Deck 16: Control
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/134
Play
Full screen (f)
Deck 16: Control
1
9. A(n) is a private company network that allows employees to easily access, share, and publish
Information using Internet software.
A) LAN portal
B) private company network (PCN)
C) intranet
D) electronic data sharing system
E) information network
Information using Internet software.
A) LAN portal
B) private company network (PCN)
C) intranet
D) electronic data sharing system
E) information network
B
2
Raw data contain useful information that communicate a clear and readily understandable message to the person for which the data were gathered.
False
3
The first airline that used technology to allow passengers to buy their plane tickets and reserve their seats online had a first-mover advantage.
True
4
Data mining is the:
A) automated, electronic capture of data
B) process of hypothesis testing in large databases
C) process of verifying known relationships in large amounts of data
D) process of discovering unknown patterns and relationships in large amounts of data
E) method used to identify and eliminate perishable data
A) automated, electronic capture of data
B) process of hypothesis testing in large databases
C) process of verifying known relationships in large amounts of data
D) process of discovering unknown patterns and relationships in large amounts of data
E) method used to identify and eliminate perishable data
Unlock Deck
Unlock for access to all 134 flashcards in this deck.
Unlock Deck
k this deck
5
Moore's law accounts for the rapid increase in power and reduction in both size and price of computer equipment over the past 35 years.
Unlock Deck
Unlock for access to all 134 flashcards in this deck.
Unlock Deck
k this deck
6
Pioneering differential refers to the strategic advantage that companies earn by being the first in an industry to use new information technology to substantially lower costs or to differentiate a product or service from competitors.
Unlock Deck
Unlock for access to all 134 flashcards in this deck.
Unlock Deck
k this deck
7
Unsupervised data mining is unethical.
Unlock Deck
Unlock for access to all 134 flashcards in this deck.
Unlock Deck
k this deck
8
The first company to gain first-mover advantage typically benefits from higher profits and larger market share.
Unlock Deck
Unlock for access to all 134 flashcards in this deck.
Unlock Deck
k this deck
9
Two critical steps are required to make sure that data can be accessed by authorized users and no one else. They are:
A) authentication and authorization
B) authorization and empowerment
C) delegation and empowerment
D) encryption and empowerment
E) authentication and encryption
A) authentication and authorization
B) authorization and empowerment
C) delegation and empowerment
D) encryption and empowerment
E) authentication and encryption
Unlock Deck
Unlock for access to all 134 flashcards in this deck.
Unlock Deck
k this deck
10
In the process of capturing information, ASCII text is generated by:
A) bar codes
B) electronic scanners
C) optical character recognition software
D) e-tools
E) data mining
A) bar codes
B) electronic scanners
C) optical character recognition software
D) e-tools
E) data mining
Unlock Deck
Unlock for access to all 134 flashcards in this deck.
Unlock Deck
k this deck
11
According to the resource-based view of information technology, sustainable competitive advantage occurs when information technology adds value, is different across firms, and is difficult to create or acquire.
Unlock Deck
Unlock for access to all 134 flashcards in this deck.
Unlock Deck
k this deck
12
Which of the following statements about knowledge is true?
A) Data and information are the same as knowledge.
B) Knowledge resides in information.
C) Knowledge is the understanding that one gains from information.
D) Knowledge is easier to acquire than data and information.
E) All of these statements about knowledge are true.
A) Data and information are the same as knowledge.
B) Knowledge resides in information.
C) Knowledge is the understanding that one gains from information.
D) Knowledge is easier to acquire than data and information.
E) All of these statements about knowledge are true.
Unlock Deck
Unlock for access to all 134 flashcards in this deck.
Unlock Deck
k this deck
13
Which of the following statements about the characteristics and costs of useful information is true?
A) Raw data become information as soon as the facts and figures are manipulated.
B) For information to be useful, it has to be malleable, concrete, reliable, and timely.
C) Obtaining good information incurs negligible costs in terms of acquisition, processing, storage, retrieval, and communication.
D) Useful information does not come cheaply.
E) All of these statements about the characteristics and costs of useful information are true.
A) Raw data become information as soon as the facts and figures are manipulated.
B) For information to be useful, it has to be malleable, concrete, reliable, and timely.
C) Obtaining good information incurs negligible costs in terms of acquisition, processing, storage, retrieval, and communication.
