Deck 17: Managing Information
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
Play
Full screen (f)
Deck 17: Managing Information
1
InfoQEN is a Wi-Fi router developer.A customer asked InfoQEN to develop a Wi-Fi router that can connect 10 devices simultaneously.InfoQEN developed the router and delivered it to the customer.After a day,the customer came back saying that the devices were not getting connected to the router as the router was located on a different floor.InfoQEN replied that if the distance between the router and devices is more than 10 meters,the devices will not get connected to the router.The device was built based on the number of devices to be connected and not on the possible distance between the devices and the router.To solve this problem,InfoQEN must now either redesign the router at additional costs or ask the customer to relocate the router.Which of the following is most likely the reason for this problem?
A) The information provided to InfoQEN was untimely.
B) The information provided to InfoQEN was irrelevant.
C) The information provided to InfoQEN was incomplete.
D) The information provided to InfoQEN was inestimable.
A) The information provided to InfoQEN was untimely.
B) The information provided to InfoQEN was irrelevant.
C) The information provided to InfoQEN was incomplete.
D) The information provided to InfoQEN was inestimable.
C
2
Innove Tech is a technological firm that wants to build a global service delivery system.It has consulted a larger firm,Ziff Corp.,to obtain the proven technology required to establish this system.In the context of the costs of useful information,Innove Tech incurred _____ costs.
A) processing
B) retrieval
C) acquisition
D) storage
A) processing
B) retrieval
C) acquisition
D) storage
C
3
In 1965,one of the founders of Intel Corporation predicted that computer-processing power would double and that its cost would drop by 50 percent every two years.This is known as _____.
A) Moore's law
B) Amdahl's law
C) Metcalfe's law
D) Haitz's law
A) Moore's law
B) Amdahl's law
C) Metcalfe's law
D) Haitz's law
A
4
Data mining is the process of collecting large amounts of raw data from different sources.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
A company that has earned first-mover advantage is immune to competition.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
Shop Ahead,a retail mart,conducted a survey on how long a customer waits in a queue for billing.Based on the results of the survey,the company planned to modify the number of employees at the billing counter.While checking out of the mart,Shop Ahead asked all its customers to fill a form indicating the time they spent in the queue.All customers reported that they waited for 2,5,or 10 minutes.Majority reported that they waited for 10 minutes.Based on the results,Shop Ahead added 10 cash counters to its existing 20.After a month,the management realized that the mart had more cash counters and employees than required.Which of the following is most likely the reason for the loss incurred due to overemployment in the mart?
A) The information provided in the survey was inaccurate.
B) The information provided in the survey was irrelevant.
C) The information provided in the survey was incomplete.
D) The information provided in the survey was inestimable.
A) The information provided in the survey was inaccurate.
B) The information provided in the survey was irrelevant.
C) The information provided in the survey was incomplete.
D) The information provided in the survey was inestimable.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
Ziff Corp.,a computer cabinet manufacturer,recently employed a new supply chain management system,which has never been used before.This system enables the company to produce more computer cabinets than its competitors at considerably lower costs.By employing this new supply chain management system,Ziff Corp.has achieved _____.
A) competitive inertia
B) strategic dissonance
C) first-mover advantage
D) informational advantage
A) competitive inertia
B) strategic dissonance
C) first-mover advantage
D) informational advantage
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
Which of the following best describes storage costs?
A) It is the cost of obtaining data that an organization does not possess.
B) It is the cost of transforming data into meaningful information.
C) It is the cost of physically or electronically archiving information.
D) It is the cost of transmitting information from one place to another.
A) It is the cost of obtaining data that an organization does not possess.
B) It is the cost of transforming data into meaningful information.
C) It is the cost of physically or electronically archiving information.
