Kitchens - ISOM 210 - 6a-7b
___________ tracking occurs when a company places active or semi-passive RFID tags on expensive products or assets to gather data on the items' location with little or no manual intervention.
Asset
What tracks corporate metrics such as critical success factors and key performance indicators and include advanced capabilities such as interactive controls allowing users to manipulate data for analysis?
Business intelligence dashboards
Select two terms that describe the process for weeding out, fixing, or discarding inconsistent, incorrect, or incomplete data.
Data scrubbing. Data cleansing.
2G
Digital cell phone service
Analytical data
Encompasses all organizational data, and its primary purpose is to support the performing of managerial analysis tasks.
What is an enterprisewide security strategy to enforce corporate epolicies while enabling employee use of mobile devices such as smart phones and tablets?
Enterprise mobility management
Which data element stores a single piece of data about a person, place, thing, transaction, or event?
Entity
_________ are designated locations where Wi-Fi access points are publicly available.
Hotspots
What is the blending of personal and business use of technology devices and applications?
IT consumerization
What is the ability for a blockchain ledger to remain a permanent, indelible, and unalterable history of transactions?
Immutability
What presents the results of data analysis, displaying the patterns, relationships, and trends in a graphical format?
Infographics
Unique
Is each transaction and event represented only once in the data?
Timely
Is the data current with respect to business needs?
Accurate
Is there an incorrect value in the data?
What is the practice of gathering data and ensuring that it is uniform, accurate, consistent, and complete, including such entities as customers, suppliers, products, sales, employees, and other critical entities that are commonly integrated across organizational systems?
Master data management
What provides details about data?
Metadata
________ uses electronic tags and labels to identify objects wirelessly over short distances.
RFID
What means immediate, up-to-date data?
Real-time data
What is a collection of related data elements?
Records
Data at rest
Refers to all data in computer storage.
__________ integrity constraints are rules that enforce basic and fundamental information-based constraints.
Relational
What is a standard security technology for establishing an encrypted link between a web server and a browser, ensuring that all data passed between them remain private?
Secure sockets layer
___________ -passive RFID tags use a battery to run the microchip's circuitry, but communicate by drawing power from the RFID reader.
Semi
Data
Transactional data sender, receiver, number of coins.
True or false: Business-critical integrity constraints tend to mirror the very rules by which an organization achieves success.
True
A(n) ___________ point is the computer or network device that serves as an interface between devices and the network.
access
A(n) _______ is an entity that is capable of participating in an action or a network.
actor
A data _________ is a business analytics specialist who uses visual tools to help people understand complex data.
artist
A(n) _________ is the smallest element of data and has a value of either 0 or 1.
bit
A blockchain is formed by linking together ___________, data structures containing a hash, previous hash, and data.
blocks
The problem of being data rich and information poor results from an inability to turn business data into ______.
business intelligence
A(n) ______ can compare two or more datasets to identify patterns and trends.
comparative analysis
A data _______ is the common term for the representation of multidimensional data.
cube
A(n) _________ maintains data about various types of objects (inventory), events (transactions), people (employees), and places (warehouses).
database
Attributes are the data elements associated with an ________.
entity
Wireless __________ is a means by which portable devices can connect wirelessly to a local area network, using access points that send and receive data via radio waves.
fidelity
A(n) __________ key is a primary key of one table that appears as an attribute in another table and acts to provide a logical relationship between the two tables.
foreign
The ________ block is the first block created in the blockchain.
genesis
Data ___________ refers to the overall management of the availability, usability, integrity, and security of company data.
governance
A data ________ is a storage repository that holds a vast amount of raw data in its original format until the business needs it.
lake
A _______ records classified and summarized transactional data
ledger
A(n) ___________ area network is a large computer network usually spanning a city.
metropolitan
One primary goal of a database is to eliminate data redundancy by recording each piece of data in _______ place(s) in the database.
only one
The ____________ view of data deals with the physical storage of data on a storage device.
physical
Wi-Fi __________ access is a wireless security protocol to protect Wi-Fi networks.
protected
A(n) ___________ database model stores data in the form of logically related two-dimensional tables.
relational
Data ________ includes the tests and evaluations used to determine compliance with data governance polices to ensure correctness of data.
validation
What is the fifth-generation wireless broadband technology based on the 802.11ac standard engineered to greatly increase the speed and responsiveness of wireless networks?
5G
Data in motion
A stream of data that is moving or being transported between locations within or between computer systems.
_________________ is a device that can measure the force of acceleration, whether caused by gravity or by movement.
Accelerometer
____________ represents the loss of a network signal strength measured in decibels (dB) and occurs because the transmissions gradually dissipate in strength over longer distances or because of radio interference or physical obstructions such as walls.
Attenuation
What uses GPS tracking to track vehicles?