D) Useful information does not come cheaply.
E) All of these statements about the characteristics and costs of useful information are true.
Unlock Deck
Unlock for access to all 134 flashcards in this deck.
Unlock Deck
k this deck
14
In today's hypercompetitive business environments, capital (i.e., money) is still more important than information for business success.
Unlock Deck
Unlock for access to all 134 flashcards in this deck.
Unlock Deck
k this deck
15
The goal of an executive information system (EIS) is to:
A) replace the need for intuition in decision making
B) create a link among authorized data and network users
C) protect organizational data from hackers
D) provide accurate, complete, relevant, and timely information to managers
E) do none of these
A) replace the need for intuition in decision making
B) create a link among authorized data and network users
C) protect organizational data from hackers
D) provide accurate, complete, relevant, and timely information to managers
E) do none of these
Unlock Deck
Unlock for access to all 134 flashcards in this deck.
Unlock Deck
k this deck
16
The primary difference between raw data and information is meaning to the user.
Unlock Deck
Unlock for access to all 134 flashcards in this deck.
Unlock Deck
k this deck
17
Data clusters:
A) result from the use of internal data mining
B) are a statistical technique used for trend analysis
C) are used to create samples for statistical analyses
D) occur when three or more database elements occur together in a significant way
E) are accurately described by all of these
A) result from the use of internal data mining
B) are a statistical technique used for trend analysis
C) are used to create samples for statistical analyses
D) occur when three or more database elements occur together in a significant way
E) are accurately described by all of these
Unlock Deck
Unlock for access to all 134 flashcards in this deck.
Unlock Deck
k this deck
18
Information has strategic importance for organizations because it can be used to obtain first-mover advantage and to sustain a competitive advantage once it has been created.
Unlock Deck
Unlock for access to all 134 flashcards in this deck.
Unlock Deck
k this deck
19
Raw data contain useful information that communicate a clear and readily understandable message to the person for which the data were gathered.
Unlock Deck
Unlock for access to all 134 flashcards in this deck.
Unlock Deck
k this deck
20
Moore's law refers to the prediction that the cost of computing will drop by 50 percent every 2 years as computer- processing power doubles.
Unlock Deck
Unlock for access to all 134 flashcards in this deck.
Unlock Deck
k this deck
21
Unsupervised data mining is unethical.
Unlock Deck
Unlock for access to all 134 flashcards in this deck.
Unlock Deck
k this deck
22
Intranets are private company networks that allow employees to easily access, share, and publish information using
Internet software.
Internet software.
Unlock Deck
Unlock for access to all 134 flashcards in this deck.
Unlock Deck
k this deck
23
Three major types of information technology are used by executives, managers, and workers inside the company to access and share information. They are executive information systems, intranets, and corporate portals.
Unlock Deck
Unlock for access to all 134 flashcards in this deck.
Unlock Deck
k this deck
24
Electronic data interchange, or EDI, is the direct electronic transmission of purchase and ordering information from one company's computer system to another company's computer system.
Unlock Deck
Unlock for access to all 134 flashcards in this deck.
Unlock Deck
k this deck
25
Extranets are used to handle organizational transactions with suppliers and distributors.
Unlock Deck
Unlock for access to all 134 flashcards in this deck.
Unlock Deck
k this deck
26
It is important to understand that DSS programs should not replace managerial decision making.
Unlock Deck
Unlock for access to all 134 flashcards in this deck.
Unlock Deck
k this deck
27
Electronic data interchange (EDI), extranets, and the Internet have proven to provide such a competitive advantage that managers are scrambling to find ways to use them in their own companies.
Unlock Deck
Unlock for access to all 134 flashcards in this deck.
Unlock Deck
k this deck
28
Data mining typically splits a data set in half, finds patterns in one half, and then tests the validity of those patterns by trying to find them again in the second half of the data set.
Unlock Deck
Unlock for access to all 134 flashcards in this deck.
Unlock Deck
k this deck
29
The term data mining refers to the process of discovering unknown patterns and relationships in large amounts of data.
Unlock Deck
Unlock for access to all 134 flashcards in this deck.
Unlock Deck
k this deck
30
The two activities necessary to properly secure data and data networks are the use of firewalls and antivirus software.
Unlock Deck
Unlock for access to all 134 flashcards in this deck.
Unlock Deck
k this deck
31
Data mining often reveals data clusters where three or more database elements occur together.
