Deck 16: Section 1: Control
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/11
Play
Full screen (f)
Deck 16: Section 1: Control
1
Data mining is the:
A) automated, electronic capture of data
B) process of hypothesis testing in large databases
C) process of verifying known relationships in large amounts of data
D) process of discovering unknown patterns and relationships in large amounts of data
E) method used to identify and eliminate perishable data
A) automated, electronic capture of data
B) process of hypothesis testing in large databases
C) process of verifying known relationships in large amounts of data
D) process of discovering unknown patterns and relationships in large amounts of data
E) method used to identify and eliminate perishable data
D
2
The goal of an executive information system (EIS) is to:
A) replace the need for intuition in decision making
B) create a link among authorized data and network users
C) protect organizational data from hackers
D) provide accurate, complete, relevant, and timely information to managers
E) do none of these
A) replace the need for intuition in decision making
B) create a link among authorized data and network users
C) protect organizational data from hackers
D) provide accurate, complete, relevant, and timely information to managers
E) do none of these
D
3
A(n) _____is a private company network that allows employees to easily access, share, and publish information using Internet software.
A) LAN portal
B) private company network (PCN)
C) intranet
D) electronic data sharing system
E) information network
A) LAN portal
B) private company network (PCN)
C) intranet
D) electronic data sharing system
E) information network
intranet
4
To properly secure data and data networks, a manager should use:
A) virtual private networks
B) firewalls
C) authentication and authorization
D) Web-based SSL encryption
E) all of these
A) virtual private networks
B) firewalls
C) authentication and authorization
D) Web-based SSL encryption
E) all of these
Unlock Deck
Unlock for access to all 11 flashcards in this deck.
Unlock Deck
k this deck
5
Which of the following statements about knowledge is true?
A) Data and information are the same as knowledge.
B) Knowledge resides in information.
C) Knowledge is the understanding that one gains from information.
D) Knowledge is easier to acquire than data and information.
E) All of these statements about knowledge are true.
A) Data and information are the same as knowledge.
B) Knowledge resides in information.
C) Knowledge is the understanding that one gains from information.
D) Knowledge is easier to acquire than data and information.
E) All of these statements about knowledge are true.
Unlock Deck
Unlock for access to all 11 flashcards in this deck.
Unlock Deck
k this deck
6
DSS programs can replace managerial decision making.
Unlock Deck
Unlock for access to all 11 flashcards in this deck.
Unlock Deck
k this deck
7
Raw data contain useful information that communicate a clear and readily understandable message to the person for which the data were gathered.
Unlock Deck
Unlock for access to all 11 flashcards in this deck.
Unlock Deck
k this deck
8
Although firewalls can protect personal computers and network services connected to the corporate network, people away from their offices who interact with their company networks via the Internet face a safety risk. Which of the following technologies has proven to be a viable solution to this problem?
A) safe software for logic (SSL) encryption
B) firewall reengineering
C) secure sockets layer (SSL) encryption
D) secure logistical LAN (SLL) encryption
E) virus protected networks (VPNs)
A) safe software for logic (SSL) encryption
B) firewall reengineering
C) secure sockets layer (SSL) encryption
D) secure logistical LAN (SLL) encryption
E) virus protected networks (VPNs)
Unlock Deck
Unlock for access to all 11 flashcards in this deck.
Unlock Deck
k this deck
9
Two critical steps are required to make sure that data can be accessed by authorized users and no one else. They are:
A) authentication and authorization
B) authorization and empowerment
C) delegation and empowerment
D) encryption and empowerment
E) authentication and encryption
A) authentication and authorization
B) authorization and empowerment
C) delegation and empowerment
D) encryption and empowerment
E) authentication and encryption
Unlock Deck
Unlock for access to all 11 flashcards in this deck.
Unlock Deck
k this deck
10
Which of the following statements about the characteristics and costs of useful information is true?
A) Raw data become information as soon as the facts and figures are manipulated.
B) For information to be useful, it has to be malleable, concrete, reliable, and timely.
C) Obtaining good information incurs negligible costs in terms of acquisition, processing, storage, retrieval, and communication.
D) Useful information does not come cheaply.
E) All of these statements about the characteristics and costs of useful information are true.
A) Raw data become information as soon as the facts and figures are manipulated.
B) For information to be useful, it has to be malleable, concrete, reliable, and timely.
C) Obtaining good information incurs negligible costs in terms of acquisition, processing, storage, retrieval, and communication.
D) Useful information does not come cheaply.
E) All of these statements about the characteristics and costs of useful information are true.
Unlock Deck
Unlock for access to all 11 flashcards in this deck.
Unlock Deck
k this deck
11
Unsupervised data mining is particularly good at identifying:
A) association or affinity patterns
B) sequence patterns
C) predictive patterns
D) data clusters
E) all of these
A) association or affinity patterns
B) sequence patterns
C) predictive patterns
D) data clusters
E) all of these
Unlock Deck
Unlock for access to all 11 flashcards in this deck.
Unlock Deck
k this deck