K201 Lecture Exam 1 (Multiple Choice Questions)

0.0(0)
studied byStudied by 1 person
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/49

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

50 Terms

1
New cards

In the five-component framework of an information system, which is the most important?

People

2
New cards

Each Information System is comprised of five components. Match the component with the order in which it appears in the Five-Component Model.

1-Hardware

2-Software

3-Data

4-Procedures

5-People

3
New cards

True/False: The number of components in the Five Component Model increases in proportion to an Information System's complexity and/or size.

False

4
New cards

If it is on a piece of paper or on a digital screen it is________ if it is in the mind of a human it is __________

Data and Information

5
New cards

True/False In order for data to be considered timely it must be delivered in real time.

False

6
New cards

True/False Good data are always worth the cost, no matter how expensive.

False

7
New cards

Keeping track of data involving multiple themes such as employees, transactions, customers, supplies, etc. should be done with...? (Spreadsheet, relational database or a flat file system)

Relational database

8
New cards

The data displayed in Design View of a table in an Access database is an example of ______

Metadata

9
New cards

True/False A database is simply a group of tables or files.

False

10
New cards

Match the data elements below with the term in which they are often referred. (fields, bytes, tables, records)

Fields-Columns

Bytes-Characters

Tables-File

Records-Row

11
New cards

How many primary functions does a database management system (DBMS) have?

3 primary functions (to create the database and its structures, to process the database, and to administer the database)

12
New cards

Which of the following is an international standard language for processing a database? (Paradox, DB2, MS Access, or SQL)

SQL

13
New cards

True/False The lost-update problem can be resolved by implementing multi-user database processing.

False (actually caused by multi-user database processing. Some type of locking must be used to coordinate activities among the multiple users)

14
New cards

True/False Microsoft Access is a database

False

15
New cards

A ___________ makes databases more useful for obtaining information.

database application

16
New cards

A ________ describes the data and relationships that will be stored in a database.

data model

17
New cards

Which of the following relationship types is described in the attached image?

->------<- (three prong to three prong)

Many-to-many

18
New cards

True/False A table containing normalized data should have 3 or fewer themes

False (A normalized table should contain data with one and only one theme)

19
New cards

True/False N:M relationships should be represented in a data model the same way a 1:N relationship is represented.

False

20
New cards

Which of the following should be responsible for signing off on the data model before a database is developed? (end users, project manager, CEO, development team)

end users

21
New cards

Information systems that process operational, social, and other data to identify patterns, trends, and relationships for use by business professionals are known as_______.

Business Intelligence (BI) Systems

22
New cards

The patterns, trends, and relationships produced by these information systems are referred to as ________.

business intelligence

23
New cards

True/False An inventory report set to run automatically when an item reaches a critical low point is an example of pull publishing.

False (This is an example of push publishing because the report is executed automatically as a result of an event)

24
New cards

Which of the following is the first primary activity in the BI process? (Cleanse Data, Analyze Data, Acquire Data, Publish Results)

Acquire Data

25
New cards

True/False One of the main benefits of BI Analysis is that there are no discrepancies in the data acquired from multiple sources.

False (No matter how advanced a system is, the only safeguard against inaccurate analyses from inconsistent data is for the analyst and knowledge worker to realize inconsistencies are a common occurrence and to be on the lookout)

26
New cards

________ is the application of statistical techniques to find patterns and relationships among data for classification and prediction.

Data Mining

27
New cards

True/False For unsupervised data mining, analysts do not create a model or hypothesis before running the analysis.

True

28
New cards

With ________, data miners develop a model prior to the analysis and apply statistical techniques to data to estimate parameters of the model.

Supervised data mining

29
New cards

True/False A common business application of decision trees is to classify loans by likelihood of default.

True

30
New cards

True/False The process by which Netflix recommends movies and TV shows that you may like is an example of business intelligence systems being utilized in the entertainment industry.

True

31
New cards

A ________ is a person or an organization that seeks to obtain or alter data or other IS assets illegally, without the owner's permission and often without the owner's knowledge.

Threat

32
New cards

True/False An employee inadvertently installing an old database on top of the current one is considered a threat caused by human error

True

33
New cards

In the context of security threats, pretexting, sniffing, spoofing, and phishing are all examples of ________.

unauthorized data disclosure

34
New cards

In order to access your student records, you must authenticate with your IU username and passphrase. This is an example of which category of safeguard?

Technical

35
New cards

True/False Encryption, the process of transforming clear text into coded, unintelligible text for secure storage or communication is a type of human safeguard.

False (Encryption is a type of technical safeguard that also safeguards data)

36
New cards

Nonword passwords are vulnerable to a ________ attack in which the password cracker tries every possible combination of characters.

Brute force

37
New cards

When transferring funds online through the website of a reputed bank. Which of the following will be displayed in the address bar of your browser that will let you know that the bank is using the Secure Sockets Layer (SSL) protocol?

https

38
New cards

________ refers to an organization-wide function that is in charge of developing data policies and enforcing data standards

Data administration

39
New cards

________ protect databases and other organizational data.

Data safeguards

40
New cards

True/False User accounts should be defined to give users the least possible privilege needed to perform their jobs. (human safeguards for employees)

True

41
New cards

A student team, which is assigned a term project, meets and divides the work into sections and then team members work independently on their individual pieces. An hour before the project is due the team members meet again to assemble their independent pieces into a whole. What is lacking in this activity?

Collaboration

42
New cards

What is a key difference between collaboration and cooperation?

Unlike cooperation, collaboration gives importance to iteration and feedback.

43
New cards

Which of the following is a primary purpose of collaboration? (Combining pieces of work, becoming informed, evaluating coworkers, performing routine tasks)

Becoming Informed

44
New cards

Kyra, a plant supervisor, orders 500 units of Type-2 steel beams for the coming month. In doing so, she has made a(n) ________ decision.

Operational

45
New cards

Project leaders have to make decisions on the allocation and utilization of materials and labor. Such decisions are called ________ decisions.

managerial

46
New cards

An organization uses a formula to compute the reorder quantity of an item in inventory. This is an example of a(n) ________ decision process.

Structured

47
New cards

Which of the following questions is best answered through unstructured decision making? (How many overtime hours should be used to fill this order?, Should we continue to outsource our bookkeeping processes?, What is the acceptable defect ratio for this product?, When should the next batch be scheduled to reduce idle time?)

Should we continue to outsource our bookkeeping processes?

48
New cards

The need for collaboration is greatest for ________ decisions.

Strategic

49
New cards

True/False Margaret finds that calling all her senior supervisors and quality managers for a face-to-face meeting is not feasible. She arranges for a multiparty text chatting session involving all of them. This is an example of asynchronous communication.

False (This is an example of synchronous communication because all have arranged to text at the same time)

50
New cards

Version-management systems ________.

track changes to shared documents