Unlock Deck
Unlock for access to all 134 flashcards in this deck.
Unlock Deck
k this deck
32
The key to sustaining a competitive advantage is using information technology to continuously improve and support the core functions of a business.
Unlock Deck
Unlock for access to all 134 flashcards in this deck.
Unlock Deck
k this deck
33
Virtual private networks (VPN) and secure sockets layer (SSL) encryption perform basically the same function.
Unlock Deck
Unlock for access to all 134 flashcards in this deck.
Unlock Deck
k this deck
34
Bar codes and document scanners are common methods of electronically capturing data.
Unlock Deck
Unlock for access to all 134 flashcards in this deck.
Unlock Deck
k this deck
35
Association patterns are also called sequence patterns.
Unlock Deck
Unlock for access to all 134 flashcards in this deck.
Unlock Deck
k this deck
36
Data encryption transforms data into complex, scrambled digital codes that can only be unencrypted by authorized users who possess unique decryption keys.
Unlock Deck
Unlock for access to all 134 flashcards in this deck.
Unlock Deck
k this deck
37
Data and information are the same as knowledge.
Unlock Deck
Unlock for access to all 134 flashcards in this deck.
Unlock Deck
k this deck
38
Protecting information is the process of ensuring that data are reliably and consistently retrievable in a usable format for authorized users but no one else.
Unlock Deck
Unlock for access to all 134 flashcards in this deck.
Unlock Deck
k this deck
39
A data warehouse stores raw data that have been collected from a variety of sources for later use.
Unlock Deck
Unlock for access to all 134 flashcards in this deck.
Unlock Deck
k this deck
40
The two basic methods of capturing information are continuous and periodic.
Unlock Deck
Unlock for access to all 134 flashcards in this deck.
Unlock Deck
k this deck
41
Why is information strategically important for organizations?
A) Information can be used to obtain first-mover advantage.
B) Information is derived from perceived knowledge, which limits its availability.
C) Information cannot be used as a medium of exchange.
D) Information creates suboptimization opportunities.
E) All of these are examples of why information is strategically important for organizations.
A) Information can be used to obtain first-mover advantage.
B) Information is derived from perceived knowledge, which limits its availability.
C) Information cannot be used as a medium of exchange.
D) Information creates suboptimization opportunities.
E) All of these are examples of why information is strategically important for organizations.
Unlock Deck
Unlock for access to all 134 flashcards in this deck.
Unlock Deck
k this deck
42
According to months.
A) Moore's law
B)Gordon'1law, the cost of computing will drop by 50 percent as computer-processing power doubles every 18
C) the Peter principle
D) the rule of e-commerce
E) Gresham's Law
A) Moore's law
B)Gordon'1law, the cost of computing will drop by 50 percent as computer-processing power doubles every 18
C) the Peter principle
D) the rule of e-commerce
E) Gresham's Law
Unlock Deck
Unlock for access to all 134 flashcards in this deck.
Unlock Deck
k this deck
43
Which of the following is one of the critical issues companies need to address in order to sustain a competitive advantage through information technology?
A) Who will have access to the information technology?
B) Will the purchase of the information technology be viewed as an expense or as an investment?
C) Does the firm's use of the information technology violate any ethical standards?
D) Is the firm's use of information technology difficult for another company to create or buy?
E) What government regulations may influence the company's use of information technology?
A) Who will have access to the information technology?
B) Will the purchase of the information technology be viewed as an expense or as an investment?
C) Does the firm's use of the information technology violate any ethical standards?
D) Is the firm's use of information technology difficult for another company to create or buy?
E) What government regulations may influence the company's use of information technology?
Unlock Deck
Unlock for access to all 134 flashcards in this deck.
Unlock Deck
k this deck
44
Most expert systems work by using a collection of "if-then" rules to sort through information and recommend a course of action.
Unlock Deck
Unlock for access to all 134 flashcards in this deck.
Unlock Deck
k this deck
45
The key to sustaining competitive advantage is .
A) faster computers with more memory
B) using information technology to continuously improve and support the core functions of a business
C) the Internet
D) the ability of the managers to delegate
E) how important the company's culture perceives conceptual skills
A) faster computers with more memory
B) using information technology to continuously improve and support the core functions of a business
C) the Internet
D) the ability of the managers to delegate
E) how important the company's culture perceives conceptual skills
Unlock Deck
Unlock for access to all 134 flashcards in this deck.
