Deck 16: Section 3: Control

Full screen (f)
exit full mode
Question
Which of the following statements about knowledge is true?

A) Data and information are the same as knowledge.
B) Knowledge resides in information.
C) Knowledge is the understanding that one gains from information.
D) Knowledge is easier to acquire than data and information.
E) All of these statements about knowledge are true.
Use Space or
up arrow
down arrow
to flip the card.
Question
Which of the following statements about the characteristics and costs of useful information is true?

A) Raw data become information as soon as the facts and figures are manipulated.
B) For information to be useful, it has to be malleable, concrete, reliable, and timely.
C) Obtaining good information incurs negligible costs in terms of acquisition, processing, storage, retrieval, and communication.
D) Useful information does not come cheaply.
E) All of these statements about the characteristics and costs of useful information are true.
Question
Unsupervised data mining is unethical.
Question
____________is the direct electronic transmission of purchase and ordering information from one company's computer system to another company's computer system.

A) Automated processing
B) Electronic data interchange
C) Transaction channeling
D) Data manipulation
E) Information exchange
Question
Data mining is the:

A) automated, electronic capture of data
B) process of hypothesis testing in large databases
C) process of verifying known relationships in large amounts of data
D) process of discovering unknown patterns and relationships in large amounts of data
E) method used to identify and eliminate perishable data
Question
Raw data contain useful information that communicate a clear and readily understandable message to the person for which the data were gathered.
Question
The goal of an executive information system (EIS) is to:

A) replace the need for intuition in decision making
B) create a link among authorized data and network users
C) protect organizational data from hackers
D) provide accurate, complete, relevant, and timely information to managers
E) do none of these
Question
In the process of capturing information, ASCII text is generated by:

A) bar codes
B) electronic scanners
C) optical character recognition software
D) e-tools
E) data mining
Question
A(n)____________ is a private company network that allows employees to easily access, share, and publish information using Internet software.

A) LAN portal
B) private company network (PCN)
C) intranet
D) electronic data sharing system
E) information network
Question
Data clusters:

A) result from the use of internal data mining
B) are a statistical technique used for trend analysis
C) are used to create samples for statistical analyses
D) occur when three or more database elements occur together in a significant way
E) are accurately described by all of these
Question
Two critical steps are required to make sure that data can be accessed by authorized users and no one else. They are:

A) authentication and authorization
B) authorization and empowerment
C) delegation and empowerment
D) encryption and empowerment
E) authentication and encryption
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/11
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 16: Section 3: Control
1
Which of the following statements about knowledge is true?

A) Data and information are the same as knowledge.
B) Knowledge resides in information.
C) Knowledge is the understanding that one gains from information.
D) Knowledge is easier to acquire than data and information.
E) All of these statements about knowledge are true.
C
2
Which of the following statements about the characteristics and costs of useful information is true?

A) Raw data become information as soon as the facts and figures are manipulated.
B) For information to be useful, it has to be malleable, concrete, reliable, and timely.
C) Obtaining good information incurs negligible costs in terms of acquisition, processing, storage, retrieval, and communication.
D) Useful information does not come cheaply.
E) All of these statements about the characteristics and costs of useful information are true.
Useful information does not come cheaply.
3
Unsupervised data mining is unethical.
False
4
____________is the direct electronic transmission of purchase and ordering information from one company's computer system to another company's computer system.

A) Automated processing
B) Electronic data interchange
C) Transaction channeling
D) Data manipulation
E) Information exchange
Unlock Deck
Unlock for access to all 11 flashcards in this deck.
Unlock Deck
k this deck
5
Data mining is the:

A) automated, electronic capture of data
B) process of hypothesis testing in large databases
C) process of verifying known relationships in large amounts of data
D) process of discovering unknown patterns and relationships in large amounts of data
E) method used to identify and eliminate perishable data
Unlock Deck
Unlock for access to all 11 flashcards in this deck.
Unlock Deck
k this deck
6
Raw data contain useful information that communicate a clear and readily understandable message to the person for which the data were gathered.
Unlock Deck
Unlock for access to all 11 flashcards in this deck.
Unlock Deck
k this deck
7
The goal of an executive information system (EIS) is to:

A) replace the need for intuition in decision making
B) create a link among authorized data and network users
C) protect organizational data from hackers
D) provide accurate, complete, relevant, and timely information to managers
E) do none of these
Unlock Deck
Unlock for access to all 11 flashcards in this deck.
Unlock Deck
k this deck
8
In the process of capturing information, ASCII text is generated by:

A) bar codes
B) electronic scanners
C) optical character recognition software
D) e-tools
E) data mining
Unlock Deck
Unlock for access to all 11 flashcards in this deck.
Unlock Deck
k this deck
9
A(n)____________ is a private company network that allows employees to easily access, share, and publish information using Internet software.

A) LAN portal
B) private company network (PCN)
C) intranet
D) electronic data sharing system
E) information network
Unlock Deck
Unlock for access to all 11 flashcards in this deck.
Unlock Deck
k this deck
10
Data clusters:

A) result from the use of internal data mining
B) are a statistical technique used for trend analysis
C) are used to create samples for statistical analyses
D) occur when three or more database elements occur together in a significant way
E) are accurately described by all of these
Unlock Deck
Unlock for access to all 11 flashcards in this deck.
Unlock Deck
k this deck
11
Two critical steps are required to make sure that data can be accessed by authorized users and no one else. They are:

A) authentication and authorization
B) authorization and empowerment
C) delegation and empowerment
D) encryption and empowerment
E) authentication and encryption
Unlock Deck
Unlock for access to all 11 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 11 flashcards in this deck.