Deck 16: Section 1: Control

Full screen (f)
exit full mode
Question
Data mining is the:

A) automated, electronic capture of data
B) process of hypothesis testing in large databases
C) process of verifying known relationships in large amounts of data
D) process of discovering unknown patterns and relationships in large amounts of data
E) method used to identify and eliminate perishable data
Use Space or
up arrow
down arrow
to flip the card.
Question
The goal of an executive information system (EIS) is to:

A) replace the need for intuition in decision making
B) create a link among authorized data and network users
C) protect organizational data from hackers
D) provide accurate, complete, relevant, and timely information to managers
E) do none of these
Question
A(n) _____is a private company network that allows employees to easily access, share, and publish information using Internet software.

A) LAN portal
B) private company network (PCN)
C) intranet
D) electronic data sharing system
E) information network
Question
To properly secure data and data networks, a manager should use:

A) virtual private networks
B) firewalls
C) authentication and authorization
D) Web-based SSL encryption
E) all of these
Question
Which of the following statements about knowledge is true?

A) Data and information are the same as knowledge.
B) Knowledge resides in information.
C) Knowledge is the understanding that one gains from information.
D) Knowledge is easier to acquire than data and information.
E) All of these statements about knowledge are true.
Question
DSS programs can replace managerial decision making.
Question
Raw data contain useful information that communicate a clear and readily understandable message to the person for which the data were gathered.
Question
Although firewalls can protect personal computers and network services connected to the corporate network, people away from their offices who interact with their company networks via the Internet face a safety risk. Which of the following technologies has proven to be a viable solution to this problem?

A) safe software for logic (SSL) encryption
B) firewall reengineering
C) secure sockets layer (SSL) encryption
D) secure logistical LAN (SLL) encryption
E) virus protected networks (VPNs)
Question
Two critical steps are required to make sure that data can be accessed by authorized users and no one else. They are:

A) authentication and authorization
B) authorization and empowerment
C) delegation and empowerment
D) encryption and empowerment
E) authentication and encryption
Question
Which of the following statements about the characteristics and costs of useful information is true?

A) Raw data become information as soon as the facts and figures are manipulated.
B) For information to be useful, it has to be malleable, concrete, reliable, and timely.
C) Obtaining good information incurs negligible costs in terms of acquisition, processing, storage, retrieval, and communication.
D) Useful information does not come cheaply.
E) All of these statements about the characteristics and costs of useful information are true.
Question
Unsupervised data mining is particularly good at identifying:

A) association or affinity patterns
B) sequence patterns
C) predictive patterns
D) data clusters
E) all of these
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/11
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 16: Section 1: Control
1
Data mining is the:

A) automated, electronic capture of data
B) process of hypothesis testing in large databases
C) process of verifying known relationships in large amounts of data
D) process of discovering unknown patterns and relationships in large amounts of data
E) method used to identify and eliminate perishable data
D
2
The goal of an executive information system (EIS) is to:

A) replace the need for intuition in decision making
B) create a link among authorized data and network users
C) protect organizational data from hackers
D) provide accurate, complete, relevant, and timely information to managers
E) do none of these
D
3
A(n) _____is a private company network that allows employees to easily access, share, and publish information using Internet software.

A) LAN portal
B) private company network (PCN)
C) intranet
D) electronic data sharing system
E) information network
intranet
4
To properly secure data and data networks, a manager should use:

A) virtual private networks
B) firewalls
C) authentication and authorization
D) Web-based SSL encryption
E) all of these
Unlock Deck
Unlock for access to all 11 flashcards in this deck.
Unlock Deck
k this deck
5
Which of the following statements about knowledge is true?

A) Data and information are the same as knowledge.
B) Knowledge resides in information.
C) Knowledge is the understanding that one gains from information.
D) Knowledge is easier to acquire than data and information.
E) All of these statements about knowledge are true.
Unlock Deck
Unlock for access to all 11 flashcards in this deck.
Unlock Deck
k this deck
6
DSS programs can replace managerial decision making.
Unlock Deck
Unlock for access to all 11 flashcards in this deck.
Unlock Deck
k this deck
7
Raw data contain useful information that communicate a clear and readily understandable message to the person for which the data were gathered.
Unlock Deck
Unlock for access to all 11 flashcards in this deck.
Unlock Deck
k this deck
8
Although firewalls can protect personal computers and network services connected to the corporate network, people away from their offices who interact with their company networks via the Internet face a safety risk. Which of the following technologies has proven to be a viable solution to this problem?

A) safe software for logic (SSL) encryption
B) firewall reengineering
C) secure sockets layer (SSL) encryption
D) secure logistical LAN (SLL) encryption
E) virus protected networks (VPNs)
Unlock Deck
Unlock for access to all 11 flashcards in this deck.
Unlock Deck
k this deck
9
Two critical steps are required to make sure that data can be accessed by authorized users and no one else. They are:

A) authentication and authorization
B) authorization and empowerment
C) delegation and empowerment
D) encryption and empowerment
E) authentication and encryption
Unlock Deck
Unlock for access to all 11 flashcards in this deck.
Unlock Deck
k this deck
10
Which of the following statements about the characteristics and costs of useful information is true?

A) Raw data become information as soon as the facts and figures are manipulated.
B) For information to be useful, it has to be malleable, concrete, reliable, and timely.
C) Obtaining good information incurs negligible costs in terms of acquisition, processing, storage, retrieval, and communication.
D) Useful information does not come cheaply.
E) All of these statements about the characteristics and costs of useful information are true.
Unlock Deck
Unlock for access to all 11 flashcards in this deck.
Unlock Deck
k this deck
11
Unsupervised data mining is particularly good at identifying:

A) association or affinity patterns
B) sequence patterns
C) predictive patterns
D) data clusters
E) all of these
Unlock Deck
Unlock for access to all 11 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 11 flashcards in this deck.