Unlock Deck
k this deck
46
The first company to use new information technology to substantially lower costs or differentiate products or services often gains .
A) first-mover advantage
B) lower profits
C) less market adaptability
D) increased synergy
E) all of these
A) first-mover advantage
B) lower profits
C) less market adaptability
D) increased synergy
E) all of these
Unlock Deck
Unlock for access to all 134 flashcards in this deck.
Unlock Deck
k this deck
47
A table showing the order frequencies as well as the average dollar value of the orders of different segments of a catalog retailer's market would be an example of .
A) an MIS
B) perceived knowledge
C) raw data
D) information
E) influential knowledge
A) an MIS
B) perceived knowledge
C) raw data
D) information
E) influential knowledge
Unlock Deck
Unlock for access to all 134 flashcards in this deck.
Unlock Deck
k this deck
48
Understanding that consumers wanted clean, convenient food when they were away from home was the information the first fast food restaurant founder used to .
A) acquire a source of perceived knowledge
B) create a tactical advantage
C) create a first-mover advantage
D) pioneer sales in the consumer food industry
E) sustain a competitive advantage
A) acquire a source of perceived knowledge
B) create a tactical advantage
C) create a first-mover advantage
D) pioneer sales in the consumer food industry
E) sustain a competitive advantage
Unlock Deck
Unlock for access to all 134 flashcards in this deck.
Unlock Deck
k this deck
49
In the process of capturing information, ASCII text is generated by .
A) bar codes
B) electronic scanners
C) optical character recognition software
D) e-tools
E) data mining
A) bar codes
B) electronic scanners
C) optical character recognition software
D) e-tools
E) data mining
Unlock Deck
Unlock for access to all 134 flashcards in this deck.
Unlock Deck
k this deck
50
When Billy Ingram founded White Castle, much of the public thought that hamburgers were made from rotten beef and not fit for human consumption. Ingram ground fresh beef in front of customers to prove it was safe and was the first to successfully sell hamburgers to the middle class. Today Ingram is credited as the founder of the fast- food industry. Yet, today White Castle has 330 locations, and McDonald's has 25,000 stores. From this information, you know .
A) tactics are more influential than strategies
B) the competitive advantage White Castle achieved from being first was not sustainable
C) White Castle lost its pioneering differential
D) product diffusion rates were slow
E) none of these
A) tactics are more influential than strategies
B) the competitive advantage White Castle achieved from being first was not sustainable
C) White Castle lost its pioneering differential
D) product diffusion rates were slow
E) none of these
Unlock Deck
Unlock for access to all 134 flashcards in this deck.
Unlock Deck
k this deck
51
The two basic methods of capturing information are .
A) systematic and unsystematic
B) planned and unplanned
C) continuous and intermittent
D) functional and hierarchical
E) manual and electronic
A) systematic and unsystematic
B) planned and unplanned
C) continuous and intermittent
D) functional and hierarchical
E) manual and electronic
Unlock Deck
Unlock for access to all 134 flashcards in this deck.
Unlock Deck
k this deck
52
The term refers to facts and figures that are in an unusable form.
A) nonspecific information
B) processed data
C) raw data
D) perceived knowledge
E) relevant information
A) nonspecific information
B) processed data
C) raw data
D) perceived knowledge
E) relevant information
Unlock Deck
Unlock for access to all 134 flashcards in this deck.
Unlock Deck
k this deck
53
According to the resource-based view of information technology, sustainable competitive advantage .
A) is difficult to create or acquire
B) can be created by using information technology to continuously improve and support the core functions of a business
C) differs across firms
D) occurs when information technology adds value
E) is accurately described by all of these
A) is difficult to create or acquire
B) can be created by using information technology to continuously improve and support the core functions of a business
C) differs across firms
D) occurs when information technology adds value
E) is accurately described by all of these
Unlock Deck
Unlock for access to all 134 flashcards in this deck.
Unlock Deck
k this deck
54
Pages listing all of the felony crimes perpetrated in a given city during the last decade would be an example of ____.
A) a resource allocation table
B) traditional knowledge
C) raw data
D) perceived knowledge
E) information
A) a resource allocation table
B) traditional knowledge
C) raw data
D) perceived knowledge
E) information
Unlock Deck
Unlock for access to all 134 flashcards in this deck.