D) It is the cost of transmitting information from one place to another.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
Extranets allow companies to exchange information and conduct transactions with outsiders by providing them direct,web-based access to authorized parts of a company's information system.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
Fuine Corp.,a multinational corporation,has a data management system that contains raw data about the firm,its employees,business processes,subdivisions,etc.The data management system is outdated and inefficient in converting the data into useable information.This significantly costs the company.In this case,which of the following costs is Fuine Corp.incurring?
A) Processing costs
B) Retrieval costs
C) Acquisition costs
D) Storage costs
A) Processing costs
B) Retrieval costs
C) Acquisition costs
D) Storage costs
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
Most expert systems work by using a collection of "if-then" rules to sort through information and recommend a course of action.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
Data and information are the same as knowledge.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
Lailey Tech,a global customer service provider,spent $25 million on a new data center to keep its data safe at a single location.Which of the following costs best illustrates the expenditure on the new data center?
A) Acquisition costs
B) Processing costs
C) Storage costs
D) Retrieval costs
A) Acquisition costs
B) Processing costs
C) Storage costs
D) Retrieval costs
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
Which of the following leads to sustainable competitive advantage?
A) A similarity in information technology used across competing firms
B) A high potential for competing firms to create or buy a company's information technology
C) Continuous improvement of the hardware and software used by a company
D) Using information technology to continuously improve the core functions of a company
A) A similarity in information technology used across competing firms
B) A high potential for competing firms to create or buy a company's information technology
C) Continuous improvement of the hardware and software used by a company
D) Using information technology to continuously improve the core functions of a company
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
Association patterns help identify database elements that are different.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
Retrieval cost is the cost of transmitting information from one place to another.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
Intranets use standardized protocols to describe and transfer data from one company in such a way that those data can automatically be read,understood,transcribed,and processed by different computer systems in another company.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
Competitive advantage does not depend on using information technology to continuously improve and support the core functions of a business.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
Which of the following is a characteristic of information?
A) Information specifically contains figures.
B) Information is useful even when it is inaccurate.
C) Information has context attached to it.
D) Incomplete information helps in recognizing problems.
A) Information specifically contains figures.
B) Information is useful even when it is inaccurate.
C) Information has context attached to it.
D) Incomplete information helps in recognizing problems.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
Expert systems do not permit nonexpert employees to draw on the expert knowledge base to make decisions.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
A(n)_____ can be used to convert digitized documents into ASCII (American Standard Code for Information Interchange)text that can be edited by word processing software.
A) electronic bar scanner
B) radio frequency analogue software
C) optical character recognition software
D) electromagnetic wave imager
A) electronic bar scanner
B) radio frequency analogue software
C) optical character recognition software
D) electromagnetic wave imager
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
Which of the following best describes radio frequency identification (RFID)tags?
A) They represent numerical data of a product by varying the thickness and pattern of vertical bars.
B) They require direct line-of-sight scanning for the radio waves to scan a product perfectly.
C) They require a reader that tunes into a specific frequency to determine the number and location of products.
D) They are installed in a handheld or pen-type scanner that reads and records data instantly.
A) They represent numerical data of a product by varying the thickness and pattern of vertical bars.
B) They require direct line-of-sight scanning for the radio waves to scan a product perfectly.
C) They require a reader that tunes into a specific frequency to determine the number and location of products.
D) They are installed in a handheld or pen-type scanner that reads and records data instantly.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
The two basic requirements for a good electronic scanner are a document feeder and a(n)_____.
A) digital printing software
B) optical character recognition software
C) radio wave transmitter
D) bar code imager
A) digital printing software
B) optical character recognition software
C) radio wave transmitter
D) bar code imager
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
A decision support system (DSS):
A) speeds up and simplifies the acquisition of information.
B) uses external sources of data to provide managers the information to analyze organizational performance.
C) is designed to help managers deal with specific kinds of problems.
D) is a hybrid of executive information systems and intranets.
A) speeds up and simplifies the acquisition of information.
B) uses external sources of data to provide managers the information to analyze organizational performance.