Automatic vehicle location
What is an entity that is participating with ill-intentions?
Bad actor
What measures network performance and represents the maximum amount of data that can pass from one point to another in a unit of time?
Bandwidth
____ rate is the number of bits transferred or received per unit of time.
Bit
________ is a type of digital currency in which a record of transactions is maintained and new units of currency are generated by the computational solution of mathematical problems and which operates independently of a central bank.
Bitcoin
What is a type of distributed ledger, consisting of blocks of data that maintain a permanent and tamper-proof record of transactional data?
Blockchain
What is a wireless PAN technology that transmits signals over short distances among cell phones, computers, and other devices?
Bluetooth
3G
Broadband Internet services over cellular networks; Added MMS (multimedia message services) or picture message services
What enforces business rules vital to an organization's success and often require more insight and knowledge than relational integrity constraints?
Business-critical integrity constraints
___________ is the science and art of making an illustrated map or chart.
Cartography
What uses plastic or conductive polymers instead of silicon-based microchips, allowing them to be washed or exposed to water without damaging the chip?
Chipless RFID tags
_______ analysis can compare two or more datasets to identify patterns and trends.
Comparative
What occurs when a company keeps tabs of competitor's activities on the web using software that automatically tracks all competitor website activities such as discounts and new products?
Competitive monitoring
Dual persona technology creates two completely separate user interfaces one the same device, one for work and one for personal use. What is dual persona technology an example of?
Containerization
What isolates corporate applications from personal applications on a device?
Containerization
Select the four functions that a database management system can perform on data in a database?
Create data. Delete data. Update data. Read data.
What is the collection of data from various sources for the purpose of data processing?
Data aggregation
What compiles all of the metadata about the data elements in the data model?
Data dictionary
Select a term that is a synonym for data element, the smallest or basic unit of data in a database.
Data field
What occurs when a company examines its data to determine if it can meet business expectations, while identifying possible data gaps or where missing data might exist?
Data gap analysis
What occurs when a system produces incorrect, inconsistent, or duplicate data?
Data integrity issues
What is the time it takes for data to be stored or retrieved?
Data latency
What is a technique for establishing a match, or balance, between the source data and the target data warehouse?
Data map
What contains a subset of data warehouse data?
Data mart
What are logical data structures that detail the relationships among data elements using graphics or pictures?
Data models
What is an individual item on a graph or a chart?
Data point
What determines the accuracy and completeness of its data?
Data quality audits
Select the four primary traits of the value of data.
Data quality. Data type. Data timeliness. Data governance.
Select the statement that accurately describes a situation in which there is too much data to properly understand or make use of it.
Data rich and information poor
Who is responsible for ensuring the policies and procedures are implemented across the organization and acts as a liaison between the MIS department and the business?
Data steward
Data in use
Data that is currently being updated, processed, erased, accessed or read by a system.
What describes technologies that allow users to "see" or visualize data to transform information into a business perspective?
Data visualization
What moves beyond Excel graphs and charts into sophisticated analysis techniques such as pie charts, controls, instruments, maps, time-series graphs, and more?
Data visualization tools
What is a logical collection of data, gathered from many different operational databases, that supports business analysis activities and decision-making tasks?
Data warehouse
Select the four primary reasons low-quality data occurs in a system.
Data-entry personnel enter abbreviated data to save time. Third-party and external data contains inconsistencies and errors. Different systems have different data entry standards and formats. Online customers intentionally enter inaccurate data to protect their privacy.
What is a worldwide gap giving advantage to those with access to technology?
Digital divide
What is erroneous or flawed data?
Dirty data
_________ computing processes and manages algorithms across many machines in a computing environment.
Distributed
Which of the following are problems associated with dirty data? (Choose all that apply)
Duplicate data. Incorrect data. Non-formatted data.
Select the statement that accurately defines the relationship between entities and attributes in a relational database.
Each attribute of an entity occupies a separate column of a table.
Choose Your Own Device
Employees choose a company approved and configured device.
Company Issued, Personally Enabled
Employees provided with corporate devices.
Bring Your Own Device
Employees use their own device.
Transactional data
Encompasses all of the data contained within a single business process or unit of work, and its primary purpose is to support daily operational tasks.
What is the time remaining before reaching a destination using the present speed and is typically used for navigation applications?
Estimated time enroute
What is the time of day of an expected arrival at a certain destination and is typically used for navigation applications?
Estimated time of arrival
Inconsistent Data Definitions
Every department had its own method for recording data so when trying to share information, data did not match and users did not get the data they really needed.
___________, transformation, and loading is a process that extracts data from internal and external databases, transforms it using a common set of enterprise definitions, and loads it into a data warehouse.
Extraction
_____ data is the application of big data analytics to smaller data sets in near-real or real-time in order to solve a problem or create business value.