Unlock Deck
k this deck
55
45. Because they are inexpensive and easy to use, , which convert printed text and pictures into digital images,
Have become an increasingly popular method for capturing data electronically.
A) electronic data interchanges
B) electronic scanners
C) radio frequency information digitizers (RFIDs)
D) data digitalization
E) bar coding devices
Have become an increasingly popular method for capturing data electronically.
A) electronic data interchanges
B) electronic scanners
C) radio frequency information digitizers (RFIDs)
D) data digitalization
E) bar coding devices
Unlock Deck
Unlock for access to all 134 flashcards in this deck.
Unlock Deck
k this deck
56
The three methods of tracing products through a distribution system are paper records, bar codes, and radio frequency identification tags. Which of the following statements about the tracing of products is true?
A) RFID tags need direct line-of-sight scanning.
B) Bar codes would be the easiest and most economical method to use.
C) Until technological improvements are made, paper records are the best way to trace recalled products.
D) RFID tags are most efficient because they can be read by a radio that has been tuned to a specific frequency.
E) Bar codes are the most efficient because they make use of optical character recognition.
A) RFID tags need direct line-of-sight scanning.
B) Bar codes would be the easiest and most economical method to use.
C) Until technological improvements are made, paper records are the best way to trace recalled products.
D) RFID tags are most efficient because they can be read by a radio that has been tuned to a specific frequency.
E) Bar codes are the most efficient because they make use of optical character recognition.
Unlock Deck
Unlock for access to all 134 flashcards in this deck.
Unlock Deck
k this deck
57
The manual capture of information is .
A) slow
B) expensive
C) labor-intensive
D) often inaccurate
E) all of these
A) slow
B) expensive
C) labor-intensive
D) often inaccurate
E) all of these
Unlock Deck
Unlock for access to all 134 flashcards in this deck.
Unlock Deck
k this deck
58
50. Using data mining, the user usually begins by telling the data mining software to look and test for specific
Patterns and relationships in a data set.
A) supervised
B) specific
C) comprehensive
D) unsupervised
E) homogenous
Patterns and relationships in a data set.
A) supervised
B) specific
C) comprehensive
D) unsupervised
E) homogenous
Unlock Deck
Unlock for access to all 134 flashcards in this deck.
Unlock Deck
k this deck
59
is the process of discovering unknown patterns and relationships in large amounts of data.
A) Information keystoning
B) Data mining
C) Data warehousing
D) Data outsourcing
E) Patterning
A) Information keystoning
B) Data mining
C) Data warehousing
D) Data outsourcing
E) Patterning
Unlock Deck
Unlock for access to all 134 flashcards in this deck.
Unlock Deck
k this deck
60
46. Text and pictures that have been digitized cannot be searched or edited like text and pictures found in word processing software. processing software.
a. Electronic bar scanners
Can be used to convert digitized documents into ASCII code that can be edited by word
B) Optical numerical readers
C) Optical character recognition software
D) Radio frequency analog systems
E) Analog scanners
a. Electronic bar scanners
Can be used to convert digitized documents into ASCII code that can be edited by word
B) Optical numerical readers
C) Optical character recognition software
D) Radio frequency analog systems
E) Analog scanners
Unlock Deck
Unlock for access to all 134 flashcards in this deck.
Unlock Deck
k this deck
61
51. Using data mining, the user simply tells the data mining software to uncover whatever patterns and
Relationships it can find in a data set.
A) supervised
B) specific
C) comprehensive
D) heterogeneous
E) unsupervised
Relationships it can find in a data set.
A) supervised
B) specific
C) comprehensive
D) heterogeneous
E) unsupervised
Unlock Deck
Unlock for access to all 134 flashcards in this deck.
Unlock Deck
k this deck
62
57. The data used in data mining typically come from that store huge amounts of data that have been prepared
For data mining analysis by being cleaned of errors and redundancy.
A) Internet databases
B) competitive intelligence sources
C) data warehouses
D) data extractions
E) information clearinghouses
For data mining analysis by being cleaned of errors and redundancy.
A) Internet databases
B) competitive intelligence sources
C) data warehouses
D) data extractions
E) information clearinghouses
Unlock Deck
Unlock for access to all 134 flashcards in this deck.
Unlock Deck
k this deck
63
Data mining is the .
