Deck 16: Section 3: Control
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/11
Play
Full screen (f)
Deck 16: Section 3: Control
1
Which of the following statements about knowledge is true?
A) Data and information are the same as knowledge.
B) Knowledge resides in information.
C) Knowledge is the understanding that one gains from information.
D) Knowledge is easier to acquire than data and information.
E) All of these statements about knowledge are true.
A) Data and information are the same as knowledge.
B) Knowledge resides in information.
C) Knowledge is the understanding that one gains from information.
D) Knowledge is easier to acquire than data and information.
E) All of these statements about knowledge are true.
C
2
Which of the following statements about the characteristics and costs of useful information is true?
A) Raw data become information as soon as the facts and figures are manipulated.
B) For information to be useful, it has to be malleable, concrete, reliable, and timely.
C) Obtaining good information incurs negligible costs in terms of acquisition, processing, storage, retrieval, and communication.
D) Useful information does not come cheaply.
E) All of these statements about the characteristics and costs of useful information are true.
A) Raw data become information as soon as the facts and figures are manipulated.
B) For information to be useful, it has to be malleable, concrete, reliable, and timely.
C) Obtaining good information incurs negligible costs in terms of acquisition, processing, storage, retrieval, and communication.
D) Useful information does not come cheaply.
E) All of these statements about the characteristics and costs of useful information are true.
Useful information does not come cheaply.
3
Unsupervised data mining is unethical.
False
4
____________is the direct electronic transmission of purchase and ordering information from one company's computer system to another company's computer system.
A) Automated processing
B) Electronic data interchange
C) Transaction channeling
D) Data manipulation
E) Information exchange
A) Automated processing
B) Electronic data interchange
C) Transaction channeling
D) Data manipulation
E) Information exchange
Unlock Deck
Unlock for access to all 11 flashcards in this deck.
Unlock Deck
k this deck
5
Data mining is the:
A) automated, electronic capture of data
B) process of hypothesis testing in large databases
C) process of verifying known relationships in large amounts of data
D) process of discovering unknown patterns and relationships in large amounts of data
E) method used to identify and eliminate perishable data
A) automated, electronic capture of data
B) process of hypothesis testing in large databases
C) process of verifying known relationships in large amounts of data
D) process of discovering unknown patterns and relationships in large amounts of data
E) method used to identify and eliminate perishable data
Unlock Deck
Unlock for access to all 11 flashcards in this deck.
Unlock Deck
k this deck
6
Raw data contain useful information that communicate a clear and readily understandable message to the person for which the data were gathered.
Unlock Deck
Unlock for access to all 11 flashcards in this deck.
Unlock Deck
k this deck
7
The goal of an executive information system (EIS) is to:
A) replace the need for intuition in decision making
B) create a link among authorized data and network users
C) protect organizational data from hackers
D) provide accurate, complete, relevant, and timely information to managers
E) do none of these
A) replace the need for intuition in decision making
B) create a link among authorized data and network users
C) protect organizational data from hackers
D) provide accurate, complete, relevant, and timely information to managers
E) do none of these
Unlock Deck
Unlock for access to all 11 flashcards in this deck.
Unlock Deck
k this deck
8
In the process of capturing information, ASCII text is generated by:
A) bar codes
B) electronic scanners
C) optical character recognition software
D) e-tools
E) data mining
A) bar codes
B) electronic scanners
C) optical character recognition software
D) e-tools
E) data mining
Unlock Deck
Unlock for access to all 11 flashcards in this deck.
Unlock Deck
k this deck
9
A(n)____________ is a private company network that allows employees to easily access, share, and publish information using Internet software.
A) LAN portal
B) private company network (PCN)
C) intranet
D) electronic data sharing system
E) information network
A) LAN portal
B) private company network (PCN)
C) intranet
D) electronic data sharing system
E) information network
Unlock Deck
Unlock for access to all 11 flashcards in this deck.
Unlock Deck
k this deck
10
Data clusters:
A) result from the use of internal data mining
B) are a statistical technique used for trend analysis
C) are used to create samples for statistical analyses
D) occur when three or more database elements occur together in a significant way
E) are accurately described by all of these
A) result from the use of internal data mining
B) are a statistical technique used for trend analysis
C) are used to create samples for statistical analyses
D) occur when three or more database elements occur together in a significant way
E) are accurately described by all of these
Unlock Deck
Unlock for access to all 11 flashcards in this deck.
Unlock Deck
k this deck
11
Two critical steps are required to make sure that data can be accessed by authorized users and no one else. They are:
A) authentication and authorization
B) authorization and empowerment
C) delegation and empowerment
D) encryption and empowerment
E) authentication and encryption
A) authentication and authorization
B) authorization and empowerment
C) delegation and empowerment
D) encryption and empowerment
E) authentication and encryption
Unlock Deck
Unlock for access to all 11 flashcards in this deck.
Unlock Deck
k this deck