Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
90 Cards in this Set
- Front
- Back
T or F: data is free. |
False |
|
What is the difference between IT and IS? |
IT (hardware & software) + Procedures & People = IS (all 5 components) |
|
In the five component framework of an IS, which is the most important? |
People |
|
What is the order in which each component appears (from left to right) in the Five-Component Model? |
Hardware, Software, Data, Procedures, People |
|
What is the difference between data and information? |
Data: recorded facts or figures. Information: knowledge derived from data |
|
T or F: In order for data to be timely, it must be delivered in real time. |
False |
|
T or F: Good data are always worth the cost, no matter how expensive. |
False |
|
Keeping track of data involving multiple themes should be done with what? |
Relational database (lists of data involving a single theme should be stored in a spreadsheet) |
|
The data displayed in Design View of a table in an Access database is an example of... |
metadata (data that describes data) |
|
T or F: A database is simply a group of files or tables. |
False. (a database also includes relationships among the rows in the tables and metadata) |
|
Match the data elements with the term in which they are often referred. (bytes, records, fields, tables) (file, characters, columns, rows) |
Fields --> columns Bytes --> characters Table --> file Records --> row |
|
T or F: Businesses often purchase Information Systems to increase efficiency of their business processes. |
False |
|
What is good data? |
Accurate Timely (for your purpose) Relevant (to context & subject) Just sufficient Worth its cost |
|
T or F: In order for any organization to consider data "timely" it must be up to the second |
False |
|
Database Management System (DBMS) |
a program used to create, process, and administer a database |
|
What is the difference between a DBMS and a database? |
DBMS: software program Database: collection of tables, relationships, and metadata |
|
Entity |
Some thing that the users want to track (have relationships to eachother) |
|
Attributes |
describe characteristics of the entity |
|
I:N |
one-to-many relationships |
|
N:M |
many-to-many relationships |
|
Normalization |
Process of converting a poorly structured table into two or more well-structured tables (by using a primary key) Goal: to construct tables such that every table has a single topic/theme (eliminate data duplication) |
|
How many primary functions does a DBMS have? |
3: to create, process, and administer |
|
What is a structured query language (SQL)? |
an international standard language for processing a database |
|
T or F: The lost-update problem can be resolved by implementing multi-user database processing. |
False. (this is what actually causes the problem. It must be resolved by implementing some type of locking to coordinate activities among multiple users) |
|
Which DBMS category does Microsoft Access belong to? |
Personal DBMS (meant for a single user) |
|
Data Model |
Describes the data and relationships that will be stored in a database. |
|
What type of relationship does this describe? >------< |
N:M, many-to-many |
|
T or F: A table containing normalized data should have 3 or fewer themes. |
False (it should contain only one theme) |
|
What is the most important phase of the SDLC? |
Determine Requirements |
|
If a project is determined to be feasible in the SDLC, the immediate next step is to.... |
maintain the system |
|
The situation that occurs when adding more resources creates inefficiencies is known as.... |
Diseconomies of scale |
|
Why are forms important? |
important for data entry (prevents mistakes & ensures data confidentiality) |
|
Is Microsoft Access considered a database? |
No. (it is a DBMS) |
|
Reports |
display data in a meaningful way |
|
Cardinality |
Max./min. amount of entities that can be involved in a relationship |
|
Which type of relationship would be between a student table and a class table? |
N:M, many-to-many |
|
Business intelligence (BI) systems |
information systems that process operational, social, and other data to identify patterns, relationships, and trends for use by business professionals. (contains hardware, software, data, procedures, and people) |
|
BI application |
Software component of a BI system (analyze data) |
|
What are the primary activities in the BI process? |
acquire data, perform analysis, publish results |
|
The patterns, trends, and relationships produced by BI systems are referred to as... |
Business Intelligence |
|
T or F: An inventory report set to run automatically when an item reaches a critical low point is pull publishing |
False (this is push publishing since it's executed automatically) |
|
What is the first primary activity in the BI process? |
acquire data |
|
T or F: One of the main benefits of BI analysis is that there are no discrepencies in the data acquired from multiple sources. |
False |
|
Data mining |
the application of statistical techniques to find patterns & relationships among data for classification and prediction. |
|
What is true of unsupervised data mining? |
analysts don't create a model/hypothesis before running the analysis |
|
