Information Systems Final Exam University of Iowa

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/84

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

85 Terms

1
New cards

Responsive Design:

Helps to ensure a common look and feel for the site across all devices by rearranging content

2
New cards

Website design for a company always requires:

A careful analysis of the functionality needed by users

3
New cards

A mobile website for a company:

Sometimes trims down on content and features

4
New cards

Which of the following is true about structured data from an Online Transaction Processing System?

Each transaction is processed at the time of entry

5
New cards

Closing tag

6
New cards

CSS

Describes how HTML elements are to be displayed on screen

7
New cards

Div

A generic container element you can put other HTML elements inside

8
New cards

Class

Specifies a style for a select group of HTML elements

9
New cards

Media query

Lets you create CSS styles that are only activated under certain conditions (for example, if the browser is smaller than 500px wide)

10
New cards

Article

Meant to go around blog posts, news articles, essays, and any other bit of content that could stand alone and is meant to be read

11
New cards

Ul

This tag makes bulleted lists

12
New cards

Style

An HTML tag that you can use to include CSS directly in your HTML file, rather than linking to an external CSS file.

13
New cards

Javascript

Can hide a

Text

14
New cards

Which of the following describes structured data?

-a defined length, type, and format

-includes numbers, dates, or strings such as Customer Address

-is typically stored in a relational database

15
New cards

What of the following are characteristics of unstructured data?

-does not follow a specified format

-free-form text

-emails and Twitter tweets are examples

16
New cards

A transaction processing system (TPS) is the basic business system that assists operational level analysts when making data driven decisions. Which of the following is not an example of a TPS?

Comfort Dental 's x-ray pictures

17
New cards

The primary purpose of a data warehouse is to

combine strategic information

18
New cards

Why were data warehouses created?

-Numbers and types of operational databases increased as businesses grew.

-Many companies had information scattered across multiple systems with different formats.

-Completing reporting requests from numerous operational systems took days or weeks.

19
New cards

What is extraction, transformation, and loading?

It is a process that extracts information from internal and external databases, transforms it using a common set of enterprise definitions, and loads it into a data warehouse.

20
New cards

Which of the following occurs during data cleansing?

-Clean missing records

-Clean redundant record

-Clean inaccurate data

21
New cards

Which of the following statements is true?

The more complete and accurate an organization wants to get its information, the more it costs.

22
New cards

Business analysis is often difficult to achieve from operational (TPS) databases. Which of the following is not a reason why:

effective direct data access like QBE is not available

23
New cards

Business analytics can provide managers with the ability to make better decisions. Which of the following is not an example of how different industries use business analytics?

Identify the primary locations where data is collected

24
New cards

What is Big Data?

a collection of large, complex data sets, including structured and unstructured data, which cannot be analyzed using traditional database methods and tools

25
New cards

What is web analytics?

unstructured data associated with websites to identify consumer behavior and website navigation

26
New cards

T or F: Web/Screen scraped data in not used by an organization for any analysis purpose because it cannot be obtained from your transaction processing system

False

27
New cards

Scraping of data from the web can be accomplished by using which of the following methods:

-An RTO website

-Software tools designed for scraping data

-A responsive web site design

-A software tool that grabs data and downloads the data as a csv file

-2 of the above are correct****

28
New cards

The Google Chrome web scraper extension:

Uses a sitemap that defines the pages you scrape and the data you scrape

29
New cards

In the relational database model, what is a person, place, thing, transaction, or event about which information is stored?

entity

30
New cards

Why do relational databases use both primary keys and foreign keys?

to create relationships between entities

31
New cards

What is a primary key?

a field (or group of fields) that uniquely identifies a given record in a table

32
New cards

What is a foreign key?

a primary key of one table that appears as an attribute in another table and acts to provide a relationship among the two tables

33
New cards

Which of the following is used to write lines of code to answer questions against a database

structured query language

34
New cards

What is a tool that retrieves information and helps end users graphically design the answer to a question?

query-by-example tool

35
New cards

What is the primary difference between an entity and an attribute?

An entity is a table that stores information about people, places, or events, whereas an attribute is a column or specific field of the data elements associated with an entity.

36
New cards

What is the role of a foreign key?

It is a primary key of one table that appears as an attribute in another table and acts to provide a logical relationship between the two tables.

37
New cards

Suppose you have a database table named INVENTORY that contains all the products a company sells. The table contains the inventory item # (primary key), item description, and the sales price for each inventory item. The database also contains a table named SALES that contains data about every point-of-sale made (at a brick and mortar store) and each inventory item # sold on that sale. as a foreign key. I want a Sales-Item report that lists all Sales, each and every inventory item # sold on the sale, and the description for each item on each Sale. Which of the following are true - select all that are correct.

--the report will require 2 tables to be linked together

--the 2 tables will be linked together with the inventory item # field

38
New cards

Transaction processing system data might be used for:

-Doing analysis on future student enrollment

-Creating reports/queries for evaluating revenue amounts in an e-commerce sales system

-Input into a BI analysis tool

39
New cards

Which of the following, (1) money deposited in a bank account, (2) student registering for a class, (3) customer adding an item to an online shopping cart, are considered transactions in an information system?

All of them

40
New cards

Which of the following is NOT a part of a database?

Worksheets

41
New cards

A database for a company's transaction processing system for recording sales; should reflect:

The company's specific business process rules

42
New cards

T or F: BandID is the primary key in the Band table. The Bookings table needs BandID as a foreign key. You will not need to create an attribute in the Bookings table that will hold the BandID value; since Access will automatically create the foreign key attribute for you.

False

43
New cards

A foreign key in a database table:

is an attribute in a table; its value must be a value from a primary key in another table

44
New cards

Suppose that you have an Access database with a table named Sale Orders with the fields "OrderID", "TotalOrder$Value", "CustomerID (fk from customer table.)"; and; a table named Customer with the fields "CustomerID", CustomerName", "CurrentARBalance", and "CurrentCrediLimit".. I want a Customer-Sales query that lists all Sale Orders, and the CustomerName for each Sale Order.

Which of the following are true?

The 2 tables will be linked together with the CustomerID field

45
New cards

Suppose that you have an Access database with a table named Sale Orders with the fields "OrderID", "Order$Value", "CustomerID (fk from customer table.)"; and; a table named Customer with the fields "CustomerID", CurrentARBalance", and "CurrentCrediLimit".

How might you design a query to calculate the total $ value of all orders placed by each customer?

Use a GroupBy and Sum for the Sale Orders table

46
New cards

Suppose you are running a mid-sized business; and it is using cloud-based SaaS ERP software.

Which of the following will not be an issue that you will he worried about?

employing full-time IT professionals to manage your hardware and servers

47
New cards

A benefit of using a CRM system would be:

Customer data is available for use by all customer facing departments

48
New cards

Data used in business intelligence (BI) analysis could come from which of the following sources:

--A cloud based application

--Data from sources outside the company

--Structured data from sources inside the company

49
New cards

A key feature of an enterprise system is that _________.

it will help a business coordinate between business processes

50
New cards

Which of the following is used by the Google Chrome web scraper extension to scrape the data:

A Text selector type

51
New cards

Structured Data

Information displayed in titled columns and rows which can easily be ordered and processes; can be visualized as a perfectly organized filing cabinet where everything is identified, labeled, and easy to access

Transaction Processing Systems (TPSs)

-Capture and process detailed data necessary to update the organization's records about fundamental business operations

-Include order entry, inventory control, payroll, accounts payable/receivable, general ledgers, etc.

-Provides valuable input to data analytic efforts

Online transaction processing (OLTP)

-Data processing in which each transaction is processed immediately

-At any time, the data in an online system reflects the current status

52
New cards

What is an Information System?

Technology that collects, processes, stores, analyzes, and disseminates information for a specific purpose

-Solves business problems, perform data analysis, and supports decision-making

--Example: Expedia.com collects information on flights, analyzes customer requests, and returns info on matching flights so that customer can make a purchase decision

53
New cards

Information Technology (IT) vs Information Systems (IS)

Information Technology (IT): the hardware, software and media used to store, organize, retrieve and communicate information

Information System (IS): an organized combination of hardware, software, infrastructure, data and people that is used to accomplish a specified organizational or personal objective

Computerized IS builds on top of IT infrastructure**

54
New cards

HTML (Hypertext Markup Language)

-Marks up the content of a site.

-You can call up functionality by using certain HTML tags.

-Is simple in its structure. (No programming logic, no loops or functions.)

-Was NEVER really intended to contain tags for formatting a web page.

-Was created to describe the content of a web page

55
New cards

CSS (Cascading Style Sheets)

-Describes how HTML elements are to be displayed on screen

-Can control the layout of multiple web pages all at once

-External stylesheets are stored in CSS files

-Used to define styles for different devices and screen sizes

56
New cards

Javascript

There are many things that JavaScript can do that HTML and CSS cannot do:

-Can Change HTML Content.

-Can Hide HTML Elements.

-Programs the behavior of web pages

57
New cards

Responsive Design

Creates web pages that look good on all devices

-Will automatically adjust for different screen sizes and devices

-Helps to furnish a full experience at the mobile and desktop levels; site design changes as the display used by the user increases in screen size

-Helps to avoid an inconsistent experience for users on different devices

58
New cards

Data Analysis Steps (ETL)

1. Extract

-Obtaining data is the first step in data analytics.

-Data is often stored in different systems and in multiple formats.

-Canned reports often lack complete data, such as date, time, etc. Be sure to include all the fields you will need to get a complete set of data.

-Query Design Tool (QBE)

2. Transform

-Data wrangling, sometimes referred to as data munging, is the process of transforming and mapping data from one "raw" data form into another format with the intent of making it more appropriate and valuable for a variety of downstream purposes such as analytics.

-The process of detecting and then correcting or deleting incomplete, incorrect, inaccurate, irrelevant records that reside in a database

-Extracting the data in a raw form from the data source,

-"Munging" the raw data using algorithms (e.g. sorting) or parsing the data into predefined data structures.

-Depositing the resulting content into storage for future use or using it yourself

3. Load

-Depositing the resulting transformed data into a database for future analysis by a tool

-Depositing the resulting transformed data into a file for future analysis by a tool

-Then you do the analysis

59
New cards

Business Analytics

The use of data and quantitative analysis to support fact-based decision making within organizations

Can be used to:

-Gain a better understanding of current business performance

-Reveal new business patterns and relationships

-Explain why certain results occurred

-Optimize current operations

-Forecast future business results

60
New cards

What is Web Scraping?

-Process of extracting data from websites

--You could go website to website and copy and paste data into Excel or word; clean it; then use it

--You could automate the extraction with software; clean it; then use it

61
New cards

Relational Database

Stores data in connected tables

-Connections (Joins) are accomplished via common attribute fields called Join Fields (often a Foreign Key)

-In order to accomplish queries across multiple tables there must be Join Fields

62
New cards

Creating Relationships Through Keys

Primary key - A field (or group of fields) that uniquely identifies a given record in a table

Foreign key - A primary key of one table that appears an attribute in another table and acts to provide a logical relationship among the two tables

63
New cards

The Hierarchy of a Relational Database

1. Database

2. A table is a collection of related records

3. A record is a group of related fields

4. An attribute/field

64
New cards

APIs

API's- very much the same thing as a UI, except that it is geared for consumption by software instead of humans.

-Often explained as a technology that allows applications (software programs) to talk to one another

-The terms "software," "applications," "machines" and "computers" are virtually interchangeable

-Came in to existence to satisfy a demand for access to valuable content, data and resources

-Enable websites, web and mobile applications to build applications, using resources that were completely out of reach in even the recent past.

-Some API resources, like a simple city look-up by postal code, might be simple enough that a developer could recreate, but other resources such as global satellite imagery is something the average developer does not have the resources, or the time to create—the more API resources available, the cooler the apps we build.

-API consumers have a need, a problem they need to solve.

65
New cards

Scrum

An agile process that allows us to focus on delivering the highest business value in the shortest time.

-It allows us to rapidly and repeatedly inspect actual working software (every two weeks to one month).