C) is designed to help managers deal with specific kinds of problems.
D) is a hybrid of executive information systems and intranets.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
By examining customer checkout details,a supermarket has learned that people who buy beer,typically,also buy a packet of salted snacks.As a result,the manager of the supermarket decides to place beer near the shelf with chips and pretzels.In this case,which of the following tools for processing information has the supermarket most likely used?
A) Data integration
B) Data mining
C) Bar coding
D) Radio frequency tagging
A) Data integration
B) Data mining
C) Bar coding
D) Radio frequency tagging
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
_____ are private company networks that allow employees to easily access,share,and publish information using Internet software.
A) Extranets
B) Data clusters
C) Intranets
D) Firewalls
A) Extranets
B) Data clusters
C) Intranets
D) Firewalls
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
Affinity patterns occur when:
A) two or more database elements occur together in a significant pattern in which one of the elements precedes the other.
B) two or more database elements tend to occur together in a significant way.
C) three or more database elements occur intermittently in an unstructured way.
D) three or more database elements occur together in a significant pattern in which one of the elements precedes the other.
A) two or more database elements occur together in a significant pattern in which one of the elements precedes the other.
B) two or more database elements tend to occur together in a significant way.
C) three or more database elements occur intermittently in an unstructured way.
D) three or more database elements occur together in a significant pattern in which one of the elements precedes the other.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
A manufacturer of pharmaceuticals can access information about its sales and share confidential product information with drug store chains through the use of _____.
A) an extranet
B) an electronic data interchange
C) a corporate portal
D) two-factor authentication
A) an extranet
B) an electronic data interchange
C) a corporate portal
D) two-factor authentication
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
The three kinds of information technology used by executives,managers,and workers inside a company to access and share information are:
A) executive information systems, portals, and intranets.
B) local area networks, extranets, and management control systems.
C) electronic data interchange, web services, and extranets.
D) expert systems, decision support systems, and virtual private networks.
A) executive information systems, portals, and intranets.
B) local area networks, extranets, and management control systems.
C) electronic data interchange, web services, and extranets.
D) expert systems, decision support systems, and virtual private networks.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
Which of the following best describes communication costs?
A) It is the cost of obtaining data that an organization does not possess.
B) It is the cost of transforming data into meaningful information.
C) It is the cost of transmitting information from one place to another.
D) It is the cost of physically or electronically archiving information.
A) It is the cost of obtaining data that an organization does not possess.
B) It is the cost of transforming data into meaningful information.
C) It is the cost of transmitting information from one place to another.
D) It is the cost of physically or electronically archiving information.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
_____ represent numerical data by varying the thickness and pattern of vertical lines.
A) Radio frequency identification tags
B) Bar codes
C) Morse codes
D) Optical character recognition tags
A) Radio frequency identification tags
B) Bar codes
C) Morse codes
D) Optical character recognition tags
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
Which of the following statements is true about knowledge?
A) Knowledge is similar to data and information.
B) Knowledge resides in information.
C) Knowledge is the understanding that one gains from information.
D) Knowledge is easier to acquire than data and information.
A) Knowledge is similar to data and information.
B) Knowledge resides in information.
C) Knowledge is the understanding that one gains from information.
D) Knowledge is easier to acquire than data and information.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
A(n)_____ allows companies to exchange information and conduct transactions by purposely providing outsiders with direct,web browser-based access to authorized parts of a company's information system.
A) extranet
B) corporate portal
C) executive information system
D) intranet
A) extranet
B) corporate portal
C) executive information system
D) intranet
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
Baxton Courier Services recently gave all its employees electronic tablets to accurately track the whereabouts of its shipments.In this process,the costs that Baxton Courier Services incurred is an example of _____ costs.
A) acquisition
B) processing
C) communication
D) retrieval
A) acquisition
B) processing
C) communication
D) retrieval
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
Which of the following is a software that encrypts Internet data at both ends of the transmission process?