Fast
What links business assets to a centralized system where they can be tracked and monitored over time?
GIS map automation
Select the three primary wireless business applications.
GIS. GPS. RFID.
__________ is a GPS technology adventure game that posts the longitude and latitude location for an item on the Internet for users to find.
Geocache
___________ in spatial databases is a coding process that assigns a digital map feature to an attribute that serves as a unique ID (tract number, node number) or classification (soil type, zoning category).
Geocoding
What term describes a round coin-sized object that is uniquely numbered and hidden in geocache?
Geocoin
What stores, views, and analyzes geographic data creating, multidimensional charts or maps?
Geographic information system
Select three measurements of bandwidth.
Gigabits. Megabits. Kilobits.
What is a satellite-based navigation system providing extremely accurate position, time, and speed information?
Global positioning system
Previous Hash
Hash of the previous block in the blockchain.
4G
High-speed access, anywhere, anytime, to anything digital—audio, video, text
What is a broad administrative area that deals with identifying individuals in a system and controlling their access to resources within that system by associating user rights and restrictions with the established identity?
Identity management
Select the three accurate statements reflecting the business advantages of a relational database.
Increased data integrity. Increased data security. Reduced data redundancy.
_________ present the results of data analysis, displaying the patterns, relationships, and trends in a graphical format.
Infographics
What are rules that help ensure the quality of data?
Integrity constraints
Complete
Is a value missing from the data?
Consistent
Is aggregate or summary data in agreement with detailed data?
__________ represents a north/south measurement of position.
Latitude
Which applications use location information to provide a service?
Location-based services
What focuses on how individual users logically access data to meet their own particular business needs?
Logical view of data
What represents an east/west measurement of position?
Longitude
Which technology has multiple transmitters and receivers, allowing them to send and receive greater amounts of data than traditional networking devices?
MIMO
Lack of Data Standards
Managers need to perform cross-functional analysis using data from all departments, which differed in granularities, formats, and levels.
What is a large computer network usually spanning a city?
Metropolitan area network
What is the set of processes and procedures involved in writing software for use on wireless devices?
Mobile application development
What is a security strategy that administers and enforces corporate epolicies for applications on mobile devices?
Mobile application management
Identify the three primary areas of an enterprise mobility strategy.
Mobile application management. Mobile device management. Mobile information management.
What is the ability to purchase goods and services through a wireless Internet-enabled device?
Mobile business
What is a security strategy comprised of products and services that offer remote support for mobile devices, such as smart phones, laptops, and tablets?
Mobile device management
Ineffective Direct Data Access
Most data stored in operational databases did not allow users direct access; users had to wait to have their queries or questions answered by MIS professionals who could code SQL.
What is about ensuring that everyone has equal access to the Internet?
Net neutrality
What provides communication for devices owned by a single user that work over a short distance?
PAN
_________ RFID tags do not have a power source, whereas active RFID tags have their own transmitter and a power source (typically a battery).
Passive
_________ computing is the growing trend of embedding computer capabilities into everyday objects to make them effectively communicate and perform useful tasks in a way that minimizes the end user's need to interact with computers as computers.
Pervasive
What is a field that uniquely identifies a given record in a table?
Primary key
Which of the following are examples of analytical data? (Check all that apply.)
Product statistics. Sales projections.
What is a website that looks and behaves as if it is a mobile application but it is just a normal website?
Progressive web application
What is a way to validate transactions and achieve the distributed consensus?
Proof-of-stake
What is a requirement to define an expensive computer calculation, also called mining, that needs to be performed in order to create a new group of trustless transactions on the distributed ledger or blockchain?
Proof-of-work
What is a device that measures the acceleration (the rate of change of velocity) of an item and is used to track truck speeds or taxi cab speeds?
RFID accelerometer
What is a transmitter/receiver that reads the contents of RFID tags in the area?
RFID reader
What is an electronic identification device that is made up of a chip and antenna?
RFID tag
_______ data is data that has not been processed for use.
Raw
Which system allows users to create, read, update, and delete data in a relational database?
Relational database management system
What receives and repeats a signal to extend its attenuation or range?
Repeater
Select three terms that represent the event that occurs when paper maps are laid edge to edge and items that run across maps but do not match are reconfigured to match.
Rubber sheeting. Warping. Edge matching.
What is a combination of HTTP and SSL to provide encryption and secure identification of an Internet server?
SHTTP or HTTPS
Which of the following are examples of transactional data? (Check all that apply.)
Sales receipt. Airline ticket.
What is a space station that orbits the Earth receiving and transmitting signals from Earth-based stations over a wide area?
Satellite
Select three common uses of GIS in a business.
Sending information alerts. Mapping quantities. Finding what is nearby.
___________ offer more advanced computing ability and connectivity than basic cell phones.
Smartphones
_____ data identifies the primary location where data is collected.
Source
What identifies the primary location where data is collected?