Supervised data mining |
data miners develop a model prior to the analysis and apply statistical techniques to estimate parameters of the model |
|
T or F: A common business application of decision trees is to classify loans by likelihood of default |
True |
|
T or F: The process by which netflix recommends movies/ TV shows is an example of BI systems being utilized in the entertainment industry. |
True |
|
Manage risk |
to proactively balance trade off between risk and cost |
|
Technical Safeguards |
involve the hardware & software components of an IS |
|
Identification |
identifies the user (username) |
|
Authentication |
authenticates the user (password) |
|
Encryption |
process of transforming clear text into coded, unintelligible text for secure storage or communication |
|
https |
most secure communications over internet use this protocol. data is encrypted using Secure Sockets Layer (SSL): uses a combination of public key and symmetric encryption |
|
Firewall |
computing device that prevents unauthorized network access |
|
Malware |
category of software that includes viruses, spyware, and adware |
|
Worm |
Virus that self-propogates using internet or other network |
|
Design Secure Applications |
Prevent common attacks like SQL injection attacks |
|
Data Safeguards |
protect databases & organizational data |
|
Data administration |
In charge of developing data policies and enforcing data standards (organization-wide function) |
|
Database administration |
Function that pertains to a particular database. Develop procedures & practices to ensure efficient & orderly multiuser processing, control changes, and protect databases. |
|
Human Safeguards |
Involve people & procedure components of an IS. hiring & screening, termination policies, position definitions, dissemination of policies & enforcement |
|
A _____ is a person or an organization that seeks to obtain or alter data or other IS assets illegally, without the owner's permission or knowledge |
Threat |
|
Pretexting, sniffing, spoofing, and phishing are all examples of.... |
unauthorized data disclosure |
|
In order to access your student records, you must authenticate with your IU username & passphrase. This is an example of which safeguard? |
Technical |
|
T or F: Encryption is a type of data safeguard |
False and true..? |
|
Nonword passwords are vulnerable to a _____ attack in which the password cracker tries every possible combination |
Brute Force |
|
What will be displayed in the address bar to let you know you're using SSL protocal? |
https |
|
________ refers to an organization-wide function in charge of developing data policies & enforcing data standards |
Data administration |
|
_______ protect databases and other organizational data |
Data safeguards |
|
What is true about human safeguards for employees? |
user accounts should give users the least possible privilege needed to perform their jobs |
|
T or F: Email spoofing is a synonym for phishing |
True |
|
How should organizations respond to security threats? |
Establish a company-wide security policy (technical, data, and human safeguards) Manage Risk (proactively balance trade- off's between risk and cost) |
|
Cooperation |
group of people working together to accomplish a job |
|
Collaboration |
group of people working together to achieve a common goal via a process of feedback and iteration |
|
Primary purposes of collaboration |
become informed * make decisions solve problems manage projects |
|
Operational decisions |
support day-to-day activities |
|
Managerial decisions |
about the allocation & utilization of resources |
|
Strategic decisions |
support broad-scope, organizational issues |
|
Synchronous Communication |
occurs when all team members meet at the same time (conference calls, video calls, chat room) |
|
Asynchronous Communication |
occurs when team members do not meet at the same time (e-mail, text messages, etc) |
|
What is the difference between version management and version control? |
Version Management: tracks changes to documents and provides features/functions to accommodate concurrent work Version Control: process that occurs when the collaboration tool limits, and sometimes directs, user activity |
|
What is the key difference between collaboration & cooperation? |
Collaboration gives importance to iteration & feedback |
|
Which is a primary purpose of collaboration? |
Becoming informed |
|
Kyra, a plant supervisor, orders 500 units of Type-2 steel beams for the coming month. She has made a ________ decision. |
Operational |
|
Project leaders have to make decisions on the allocation & utilization of materials and labor. Such decisions are called _________. |
Managerial decisions |
|
An organization uses a formula to compute the reorder quantity of an item in inventory. This is an example of a _______ decision process. |
structured |
|
The need for collaboration is greatest for ________ decisions. |
strategic |
|
T or F: Margaret arranges for a multiparty text chatting session. This is an example of asynchronous communication. |
False. (this is an example of synchronous communication because all have agreed to text at the same time) |
|
Version-management systems _______. |
track changes to shared documents |