A) Cookie manipulator
B) Virtual private network
C) Executive information system
D) Data insulator
A) Cookie manipulator
B) Virtual private network
C) Executive information system
D) Data insulator
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
Which of the following web-based tools provides secure off-site access to data and programs?
A) Decision support system
B) Electronic data interchange
C) Secure sockets layer encryption
D) Executive information system
A) Decision support system
B) Electronic data interchange
C) Secure sockets layer encryption
D) Executive information system
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
Sequence patterns appear when:
A) two or more database elements occur together in a significant pattern in which one of the elements precedes the other.
B) two or more database elements tend to occur together in a significant way.
C) three or more database elements occur together in a significant way.
D) three or more database elements occur together in an insignificant pattern in which two of the elements precede the other.
A) two or more database elements occur together in a significant pattern in which one of the elements precedes the other.
B) two or more database elements tend to occur together in a significant way.
C) three or more database elements occur together in a significant way.
D) three or more database elements occur together in an insignificant pattern in which two of the elements precede the other.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
The two critical steps required to make sure that data can be accessed by approved users and no one else are:
A) authentication and authorization.
B) authorization and empowerment.
C) authentication and encryption.
D) authorization and encryption.
A) authentication and authorization.
B) authorization and empowerment.
C) authentication and encryption.
D) authorization and encryption.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
Soundwave Communication Services has processed and archived a large amount of data on its servers.Due to a technical fault in its servers, it could not access the data.The company had to pay $3 million to technicians to regain access to the data.This is an example of _____ costs.
A) acquisition cost
B) processing cost
C) storage cost
D) retrieval cost
A) acquisition cost
B) processing cost
C) storage cost
D) retrieval cost
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
_____ usually begins with the user telling the data mining software to look and test for specific patterns and relationships in a data set.
A) Data integration
B) Data binding
C) Supervised data mining
D) Unsupervised data mining
A) Data integration
B) Data binding
C) Supervised data mining
D) Unsupervised data mining
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
_________ occur when two or more database elements tend to occur together in a significant way.A.Association patterns
B.Data clustersC.Time seriesD.Predictive patterns
B.Data clustersC.Time seriesD.Predictive patterns
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
The two basic methods of capturing information are _________.
A.systematic and unsystematic
B.manual and electronic
C.continuous and intermittent
D.functional and hierarchical
A.systematic and unsystematic
B.manual and electronic
C.continuous and intermittent
D.functional and hierarchical
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
In the context of protecting information,_________ makes sure that users are who they claim to be.A.encryption
B.authorizationC.decryptionD.authentication
B.authorizationC.decryptionD.authentication
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
_________ are the two information technologies to capture and share the knowledge of consultants,specialists,and experts with other managers and workers.
A.Decision support systems and expert systems
B.Executive information systems and electronic data interchange
C.Virtual private networks and secure socket layer encryption
D.Data mining and two-factor authentication
A.Decision support systems and expert systems
B.Executive information systems and electronic data interchange
C.Virtual private networks and secure socket layer encryption
D.Data mining and two-factor authentication
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
While completing an online banking transaction,David was asked to type his Internet banking password followed by a one-time password that was sent to his registered cell phone number to authenticate the transaction.This type of authentication is called _________.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
_________ transforms data into complex,scrambled digital codes that can be decrypted only by authorized users who possess unique decryption keys.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
_________ stores huge amounts of data that have been prepared for data mining analysis by being cleaned of errors and redundancy.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
The term _________ refers to facts and figures that are unusable unless they have meaning.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
_________ is the process of granting authenticated users approved access to data,software,and systems.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
_________ allow managers and employees to use a web browser to gain access to customized company information and to complete specialized transactions.
A.Extranets
B.Firewalls
C.Corporate portals
D.Executive information systems
A.Extranets
B.Firewalls
C.Corporate portals
D.Executive information systems
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck