• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/43

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

43 Cards in this Set

  • Front
  • Back
A maintenance management systems is an example of what type of system?
Departmental
Which of the following is not a responsibility of the IS department
Gather data
A malicious hacker floods a web server with millions of bogus requests. This is an example of a(n) ______ attack
Denial-of-service
The more attributes there are, the easier it is to build a model that fits the sample data, but is worthless as a redictor. Which of the following best explains this phenomenon?
The curse of dimensionality
Which is a way that a data warehouse differs from a data mart?
A data mart addresses a specific business are or question
Which of the following is not a characteristic of Web 2.0
Sales of software licenses
Describe what the following does when included in a Query.
to_char(orderdate,"YYYY") as Year
It formats the orderdate as year and labels the column Year
Which step in the SDLC aims to eliminate projects that have the potential to violate industry regulations?
feasibility analysis
You have received an email asking you to click on a link that will take you to your bank's website where you are to put in your account information and other personal data. This is an example of __________.
Phishing
Which of the following is not a problem caused by information silos?
data consistency
The System development life cycle is the traditional process used to develop information systems. It is an iterative process with the steps repeated as many times as necessary
false
In general, the people you know best contribute the most connections to your network
false
Brooks' Law points out that adding more people to a late project makes the project later. This is also known as ________.
diseconomies of scale
the proper order for SQL statements is _________.
Select, From, Where, Group by, order by
write a query to get all fields from Northwinds Orders table.
Select *
From Northwinds.orders
Which of the following is not a component of an ERP?
an EAI server
Which of the following os one of the principal
to be an effective consumer of the IT department's resoures
The primary Key in the Orders table is orderid. The foreign Key in the OrderDetails table is orderid. You need to get information from both tables. What must be in the query and in what statement?
WHERE orderdetails.orderid = orders.orderid
Explain in detail the difference between reporting and data-mining systems
Reporting systems integrated data from multiple sources, and they process that data by sorting, grouping, summing, averaging, and comparing. Data-mining systems improve decision making by using the discovered patterns and relationships to anticipate events or predict future outcomes
Well-managed organizations recognize that __________ are critical, complex, and dynamic.
business processes
Which of the following is NOT an example of a service?
Going to the office supply store for reams of paper
Systems development is the process of creating and maintaing information systems. The scope of an information system includes which of the following?
data, procedures, software, hardware, people
An enterprise that can quickly adapt to external factors such as regulations is called a(n) _________ enterprise.
Agile
Which of the following is not a challenge when implementing new enterprise systems?
employees welcoming the new system
In social networks, the value of social capital is determined by the number of relationships, the strength of the relationships, and the resources controlled by those relationships.
True
You receive an email from a close friend. The email says that their car broke down and they need a $550 loan from you to get it fixed. It gives instructions on where to wire the money to them. You do as they ask. A week later you ask the friend about getting repaid. They look at you like you are nuts. They have never been where the email said they were. You are a victim of a(n) ________ attack.
Spoofing
Which of the following is not a problem with raw data?
consistent data
Explain in detail the difference between supervised data-mining and unsupervised data-mining
In supervised data mining the model is created before analysis and statistical techniques such as regression are used to estimate the model's variable parameters

In unsupervised data mining the analysis is run before creating a model. Techniques such as clustering and neutral networks are used to see relationships in the data. Hypotheses are created after the data-mining to explain the results.
After establishing the goals and purpose of a new information system, the project feasibility must be examined. Which of the following is not a dimension of feasibility that would be considered?
administrative
Which of the following is not part of the requirements analysis?
module development
which of the following non-merchant e-commerce companies match buyers and sellers at a predetermined price and arrange for delivery of the goods or services?
clearinghouses
which of the following use if/then rules?
Expert
The process of creating and maintaining information systems is called _________.
Systems development
Which of the following is not a way that social capital adds value?
expediency
benefits of a computer system for which it is not possible to assign dollar values are _______ benefits.
intangible
which of the following is an advantage of outsourcing?
It can be an easy way to gain expertise
A web store front is an example of a(an) __________.
functional information system
One of the distinguishing characteristics of Enterprise 2.0 is that the company manages the relationship with the customer through the use of a customer relationship management system
False
Interenterprise systems are used within a company to enable the transparency of the data and minimize the loss of data
false
Which of the following is not a disadvantage of disintermediation?
price elasticity
A business intelligence system (BI) is an information system that provides information for improving decision making. A reporting system is not part of a BI system.
False
The systems development life cycle is the traditional process used to develop information systems. It is a four phase process consisting of 1. system definition, 2. requirements analysis, 3. component design, and 4. implementation.
False
On what day in history did Dr. Fletcher Glancy not wear a Hawaiian shirt to ISA 235 class?
Tuesday April 23rd.