Source data
What identifies the geographic location of features and boundaries on Earth, such as natural or constructed features, oceans, and more?
Spatial data
___________ is a method of sending audio and video files over the Internet in such a way that the user can view the file while it is being transferred.
Streaming
Which of the following is generated continuously by thousands of data sources, which typically send in the data records simultaneously and in small sizes?
Streaming data
5G
Superior data communication rate; Expected to provide artificial intelligence capabilities on wearable devices
Hash
The blocks unique identifier like a fingerprint.
Poor Data Quality
The data, if available, were often incorrect or incomplete. Therefore, users could not rely on the data to make decisions.
1G
The original analog cell phone network
True or false: Gender, for instance can be referred to in many ways (Male, Female, M/F, 1/0), but it should be standardized on a data warehouse with one common way of referring to each data element that stores gender (M/F).
True
Inadequate Data Usefulness
Users could not get the data they needed; what was collected was not always useful for intended purposes.
Why does a database offer increased information security?
Various security features of databases ensure that individuals have only certain types of access to certain types of data.
________ over IP uses IP technology to transmit telephone calls.
Voice
_________ over LTE allows mobile voice calls to be made over broadband networks, creating—under the right network conditions—clearer audio and fewer dropped calls.
Voice
What is an encryption algorithm designed to protect wireless transmission data?
WEP
What is a local area network that uses radio signals to transmit and receive data over distances of a few hundred feet?
WLAN
What is the practice of tagging pavement with codes displaying where Wi-Fi access is available?
War chalking
Which of the following are answers to tough business questions BI can answer? (Choose all that apply)
Where is the business going? Where is the business now? Where has the business been?
Select the statement below that accurately reflects a database.
While a database has only one physical view, it can easily support multiple logical views that provides for flexibility.
What includes the inner workings of a Wi-Fi service or utility, including the signal transmitters, towers, or poles, along with additional equipment required to send out a Wi-Fi signal?
Wi-Fi infrastructure
_______ is a communications technology aimed at providing high-speed wireless data over metropolitan area networks.
WiMAX
What is a metropolitan area network that uses radio signals to transmit and receive data?
Wireless MAN
Select the four wireless communication network categories.
Wireless metropolitan area networks. Wireless wide area networks. Personal area networks. Wireless local area network.
Select the two accurate statements about mobility and wireless communications.
Wireless refers to any type of operation accomplished without the use of a hard-wired connection. Mobile means the technology can travel with the user.
A(n) _________ rule defines how a company performs certain aspects of its business and typically results in either a yes/no or true/false answer.
business
A web server requires an SSL __________, an electronic document that confirms the identity of a website or server and verifies that a public key belongs to a trustworthy individual or company.
certificate
Business intelligence ________ track corporate metrics such as critical success factors and key performance indicators and include advanced capabilities such as interactive controls allowing users to manipulate data for analysis.
dashboards
War ________ is deliberately searching for Wi-Fi signals while driving by in a vehicle.
driving
Data ___________ refers to the extent of detail within the data (fine and detailed or coarse and abstract).
granularity
A _____ is a function that converts an input of letters and numbers into an encrypted output of a fixed length.
hash
Data ___________ occurs when the same data element has different values.
inconsistency
Mobile _________ management is a security strategy that involves keeping sensitive data encrypted and allowing only approved applications to access or transmit it.
information
Data _________ is a measure of the quality of data.
integrity
Analysis ___________ occurs when the user goes into an emotional state of over analyzing (or over-thinking) a situation so that a decision or action is never taken, in effect paralyzing the outcome. In the time of big data, analysis paralysis is a growing problem.
paralysis
A wireless access ____________ enables devices to connect to a wireless network to communicate with each other.
point
A(n) ___________ -by-example tool helps users graphically design the answer to a question against a database.
query
A _______ access network is a technology that connects individual devices to other parts of a network through radio connections.
radio
Data __________ is the duplication of data, or the storage of the same data in multiple places.
redundancy
Data ___________ is the management and oversight of an organization's data assets to help provide business users with high-quality data that is easily accessible in a consistent manner.
stewardship
A(n) __________ query language asks users to write lines of code to answer questions against a database.
structured
Real-time __________ provide real-time data in response to requests.
systems
A data map is a technique for establishing a match, or balance, between the source data and the ______ data warehouse.
target
Data-driven decision management is an approach to business governance that values decisions that can be backed up with ______ data.
verifiable
A(n) ________ area network spans a large geographic area such as a state, province, or country.
wide
A(n) ___________-WAN is a wide area network that uses radio signals to transmit and receive data.
wireless
Proof-of-_________ is a requirement to define an expensive computer calculation, also called mining, that needs to be performed in order to create a new group of trustless transactions on the distributed ledger or blockchain.
work