Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
43 Cards in this Set
- Front
- Back
A maintenance management systems is an example of what type of system?
|
Departmental
|
|
Which of the following is not a responsibility of the IS department
|
Gather data
|
|
A malicious hacker floods a web server with millions of bogus requests. This is an example of a(n) ______ attack
|
Denial-of-service
|
|
The more attributes there are, the easier it is to build a model that fits the sample data, but is worthless as a redictor. Which of the following best explains this phenomenon?
|
The curse of dimensionality
|
|
Which is a way that a data warehouse differs from a data mart?
|
A data mart addresses a specific business are or question
|
|
Which of the following is not a characteristic of Web 2.0
|
Sales of software licenses
|
|
Describe what the following does when included in a Query.
to_char(orderdate,"YYYY") as Year |
It formats the orderdate as year and labels the column Year
|
|
Which step in the SDLC aims to eliminate projects that have the potential to violate industry regulations?
|
feasibility analysis
|
|
You have received an email asking you to click on a link that will take you to your bank's website where you are to put in your account information and other personal data. This is an example of __________.
|
Phishing
|
|
Which of the following is not a problem caused by information silos?
|
data consistency
|
|
The System development life cycle is the traditional process used to develop information systems. It is an iterative process with the steps repeated as many times as necessary
|
false
|
|
In general, the people you know best contribute the most connections to your network
|
false
|
|
Brooks' Law points out that adding more people to a late project makes the project later. This is also known as ________.
|
diseconomies of scale
|
|
the proper order for SQL statements is _________.
|
Select, From, Where, Group by, order by
|
|
write a query to get all fields from Northwinds Orders table.
|
Select *
From Northwinds.orders |
|
Which of the following is not a component of an ERP?
|
an EAI server
|
|
Which of the following os one of the principal
|
to be an effective consumer of the IT department's resoures
|
|
The primary Key in the Orders table is orderid. The foreign Key in the OrderDetails table is orderid. You need to get information from both tables. What must be in the query and in what statement?
|
WHERE orderdetails.orderid = orders.orderid
|
|
Explain in detail the difference between reporting and data-mining systems
|
Reporting systems integrated data from multiple sources, and they process that data by sorting, grouping, summing, averaging, and comparing. Data-mining systems improve decision making by using the discovered patterns and relationships to anticipate events or predict future outcomes
|
|
Well-managed organizations recognize that __________ are critical, complex, and dynamic.
|
business processes
|
|
Which of the following is NOT an example of a service?
|
Going to the office supply store for reams of paper
|
|
Systems development is the process of creating and maintaing information systems. The scope of an information system includes which of the following?
|
data, procedures, software, hardware, people
|
|
An enterprise that can quickly adapt to external factors such as regulations is called a(n) _________ enterprise.
|
Agile
|
|
Which of the following is not a challenge when implementing new enterprise systems?
|
employees welcoming the new system
|
|
In social networks, the value of social capital is determined by the number of relationships, the strength of the relationships, and the resources controlled by those relationships.
|
True
|
|
You receive an email from a close friend. The email says that their car broke down and they need a $550 loan from you to get it fixed. It gives instructions on where to wire the money to them. You do as they ask. A week later you ask the friend about getting repaid. They look at you like you are nuts. They have never been where the email said they were. You are a victim of a(n) ________ attack.
|
Spoofing
|
|
Which of the following is not a problem with raw data?
|
consistent data
|
|
Explain in detail the difference between supervised data-mining and unsupervised data-mining
|
In supervised data mining the model is created before analysis and statistical techniques such as regression are used to estimate the model's variable parameters
In unsupervised data mining the analysis is run before creating a model. Techniques such as clustering and neutral networks are used to see relationships in the data. Hypotheses are created after the data-mining to explain the results. |
|
After establishing the goals and purpose of a new information system, the project feasibility must be examined. Which of the following is not a dimension of feasibility that would be considered?
|
administrative
|
|
Which of the following is not part of the requirements analysis?
|
module development
|
|
which of the following non-merchant e-commerce companies match buyers and sellers at a predetermined price and arrange for delivery of the goods or services?
|
clearinghouses
|
|
which of the following use if/then rules?
|
Expert
|
|
The process of creating and maintaining information systems is called _________.
|
Systems development
|
|
Which of the following is not a way that social capital adds value?
|
expediency
|
|
benefits of a computer system for which it is not possible to assign dollar values are _______ benefits.
|
intangible
|
|
which of the following is an advantage of outsourcing?
|
It can be an easy way to gain expertise
|
|
A web store front is an example of a(an) __________.
|
functional information system
|
|
One of the distinguishing characteristics of Enterprise 2.0 is that the company manages the relationship with the customer through the use of a customer relationship management system
|
False
|
|
Interenterprise systems are used within a company to enable the transparency of the data and minimize the loss of data
|
false
|
|
Which of the following is not a disadvantage of disintermediation?
|
price elasticity
|
|
A business intelligence system (BI) is an information system that provides information for improving decision making. A reporting system is not part of a BI system.
|
False
|
|
The systems development life cycle is the traditional process used to develop information systems. It is a four phase process consisting of 1. system definition, 2. requirements analysis, 3. component design, and 4. implementation.
|
False
|
|
On what day in history did Dr. Fletcher Glancy not wear a Hawaiian shirt to ISA 235 class?
|
Tuesday April 23rd.
|