A) automated, electronic capture of data
B) process of hypothesis testing in large databases
C) process of verifying known relationships in large amounts of data
D) process of discovering unknown patterns and relationships in large amounts of data
E) method used to identify and eliminate perishable data
A) automated, electronic capture of data
B) process of hypothesis testing in large databases
C) process of verifying known relationships in large amounts of data
D) process of discovering unknown patterns and relationships in large amounts of data
E) method used to identify and eliminate perishable data
Unlock Deck
Unlock for access to all 134 flashcards in this deck.
Unlock Deck
k this deck
64
Baseball management discovered that its sales increased by almost 100 percent in those seasons when it held an open house prior to the opening game and allowed people to see the box seats and examine the view of the stadium from those seats. In terms of data mining, the management discovered a(n) pattern.
A) affinity
B) sequence
C) association
D) adjacency
E) collaborative
A) affinity
B) sequence
C) association
D) adjacency
E) collaborative
Unlock Deck
Unlock for access to all 134 flashcards in this deck.
Unlock Deck
k this deck
65
A system that requires employees to scan their thumbprints as they start work is called a(n) .
A) intangible cookies
B) biometrics
C) personal RFID tags
D) individual bar codes
E) optical scanners
A) intangible cookies
B) biometrics
C) personal RFID tags
D) individual bar codes
E) optical scanners
Unlock Deck
Unlock for access to all 134 flashcards in this deck.
Unlock Deck
k this deck
66
Which of the following statements about data mining is true?
A) Data mining is the specific process used to match buyers and sellers.
B) Data mining is too expensive for most companies to use at this time.
C) The two forms of data mining are centralized and decentralized.
D) Data mining typically uses data from a data warehouse.
E) All of these statements about data mining are true.
A) Data mining is the specific process used to match buyers and sellers.
B) Data mining is too expensive for most companies to use at this time.
C) The two forms of data mining are centralized and decentralized.
D) Data mining typically uses data from a data warehouse.
E) All of these statements about data mining are true.
Unlock Deck
Unlock for access to all 134 flashcards in this deck.
Unlock Deck
k this deck
67
For the purposes of data mining, patterns are just the opposite of association patterns.
A) sequence
B) adjacency
C) predictive
D) affinity
E) asymmetrical
A) sequence
B) adjacency
C) predictive
D) affinity
E) asymmetrical
Unlock Deck
Unlock for access to all 134 flashcards in this deck.
Unlock Deck
k this deck
68
To properly secure data and data networks, a manager should use all of the following EXCEPT .
A) roadblocks
B) firewalls
C) data encryption
D) antivirus software
E) virtual private networks
A) roadblocks
B) firewalls
C) data encryption
D) antivirus software
E) virtual private networks
Unlock Deck
Unlock for access to all 134 flashcards in this deck.
Unlock Deck
k this deck
69
Although firewalls can protect personal computers and network services connected to the corporate network, people away from their offices who interact with their company networks via the Internet face a safety risk. Which of the following technologies has proven to be an inexpensive solution to this problem?
A) safe software for logic (SSL) encryption
B) virtual private networks
C) local area networks
D) firewall reassignment
E) reengineered applets
A) safe software for logic (SSL) encryption
B) virtual private networks
C) local area networks
D) firewall reassignment
E) reengineered applets
Unlock Deck
Unlock for access to all 134 flashcards in this deck.
Unlock Deck
k this deck
70
Unsupervised data mining is particularly good at identifying .
A) association or affinity patterns
B) sequence patterns
C) predictive patterns
D) data clusters
E) all of these
A) association or affinity patterns
B) sequence patterns
C) predictive patterns
D) data clusters
E) all of these
Unlock Deck
Unlock for access to all 134 flashcards in this deck.
Unlock Deck
k this deck
71
By examining checkout data, supermarkets have learned that people who are buying beer often also buy a bag of salty snacks. The use of data mining led to the discovery of a(n) pattern.
A) sequential
B) affinity
C) predictive
D) adjacency
E) extrapolative
A) sequential
B) affinity
C) predictive
D) adjacency
E) extrapolative
Unlock Deck
Unlock for access to all 134 flashcards in this deck.
Unlock Deck
k this deck
72
The two major types of data mining are .