-The business sets the priorities. Teams self-organize to determine the best way to deliver the highest priority features.

-Every two weeks to a month anyone can see real working software and decide to release it as is or continue to enhance it for another sprint.

66
New cards

Sprints

Scrum projects make progress in a series of "sprints"

-Typical duration is 2-4 weeks or a calendar month at most

-A constant duration leads to a better rhythm

-Product is designed, coded, and tested during the sprint

67
New cards

Scrum Framework

1. Roles

-Product owner

-ScrumMaster

-Team

2. Ceremonies

-Spring planning

-Spring review

-Sprint retrospective

-Daily scrum meeting

3. Artifacts

-Product backlog

-Spring backlog

-Burndown charts

68
New cards

Robotic Process Automation (RPA)

Software robot or "bot" that replicates the actions of a human to execute tasks across computer systems.

-Configurable software that sits on top of a company's existing IT infrastructure, pulling data, performing algorithms, and creating reports.

-The "robot" is configured to complete the same process steps, follow the business rules, and use the same systems that a human does today.

-RPA makes the most significant impact on manual work processes that are repetitive and recurring, and often have high human error rates.

-Automate tasks that you'd normally spend time doing yourself, freeing you up to focus on the things that require your human touch.

69
New cards

Jupyter Notebooks

A free, open-source, interactive web tool known as a computational notebook

-Data analysts can use it to combine software code, computational output, and explanatory text in a single document

-Users write code, execute code, and see what happens

-Modify and repeat in a kind of iterative conversation between the analyst and data

70
New cards

Virus

Software written with malicious intent to cause annoyance or damage

-Worm

-Malware

-Adware

-Spyware

-Ransomware

-Scareware

-Backdoor program

-Denial-of-service attack (DoS)

-Distributed denial-of-service attack (DDoS)

-Trojan-horse virus

71
New cards

3 Primary IT Security Areas

1. People (Authentication and Authorization)

2. Data (Prevention and Resistance)

3. Attacks (Detection and Response)

72
New cards

Internet of Things (IoT) -

A network of physical objects (things) embedded with sensors, processors, software, and network connectivity capability to enable them to exchange data with the manufacturer of the device, device operators, other connected devices, and cloud-based software.

-RFID inventory tracking chips, traditional in-store infrared foot-traffic counters, cellular and Wi-Fi tracking systems, digital signage, a kiosk, or a customer's mobile device

-Sensor: a device that is capable of sensing something about its surroundings (Pressure, temperature, humidity, pH level, motion, vibration, or level of light)

73
New cards

The Cloud

The on-demand delivery of compute power, database storage, applications, and other IT resources through a cloud services platform via the internet with pay-as-you-go pricing

74
New cards

Enterprise Systems

Provide enterprise-wide support and data access for a firm's operations and business processes.

-Supply chain management

-Customer relationship management

-Enterprise resource planning

75
New cards

Unstructured Data

-Raw and unorganized

-NO pre-defined data model; often text; and relationships are ambiguous

-There is sometimes some structure in this data but the structure is not neatly spelled out for us

-Need to extract elements that matter and figure out how they are related

76
New cards

Worm

Spreads itself not only from file to file but also from computer to computer

77
New cards

Malware

Software that is intended to damage or disable computes and computer systems

78
New cards

Adware

Software, while purporting to serve some useful function and often fulfilling that function, also allows Internet advertisers to display advertisements without the consent of the computer user

79
New cards

Spyware

A special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission

80
New cards

Ransomware

A form of malicious software that infects your computers and asks for money

81
New cards

Scareware

Type of malware designed to trick victims into giving up personal information to purchase or download useless and potentially dangerous software

82
New cards

Backdoor program

Opens a way into the network for future attacks

83
New cards

Denial-of-service attack (DoS)

Floods a website with so many requests for service that it slows down or crashes the site

84
New cards

Distributed denial-of-service attack (DDoS)

From multiple computers floods a website with so many requests for service that it slows down or crashes (Ping of Death)

85
New cards

Trojan-horse virus

Hides inside other software, usually as an attachment or a downloadable file