to detect and correct​ incomplete, redundant, or incorrect data.

data scrubbing

a term used by companies looking to detect and correct and incomplete, redundant, or incorrect data.

data scrubbing

​____________________ is a term used by companies looking to detect and correct​ incomplete, redundant, or incorrect data.

data scrubbing

What technology trend raises ethical issues related to the limitless data that can be collected about you?

data storage costs rapidly decline

What technology trend raises ethical issues related to the limitless data that can be collected about​ you?

data storage costs rapidly decline

A(n) _____________ is a database whose content focuses on historical organizational data

data warehouse

A(n) _____________ is a database whose content focuses on historical organizational data.

data warehouse

David creates a central database by extracting, transforming, and loading metadata from various internal and external sources of information. He plans to use this database for executing various functions such as intelligence gathering, strategic planning, and analysis. This central repository of information is referred to as a __________.

data warehouse

Most larger corporations utilize a​ ______ to consolidate data from a business along with external data.

data warehouse

a(n) ___________________ is a database whose content focuses on historical organizational data:

data warehouse

In​ client/server computing, a client normally consists of​ a:

desktop computer

in client/ server computing, a client normally consists of a:

desktop computer

In​ client/server computing, a client normally consists of​ a:

desktop computer.

A common approach of networking multiple computers as opposed to a single computer is called:

distributed processing

A common approach of networking multiple computers as opposed to a single computer is​ called:

distributed processing

If someone at your work accuses you of sending inappropriate emails, you should be afforded _______

due process

with regard to relational databases, which of the following is false?

each table must have a one-to-one relationship to another table

A(n) __________ is a popular way to describe relationships (i.e., one-to-one, one-to-many) in a relational database

entity relationship diagram

​A(n) __________ is a popular way to describe relationships​ (i.e., one-to-one,​ one-to-many) in a relational database.

entity relationship diagram

in a relational database generalized categories represent a(n) _______________, and each category has characteristics called _____________.

entity; attributes

Principles of right and wrong that you use to make choices are called

ethics

Principles of right and wrong that you use to make choices are called?

ethics

Input Devices

gather data and convert them into electronic form for use by the computer (keyboard)

What would an organization use to specify rules for​ sharing, disseminating,​ acquiring, standardizing,​ classifying, and inventorying​ information?

information policy

A photo you have taken of your family is considered __________________ and is protected by law.

intellectual property

A photo you have taken of your family is considered​ ______________, and is protected by law.

intellectual property

The use and regulation of trade secrets, copyrights, and patents is the U.S. government's attempt to protect ________.

intellectual property

Compared to in-house hosting, cloud-based hosting ____________________

minimizes the risk of investing in technology that will soon become obsolete.

Private Cloud

is operated solely for an organization. It may be managed by the organization or a third party and may exist on premise or off premise.

which of the following is false concerning the social and cultural issues in regard to the prevalence of information systems?

it is an equalizer for social classes and minorities

a computer _____________ causes the most repetitive stress injuries

keyboard

​_____ is a feature of political systems in which laws permit individuals to recover damages done to them by the actions of others.

liability

Which of the following is an example of a popular open source operating​ system?

linux

A __________is a large-capacity, high-performance computer that can process large amounts of data very rapidly.

mainframe

A car reservation system requiring processing a thousand transactions per second would likely require a​ __________ to process the transactions.

mainframe

A​ ________ is a​ large-capacity, high-performance computer that can process large amounts of data very rapidly.

mainframe

a car reservation system requiring processing a thousand transactions per second would likely require a ______________ to process the transactions

mainframe

System Software

manages the resources and activities of the computer

The most common use of nonrelational database management systems is for__________________.

managing extremely large data sets

The most common use of nonrelational database management systems is​ for______________

managing extremely large data sets

The most common use of nonrelational database management systems is​ for__________________.

managing extremely large data sets

The data​ _______________ language would allow you to retrieve information from the database​ (i.e., using the​ SELECT, FROM, WHERE​ commands).

manipulation

zipreality, which uses both zillow and google maps, is an example of a:

mashup

​ZipReality, which uses both Zillow and Google​ Maps, is an example of​ a:

mashup

ZipReality, which uses both Zillow and Google​ Maps, is an example of​ a:

mashup.