A) supervised and unsupervised
B) random and sequence
C) affinity and association
D) sequence and affinity
E) ASCII and digital
A) supervised and unsupervised
B) random and sequence
C) affinity and association
D) sequence and affinity
E) ASCII and digital
Unlock Deck
Unlock for access to all 134 flashcards in this deck.
Unlock Deck
k this deck
73
Which of the following is NOT an example of a security problem that may threaten data and data networks?
A) email snooping
B) phishing
C) keystroke monitoring
D) mob flashing
E) password cracking
A) email snooping
B) phishing
C) keystroke monitoring
D) mob flashing
E) password cracking
Unlock Deck
Unlock for access to all 134 flashcards in this deck.
Unlock Deck
k this deck
74
54. By examining checkout data, supermarkets have learned that people who are buying beer typically also buy a bag of salty snacks. As a result of this finding from pretzel aisle.
A) optical scanning
B) electronic data interchange
C) bar coding
D) data mining e. data warehousing
, supermarkets often place displays of beer near the chips and
A) optical scanning
B) electronic data interchange
C) bar coding
D) data mining e. data warehousing
, supermarkets often place displays of beer near the chips and
Unlock Deck
Unlock for access to all 134 flashcards in this deck.
Unlock Deck
k this deck
75
Two critical steps are required to make sure that data can be accessed by authorized users and no one else. They are ____.
A) authentication and authorization
B) authorization and empowerment
C) delegation and empowerment
D) encryption and empowerment
E) authentication and encryption
A) authentication and authorization
B) authorization and empowerment
C) delegation and empowerment
D) encryption and empowerment
E) authentication and encryption
Unlock Deck
Unlock for access to all 134 flashcards in this deck.
Unlock Deck
k this deck
76
Have you ever purchased a book or CD on Amazon.com and noticed that as soon as you put your selection in the shopping cart, you were offered a series of other items that people who made the same purchase as you did also bought? This would be an example of data mining.
A) sequence
B) association
C) predictive
D) adjacency
E) extrapolative
A) sequence
B) association
C) predictive
D) adjacency
E) extrapolative
Unlock Deck
Unlock for access to all 134 flashcards in this deck.
Unlock Deck
k this deck
77
Which of the following statements about firewalls is true?
A) Firewalls are a way to protect data.
B) Firewalls can be in the form of hardware or software.
C) Firewalls prevent unauthorized use of data.
D) Firewalls sit between the computers in an internal organizational network and outside networks.
E) All of these statements about firewalls are true.
A) Firewalls are a way to protect data.
B) Firewalls can be in the form of hardware or software.
C) Firewalls prevent unauthorized use of data.
D) Firewalls sit between the computers in an internal organizational network and outside networks.
E) All of these statements about firewalls are true.
Unlock Deck
Unlock for access to all 134 flashcards in this deck.
Unlock Deck
k this deck
78
Unsupervised data mining can be used to recognize patterns.
A) association, affinity, and sequence
B) association, extrapolative, and predictive
C) affinity, predictive, and adjacency
D) progressive, predictive, and accommodative
E) affinity, sequence, and predictive
A) association, affinity, and sequence
B) association, extrapolative, and predictive
C) affinity, predictive, and adjacency
D) progressive, predictive, and accommodative
E) affinity, sequence, and predictive
Unlock Deck
Unlock for access to all 134 flashcards in this deck.
Unlock Deck
k this deck
79
Data clusters ____.
A) result from the use of internal data mining
B) are a statistical technique used for trend analysis
C) are used to create samples for statistical analyses
D) occur when three or more database elements occur together in a significant way
E) are accurately described by all of these
A) result from the use of internal data mining
B) are a statistical technique used for trend analysis
C) are used to create samples for statistical analyses
D) occur when three or more database elements occur together in a significant way
E) are accurately described by all of these
Unlock Deck
Unlock for access to all 134 flashcards in this deck.
Unlock Deck
k this deck
80
The Food and Drug Administration (FDA) could use data it has collected from millions of suspected drug-related adverse event reports and other electronic medical information to identify a pattern of adverse drug events in a specific population. This data collected by the FDA would be held in a(n) .
A) Internet database
B) competitive intelligence source
C) data warehouse
D) data extraction
E) information clearinghouse
A) Internet database
B) competitive intelligence source
C) data warehouse
D) data extraction
E) information clearinghouse
Unlock Deck
Unlock for access to all 134 flashcards in this deck.
Unlock Deck
k this deck