Compared to​ in-house hosting,​ cloud-based hosting​ ________.

minimizes the risk of investing in technology that will soon become obsolete

The philosophy that quality should be the responsibility of everyone that works in a firm and every business unit is best known as which of the​ following?

total quality managment

Disney is using​ a/an ___________ technology in the form of a wristband to help improve the guest experience by combining a​ guest's room​ key, park​ ticket, and eventually a​ vacation-planning system to make the experience more efficient with reduced wait times.

radio-frequency identification​ (RFID)

When firms outsource software work outside their national borders, this practice is called __________.

offshore software outsourcing

Where is a cookie that is created during a Web site visit​ stored?

on the visitor's computer

In cloud computing, resources are said to be "pooled" because

organizations share the same physical hardware through virtualization.

In cloud​ computing, resources are said to be​ "pooled" because:

organizations share the same physical hardware through virtualization.

Among the five identified moral dimensions of the information age, which addresses the question "which cultural values are supported by information technology?

quality of life

Among the five identified moral dimensions of the information​ age, which addresses the question​ "which cultural values are supported by information​ technology?"

quality of life

A formal name to describe self-regulating policies is called _____________.

safe harbor

A formal name to describe​ self-regulating policies is called​ _____________.

safe harbor

When dealing with platform and infrastructure change, __________ refers to the ability of a computer, product, or system to expand to serve a large number of users without breaking down.

scalability

Apps

small pieces of software that run on the internet, on your computer, or on your mobile phone or tablet and are generally delivered over the internet. Refer commonly to mobile applications - iPhone, Android - Tie user to platform

The Windows operating system is an example of​ ______________ software

system

The Windows operating system is an example of​ ______________ software.

system

The IT infastructure computer software component includes both _______________ and ______________ software categories:

system and application

Online analytical processing (OLAP) is best defined as __________.

the capability for manipulating and analyzing large volumes of data from multiple perspectives

Some of the roles of an information policy are __________.

to identify which users and organizational units can share information, where information can be distributed, and who is responsible for updating ad maintaining the information

Edward Snowden, NSA technology contract worker

used web crawler (automatically moves from website to website, following links embedded in each document, and copies everything in its path) to get data out of NSA he was concerned, data provided to government from data gathering giants (google, facebook, twitter, microsoft, yahoo) PRISM helps identify terrorists by collecting metadata, this was what sacred snowden court ruled that it wasnt justified to gather that much, but the thing itself wasnt illegal

Which of the following is NOT a step a firm might take to make sure they have a high level of data quality?

using in-memory computing

Which of the following is not a step a firm might take to make sure they have a high level of data quality?

using in-memory computing

Andrew analyzes an ethical issue at​ work, evaluates the outcomes of various​ options, and chooses the one that achieves the greatest value. Which ethical principle is Andrew​ applying?

utilitarian principle

The ethical principle that calls ranking alternatives before making a decision is called the? ______________

utilitarian principle

The ethical principle that calls ranking alternatives before making a decision is called the​ ______

utilitarian principle

The ethical principle that calls ranking alternatives before making a decision is called the​ ______________.

utilitarian principle

The ethical principle that calls ranking alternatives before making a decision is called the

utilitarian principle.


Set pelajaran terkait

KINES Final (Chapters 4, 13, 8, 11 - 12, 29 - 33)

View Set

Effective Vocal Delivery and Bodily Actions

View Set

009 - Chapter 9 - Praxis 5039 (Chapter Test)

View Set

Honors Biology 9 Midterm Review Quizet

View Set

Drivers training homework Questions

View Set

Sugar: The simplest of Carbohydrates

View Set

COMPORTAMIENTO DEL CONSUMIDOR P#1

View Set

ATI Dynamic Quiz Med Surg Respiratory

View Set